Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Janaka Alawatugoda is active.

Publication


Featured researches published by Janaka Alawatugoda.


australasian conference on information security and privacy | 2014

Continuous After-the-Fact Leakage-Resilient Key Exchange

Janaka Alawatugoda; Colin Boyd; Douglas Stebila

Security models for two-party authenticated key exchange (AKE) protocols have developed over time to provide security even when the adversary learns certain secret keys. In this work, we advance the modelling of AKE protocols by considering more granular, continuous leakage of long-term secrets of protocol participants: the adversary can adaptively request arbitrary leakage of long-term secrets even after the test session is activated, with limits on the amount of leakage per query but no bounds on the total leakage. We present a security model supporting continuous leakage even when the adversary learns certain ephemeral secrets or session keys, and give a generic construction of a two-pass leakage-resilient key exchange protocol that is secure in the model; our protocol achieves continuous, after-the-fact leakage resilience with not much more cost than a previous protocol with only bounded, non-after-the-fact leakage.


IACR Cryptology ePrint Archive | 2015

Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange

Janaka Alawatugoda; Douglas Stebila; Colin Boyd

Security models for two-party authenticated key exchange AKE protocols have developed over time to capture the security of AKE protocols even when the adversary learns certain secret values. Increased granularity of security can be modelled by considering partial leakage of secrets in the manner of models for leakage-resilient cryptography, designed to capture side-channel attacks. In this work, we use the strongest known partial-leakage-based security model for key exchange protocols, namely continuous after-the-fact leakage


international conference on industrial and information systems | 2011

Countermeasures against Bernstein's remote cache timing attack

Janaka Alawatugoda; Darshana Jayasinghe; Roshan G. Ragel


international conference on industrial and information systems | 2013

Software implementation level countermeasures against the cache timing attack on advanced encryption standard

Udyani Herath; Janaka Alawatugoda; Roshan G. Ragel

\mathrm {eCK}


International Journal of Information Security | 2017

Generic construction of an \mathrm {eCK}-secure key exchange protocol in the standard model

Janaka Alawatugoda


financial cryptography | 2015

Protecting encrypted cookies from compression side-channel attacks

Janaka Alawatugoda; Douglas Stebila; Colin Boyd


provable security | 2017

Leakage-Resilient Non-interactive Key Exchange in the Continuous-Memory Leakage Setting.

Suvradip Chakraborty; Janaka Alawatugoda; C. Pandu Rangan


Journal of Mathematical Cryptology | 2017

On the leakage-resilient key exchange

Janaka Alawatugoda

\mathrm {CAFL\text {-}eCK}


international conference on information and automation | 2016

Leakage-resilient storage scheme for cryptographic applications

Janaka Alawatugoda; Roshan G. Ragel; Danushka Eranga; Nalaka Jayanath; Chinthaka Somathilaka


Institute for Future Environments; Science & Engineering Faculty | 2015

Continuous after-the-fact leakage-resilient eCK-secure key exchange

Janaka Alawatugoda; Douglas Stebila; Colin Boyd

model. We resolve an open problem by constructing the first concrete two-pass leakage-resilient key exchange protocol that is secure in the

Collaboration


Dive into the Janaka Alawatugoda's collaboration.

Top Co-Authors

Avatar

Douglas Stebila

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Colin Boyd

Norwegian University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

C. Pandu Rangan

Indian Institute of Technology Madras

View shared research outputs
Top Co-Authors

Avatar

Suvradip Chakraborty

Indian Institute of Technology Madras

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge