Ujjwal Guin, Ph.D., IEEE Senior Member

Godbold Associate Professor
Department of Electrical and Computer Engineering
Auburn University
325 Broun Hall, Auburn, AL 36849-5201, USA
Email: ujjwal.guin at auburn dot edu
Phone: (334) 844-1835 (Office)
[Curriculum vitae][Google Scholar][Research Gate]


Attacks and Solutions in Cryptography


The advancement in high-performance computing and the dawn of quantum computing drive the need for novel designs of cryptographic algorithms that are secure against potential future adversaries. The emergence of the Internet of things (IoT) also propels the designing of lightweight cryptography suitable for resource-constrained edge devices. It is of paramount importance to analyze the security and potential weakness of different crypto-primitives under various applications to ensure confidentiality, integrity, authentication, and nonrepudiation for secure communications. In addition, Shor's factoring algorithm exposes the possible vulnerabilities of well-established public key infrastructure (PKI) such as RSA when facing quantum computers. The lattice-based learning with errors (LWE) is one of the promising candidates for Post-Quantum Cryptography (PQC), thwarting the cryptanalysis efforts with advanced quantum machines.

Publications

Disclaimer: The pdf files (articles) are copyright protected. Retrieving, copying, or distributing these files are prohibited. You may, however, browse these articles in the same spirit as you read an article in a public library.

Journal Papers
  1. B. J. Lucas, A. Alwan, M. Murzello, Y. Tu, P. He, A. J. Schwartz, D. Guevara, U. Guin , K. Juretus, and J. Xie, "Lightweight Hardware Implementation of Binary Ring-LWE PQC Accelerator," in IEEE Computer Architecture Letters, pp. 17-20, 2022. [Link] [PDF] [BibTeX: lucas2022lightweight]
  2. P. He, U. Guin, and J. Xie, "Novel Low-Complexity Polynomial Multiplication over Hybrid Fields for Efficient Implementation of Binary Ring-LWE Post-Quantum Cryptography," in IEEE Journal on Emerging and Selected Topics in Circuits and Systems (JETCAS), pp. 383-394, 2021. [Link] [PDF] [BibTeX: he2021novel]
Conference Papers
  1. Y. Zhong, and U. Guin , “Fault-Injection Based Chosen-Plaintext Attacks on Multicycle AES Implementations,” in Great Lakes Symposium on VLSI (GLSVLSI), pp. 1-6, 2022. [PDF] [BibTeX: zhong2022fault]
  2. Y. Zhong, and U. Guin , “Chosen-Plaintext Attack on Energy-Efficient Hardware Implementation of GIFT-COFB,” in IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 1-4, 2022. [PDF] [BibTeX: ]
  3. Y. Tu, P. He, U. Guin and J. Xie, “Low-Complexity Implementation of Lightweight Ring-LWE based Post-Quantum Cryptography,” in GOMACTech, 2022.
  4. A. Jain, and U. Guin, “A Novel Tampering Attack on AES Cores with Hardware Trojans,” in ITC-Asia, pp. 77-82, 2020. [PDF] [BibTeX: jain2020novel]
  5. J. Xie, K. Basu, K. Gaj and U. Guin, “Special Session: The Recent Advance in Hardware Implementation of Post-Quantum Cryptography," in VLSI Test Symposium (VTS), pp. 1-10, 2020. [LINK] [PDF] [BibTeX: xie2020special]