Follow
Poulami Das
Poulami Das
Postdoc, CISPA
Verified email at cispa.de
Title
Cited by
Cited by
Year
{FastKitten}: Practical smart contracts on bitcoin
P Das, L Eckey, T Frassetto, D Gens, K Hostáková, P Jauernig, S Faust, ...
28th USENIX Security Symposium (USENIX Security 19), 801-818, 2019
1142019
A formal treatment of deterministic wallets
P Das, S Faust, J Loss
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
422019
ECC on Your Fingertips: A Single Instruction Approach for Lightweight ECC Design in GF(p)
DB Roy, P Das, D Mukhopadhyay
International Conference on Selected Areas in Cryptography, 161-177, 2015
322015
Deterministic wallets in a quantum world
N Alkeilani Alkadri, P Das, A Erwig, S Faust, J Krämer, S Riahi, P Struck
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
182020
The exact security of BIP32 wallets
P Das, A Erwig, S Faust, J Loss, S Riahi
Proceedings of the 2021 ACM SIGSAC conference on computer and communications …, 2021
172021
Exploiting the Order of Multiplier Operands: A Low Cost Approach for HCCA Resistance
P Das, DB Roy, D Mukhopadhyay
https://eprint.iacr.org/2015/925, 2015
72015
DPaSE: distributed password-authenticated symmetric-key encryption, or how to get many keys from one password
P Das, J Hesse, A Lehmann
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
62022
DPaSE: Distributed password-authenticated symmetric encryption
P Das, J Hesse, A Lehmann
Cryptology ePrint Archive, 2020
52020
Inner collisions in ECC: Vulnerabilities of complete addition formulas for NIST curves
P Das, DB Roy, H Boyapally, D Mukhopadhyay
2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST), 1-6, 2016
42016
Secure public key hardware for IoT applications
P Das, DB Roy, D Mukhopadhyay
2016 IEEE 59th International Midwest Symposium on Circuits and Systems …, 2016
42016
Round efficient byzantine agreement from VDFs
P Das, L Eckey, S Faust, J Loss, M Maitra
Cryptology ePrint Archive, 2022
32022
Bip32-compatible threshold wallets
P Das, A Erwig, S Faust, J Loss, S Riahi
Cryptology ePrint Archive, 2023
22023
Improved atomicity to prevent HCCA on NIST curves
P Das, D Basu Roy, D Mukhopadhyay
Proceedings of the 3rd ACM International Workshop on ASIA Public-Key …, 2016
12016
Efficient Post-Quantum Secure Deterministic Threshold Wallets from Isogenies
P Das, A Erwig, M Meyer, P Struck
Cryptology ePrint Archive, 2023
2023
Secure Infrastructures in the Realm of Decentralization
P Das
Technische Universität Darmstadt, 2023
2023
Automatic generation of HCCA-resistant scalar multiplication algorithm by proper sequencing of field multiplier operands
P Das, DB Roy, D Mukhopadhyay
Journal of Cryptographic Engineering 9, 263-275, 2019
2019
Automatic Generation of HCCA Resistant Scalar Multiplication Algorithm by Proper Sequencing of Field Multiplier Operands
P Das, DB Roy, D Mukhopadhyay
EPiC Series in Computing 49, 33-49, 2017
2017
The system can't perform the operation now. Try again later.
Articles 1–17