default search action
Shivam Bhasin
2020 – today
- 2024
- [j60]Stjepan Picek, Annelie Heuser, Alan Jovic, Shivam Bhasin, Francesco Regazzoni:
Tipping the Balance: Imbalanced Classes in Deep-Learning Side-Channel Analysis. IEEE Des. Test 41(2): 32-38 (2024) - [j59]Shivam Bhasin, Anupam Chattopadhyay, Tim Güneysu, Swarup Bhunia:
Special Issue on Postquantum Cryptography for Internet of Things. IEEE Des. Test 41(5): 5-6 (2024) - [j58]Anupam Chattopadhyay, Shivam Bhasin, Tim Güneysu, Swarup Bhunia:
Quantum-Safe Internet of Things. IEEE Des. Test 41(5): 36-45 (2024) - [j57]Prasanna Ravi, Thales Paiva, Dirmanto Jap, Jan-Pieter D'Anvers, Shivam Bhasin:
Defeating Low-Cost Countermeasures against Side-Channel Attacks in Lattice-based Encryption A Case Study on Crystals-Kyber. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(2): 795-818 (2024) - [j56]Lichao Wu, Yoo-Seung Won, Dirmanto Jap, Guilherme Perin, Shivam Bhasin, Stjepan Picek:
Ablation Analysis for Multi-Device Deep Learning-Based Physical Side-Channel Analysis. IEEE Trans. Dependable Secur. Comput. 21(3): 1331-1341 (2024) - [j55]Shivam Bhasin, Fabrizio De Santis, Francesco Regazzoni:
Special Issue on Post-Quantum Cryptography for Embedded Systems. ACM Trans. Embed. Comput. Syst. 23(2): 26:1-26:3 (2024) - [c117]Mustafa Khairallah, Srinivasan Yadhunathan, Shivam Bhasin:
Lightweight Leakage-Resilient PRNG from TBCs Using Superposition. COSADE 2024: 197-217 - [c116]Sriram Vasudevan, Prasanna Ravi, Arpan Jati, Shivam Bhasin, Anupam Chattopadhyay:
Formal Verification of Secure Boot Process. DATE 2024: 1-6 - [c115]Prasanna Ravi, Shivam Bhasin, Anupam Chattopadhyay, Aikata, Sujoy Sinha Roy:
Backdooring Post-Quantum Cryptography: Kleptographic Attacks on Lattice-based KEMs. ACM Great Lakes Symposium on VLSI 2024: 216-221 - [c114]Trevor Yap, Stjepan Picek, Shivam Bhasin:
OccPoIs: Points of Interest Based on Neural Network's Key Recovery in Side-Channel Analysis Through Occlusion. INDOCRYPT (2) 2024: 3-28 - [c113]Aneesh Kandi, Anubhab Baksi, Peizhou Gan, Sylvain Guilley, Tomas Gerlich, Jakub Breier, Anupam Chattopadhyay, Ritu Ranjan Shrivastwa, Zdenek Martinasek, Shivam Bhasin:
Side-Channel and Fault Resistant ASCON Implementation: A Detailed Hardware Evaluation. ISVLSI 2024: 307-312 - [c112]Prasanna Ravi, Arpan Jati, Shivam Bhasin:
Achilles Heel in Secure Boot: Breaking RSA Authentication and Bitstream Recovery from Zynq-7000 SoC. WOOT @ USENIX Security Symposium 2024: 1-10 - [e5]Shivam Bhasin, Thomas Roche:
Smart Card Research and Advanced Applications - 22nd International Conference, CARDIS 2023, Amsterdam, The Netherlands, November 14-16, 2023, Revised Selected Papers. Lecture Notes in Computer Science 14530, Springer 2024, ISBN 978-3-031-54408-8 [contents] - [e4]Anupam Chattopadhyay, Shivam Bhasin, Stjepan Picek, Chester Rebeiro:
Progress in Cryptology - INDOCRYPT 2023 - 24th International Conference on Cryptology in India, Goa, India, December 10-13, 2023, Proceedings, Part I. Lecture Notes in Computer Science 14459, Springer 2024, ISBN 978-3-031-56231-0 [contents] - [e3]Anupam Chattopadhyay, Shivam Bhasin, Stjepan Picek, Chester Rebeiro:
Progress in Cryptology - INDOCRYPT 2023 - 24th International Conference on Cryptology in India, Goa, India, December 10-13, 2023, Proceedings, Part II. Lecture Notes in Computer Science 14460, Springer 2024, ISBN 978-3-031-56234-1 [contents] - [i78]Dirmanto Jap, Jakub Breier, Zdenko Lehocký, Shivam Bhasin, Xiaolu Hou:
Side-Channel Analysis of OpenVINO-based Neural Network Models. CoRR abs/2407.16467 (2024) - [i77]Prasanna Ravi, Dirmanto Jap, Shivam Bhasin, Anupam Chattopadhyay:
Machine Learning based Blind Side-Channel Attacks on PQC-based KEMs - A Case Study of Kyber KEM. IACR Cryptol. ePrint Arch. 2024: 169 (2024) - [i76]Trevor Yap Hong Eng, Shivam Bhasin, Léo Weissbart:
Train Wisely: Multifidelity Bayesian Optimization Hyperparameter Tuning in Side-Channel Analysis. IACR Cryptol. ePrint Arch. 2024: 170 (2024) - [i75]Mustafa Khairallah, Srinivasan Yadhunathan, Shivam Bhasin:
Lightweight Leakage-Resilient PRNG from TBCs using Superposition. IACR Cryptol. ePrint Arch. 2024: 218 (2024) - [i74]Harishma Boyapally, Durba Chatterjee, Kuheli Pratihar, Sayandeep Saha, Debdeep Mukhopadhyay, Shivam Bhasin:
Harmonizing PUFs for Forward Secure Authenticated Key Exchange with Symmetric Primitives. IACR Cryptol. ePrint Arch. 2024: 484 (2024) - [i73]Aneesh Kandi, Anubhab Baksi, Peizhou Gan, Sylvain Guilley, Tomas Gerlich, Jakub Breier, Anupam Chattopadhyay, Ritu Ranjan Shrivastwa, Zdenek Martinasek, Shivam Bhasin:
Side-Channel and Fault Resistant ASCON Implementation: A Detailed Hardware Evaluation (Extended Version). IACR Cryptol. ePrint Arch. 2024: 984 (2024) - [i72]Daniel J. Bernstein, Karthikeyan Bhargavan, Shivam Bhasin, Anupam Chattopadhyay, Tee Kiah Chia, Matthias J. Kannwischer, Franziskus Kiefer, Thales Paiva, Prasanna Ravi, Goutam Tamvada:
KyberSlash: Exploiting secret-dependent division timings in Kyber implementations. IACR Cryptol. ePrint Arch. 2024: 1049 (2024) - [i71]Shivam Bhasin, Harishma Boyapally, Dirmanto Jap:
Reality Check on Side-Channels: Lessons learnt from breaking AES on an ARM Cortex A processor. IACR Cryptol. ePrint Arch. 2024: 1381 (2024) - 2023
- [j54]Anubhab Baksi, Shivam Bhasin, Jakub Breier, Dirmanto Jap, Dhiman Saha:
A Survey on Fault Attacks on Symmetric Key Cryptosystems. ACM Comput. Surv. 55(4): 86:1-86:34 (2023) - [j53]Trevor Yap, Adrien Benamira, Shivam Bhasin, Thomas Peyrin:
Peek into the Black-Box: Interpretable Neural Network using SAT Equations in Side-Channel Analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(2): 24-53 (2023) - [j52]Gokulnath Rajendran, Prasanna Ravi, Jan-Pieter D'Anvers, Shivam Bhasin, Anupam Chattopadhyay:
Pushing the Limits of Generic Side-Channel Attacks on LWE-based KEMs - Parallel PC Oracle Attacks on Kyber KEM and Beyond. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(2): 418-446 (2023) - [j51]Prasanna Ravi, Bolin Yang, Shivam Bhasin, Fan Zhang, Anupam Chattopadhyay:
Fiddling the Twiddle Constants - Fault Injection Analysis of the Number Theoretic Transform. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(2): 447-481 (2023) - [c111]Dirmanto Jap, Shivam Bhasin:
Using Model Optimization as Countermeasure against Model Recovery Attacks. ACNS Workshops 2023: 196-209 - [c110]Trevor Yap, Stjepan Picek, Shivam Bhasin:
Beyond the Last Layer: Deep Feature Loss Functions in Side-channel Analysis. ASHES@CCS 2023: 73-82 - [c109]Jakub Breier, Dirmanto Jap, Xiaolu Hou, Shivam Bhasin:
A Desynchronization-Based Countermeasure Against Side-Channel Analysis of Neural Networks. CSCML 2023: 296-306 - [c108]Sayandeep Saha, Prasanna Ravi, Dirmanto Jap, Shivam Bhasin:
Non-Profiled Side-Channel Assisted Fault Attack: A Case Study on DOMREP. DATE 2023: 1-6 - [c107]Prasanna Ravi, Dirmanto Jap, Shivam Bhasin, Anupam Chattopadhyay:
Invited Paper: Machine Learning Based Blind Side-Channel Attacks on PQC-Based KEMs - A Case Study of Kyber KEM. ICCAD 2023: 1-7 - [i70]Jakub Breier, Dirmanto Jap, Xiaolu Hou, Shivam Bhasin:
A Desynchronization-Based Countermeasure Against Side-Channel Analysis of Neural Networks. CoRR abs/2303.18132 (2023) - [i69]Sarani Bhattacharya, Dilip Kumar Shanmugasundaram Veeraraghavan, Shivam Bhasin, Debdeep Mukhopadhyay:
Uncovering Vulnerabilities in Smartphone Cryptography: A Timing Analysis of the Bouncy Castle RSA Implementation. IACR Cryptol. ePrint Arch. 2023: 135 (2023) - [i68]Trevor Yap, Shivam Bhasin, Stjepan Picek:
OccPoIs: Points of Interest based on Neural Network's Key Recovery in Side-Channel Analysis through Occlusion. IACR Cryptol. ePrint Arch. 2023: 1055 (2023) - [i67]Bolin Yang, Prasanna Ravi, Fan Zhang, Ao Shen, Shivam Bhasin:
STAMP-Single Trace Attack on M-LWE Pointwise Multiplication in Kyber. IACR Cryptol. ePrint Arch. 2023: 1184 (2023) - [i66]Thales Paiva, Prasanna Ravi, Dirmanto Jap, Shivam Bhasin:
Et tu, Brute? SCA Assisted CCA using Valid Ciphertexts - A Case Study on HQC KEM. IACR Cryptol. ePrint Arch. 2023: 1626 (2023) - [i65]Prasanna Ravi, Thales Paiva, Dirmanto Jap, Jan-Pieter D'Anvers, Shivam Bhasin:
Defeating Low-Cost Countermeasures against Side-Channel Attacks in Lattice-based Encryption - A Case Study on Crystals-Kyber. IACR Cryptol. ePrint Arch. 2023: 1627 (2023) - [i64]Prasanna Ravi, Arpan Jati, Shivam Bhasin:
Breaking RSA Authentication on Zynq-7000 SoC and Beyond: Identification of Critical Security Flaw in FSBL Software. IACR Cryptol. ePrint Arch. 2023: 1913 (2023) - 2022
- [j50]Prasanna Ravi, James Howe, Anupam Chattopadhyay, Shivam Bhasin:
Lattice-based Key-sharing Schemes: A Survey. ACM Comput. Surv. 54(1): 9:1-9:39 (2022) - [j49]Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek:
SCA Strikes Back: Reverse-Engineering Neural Network Architectures Using Side Channels. IEEE Des. Test 39(4): 7-14 (2022) - [j48]Hadi Soleimany, Nasour Bagheri, Hosein Hadipour, Prasanna Ravi, Shivam Bhasin, Sara Mansouri:
Practical Multiple Persistent Faults Analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(1): 367-390 (2022) - [j47]Francesco Berti, Shivam Bhasin, Jakub Breier, Xiaolu Hou, Romain Poussier, François-Xavier Standaert, Balazs Udvarhelyi:
A Finer-Grain Analysis of the Leakage (Non) Resilience of OCB. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(1): 461-481 (2022) - [j46]Prasanna Ravi, Martianus Frederic Ezerman, Shivam Bhasin, Anupam Chattopadhyay, Sujoy Sinha Roy:
Will You Cross the Threshold for Me? Generic Side-Channel Assisted Chosen-Ciphertext Attacks on NTRU-based KEMs. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(1): 722-761 (2022) - [j45]Satyam Kumar, Vishnu Asutosh Dasu, Anubhab Baksi, Santanu Sarkar, Dirmanto Jap, Jakub Breier, Shivam Bhasin:
Side Channel Attack On Stream Ciphers: A Three-Step Approach To State/Key Recovery. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(2): 166-191 (2022) - [j44]Nasour Bagheri, Sadegh Sadeghi, Prasanna Ravi, Shivam Bhasin, Hadi Soleimany:
SIPFA: Statistical Ineffective Persistent Faults Analysis on Feistel Ciphers. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(3): 367-390 (2022) - [j43]Prasanna Ravi, Shivam Bhasin, Sujoy Sinha Roy, Anupam Chattopadhyay:
On Exploiting Message Leakage in (Few) NIST PQC Candidates for Practical Message Recovery Attacks. IEEE Trans. Inf. Forensics Secur. 17: 684-699 (2022) - [j42]Xiaolu Hou, Jakub Breier, Shivam Bhasin:
SBCMA: Semi-Blind Combined Middle-Round Attack on Bit-Permutation Ciphers With Application to AEAD Schemes. IEEE Trans. Inf. Forensics Secur. 17: 3677-3690 (2022) - [j41]Jakub Breier, Dirmanto Jap, Xiaolu Hou, Shivam Bhasin, Yang Liu:
SNIFF: Reverse Engineering of Neural Networks With Fault Attacks. IEEE Trans. Reliab. 71(4): 1527-1539 (2022) - [c106]Piyush Beegala, Debapriya Basu Roy, Prasanna Ravi, Shivam Bhasin, Anupam Chattopadhyay, Debdeep Mukhopadhyay:
Efficient Loop Abort Fault Attacks on Supersingular Isogeny based Key Exchange (SIKE). DFT 2022: 1-6 - [c105]Prasanna Ravi, Anupam Chattopadhyay, Shivam Bhasin:
Security and Quantum Computing: An Overview. LATS 2022: 1-6 - [c104]Mustafa Khairallah, Shivam Bhasin:
Hardware Implementation of Masked SKINNY SBox with Application to AEAD. SPACE 2022: 50-69 - [p1]Lejla Batina, Shivam Bhasin, Jakub Breier, Xiaolu Hou, Dirmanto Jap:
On Implementation-Level Security of Edge-Based Machine Learning Models. Security and Artificial Intelligence 2022: 335-359 - [i63]Nasour Bagheri, Sadegh Sadeghi, Prasanna Ravi, Shivam Bhasin, Hadi Soleimany:
SIPFA: Statistical Ineffective Persistent Faults Analysis on Feistel Ciphers. IACR Cryptol. ePrint Arch. 2022: 459 (2022) - [i62]Shivam Bhasin, Dirmanto Jap, Wei Cheng Ng, Siang Meng Sim:
Survey on the Effectiveness of DAPA-Related Attacks against Shift Register Based AEAD Schemes. IACR Cryptol. ePrint Arch. 2022: 561 (2022) - [i61]Prasanna Ravi, Bolin Yang, Shivam Bhasin, Fan Zhang, Anupam Chattopadhyay:
Fiddling the Twiddle Constants - Fault Injection Analysis of the Number Theoretic Transform. IACR Cryptol. ePrint Arch. 2022: 824 (2022) - [i60]Gokulnath Rajendran, Prasanna Ravi, Jan-Pieter D'Anvers, Shivam Bhasin, Anupam Chattopadhyay:
Pushing the Limits of Generic Side-Channel Attacks on LWE-based KEMs - Parallel PC Oracle Attacks on Kyber KEM and Beyond. IACR Cryptol. ePrint Arch. 2022: 931 (2022) - [i59]Trevor Yap, Adrien Benamira, Shivam Bhasin, Thomas Peyrin:
Peek into the Black-Box: Interpretable Neural Network using SAT Equations in Side-Channel Analysis. IACR Cryptol. ePrint Arch. 2022: 1247 (2022) - [i58]Prasanna Ravi, Anupam Chattopadhyay, Shivam Bhasin:
Security and Quantum Computing: An Overview. IACR Cryptol. ePrint Arch. 2022: 1372 (2022) - [i57]Prasanna Ravi, Shivam Bhasin, Anupam Chattopadhyay, Aikata, Sujoy Sinha Roy:
Backdooring Post-Quantum Cryptography: Kleptographic Attacks on Lattice-based KEMs. IACR Cryptol. ePrint Arch. 2022: 1681 (2022) - 2021
- [j40]Yoo-Seung Won, Dong-Guk Han, Dirmanto Jap, Shivam Bhasin, Jong-Yeon Park:
Non-Profiled Side-Channel Attack Based on Deep Learning Using Picture Trace. IEEE Access 9: 22480-22492 (2021) - [j39]Shivam Bhasin, Siddharth Garg, Francesco Regazzoni:
Special Section on Attacking and Protecting Artificial Intelligence. CAAI Trans. Intell. Technol. 6(1): 1-2 (2021) - [j38]Fan Zhang, Bolin Yang, Bojie Yang, Yiran Zhang, Xuanle Ren, Shivam Bhasin, Kui Ren:
Design and Evaluation of Fluctuating Power Logic to Mitigate Power Analysis at the Cell Level. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 40(6): 1063-1076 (2021) - [j37]Siang Meng Sim, Dirmanto Jap, Shivam Bhasin:
DAPA: Differential Analysis aided Power Attack on (Non-) Linear Feedback Shift Registers. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(1): 169-191 (2021) - [j36]Shivam Bhasin, Jan-Pieter D'Anvers, Daniel Heinz, Thomas Pöppelmann, Michiel Van Beirendonck:
Attacking and Defending Masked Polynomial Comparison for Lattice-Based Cryptography. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(3): 334-359 (2021) - [j35]Ville Yli-Mäyry, Rei Ueno, Noriyuki Miura, Makoto Nagata, Shivam Bhasin, Yves Mathieu, Tarik Graba, Jean-Luc Danger, Naofumi Homma:
Diffusional Side-Channel Leakage From Unrolled Lightweight Block Ciphers: A Case Study of Power Analysis on PRINCE. IEEE Trans. Inf. Forensics Secur. 16: 1351-1364 (2021) - [j34]Yoo-Seung Won, Xiaolu Hou, Dirmanto Jap, Jakub Breier, Shivam Bhasin:
Back to the Basics: Seamless Integration of Side-Channel Pre-Processing in Deep Neural Networks. IEEE Trans. Inf. Forensics Secur. 16: 3215-3227 (2021) - [c103]Sayandeep Saha, Arnab Bag, Dirmanto Jap, Debdeep Mukhopadhyay, Shivam Bhasin:
Divided We Stand, United We Fall: Security Analysis of Some SCA+SIFA Countermeasures Against SCA-Enhanced Fault Template Attacks. ASIACRYPT (2) 2021: 62-94 - [c102]Anubhab Baksi, Shivam Bhasin, Jakub Breier, Mustafa Khairallah, Thomas Peyrin, Sumanta Sarkar, Siang Meng Sim:
DEFAULT: Cipher Level Resistance Against Differential Fault Attack. ASIACRYPT (2) 2021: 124-156 - [c101]Yoo-Seung Won, Soham Chatterjee, Dirmanto Jap, Arindam Basu, Shivam Bhasin:
WaC: First Results on Practical Side-Channel Attacks on Commercial Machine Learning Accelerator. ASHES@CCS 2021: 111-114 - [c100]Dirmanto Jap, Yoo-Seung Won, Shivam Bhasin:
Fault injection attacks on SoftMax function in deep neural networks. CF 2021: 238-240 - [c99]Xiaolu Hou, Jakub Breier, Shivam Bhasin:
DNFA: Differential No-Fault Analysis of Bit Permutation Based Ciphers Assisted by Side-Channel. DATE 2021: 182-187 - [c98]Anubhab Baksi, Shivam Bhasin, Jakub Breier, Anupam Chattopadhyay, Vinay B. Y. Kumar:
Feeding Three Birds With One Scone: A Generic Duplication Based Countermeasure To Fault Attacks. DATE 2021: 561-564 - [c97]Yoo-Seung Won, Soham Chatterjee, Dirmanto Jap, Shivam Bhasin, Arindam Basu:
Time to Leak: Cross-Device Timing Attack On Edge Deep Learning Accelerator. ICEIC 2021: 1-4 - [c96]Yoo-Seung Won, Shivam Bhasin:
Are Cold Boot Attacks Still Feasible: A Case Study on Raspberry Pi With Stacked Memory. FDTC 2021: 56-60 - [c95]Yoo-Seung Won, Soham Chatterjee, Dirmanto Jap, Arindam Basu, Shivam Bhasin:
DeepFreeze: Cold Boot Attacks and High Fidelity Model Recovery on Commercial EdgeML Device. ICCAD 2021: 1-9 - [c94]Yoo-Seung Won, Shivam Bhasin:
A Systematic Side-Channel Evaluation of Black Box AES in Secure MCU: Architecture Recovery and Retrieval of PUF Based Secret Key. ISCAS 2021: 1-5 - [c93]Ville Yli-Mäyry, Akira Ito, Naofumi Homma, Shivam Bhasin, Dirmanto Jap:
Extraction of Binarized Neural Network Architecture and Secret Parameters Using Side-Channel Information. ISCAS 2021: 1-5 - [c92]Prasanna Ravi, Suman Deb, Anubhab Baksi, Anupam Chattopadhyay, Shivam Bhasin, Avi Mendelson:
On Threat of Hardware Trojan to Post-Quantum Lattice-Based Schemes: A Key Recovery Attack on SABER and Beyond. SPACE 2021: 81-103 - [c91]Prasanna Ravi, Anupam Chattopadhyay, Shivam Bhasin:
Practical Side-Channel and Fault Attacks on Lattice-Based Cryptography. VLSI-SoC 2021: 1-2 - [e2]Shivam Bhasin, Fabrizio De Santis:
Constructive Side-Channel Analysis and Secure Design - 12th International Workshop, COSADE 2021, Lugano, Switzerland, October 25-27, 2021, Proceedings. Lecture Notes in Computer Science 12910, Springer 2021, ISBN 978-3-030-89914-1 [contents] - [i56]Yun Chen, Ali Hajiabadi, Romain Poussier, Andreas Diavastos, Shivam Bhasin, Trevor E. Carlson:
Mitigating Power Attacks through Fine-Grained Instruction Reordering. CoRR abs/2107.11336 (2021) - [i55]Yoo-Seung Won, Soham Chatterjee, Dirmanto Jap, Arindam Basu, Shivam Bhasin:
DeepFreeze: Cold Boot Attacks and High Fidelity Model Recovery on Commercial EdgeML Device. CoRR abs/2108.01281 (2021) - [i54]Shivam Bhasin, Jan-Pieter D'Anvers, Daniel Heinz, Thomas Pöppelmann, Michiel Van Beirendonck:
Attacking and Defending Masked Polynomial Comparison for Lattice-Based Cryptography. IACR Cryptol. ePrint Arch. 2021: 104 (2021) - [i53]Anubhab Baksi, Shivam Bhasin, Jakub Breier, Mustafa Khairallah, Thomas Peyrin, Sumanta Sarkar, Siang Meng Sim:
DEFAULT: Cipher Level Resistance Against Differential Fault Attack. IACR Cryptol. ePrint Arch. 2021: 712 (2021) - [i52]Lichao Wu, Yoo-Seung Won, Dirmanto Jap, Guilherme Perin, Shivam Bhasin, Stjepan Picek:
Explain Some Noise: Ablation Analysis for Deep Learning-based Physical Side-channel Analysis. IACR Cryptol. ePrint Arch. 2021: 717 (2021) - [i51]Prasanna Ravi, Martianus Frederic Ezerman, Shivam Bhasin, Anupam Chattopadhyay, Sujoy Sinha Roy:
Generic Side-Channel Assisted Chosen-Ciphertext Attacks on Streamlined NTRU Prime. IACR Cryptol. ePrint Arch. 2021: 718 (2021) - [i50]Hadi Soleimany, Nasour Bagheri, Hosein Hadipour, Prasanna Ravi, Shivam Bhasin, Sara Mansouri:
Practical Multiple Persistent Faults Analysis. IACR Cryptol. ePrint Arch. 2021: 1362 (2021) - 2020
- [j33]Manaar Alam, Arnab Bag, Debapriya Basu Roy, Dirmanto Jap, Jakub Breier, Shivam Bhasin, Debdeep Mukhopadhyay:
Neural Network-based Inherently Fault-tolerant Hardware Cryptographic Primitives without Explicit Redundancy Checks. ACM J. Emerg. Technol. Comput. Syst. 17(1): 3:1-3:30 (2020) - [j32]Vinay B. Y. Kumar, Suman Deb, Naina Gupta, Shivam Bhasin, Jawad Haj-Yahya, Anupam Chattopadhyay, Avi Mendelson:
Towards Designing a Secure RISC-V System-on-Chip: ITUS. J. Hardw. Syst. Secur. 4(4): 329-342 (2020) - [j31]Rei Ueno, Naofumi Homma, Sumio Morioka, Noriyuki Miura, Kohei Matsuda, Makoto Nagata, Shivam Bhasin, Yves Mathieu, Tarik Graba, Jean-Luc Danger:
High Throughput/Gate AES Hardware Architectures Based on Datapath Compression. IEEE Trans. Computers 69(4): 534-548 (2020) - [j30]Sarani Bhattacharya, Clémentine Maurice, Shivam Bhasin, Debdeep Mukhopadhyay:
Branch Prediction Attack on Blinded Scalar Multiplication. IEEE Trans. Computers 69(5): 633-648 (2020) - [j29]Jingwei Hu, Yao Liu, Ray C. C. Cheung, Shivam Bhasin, San Ling, Huaxiong Wang:
Compact Code-Based Signature for Reconfigurable Devices With Side Channel Resilience. IEEE Trans. Circuits Syst. I Regul. Pap. 67-I(7): 2305-2316 (2020) - [j28]Shivam Bhasin, Jakub Breier, Xiaolu Hou, Dirmanto Jap, Romain Poussier, Siang Meng Sim:
SITM: See-In-The-Middle Side-Channel Assisted Middle Round Differential Cryptanalysis on SPN Block Ciphers. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(1): 95-122 (2020) - [j27]Fan Zhang, Yiran Zhang, Huilong Jiang, Xiang Zhu, Shivam Bhasin, Xinjie Zhao, Zhe Liu, Dawu Gu, Kui Ren:
Persistent Fault Attack in Practice. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(2): 172-195 (2020) - [j26]Prasanna Ravi, Sujoy Sinha Roy, Anupam Chattopadhyay, Shivam Bhasin:
Generic Side-channel attacks on CCA-secure lattice-based PKE and KEMs. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(3): 307-335 (2020) - [j25]Jakub Breier, Dirmanto Jap, Xiaolu Hou, Shivam Bhasin:
On Side Channel Vulnerabilities of Bit Permutations in Cryptographic Algorithms. IEEE Trans. Inf. Forensics Secur. 15: 1072-1085 (2020) - [j24]Sayandeep Saha, Dirmanto Jap, Debapriya Basu Roy, Avik Chakraborty, Shivam Bhasin, Debdeep Mukhopadhyay:
A Framework to Counter Statistical Ineffective Fault Analysis of Block Ciphers Using Domain Transformation and Error Correction. IEEE Trans. Inf. Forensics Secur. 15: 1905-1919 (2020) - [c90]Anubhab Baksi, Vinay B. Y. Kumar, Banashri Karmakar, Shivam Bhasin, Dhiman Saha, Anupam Chattopadhyay:
A Novel Duplication Based Countermeasure to Statistical Ineffective Fault Analysis. ACISP 2020: 525-542 - [c89]Dirmanto Jap, Ville Yli-Mäyry, Akira Ito, Rei Ueno, Shivam Bhasin, Naofumi Homma:
Practical Side-Channel Based Model Extraction Attack on Tree-Based Machine Learning Algorithm. ACNS Workshops 2020: 93-105 - [c88]Daan van der Valk, Stjepan Picek, Shivam Bhasin:
Kilroy Was Here: The First Step Towards Explainability of Neural Networks in Profiled Side-Channel Analysis. COSADE 2020: 175-199 - [c87]Daan van der Valk, Marina Krcek, Stjepan Picek, Shivam Bhasin:
Learning From A Big Brother - Mimicking Neural Networks in Profiled Side-channel Analysis. DAC 2020: 1-6 - [c86]Francesco Regazzoni, Shivam Bhasin, Amir Alipour, Ihab Alshaer, Furkan Aydin, Aydin Aysu, Vincent Beroulle, Giorgio Di Natale, Paul D. Franzon, David Hély, Naofumi Homma, Akira Ito, Dirmanto Jap, Priyank Kashyap, Ilia Polian, Seetal Potluri, Rei Ueno, Elena-Ioana Vatajelu, Ville Yli-Mäyry:
Machine Learning and Hardware security: Challenges and Opportunities -Invited Talk-. ICCAD 2020: 141:1-141:6 - [c85]Dirmanto Jap, Shivam Bhasin:
Practical Reverse Engineering of Secret Sboxes by Side-Channel Analysis. ISCAS 2020: 1-5 - [c84]Prasanna Ravi, Vijaya Kumar Sundar, Anupam Chattopadhyay, Shivam Bhasin, Arvind Easwaran:
Authentication Protocol for Secure Automotive Systems: Benchmarking Post-Quantum Cryptography. ISCAS 2020: 1-5 - [c83]Shivam Bhasin, Anupam Chattopadhyay, Annelie Heuser, Dirmanto Jap, Stjepan Picek, Ritu Ranjan Shrivastwa:
Mind the Portability: A Warriors Guide through Realistic Profiled Side-channel Analysis. NDSS 2020 - [c82]Shivam Bhasin, Trevor E. Carlson, Anupam Chattopadhyay, Vinay B. Y. Kumar, Avi Mendelson, Romain Poussier, Yaswanth Tavva:
Secure Your SoC: Building System-an-Chip Designs for Security. SoCC 2020: 248-253 - [c81]Prasanna Ravi, Romain Poussier, Shivam Bhasin, Anupam Chattopadhyay:
On Configurable SCA Countermeasures Against Single Trace Attacks for the NTT - A Performance Evaluation Study over Kyber and Dilithium on the ARM Cortex-M4. SPACE 2020: 123-146 - [c80]Yoo-Seung Won, Dirmanto Jap, Shivam Bhasin:
Push for More: On Comparison of Data Augmentation and SMOTE with Optimised Deep Learning Architecture for Side-Channel. WISA 2020: 227-241 - [i49]Jakub Breier, Dirmanto Jap, Xiaolu Hou, Shivam Bhasin, Yang Liu:
SNIFF: Reverse Engineering of Neural Networks with Fault Attacks. CoRR abs/2002.11021 (2020) - [i48]Shivam Bhasin, Jakub Breier, Xiaolu Hou, Dirmanto Jap, Romain Poussier, Siang Meng Sim:
SITM: See-In-The-Middle-Side-Channel Assisted Middle Round Differential Cryptanalysis on SPN Block Ciphers. IACR Cryptol. ePrint Arch. 2020: 210 (2020) - [i47]Prasanna Ravi, Shivam Bhasin, Sujoy Sinha Roy, Anupam Chattopadhyay:
Drop by Drop you break the rock - Exploiting generic vulnerabilities in Lattice-based PKE/KEMs using EM-based Physical Attacks. IACR Cryptol. ePrint Arch. 2020: 549 (2020) - [i46]Yoo-Seung Won, Dirmanto Jap, Shivam Bhasin:
Push For More: On Comparison of Data Augmentation and SMOTE With Optimised Deep Learning Architecture For Side-Channel. IACR Cryptol. ePrint Arch. 2020: 655 (2020) - [i45]Prasanna Ravi, Romain Poussier, Shivam Bhasin, Anupam Chattopadhyay:
On Configurable SCA Countermeasures Against Single Trace Attacks for the NTT - A Performance Evaluation Study over Kyber and Dilithium on the ARM Cortex-M4. IACR Cryptol. ePrint Arch. 2020: 1038 (2020) - [i44]Yoo-Seung Won, Xiaolu Hou, Dirmanto Jap, Jakub Breier, Shivam Bhasin:
Back To The Basics: Seamless Integration of Side-Channel Pre-processing in Deep Neural Networks. IACR Cryptol. ePrint Arch. 2020: 1134 (2020) - [i43]Siang Meng Sim, Dirmanto Jap, Shivam Bhasin:
DAPA: Differential Analysis aided Power Attack on (Non-)Linear Feedback Shift Registers (Extended version). IACR Cryptol. ePrint Arch. 2020: 1241 (2020) - [i42]Anubhab Baksi, Shivam Bhasin, Jakub Breier, Dirmanto Jap, Dhiman Saha:
Fault Attacks In Symmetric Key Cryptosystems. IACR Cryptol. ePrint Arch. 2020: 1267 (2020) - [i41]Anubhab Baksi, Vinay B. Y. Kumar, Banashri Karmakar, Shivam Bhasin, Dhiman Saha, Anupam Chattopadhyay:
A Novel Duplication Based Countermeasure To Statistical Ineffective Fault Analysis. IACR Cryptol. ePrint Arch. 2020: 1268 (2020) - [i40]Prasanna Ravi, James Howe, Anupam Chattopadhyay, Shivam Bhasin:
Lattice-based Key Sharing Schemes - A Survey. IACR Cryptol. ePrint Arch. 2020: 1276 (2020) - [i39]Anubhab Baksi, Shivam Bhasin, Jakub Breier, Anupam Chattopadhyay, Vinay B. Y. Kumar:
Feeding Three Birds With One Scone: A Generic Duplication Based Countermeasure To Fault Attacks (Extended Version). IACR Cryptol. ePrint Arch. 2020: 1542 (2020) - [i38]Xiaolu Hou, Jakub Breier, Shivam Bhasin:
DNFA: Differential No-Fault Analysis of Bit Permutation Based Ciphers Assisted by Side-Channel. IACR Cryptol. ePrint Arch. 2020: 1554 (2020) - [i37]Prasanna Ravi, Shivam Bhasin, Sujoy Sinha Roy, Anupam Chattopadhyay:
On Exploiting Message Leakage in (few) NIST PQC Candidates for Practical Message Recovery and Key Recovery Attacks. IACR Cryptol. ePrint Arch. 2020: 1559 (2020)
2010 – 2019
- 2019
- [j23]Prasanna Ravi, Zakaria Najm, Shivam Bhasin, Mustafa Khairallah, Sourav Sen Gupta, Anupam Chattopadhyay:
Security is an architectural design constraint. Microprocess. Microsystems 68: 17-27 (2019) - [j22]Debapriya Basu Roy, Shivam Bhasin, Sylvain Guilley, Annelie Heuser, Sikhar Patranabis, Debdeep Mukhopadhyay:
CC Meets FIPS: A Hybrid Test Methodology for First Order Side Channel Analysis. IEEE Trans. Computers 68(3): 347-361 (2019) - [j21]Sikhar Patranabis, Nilanjan Datta, Dirmanto Jap, Jakub Breier, Shivam Bhasin, Debdeep Mukhopadhyay:
SCADFA: Combined SCA+DFA Attacks on Block Ciphers with Practical Validations. IEEE Trans. Computers 68(10): 1498-1510 (2019) - [j20]Stjepan Picek, Annelie Heuser, Alan Jovic, Shivam Bhasin, Francesco Regazzoni:
The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(1): 209-237 (2019) - [j19]Jaehun Kim, Stjepan Picek, Annelie Heuser, Shivam Bhasin, Alan Hanjalic:
Make Some Noise. Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(3): 148-179 (2019) - [j18]Debapriya Basu Roy, Shivam Bhasin, Ivica Nikolic, Debdeep Mukhopadhyay:
Combining PUF with RLUTs: A Two-party Pay-per-device IP Licensing Scheme on FPGAs. ACM Trans. Embed. Comput. Syst. 18(2): 12:1-12:22 (2019) - [j17]Sayandeep Saha, Dirmanto Jap, Sikhar Patranabis, Debdeep Mukhopadhyay, Shivam Bhasin, Pallab Dasgupta:
Automatic Characterization of Exploitable Faults: A Machine Learning Approach. IEEE Trans. Inf. Forensics Secur. 14(4): 954-968 (2019) - [c79]Fan Zhang, Bolin Yang, Bojie Yang, Yiran Zhang, Shivam Bhasin, Kui Ren:
Fluctuating Power Logic: SCA Protection by $V_{DD}$ Randomization at the Cell-level. AsianHOST 2019: 1-6 - [c78]Prasanna Ravi, Sourav Sen Gupta, Anupam Chattopadhyay, Shivam Bhasin:
Improving Speed of Dilithium's Signing Procedure. CARDIS 2019: 57-73 - [c77]Mustafa Khairallah, Xiaolu Hou, Zakaria Najm, Jakub Breier, Shivam Bhasin, Thomas Peyrin:
SoK: On DFA Vulnerabilities of Substitution-Permutation Networks. AsiaCCS 2019: 403-414 - [c76]Prasanna Ravi, Mahabir Prasad Jhanwar, James Howe, Anupam Chattopadhyay, Shivam Bhasin:
Exploiting Determinism in Lattice-based Signatures: Practical Fault Attacks on pqm4 Implementations of NIST Candidates. AsiaCCS 2019: 427-440 - [c75]Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek:
Poster: Recovering the Input of Neural Networks via Single Shot Side-channel Attacks. CCS 2019: 2657-2659 - [c74]Stjepan Picek, Dirmanto Jap, Shivam Bhasin:
Poster: When Adversary Becomes the Guardian - Towards Side-channel Security With Adversarial Attacks. CCS 2019: 2673-2675 - [c73]Prasanna Ravi, Debapriya Basu Roy, Shivam Bhasin, Anupam Chattopadhyay, Debdeep Mukhopadhyay:
Number "Not Used" Once - Practical Fault Attack on pqm4 Implementations of NIST Candidates. COSADE 2019: 232-250 - [c72]Jingyu Pan, Fan Zhang, Kui Ren, Shivam Bhasin:
One Fault is All it Needs: Breaking Higher-Order Masking with Persistent Fault Analysis. DATE 2019: 1-6 - [c71]Alexandre Menu, Shivam Bhasin, Jean-Max Dutertre, Jean-Baptiste Rigaud, Jean-Luc Danger:
Precise Spatio-Temporal Electromagnetic Fault Injections on Data Transfers. FDTC 2019: 1-8 - [c70]Mustafa Khairallah, Shivam Bhasin, Karim M. Abdellatif:
On Comparison of Countermeasures against Statistical Ineffective Fault Attacks. ICM 2019: 122-125 - [c69]Jawad Haj-Yahya, Ming Ming Wong, Vikramkumar Pudi, Shivam Bhasin, Anupam Chattopadhyay:
Lightweight Secure-Boot Architecture for RISC-V System-on-Chip. ISQED 2019: 216-223 - [c68]Mustafa Khairallah, Shivam Bhasin, Anupam Chattopadhyay:
On Misuse of Nonce-Misuse Resistance : Adapting Differential Fault Attacks on (few) CAESAR Winners. IWASI 2019: 189-193 - [c67]Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek:
CSI NN: Reverse Engineering of Neural Network Architectures Through Electromagnetic Side Channel. USENIX Security Symposium 2019: 515-532 - [e1]Shivam Bhasin, Avi Mendelson, Mridul Nandi:
Security, Privacy, and Applied Cryptography Engineering - 9th International Conference, SPACE 2019, Gandhinagar, India, December 3-7, 2019, Proceedings. Lecture Notes in Computer Science 11947, Springer 2019, ISBN 978-3-030-35868-6 [contents] - [i36]Manaar Alam, Arnab Bag, Debapriya Basu Roy, Dirmanto Jap, Jakub Breier, Shivam Bhasin, Debdeep Mukhopadhyay:
Enhancing Fault Tolerance of Neural Networks for Security-Critical Applications. CoRR abs/1902.04560 (2019) - [i35]Jingyu Pan, Shivam Bhasin, Fan Zhang, Kui Ren:
One Fault is All it Needs: Breaking Higher-Order Masking with Persistent Fault Analysis. IACR Cryptol. ePrint Arch. 2019: 8 (2019) - [i34]Prasanna Ravi, Sourav Sen Gupta, Anupam Chattopadhyay, Mustafa Khairallah, Zakaria Najm, Shivam Bhasin:
Security is an Architectural Design Constraint. IACR Cryptol. ePrint Arch. 2019: 182 (2019) - [i33]Mustafa Khairallah, Xiaolu Hou, Zakaria Najm, Jakub Breier, Shivam Bhasin, Thomas Peyrin:
SoK : On DFA Vulnerabilities of Substitution-Permutation Networks. IACR Cryptol. ePrint Arch. 2019: 387 (2019) - [i32]Prasanna Ravi, Sourav Sen Gupta, Anupam Chattopadhyay, Shivam Bhasin:
Improving Speed of Dilithium's Signing Procedure. IACR Cryptol. ePrint Arch. 2019: 420 (2019) - [i31]Xiaolu Hou, Jakub Breier, Dirmanto Jap, Lei Ma, Shivam Bhasin, Yang Liu:
Experimental Evaluation of Deep Neural Network Resistance Against Fault Injection Attacks. IACR Cryptol. ePrint Arch. 2019: 461 (2019) - [i30]Mustafa Khairallah, Shivam Bhasin, Anupam Chattopadhyay:
On Misuse of Nonce-Misuse Resistance: Adapting Differential Fault Attacks on (few) CAESAR Winners. IACR Cryptol. ePrint Arch. 2019: 585 (2019) - [i29]Shivam Bhasin, Anupam Chattopadhyay, Annelie Heuser, Dirmanto Jap, Stjepan Picek, Ritu Ranjan Shrivastwa:
Mind the Portability: A Warriors Guide through Realistic Profiled Side-channel Analysis. IACR Cryptol. ePrint Arch. 2019: 661 (2019) - [i28]Prasanna Ravi, Mahabir Prasad Jhanwar, James Howe, Anupam Chattopadhyay, Shivam Bhasin:
Exploiting Determinism in Lattice-based Signatures - Practical Fault Attacks on pqm4 Implementations of NIST candidates. IACR Cryptol. ePrint Arch. 2019: 769 (2019) - [i27]Prasanna Ravi, Sujoy Sinha Roy, Anupam Chattopadhyay, Shivam Bhasin:
Generic Side-channel attacks on CCA-secure lattice-based PKE and KEM schemes. IACR Cryptol. ePrint Arch. 2019: 948 (2019) - [i26]Daan van der Valk, Stjepan Picek, Shivam Bhasin:
Kilroy was here: The First Step Towards Explainability of Neural Networks in Profiled Side-channel Analysis. IACR Cryptol. ePrint Arch. 2019: 1477 (2019) - 2018
- [j16]Debapriya Basu Roy, Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Wei He, Debdeep Mukhopadhyay, Zakaria Najm, Xuan Thuy Ngo:
The Conflicted Usage of RLUTs for Security-Critical Applications on FPGA. J. Hardw. Syst. Secur. 2(2): 162-178 (2018) - [j15]Fan Zhang, Xiaoxuan Lou, Xinjie Zhao, Shivam Bhasin, Wei He, Ruyi Ding, Samiya Qureshi, Kui Ren:
Persistent Fault Analysis on Block Ciphers. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(3): 150-172 (2018) - [j14]Anupam Chattopadhyay, Abhisek Ukil, Dirmanto Jap, Shivam Bhasin:
Toward Threat of Implementation Attacks on Substation Security: Case Study on Fault Detection and Isolation. IEEE Trans. Ind. Informatics 14(6): 2442-2451 (2018) - [c66]David Berend, Shivam Bhasin, Bernhard Jungk:
There Goes Your PIN: Exploiting Smartphone Sensor Fusion Under Single and Cross User Setting. ARES 2018: 54:1-54:10 - [c65]Zakaria Najm, Dirmanto Jap, Bernhard Jungk, Stjepan Picek, Shivam Bhasin:
On Comparing Side-channel Properties of AES and ChaCha20 on Microcontrollers. APCCAS 2018: 552-555 - [c64]Jakub Breier, Xiaolu Hou, Dirmanto Jap, Lei Ma, Shivam Bhasin, Yang Liu:
Practical Fault Attack on Deep Neural Networks. CCS 2018: 2204-2206 - [c63]Jakub Breier, Dirmanto Jap, Shivam Bhasin:
SCADPA: Side-channel assisted differential-plaintext attack on bit permutation based ciphers. DATE 2018: 1129-1134 - [c62]Mustafa Khairallah, Rajat Sadhukhan, Radhamanjari Samanta, Jakub Breier, Shivam Bhasin, Rajat Subhra Chakraborty, Anupam Chattopadhyay, Debdeep Mukhopadhyay:
DFARPA: Differential fault attack resistant physical design automation. DATE 2018: 1171-1174 - [c61]Sayandeep Saha, Dirmanto Jap, Jakub Breier, Shivam Bhasin, Debdeep Mukhopadhyay, Pallab Dasgupta:
Breaking Redundancy-Based Countermeasures with Random Faults and Power Side Channel. FDTC 2018: 15-22 - [c60]Anubhab Baksi, Shivam Bhasin, Jakub Breier, Mustafa Khairallah, Thomas Peyrin:
Protecting block ciphers against differential fault attacks without re-keying. HOST 2018: 191-194 - [c59]Prasanna Ravi, Bernhard Jungk, Dirmanto Jap, Zakaria Najm, Shivam Bhasin:
Feature Selection Methods for Non-Profiled Side-Channel Attacks on ECC. DSP 2018: 1-5 - [c58]David Berend, Bernhard Jungk, Shivam Bhasin:
Guessing Your PIN Right: Unlocking Smartphones with Publicly Available Sensor Data. ISVLSI 2018: 363-368 - [c57]Prasanna Ravi, Shivam Bhasin, Jakub Breier, Anupam Chattopadhyay:
PPAP and iPPAP: PLL-Based Protection Against Physical Attacks. ISVLSI 2018: 620-625 - [c56]Stjepan Picek, Ioannis Petros Samiotis, Jaehun Kim, Annelie Heuser, Shivam Bhasin, Axel Legay:
On the Performance of Convolutional Neural Networks for Side-Channel Analysis. SPACE 2018: 157-176 - [c55]Sarani Bhattacharya, Shivam Bhasin, Debdeep Mukhopadhyay:
Online Detection and Reactive Countermeasure for Leakage from BPU Using TVLA. VLSID 2018: 155-160 - [i25]Jakub Breier, Xiaolu Hou, Dirmanto Jap, Lei Ma, Shivam Bhasin, Yang Liu:
Practical Fault Attack on Deep Neural Networks. CoRR abs/1806.05859 (2018) - [i24]Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek:
CSI Neural Network: Using Side-channels to Recover Your Artificial Neural Network Information. CoRR abs/1810.09076 (2018) - [i23]Stjepan Picek, Ioannis Petros Samiotis, Annelie Heuser, Jaehun Kim, Shivam Bhasin, Axel Legay:
On the Performance of Deep Learning for Side-channel Analysis. IACR Cryptol. ePrint Arch. 2018: 4 (2018) - [i22]Anubhab Baksi, Shivam Bhasin, Jakub Breier, Mustafa Khairallah, Thomas Peyrin:
Protecting Block Ciphers against Differential Fault Attacks without Re-keying (Extended Version). IACR Cryptol. ePrint Arch. 2018: 85 (2018) - [i21]Prasanna Ravi, Shivam Bhasin, Anupam Chattopadhyay:
Number "Not" Used Once - Key Recovery Fault Attacks on LWE Based Lattice Cryptographic Schemes. IACR Cryptol. ePrint Arch. 2018: 211 (2018) - [i20]Jakub Breier, Dirmanto Jap, Xiaolu Hou, Shivam Bhasin:
On Side-Channel Vulnerabilities of Bit Permutations: Key Recovery and Reverse Engineering. IACR Cryptol. ePrint Arch. 2018: 219 (2018) - [i19]Stjepan Picek, Annelie Heuser, Alan Jovic, Shivam Bhasin, Francesco Regazzoni:
The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations. IACR Cryptol. ePrint Arch. 2018: 476 (2018) - [i18]Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek:
CSI Neural Network: Using Side-channels to Recover Your Artificial Neural Network Information. IACR Cryptol. ePrint Arch. 2018: 477 (2018) - [i17]Prasanna Ravi, Mahabir Prasad Jhanwar, James Howe, Anupam Chattopadhyay, Shivam Bhasin:
Side-channel Assisted Existential Forgery Attack on Dilithium - A NIST PQC candidate. IACR Cryptol. ePrint Arch. 2018: 821 (2018) - [i16]Jaehun Kim, Stjepan Picek, Annelie Heuser, Shivam Bhasin, Alan Hanjalic:
Make Some Noise: Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis. IACR Cryptol. ePrint Arch. 2018: 1023 (2018) - 2017
- [j13]Fan Zhang, Xinjie Zhao, Wei He, Shivam Bhasin, Shize Guo:
Low-cost design of stealthy hardware trojan for bit-level fault attacks on block ciphers. Sci. China Inf. Sci. 60(4): 48102 (2017) - [j12]Liang Geng, Fan Zhang, Jizhong Shen, Wei He, Shivam Bhasin, Xinjie Zhao, Shize Guo:
Transistor level SCA-resistant scheme based on fluctuating power logic. Sci. China Inf. Sci. 60(10): 109401:1-109401:3 (2017) - [j11]Jakub Breier, Dirmanto Jap, Shivam Bhasin:
A study on analyzing side-channel resistant encoding schemes with respect to fault attacks. J. Cryptogr. Eng. 7(4): 311-320 (2017) - [j10]Jakub Breier, Wei He, Shivam Bhasin, Dirmanto Jap, Samuel Chef, Hock Guan Ong, Chee Lip Gan:
Extensive Laser Fault Injection Profiling of 65 nm FPGA. J. Hardw. Syst. Secur. 1(3): 237-251 (2017) - [j9]Jakub Breier, Wei He, Dirmanto Jap, Shivam Bhasin, Anupam Chattopadhyay:
Attacks in Reality: the Limits of Concurrent Error Detection Codes Against Laser Fault Injection. J. Hardw. Syst. Secur. 1(4): 298-310 (2017) - [j8]Xuan Thuy Ngo, Jean-Luc Danger, Sylvain Guilley, Tarik Graba, Yves Mathieu, Zakaria Najm, Shivam Bhasin:
Cryptographically Secure Shield for Security IPs Protection. IEEE Trans. Computers 66(2): 354-360 (2017) - [j7]Shivam Bhasin, Dirmanto Jap, Thomas Peyrin:
Practical Evaluation of FSE 2016 Customized Encoding Countermeasure. IACR Trans. Symmetric Cryptol. 2017(3): 108-129 (2017) - [c54]Fan Zhang, Liang Geng, Jizhong Shen, Shivam Bhasin, Xinjie Zhao, Shize Guo:
Improved low-entropy masking scheme for LED with mitigation against correlation-enhanced collision attacks. AsianHOST 2017: 49-54 - [c53]Wei He, Jakub Breier, Shivam Bhasin, Noriyuki Miura, Makoto Nagata:
An FPGA-compatible PLL-based sensor against fault injection attack. ASP-DAC 2017: 39-40 - [c52]Arvind Easwaran, Anupam Chattopadhyay, Shivam Bhasin:
A systematic security analysis of real-time cyber-physical systems. ASP-DAC 2017: 206-213 - [c51]Bernhard Jungk, Shivam Bhasin:
Don't fall into a trap: Physical side-channel analysis of ChaCha20-Poly1305. DATE 2017: 1110-1115 - [c50]Sikhar Patranabis, Jakub Breier, Debdeep Mukhopadhyay, Shivam Bhasin:
One Plus One is More than Two: A Practical Combination of Power and Fault Analysis Attacks on PRESENT and PRESENT-Like Block Ciphers. FDTC 2017: 25-32 - [c49]S. V. Dilip Kumar, Sikhar Patranabis, Jakub Breier, Debdeep Mukhopadhyay, Shivam Bhasin, Anupam Chattopadhyay, Anubhab Baksi:
A Practical Fault Attack on ARX-Like Ciphers with a Case Study on ChaCha20. FDTC 2017: 33-40 - [c48]Mohammad Nasim Imtiaz Khan, Shivam Bhasin, Alex Yuan, Anupam Chattopadhyay, Swaroop Ghosh:
Side-Channel Attack on STTRAM Based Cache for Cryptographic Application. ICCD 2017: 33-40 - [c47]Jakub Breier, Shivam Bhasin, Wei He:
An electromagnetic fault injection sensor using Hogge phase-detector. ISQED 2017: 307-312 - [c46]Debapriya Basu Roy, Shivam Bhasin, Ivica Nikolic, Debdeep Mukhopadhyay:
Opening pandora's box: Implication of RLUT on secure FPGA applications and IP security. IVSW 2017: 134-139 - [c45]Shivam Bhasin, Victor Lomné, Karim Tobich:
An Industrial Outlook on Challenges of Hardware Security in Digital Economy - Extended Abstract -. SPACE 2017: 1-9 - [i15]Sarani Bhattacharya, Clémentine Maurice, Shivam Bhasin, Debdeep Mukhopadhyay:
Template Attack on Blinded Scalar Multiplication with Asynchronous perf-ioctl Calls. IACR Cryptol. ePrint Arch. 2017: 968 (2017) - [i14]Sayandeep Saha, Dirmanto Jap, Sikhar Patranabis, Debdeep Mukhopadhyay, Shivam Bhasin, Pallab Dasgupta:
Automatic Characterization of Exploitable Faults: A Machine Learning Approach. IACR Cryptol. ePrint Arch. 2017: 1008 (2017) - [i13]Sikhar Patranabis, Jakub Breier, Debdeep Mukhopadhyay, Shivam Bhasin:
One Plus One is More than Two: A Practical Combination of Power and Fault Analysis Attacks on PRESENT and PRESENT-like Block Ciphers. IACR Cryptol. ePrint Arch. 2017: 1073 (2017) - [i12]S. V. Dilip Kumar, Sikhar Patranabis, Jakub Breier, Debdeep Mukhopadhyay, Shivam Bhasin, Anupam Chattopadhyay, Anubhab Baksi:
A Practical Fault Attack on ARX-like Ciphers with a Case Study on ChaCha20. IACR Cryptol. ePrint Arch. 2017: 1074 (2017) - [i11]Jakub Breier, Dirmanto Jap, Shivam Bhasin:
SCADPA: Side-Channel Assisted Differential-Plaintext Attack on Bit Permutation Based Ciphers. IACR Cryptol. ePrint Arch. 2017: 1166 (2017) - [i10]David Berend, Bernhard Jungk, Shivam Bhasin:
There Goes Your PIN: Exploiting Smartphone Sensor Fusion Under Single and Cross User Setting. IACR Cryptol. ePrint Arch. 2017: 1169 (2017) - 2016
- [j6]Xuan Thuy Ngo, Zakaria Najm, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger:
Method taking into account process dispersion to detect hardware Trojan Horse by side-channel analysis. J. Cryptogr. Eng. 6(3): 239-247 (2016) - [c44]Dirmanto Jap, Wei He, Shivam Bhasin:
Supervised and unsupervised machine learning for side-channel based Trojan detection. ASAP 2016: 17-24 - [c43]Wei He, Jakub Breier, Shivam Bhasin, Anupam Chattopadhyay:
Bypassing Parity Protected Cryptography using Laser Fault Injection in Cyber-Physical System. CPSS@AsiaCCS 2016: 15-21 - [c42]Darshana Jayasinghe, Shivam Bhasin, Sri Parameswaran, Aleksandar Ignjatovic:
Does it sound as it claims: a detailed side-channel security analysis of QuadSeal countermeasure. Conf. Computing Frontiers 2016: 449-454 - [c41]Noriyuki Miura, Zakaria Najm, Wei He, Shivam Bhasin, Xuan Thuy Ngo, Makoto Nagata, Jean-Luc Danger:
PLL to the rescue: a novel EM fault countermeasure. DAC 2016: 90:1-90:6 - [c40]Wei He, Jakub Breier, Shivam Bhasin, Noriyuki Miura, Makoto Nagata:
Ring Oscillator under Laser: Potential of PLL-based Countermeasure against Laser Fault Injection. FDTC 2016: 102-113 - [c39]Jakub Breier, Dirmanto Jap, Shivam Bhasin:
The other side of the coin: Analyzing software encoding schemes against fault injection attacks. HOST 2016: 209-216 - [c38]Noriyuki Miura, Shivam Bhasin:
Attack sensing against EM leakage and injection. ISOCC 2016: 201-202 - [c37]Wei He, Jakub Breier, Shivam Bhasin:
Cheap and Cheerful: A Low-Cost Digital Sensor for Detecting Laser Fault Injection Attacks. SPACE 2016: 27-46 - [c36]Wei He, Jakub Breier, Shivam Bhasin, Dirmanto Jap, Hock Guan Ong, Chee Lip Gan:
Comprehensive Laser Sensitivity Profiling and Data Register Bit-Flips for Cryptographic Fault Attacks in 65 Nm FPGA. SPACE 2016: 47-65 - [c35]Shivam Bhasin, Debdeep Mukhopadhyay:
Fault Injection Attacks: Attack Methodologies, Injection Techniques and Protection Mechanisms - A Tutorial. SPACE 2016: 415-418 - [i9]Daisuke Fujimoto, Shivam Bhasin, Makoto Nagata, Jean-Luc Danger:
A Novel Methodology for Testing Hardware Security and Trust Exploiting On-Chip Power Noise Measurements (Extended Version). IACR Cryptol. ePrint Arch. 2016: 522 (2016) - [i8]Pierre Belgarric, Shivam Bhasin, Nicolas Bruneau, Jean-Luc Danger, Nicolas Debande, Sylvain Guilley, Annelie Heuser, Zakaria Najm, Olivier Rioul:
Time-Frequency Analysis for Second-Order Attacks. IACR Cryptol. ePrint Arch. 2016: 772 (2016) - [i7]Jakub Breier, Dirmanto Jap, Shivam Bhasin:
Mistakes Are Proof That You Are Trying: On Verifying Software Encoding Schemes' Resistance to Fault Injection Attacks. IACR Cryptol. ePrint Arch. 2016: 932 (2016) - [i6]Debapriya Basu Roy, Shivam Bhasin, Sikhar Patranabis, Debdeep Mukhopadhyay, Sylvain Guilley:
What Lies Ahead: Extending TVLA Testing Methodology Towards Success Rate. IACR Cryptol. ePrint Arch. 2016: 1152 (2016) - 2015
- [j5]Wei He, Shivam Bhasin, Andrés Otero, Tarik Graba, Eduardo de la Torre, Jean-Luc Danger:
Sophisticated security verification on routing repaired balanced cell-based dual-rail logic against side channel analysis. IET Inf. Secur. 9(1): 1-13 (2015) - [j4]Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Wei He:
Exploiting FPGA Block Memories for Protected Cryptographic Implementations. ACM Trans. Reconfigurable Technol. Syst. 8(3): 16:1-16:16 (2015) - [c34]Daisuke Fujimoto, Makoto Nagata, Shivam Bhasin, Jean-Luc Danger:
A novel methodology for testing hardware security and trust exploiting On-Chip Power noise Measurement. ASP-DAC 2015: 749-754 - [c33]Xuan Thuy Ngo, Ingrid Exurville, Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm, Jean-Baptiste Rigaud, Bruno Robisson:
Hardware trojan detection by delay and electromagnetic measurements. DATE 2015: 782-787 - [c32]Xuan Thuy Ngo, Zakaria Najm, Shivam Bhasin, Debapriya Basu Roy, Jean-Luc Danger, Sylvain Guilley:
Integrated Sensor: A Backdoor for Hardware Trojan Insertions? DSD 2015: 415-422 - [c31]Roberta Piscitelli, Shivam Bhasin, Francesco Regazzoni:
Fault attacks, injection techniques and tools for simulation. DTIS 2015: 1-6 - [c30]Xuan Thuy Ngo, Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm:
Linear complementary dual code improvement to strengthen encoded circuit against hardware Trojan horses. HOST 2015: 82-87 - [c29]Debapriya Basu Roy, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger, Debdeep Mukhopadhyay:
From theory to practice of private circuit: A cautionary note. ICCD 2015: 296-303 - [c28]Emna Amouri, Shivam Bhasin, Yves Mathieu, Tarik Graba, Jean-Luc Danger:
Countering early propagation and routing imbalance of DPL designs in a tree-based FPGA. ICICDT 2015: 1-4 - [c27]Dirmanto Jap, Marc Stöttinger, Shivam Bhasin:
Support vector regression: exploiting machine learning techniques for leakage modeling. HASP@ISCA 2015: 2:1-2:8 - [c26]Ricardo Chaves, Giorgio Di Natale, Lejla Batina, Shivam Bhasin, Baris Ege, Apostolos P. Fournaris, Nele Mentens, Stjepan Picek, Francesco Regazzoni, Vladimir Rozic, Nicolas Sklavos, Bohan Yang:
Challenges in designing trustworthy cryptographic co-processors. ISCAS 2015: 2009-2012 - [c25]Shivam Bhasin, Francesco Regazzoni:
A survey on hardware trojan detection techniques. ISCAS 2015: 2021-2024 - [c24]Debapriya Basu Roy, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger, Debdeep Mukhopadhyay, Xuan Thuy Ngo, Zakaria Najm:
Reconfigurable LUT: A Double Edged Sword for Security-Critical Applications. SPACE 2015: 248-268 - [i5]Debapriya Basu Roy, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger, Debdeep Mukhopadhyay:
Reconfigurable LUT: Boon or Bane for Secure Applications. IACR Cryptol. ePrint Arch. 2015: 120 (2015) - 2014
- [j3]Daisuke Fujimoto, Noriyuki Miura, Makoto Nagata, Yu-ichi Hayashi, Naofumi Homma, Takafumi Aoki, Yohei Hori, Toshihiro Katashita, Kazuo Sakiyama, Thanh-Ha Le, Julien Bringer, Pirouz Bazargan-Sabet, Shivam Bhasin, Jean-Luc Danger:
Power Noise Measurements of Cryptographic VLSI Circuits Regarding Side-Channel Information Leakage. IEICE Trans. Electron. 97-C(4): 272-279 (2014) - [c23]Suvadeep Hajra, Chester Rebeiro, Shivam Bhasin, Gaurav Bajaj, Sahil Sharma, Sylvain Guilley, Debdeep Mukhopadhyay:
DRECON: DPA Resistant Encryption by Construction. AFRICACRYPT 2014: 420-439 - [c22]Xuan Thuy Ngo, Sylvain Guilley, Shivam Bhasin, Jean-Luc Danger, Zakaria Najm:
Encoding the state of integrated circuits: a proactive and reactive protection against hardware Trojans horses. WESS 2014: 7:1-7:10 - [c21]Shivam Bhasin, Jean-Luc Danger, Tarik Graba, Yves Mathieu, Daisuke Fujimoto, Makoto Nagata:
Physical Security Evaluation at an Early Design-Phase: A Side-Channel Aware Simulation Methodology. ES4CPS@DATE 2014: 13 - [c20]Emna Amouri, Shivam Bhasin, Yves Mathieu, Tarik Graba, Jean-Luc Danger, Habib Mehrez:
Balancing WDDL dual-rail logic in a tree-based FPGA to enhance physical security. FPL 2014: 1-4 - [c19]Daisuke Fujimoto, Daichi Tanaka, Noriyuki Miura, Makoto Nagata, Yu-ichi Hayashi, Naofumi Homma, Shivam Bhasin, Jean-Luc Danger:
Side-channel leakage on silicon substrate of CMOS cryptographic chip. HOST 2014: 32-37 - [c18]Shivam Bhasin, Tarik Graba, Jean-Luc Danger, Zakaria Najm:
A look into SIMON from a side-channel perspective. HOST 2014: 56-59 - [c17]Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm:
Side-channel leakage and trace compression using normalized inter-class variance. HASP@ISCA 2014: 7:1-7:9 - [c16]Shivam Bhasin, Nicolas Bruneau, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm:
Analysis and Improvements of the DPA Contest v4 Implementation. SPACE 2014: 201-218 - [i4]Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Xuan Thuy Ngo, Laurent Sauvage:
Hardware Trojan Horses in Cryptographic IP Cores. IACR Cryptol. ePrint Arch. 2014: 750 (2014) - [i3]Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm:
Side-Channel Leakage and Trace Compression using Normalized Inter-Class Variance. IACR Cryptol. ePrint Arch. 2014: 1020 (2014) - 2013
- [j2]Shivam Bhasin, Sylvain Guilley, Annelie Heuser, Jean-Luc Danger:
From cryptography to hardware: analyzing and protecting embedded Xilinx BRAM for cryptographic applications. J. Cryptogr. Eng. 3(4): 213-225 (2013) - [c15]Pierre Belgarric, Shivam Bhasin, Nicolas Bruneau, Jean-Luc Danger, Nicolas Debande, Sylvain Guilley, Annelie Heuser, Zakaria Najm, Olivier Rioul:
Time-Frequency Analysis for Second-Order Attacks. CARDIS 2013: 108-122 - [c14]Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm:
A low-entropy first-degree secure provable masking scheme for resource-constrained devices. WESS 2013: 7:1-7:10 - [c13]Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Xuan Thuy Ngo, Laurent Sauvage:
Hardware Trojan Horses in Cryptographic IP Cores. FDTC 2013: 15-29 - [c12]Shivam Bhasin, Wei He, Sylvain Guilley, Jean-Luc Danger:
Exploiting FPGA block memories for protected cryptographic implementations. ReCoSoC 2013: 1-8 - [i2]Shivam Bhasin, Claude Carlet, Sylvain Guilley:
Theory of masking with codewords in hardware: low-weight dth-order correlation-immune Boolean functions. IACR Cryptol. ePrint Arch. 2013: 303 (2013) - [i1]Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Zakaria Najm:
NICV: Normalized Inter-Class Variance for Detection of Side-Channel Leakage. IACR Cryptol. ePrint Arch. 2013: 717 (2013) - 2012
- [c11]Youssef Souissi, Shivam Bhasin, Sylvain Guilley, Maxime Nassar, Jean-Luc Danger:
Towards Different Flavors of Combined Side Channel Attacks. CT-RSA 2012: 245-259 - [c10]Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger:
From Cryptography to Hardware: Analyzing Embedded Xilinx BRAM for Cryptographic Applications. MICRO Workshops 2012: 1-8 - 2011
- [b1]Shivam Bhasin:
Logic-Level Countermeasures to Secure FPGA based Designs. (Contremesures au niveau logique pour sécuriser les architectures de crypto-processeurs dans un FPGA). Télécom ParisTech, France, 2011 - [j1]Nidhal Selmane, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger:
Security evaluation of application-specific integrated circuits and field programmable gate arrays against setup time violation attacks. IET Inf. Secur. 5(4): 181-190 (2011) - [c9]Youssef Souissi, Jean-Luc Danger, Sylvain Guilley, Shivam Bhasin, Maxime Nassar:
Embedded systems security: An evaluation methodology against Side Channel Attacks. DASIP 2011: 230-237 - [c8]Shivam Bhasin, Sylvain Guilley, Youssef Souissi, Tarik Graba, Jean-Luc Danger:
Efficient Dual-Rail Implementations in FPGA Using Block RAMs. ReConFig 2011: 261-267 - 2010
- [c7]Shivam Bhasin, Sylvain Guilley, Florent Flament, Nidhal Selmane, Jean-Luc Danger:
Countering early evaluation: an approach towards robust dual-rail precharge logic. WESS 2010: 6 - [c6]Shivam Bhasin, Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger:
Unrolling Cryptographic Circuits: A Simple Countermeasure Against Side-Channel Attacks. CT-RSA 2010: 195-207 - [c5]Maxime Nassar, Shivam Bhasin, Jean-Luc Danger, Guillaume Duc, Sylvain Guilley:
BCDL: A high speed balanced DPL for FPGA with global precharge and no early evaluation. DATE 2010: 849-854 - [c4]Zouha Cherif, Florent Flament, Jean-Luc Danger, Shivam Bhasin, Sylvain Guilley, Hervé Chabanne:
Evaluation of White-Box and Grey-Box Noekeon Implementations in FPGA. ReConFig 2010: 310-315
2000 – 2009
- 2009
- [c3]Nidhal Selmane, Shivam Bhasin, Sylvain Guilley, Tarik Graba, Jean-Luc Danger:
WDDL is Protected against Setup Time Violation Attacks. FDTC 2009: 73-83 - [c2]Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Nidhal Selmane:
Security Evaluation of Different AES Implementations Against Practical Setup Time Violation Attacks in FPGAs. HOST 2009: 15-21 - [c1]Shivam Bhasin, Jean-Luc Danger, Florent Flament, Tarik Graba, Sylvain Guilley, Yves Mathieu, Maxime Nassar, Laurent Sauvage, Nidhal Selmane:
Combined SCA and DFA Countermeasures Integrable in a FPGA Design Flow. ReConFig 2009: 213-218
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
[+][–] Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
[+][–] Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:03 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint