Utsav Banerjee
YOU?
Author Swipe
View article: Writing a Good Security Paper for ISSCC (2025)
Writing a Good Security Paper for ISSCC (2025) Open
Security is increasingly more important in designing chips and systems based on them, and the International Solid-State Circuits Conference (ISSCC), the leading conference for presenting advances in solid-state circuits and semiconductor t…
View article: Fast Plaintext-Ciphertext Matrix Multiplication from Additively Homomorphic Encryption
Fast Plaintext-Ciphertext Matrix Multiplication from Additively Homomorphic Encryption Open
Plaintext-ciphertext matrix multiplication (PC-MM) is an indispensable tool in privacy-preserving computations such as secure machine learning and encrypted signal processing. While there are many established algorithms for plaintext-plain…
View article: A Unified Hardware Accelerator for Fast Fourier Transform and Number Theoretic Transform
A Unified Hardware Accelerator for Fast Fourier Transform and Number Theoretic Transform Open
The Number Theoretic Transform (NTT) is an indispensable tool for computing efficient polynomial multiplications in post-quantum lattice-based cryptography. It has strong resemblance with the Fast Fourier Transform (FFT), which is the most…
View article: pc-COP: An Efficient and Configurable 2048-p-Bit Fully-Connected Probabilistic Computing Accelerator for Combinatorial Optimization
pc-COP: An Efficient and Configurable 2048-p-Bit Fully-Connected Probabilistic Computing Accelerator for Combinatorial Optimization Open
Probabilistic computing is an emerging quantum-inspired computing paradigm capable of solving combinatorial optimization and various other classes of computationally hard problems. In this work, we present pc-COP, an efficient and configur…
View article: A High-Performance Curve25519 and Curve448 Unified Elliptic Curve Cryptography Accelerator
A High-Performance Curve25519 and Curve448 Unified Elliptic Curve Cryptography Accelerator Open
In modern critical infrastructure such as power grids, it is crucial to ensure security of data communications between network-connected devices while following strict latency criteria. This necessitates the use of cryptographic hardware a…
View article: Privacy-Preserving Edge Computing from Pairing-Based Inner Product Functional Encryption
Privacy-Preserving Edge Computing from Pairing-Based Inner Product Functional Encryption Open
Pairing-based inner product functional encryption provides an efficient theoretical construction for privacy-preserving edge computing secured by widely deployed elliptic curve cryptography. In this work, an efficient software implementati…
View article: Quantum-Enabled Discrete Distribution Sampling for Post-Quantum Lattice-Based Cryptography
Quantum-Enabled Discrete Distribution Sampling for Post-Quantum Lattice-Based Cryptography Open
Lattice-based cryptography is considered the most promising candidate for post-quantum public key cryptography such as key encapsulation and digital signature schemes. Accurate and efficient sampling of matrix / vector elements and polynom…
View article: Quantum-Enabled Discrete Distribution Sampling for Post-Quantum Lattice-Based Cryptography
Quantum-Enabled Discrete Distribution Sampling for Post-Quantum Lattice-Based Cryptography Open
Lattice-based cryptography is considered the most promising candidate for post-quantum public key cryptography such as key encapsulation and digital signature schemes. Accurate and efficient sampling of matrix / vector elements and polynom…
View article: QuBEC: Boosting Equivalence Checking for Quantum Circuits with QEC Embedding
QuBEC: Boosting Equivalence Checking for Quantum Circuits with QEC Embedding Open
Quantum computing has proven to be capable of accelerating many algorithms by performing tasks that classical computers cannot. Currently, Noisy Intermediate Scale Quantum (NISQ) machines struggle from scalability and noise issues to rende…
View article: IEEE-IISc VLSI Chapter Inauguration and Activities at IISc Bangalore [Chapters]
IEEE-IISc VLSI Chapter Inauguration and Activities at IISc Bangalore [Chapters] Open
Provides society information that may include news, reviews or technical notes that should be of interest to practitioners and researchers.
View article: Batteryless, Wireless, and Secure SoC for Implantable Strain Sensing
Batteryless, Wireless, and Secure SoC for Implantable Strain Sensing Open
The past few years have witnessed a growing interest in wireless and batteryless implants, due to their potential in long-term biomedical monitoring of in-body conditions, such as internal organ movements, bladder pressure, and gastrointes…
View article: Power-Based Side-Channel Attack for AES Key Extraction on the ATMega328 Microcontroller
Power-Based Side-Channel Attack for AES Key Extraction on the ATMega328 Microcontroller Open
We demonstrate the extraction of an AES secret key from flash memory on the ATMega328 microcontroller (the microcontroller used on the popular Arduino Genuino/Uno board). We loaded a standard AVR-architecture AES-128 implementation onto th…
View article: A Low-Power BLS12-381 Pairing Cryptoprocessor for Internet-of-Things Security Applications
A Low-Power BLS12-381 Pairing Cryptoprocessor for Internet-of-Things Security Applications Open
We present the first BLS12-381 elliptic curve pairing crypto-processor for Internet-of-Things (IoT) security applications. Efficient finite field arithmetic and algorithm-architecture co-optimizations together enable two orders of magnitud…
View article: Sapphire: A Configurable Crypto-Processor for Post-Quantum Lattice-based\n Protocols
Sapphire: A Configurable Crypto-Processor for Post-Quantum Lattice-based\n Protocols Open
Public key cryptography protocols, such as RSA and elliptic curve\ncryptography, will be rendered insecure by Shor's algorithm when large-scale\nquantum computers are built. Cryptographers are working on quantum-resistant\nalgorithms, and …
View article: Sapphire: A Configurable Crypto-Processor for Post-Quantum Lattice-based Protocols
Sapphire: A Configurable Crypto-Processor for Post-Quantum Lattice-based Protocols Open
Public key cryptography protocols, such as RSA and elliptic curve cryptography, will be rendered insecure by Shor’s algorithm when large-scale quantum computers are built. Cryptographers are working on quantum-resistant algorithms, and lat…
View article: An Energy-Efficient Reconfigurable DTLS Cryptographic Engine for Securing Internet-of-Things Applications
An Energy-Efficient Reconfigurable DTLS Cryptographic Engine for Securing Internet-of-Things Applications Open
This paper presents the first hardware implementation of the Datagram\nTransport Layer Security (DTLS) protocol to enable end-to-end security for the\nInternet of Things (IoT). A key component of this design is a reconfigurable\nprime fiel…
View article: 2.3 An Energy-Efficient Configurable Lattice Cryptography Processor for the Quantum-Secure Internet of Things
2.3 An Energy-Efficient Configurable Lattice Cryptography Processor for the Quantum-Secure Internet of Things Open
This paper presents a configurable lattice cryptography processor which\nenables quantum-resistant security protocols for IoT. Efficient sampling\narchitectures, coupled with a low-power SHA-3 core, provide two orders of\nmagnitude energy …
View article: An energy-efficient reconfigurable DTLS cryptographic engine for End-to-End security in iot applications
An energy-efficient reconfigurable DTLS cryptographic engine for End-to-End security in iot applications Open
This paper presents a reconfigurable cryptographic engine that implements the\nDTLS protocol to enable end-to-end security for IoT. This implementation of the\nDTLS engine demonstrates 10x reduction in code size and 438x improvement in\nen…
View article: eeDTLS: Energy-Efficient Datagram Transport Layer Security for the Internet of Things
eeDTLS: Energy-Efficient Datagram Transport Layer Security for the Internet of Things Open
In the fast growing world of the Internet of Things (IoT), security has become a major concern. Datagram Transport Layer Security (DTLS) is considered to be one of the most suited protocols for securing the IoT. However, computation and co…
View article: Energy-efficient protocols and hardware architectures for transport layer security
Energy-efficient protocols and hardware architectures for transport layer security Open
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2017.