| Secure conversion between boolean and arithmetic masking of any order JS Coron, J Großschädl, PK Vadnala International Workshop on Cryptographic Hardware and Embedded Systems, 188-205, 2014 | 134 | 2014 |
| Conversion of security proofs from one leakage model to another: A new issue JS Coron, C Giraud, E Prouff, S Renner, M Rivain, PK Vadnala International Workshop on Constructive Side-Channel Analysis and Secure …, 2012 | 113 | 2012 |
| Conversion from arithmetic to boolean masking with logarithmic complexity JS Coron, J Großschädl, M Tibouchi, PK Vadnala International Workshop on Fast Software Encryption, 130-149, 2015 | 109 | 2015 |
| Implementation of a leakage-resilient ElGamal key encapsulation mechanism D Galindo, J Großschädl, Z Liu, PK Vadnala, S Vivek Journal of Cryptographic Engineering 6 (3), 229-238, 2016 | 31 | 2016 |
| Shuffling across rounds: A lightweight strategy to counter side-channel attacks S Patranabis, DB Roy, PK Vadnala, D Mukhopadhyay, S Ghosh 2016 IEEE 34th International Conference on Computer Design (ICCD), 440-443, 2016 | 20 | 2016 |
| Higher-order masking in practice: A vector implementation of masked AES for ARM NEON J Wang, PK Vadnala, J Großschädl, Q Xu Cryptographers’ Track at the RSA Conference, 181-198, 2015 | 20 | 2015 |
| Faster mask conversion with lookup tables PK Vadnala, J Großschädl International Workshop on Constructive Side-Channel Analysis and Secure …, 2015 | 17 | 2015 |
| Algorithms for switching between boolean and arithmetic masking of second order PK Vadnala, J Großschädl International Conference on Security, Privacy, and Applied Cryptography …, 2013 | 15 | 2013 |
| On the effect of clock frequency on voltage and electromagnetic fault injection S Koffas, PK Vadnala International Conference on Applied Cryptography and Network Security, 127-145, 2022 | 9 | 2022 |
| Time-memory trade-offs for side-channel resistant implementations of block ciphers PK Vadnala Cryptographers’ Track at the RSA Conference, 115-130, 2017 | 9 | 2017 |
| An efficient key assignment scheme for access control in a hierarchy PK Vadnala, A Mathuria International Conference on Information Systems Security, 205-219, 2006 | 7 | 2006 |
| Implementation and Evaluation of a Leakage-Resilient ElGamal Key Encapsulation Mechanism. D Galindo, J Großschädl, Z Liu, PK Vadnala, S Vivek IACR Cryptol. ePrint Arch. 2014, 835, 2014 | 6 | 2014 |
| Provably Secure Countermeasures against Side-channel Attacks PK Vadnala Unilu-University of Luxembourg, Luxembourg, Luxembourg, 2015 | 4 | 2015 |
| Practical improvements to statistical ineffective fault attacks B Ege, B Swinkels, D Toprakhisar, PK Vadnala International Workshop on Constructive Side-Channel Analysis and Secure …, 2024 | 2 | 2024 |
| Attacking OpenSSL using Side-channel Attacks: the RSA case study PK Vadnala, L Chmielewski | 1 | |
| CGAN-based Automated Fault Injection TÇ Köylü, CC Berg, P Vadnala 2024 IEEE European Test Symposium (ETS), 1-6, 2024 | | 2024 |
| Secure and efficient key assignment scheme for dynamic access control in a hierarchy PK Vadnala Dhirubhai Ambani Institute of Information and Communication Technology, 2006 | | 2006 |
| Provably Secure Countermeasures against Side-channel Attacks Dissertation defense committee PK Vadnala Université Catholique de Louvain, 1983 | | 1983 |
| FDTC 2024 D Aranha, A Aysu, J Balasch, A Barenghi, S Bauer, D Bellizia, ... | | |
| FDTC 2023 N Bagheri, J Balasch, N Beringuier-Boheer, S Bhattacharya, G Bouffard, ... | | |