default search action
Bernard L. Menezes
Person information
- affiliation: Indian Institute of Technology, Bombay, India
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [i4]Tikaram Sanyashi, Bernard Menezes:
Secure Computation over Encrypted Databases. CoRR abs/2308.02878 (2023) - 2021
- [c26]Nirmal Kumar Boran, Kenrick Pinto, Bernard Menezes:
On Disabling Prefetcher to Amplify Cache Side Channels. VDAT 2021: 1-6 - 2020
- [j8]Ashokkumar C., Bholanath Roy, M. Bhargav Sri Venkatesh, Bernard L. Menezes:
"S-Box" Implementation of AES Is Not Side Channel Resistant. J. Hardw. Syst. Secur. 4(2): 86-97 (2020)
2010 – 2019
- 2019
- [c25]Tikaram Sanyashi, Darshil Desai, Bernard Menezes:
Cryptanalysis of Homomorphic Encryption Schemes based on the Aproximate GCD Problem. ICETE (2) 2019: 517-522 - [c24]Tikaram Sanyashi, Anasuya Acharya, Bernard Menezes:
Plaintext Recovery Attacks and Their Mitigation in an Application-Specific SHE Scheme. PDCAT 2019: 69-74 - [i3]Tikaram Sanyashi, M. Bhargav Sri Venkatesh, Kapil Agarwal, Manish Verma, Bernard Menezes:
A new Hybrid Lattice Attack on Galbraith's Binary LWE Cryptosystem. CoRR abs/1904.04590 (2019) - 2018
- [c23]Tikaram Sanyashi, Sreyans Nahata, Rushang Dhanesha, Bernard Menezes:
Learning Plaintext in Galbraith's LWE Cryptosystem. ICETE (2) 2018: 725-731 - [i2]C. Ashokkumar, Bholanath Roy, M. Bhargav Sri Venkatesh, Bernard L. Menezes:
"S-Box" Implementation of AES is NOT side-channel resistant. IACR Cryptol. ePrint Arch. 2018: 1002 (2018) - 2017
- [c22]Sandeep Rai, Rushang Dhanesha, Sreyans Nahata, Bernard Menezes:
Malicious Application Detection on Android Smartphones with Enhanced Static-Dynamic Analysis. ICISS 2017: 194-208 - [c21]Jiji Angel, R. Rahul, C. Ashokkumar, Bernard Menezes:
DSA Signing Key Recovery with Noisy Side Channels and Variable Error Rates. INDOCRYPT 2017: 147-165 - [i1]Ashokkumar C., M. Bhargav Sri Venkatesh, Ravi Prakash Giri, Bernard Menezes:
Design, Implementation and Performance Analysis of Highly Efficient Algorithms for AES Key Retrieval in Access-driven Cache-based Side Channel Attacks. IACR Cryptol. ePrint Arch. 2017: 896 (2017) - 2016
- [c20]Ashokkumar C., Ravi Prakash Giri, Bernard L. Menezes:
Highly Efficient Algorithms for AES Key Retrieval in Cache Access Attacks. EuroS&P 2016: 261-275 - [c19]Kanpata Sudhakara Rao, Naman Jain, Nikhil Limaje, Abhilash Gupta, Mridul Jain, Bernard Menezes:
Two for the price of one: A combined browser defense against XSS and clickjacking. ICNC 2016: 1-6 - 2015
- [c18]Bholanath Roy, Ravi Prakash Giri, Ashokkumar C., Bernard Menezes:
Design and Implementation of an Espionage Network for Cache-based Side Channel Attacks on AES. SECRYPT 2015: 441-447 - 2014
- [c17]Pratik Poddar, Achin Bansal, Bernard Menezes:
Optimizing Elliptic Curve Scalar Multiplication with Near-Factorization. SECRYPT 2014: 361-370 - [c16]Jyoti Gajrani, Pooja Mazumdar, Sampreet A. Sharma, Bernard Menezes:
Challenges in Implementing Cache-Based Side Channel Attacks on Modern Processors. VLSID 2014: 222-227 - 2012
- [j7]Vijayalakshmi Murlidhar, Bernard Menezes, Mihir Sathe, Goutam Murlidhar:
A Clustering Based Forecast Engine for Retail Sales. J. Digit. Inf. Manag. 10(4): 219-229 (2012) - [c15]Sampreet A. Sharma, Bernard L. Menezes:
Implementing side-channel attacks on suggest boxes in web applications. SECURIT 2012: 57-62 - 2010
- [j6]Om Pal, Peeyush Jain, Sudhansu Goyal, Zia Saquib, Bernard L. Menezes:
Intrusion Detection Using Graph Support: A Hybrid Approach of Supervised and Unsupervised Techniques. Int. J. Adv. Comp. Techn. 2(3): 114-118 (2010) - [c14]M. Vijayalakshmi, Bernard Menezes, Rohit Menon, Aniket Divecha, Rajesh Ravindran, Kamal Mehta:
Intelligent sales forecasting engine using genetic algorithms. CIKM 2010: 1669-1672
2000 – 2009
- 2009
- [c13]Madhumita Chatterjee, G. Sivakumar, Bernard Menezes:
Dynamic Policy Based Model for Trust Based Access Control in P2P Applications. ICC 2009: 1-5 - 2008
- [c12]M. Vijayalakshmi, Bernard Menezes, Venu Gopal:
Forecasting Using Consistent Experts. COMAD 2008: 261-269 - 2007
- [c11]V. Vallieswaran, Bernard Menezes:
ArchKriti : A Software Architecture Based Design and Evaluation Tool Suite. ITNG 2007: 701-706 - 2006
- [c10]Ramrao Wagh, Umesh Bellur, Bernard Menezes:
Transformation of UML Design Model into Performance Model - A Model-Driven Framework. ICEIS (3) 2006: 576-580 - 2005
- [c9]Santosh Dwivedi, Bernard Menezes, Ashish Singh:
Database Access Design for E-Business - A Case Study. COMAD 2005: 168-175 - [c8]Pankaj Gulhane, Bernard Menezes, Timma Reddy Kunduru, Kalam Shah, S. A. Soman:
Forecasting using Decomposition and Combinations of Experts. IC-AI 2005: 67-73
1990 – 1999
- 1995
- [j5]Bernard L. Menezes, Umesh Bakhru:
New Bounds on the Reliability of Augmented Shuffle-Exchange Networks. IEEE Trans. Computers 44(1): 123-129 (1995) - [j4]Frank T. Hady, Bernard L. Menezes:
The Performance of Crossbar-Based Binary Hypercubes. IEEE Trans. Computers 44(10): 1208-1215 (1995) - 1994
- [j3]R. A. McConnell, Bernard L. Menezes:
Evaluation of Task Allocation in Mesh-Based Multicomputers using Genetic, Neural, and Traditional Algorithms. Int. J. Artif. Intell. Tools 3(1): 47-60 (1994) - 1993
- [j2]Bernard L. Menezes, Ivan Luiz Marques Ricarte, Ramakrishna Thurimella:
Analysis of Pipelined External Sorting on a Reconfigurable Message-Passing Multicomputer. Parallel Comput. 19(8): 839-858 (1993) - 1991
- [j1]Bernard L. Menezes, Roy M. Jenevein:
The KYKLOS Multicomputer Network: Interconnection Strategies, Properties, and Applications. IEEE Trans. Computers 40(6): 692-705 (1991) - [c7]Bernard L. Menezes, Umesh Bakhru, Randolph Sergent:
New Bounds on the Reliability of Two Augmented Shuffle-Exchange Networks. ICPP (1) 1991: 318-322 - 1990
- [c6]Bernard L. Menezes, Ramakrishna Thurimella:
Reliability Analysis of Two Classes of Double-Tree Network-Based Multiprocessors. ICPP (1) 1990: 585-586
1980 – 1989
- 1987
- [c5]Bernard L. Menezes, D. Brant, D. Loewi, Alfred G. Dale, Roy M. Jenevein:
An Interconnection Network Supporting Relational Join Operations. ICDCS 1987: 128-135 - [c4]Bernard L. Menezes, K. Thadani, Alfred G. Dale, Roy M. Jenevein:
Design of a HyperKYKLOS-based Multiprocessor Architecture for High-Performance Join Operations. IWDM 1987: 75-88 - 1986
- [c3]Roy M. Jenevein, Bernard L. Menezes:
KYKLOS: Low Tide High Flow. ICDCS 1986: 8-15 - [c2]Bernard L. Menezes, Roy M. Jenevein, Miroslaw Malek:
Reliability Analysis of the KYKLOS Interconnection Network. ICDCS 1986: 46-53 - 1985
- [c1]Bernard L. Menezes, Roy M. Jenevein:
KYKLOS : A Linear Growth Fault-Tolerant Interconnection Network. ICPP 1985: 498-502
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint