Second-order masked lookup table compression scheme A Valiveti, S Vivek IACR Transactions on Cryptographic Hardware and Embedded Systems, 129-153, 2020 | 5 | 2020 |
Higher-order lookup table masking in essentially constant memory A Valiveti, S Vivek IACR Transactions on Cryptographic Hardware and Embedded Systems, 546-586, 2021 | 3 | 2021 |
A Faster Third-Order Masking of Lookup Tables A Alexander, A Valiveti, S Vivek IACR Transactions on Cryptographic Hardware and Embedded Systems, 538-556, 2023 | 1 | 2023 |
Cryptanalysis of remote user authentication scheme with key agreement R Madhusudan, A Valiveti 2015 International Conference on Computer, Communications, and Control …, 2015 | 1 | 2015 |