{FastKitten}: Practical smart contracts on bitcoin P Das, L Eckey, T Frassetto, D Gens, K Hostáková, P Jauernig, S Faust, ... 28th USENIX security symposium (USENIX security 19), 801-818, 2019 | 129 | 2019 |
A formal treatment of deterministic wallets P Das, S Faust, J Loss Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019 | 52 | 2019 |
Deterministic wallets in a quantum world N Alkeilani Alkadri, P Das, A Erwig, S Faust, J Krämer, S Riahi, P Struck Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 32 | 2020 |
ECC on Your Fingertips: A Single Instruction Approach for Lightweight ECC Design in GF(p) DB Roy, P Das, D Mukhopadhyay International Conference on Selected Areas in Cryptography, 161-177, 2015 | 32 | 2015 |
The exact security of BIP32 wallets P Das, A Erwig, S Faust, J Loss, S Riahi Proceedings of the 2021 ACM SIGSAC conference on computer and communications …, 2021 | 26 | 2021 |
DPaSE: distributed password-authenticated symmetric-key encryption, or how to get many keys from one password P Das, J Hesse, A Lehmann Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022 | 16 | 2022 |
Exploiting the Order of Multiplier Operands: A Low Cost Approach for HCCA Resistance P Das, DB Roy, D Mukhopadhyay https://eprint.iacr.org/2015/925, 2015 | 7 | 2015 |
DPaSE: Distributed password-authenticated symmetric encryption P Das, J Hesse, A Lehmann Cryptology ePrint Archive, 2020 | 5 | 2020 |
Round Efficient Byzantine Agreement from VDFs. P Das, L Eckey, S Faust, J Loss, M Maitra CISPA, 2022 | 4 | 2022 |
Inner collisions in ECC: Vulnerabilities of complete addition formulas for NIST curves P Das, DB Roy, H Boyapally, D Mukhopadhyay 2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST), 1-6, 2016 | 4 | 2016 |
Secure public key hardware for IoT applications P Das, DB Roy, D Mukhopadhyay 2016 IEEE 59th International Midwest Symposium on Circuits and Systems …, 2016 | 4 | 2016 |
BIP32-Compatible Threshold Wallets. P Das, A Erwig, S Faust, J Loss, S Riahi CISPA, 2023 | 2 | 2023 |
Improved atomicity to prevent HCCA on NIST curves P Das, D Basu Roy, D Mukhopadhyay Proceedings of the 3rd ACM International Workshop on ASIA Public-Key …, 2016 | 1 | 2016 |
Efficient Post-Quantum Secure Deterministic Threshold Wallets from Isogenies P Das, A Erwig, M Meyer, P Struck Proceedings of the 19th ACM Asia Conference on Computer and Communications …, 2024 | | 2024 |
Shared-Custodial Password-Authenticated Deterministic Wallets P Das, A Erwig, S Faust Cryptology ePrint Archive, 2024 | | 2024 |
Secure Infrastructures in the Realm of Decentralization P Das Technische Universität Darmstadt, 2023 | | 2023 |
Automatic generation of HCCA-resistant scalar multiplication algorithm by proper sequencing of field multiplier operands P Das, DB Roy, D Mukhopadhyay Journal of Cryptographic Engineering 9, 263-275, 2019 | | 2019 |
Automatic Generation of HCCA Resistant Scalar Multiplication Algorithm by Proper Sequencing of Field Multiplier Operands P Das, DB Roy, D Mukhopadhyay EPiC Series in Computing 49, 33-49, 2017 | | 2017 |