关注
Poulami Das
Poulami Das
Cryptographer and Security Researcher, Least Authority
在 leastauthority.com 的电子邮件经过验证
标题
引用次数
引用次数
年份
{FastKitten}: Practical smart contracts on bitcoin
P Das, L Eckey, T Frassetto, D Gens, K Hostáková, P Jauernig, S Faust, ...
28th USENIX security symposium (USENIX security 19), 801-818, 2019
1292019
A formal treatment of deterministic wallets
P Das, S Faust, J Loss
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
522019
Deterministic wallets in a quantum world
N Alkeilani Alkadri, P Das, A Erwig, S Faust, J Krämer, S Riahi, P Struck
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
322020
ECC on Your Fingertips: A Single Instruction Approach for Lightweight ECC Design in GF(p)
DB Roy, P Das, D Mukhopadhyay
International Conference on Selected Areas in Cryptography, 161-177, 2015
322015
The exact security of BIP32 wallets
P Das, A Erwig, S Faust, J Loss, S Riahi
Proceedings of the 2021 ACM SIGSAC conference on computer and communications …, 2021
262021
DPaSE: distributed password-authenticated symmetric-key encryption, or how to get many keys from one password
P Das, J Hesse, A Lehmann
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
162022
Exploiting the Order of Multiplier Operands: A Low Cost Approach for HCCA Resistance
P Das, DB Roy, D Mukhopadhyay
https://eprint.iacr.org/2015/925, 2015
72015
DPaSE: Distributed password-authenticated symmetric encryption
P Das, J Hesse, A Lehmann
Cryptology ePrint Archive, 2020
52020
Round Efficient Byzantine Agreement from VDFs.
P Das, L Eckey, S Faust, J Loss, M Maitra
CISPA, 2022
42022
Inner collisions in ECC: Vulnerabilities of complete addition formulas for NIST curves
P Das, DB Roy, H Boyapally, D Mukhopadhyay
2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST), 1-6, 2016
42016
Secure public key hardware for IoT applications
P Das, DB Roy, D Mukhopadhyay
2016 IEEE 59th International Midwest Symposium on Circuits and Systems …, 2016
42016
BIP32-Compatible Threshold Wallets.
P Das, A Erwig, S Faust, J Loss, S Riahi
CISPA, 2023
22023
Improved atomicity to prevent HCCA on NIST curves
P Das, D Basu Roy, D Mukhopadhyay
Proceedings of the 3rd ACM International Workshop on ASIA Public-Key …, 2016
12016
Efficient Post-Quantum Secure Deterministic Threshold Wallets from Isogenies
P Das, A Erwig, M Meyer, P Struck
Proceedings of the 19th ACM Asia Conference on Computer and Communications …, 2024
2024
Shared-Custodial Password-Authenticated Deterministic Wallets
P Das, A Erwig, S Faust
Cryptology ePrint Archive, 2024
2024
Secure Infrastructures in the Realm of Decentralization
P Das
Technische Universität Darmstadt, 2023
2023
Automatic generation of HCCA-resistant scalar multiplication algorithm by proper sequencing of field multiplier operands
P Das, DB Roy, D Mukhopadhyay
Journal of Cryptographic Engineering 9, 263-275, 2019
2019
Automatic Generation of HCCA Resistant Scalar Multiplication Algorithm by Proper Sequencing of Field Multiplier Operands
P Das, DB Roy, D Mukhopadhyay
EPiC Series in Computing 49, 33-49, 2017
2017
系统目前无法执行此操作,请稍后再试。
文章 1–18