من نحن

جاناكا الاواتوجودا

باحث مشارك وأستاذ مساعد

د. جاناكا باحث مشارك - أستاذ مساعد في أكاديمية. حصل على البكالوريوس (مع مرتبة الشرف) في علوم الكمبيوتر من جامعة بيرادينيا - سريلانكا، وعلى درجة الدكتوراه من جامعة كوينزلاند للتكنولوجيا، أستراليا. يشغل د. جاناكا منصب زميل أبحاث مساعد في معهد الأنظمة المتكاملة والذكية، جامعة جريفيث- أستراليا، محاضر زائر في معهد الدراسات العليا للعلوم، جامعة بيرادينيا – سريلانكا، ومراجع لقاعدة بيانات zbMATH المفتوحة في معهد FIZ كارلسروه - ألمانيا. ويعمل زميل بجمعية الكمبيوتر البريطانية، وعضو محترف في جمعية ماكينات الحوسبة، وعضو في الرابطة الدولية لأبحاث التشفير وفي جمعية الكمبيوتر (سريلانكا). حصل جاناكا على توصيات التميز البحثي لأعضاء هيئة التدريس في 2018 (للأعوام 2016-2017) و 2020 (للأعوام 2018-2019) و 2022 (للأعوام 2020-2021) من كلية الهندسة، جامعة بيرادينيا - سريلانكا.

المؤهلات

    بكالوريوس (مع مرتبة الشرف) في علوم الكمبيوتر (جامعة بيرادينيا - سريلانكا)

    دكتوراه (جامعة كوينزلاند للتكنولوجيا - أستراليا)

مجالات التدريس

    التشفير

الاهتمامات البحثية

    التشفير

المنشورات

    1. Alawatugoda, J. and Okamoto, T. Standard Model Leakage-Resilient Authenticated Key Exchange using Inner-product Extractors. In Designs, Codes and Cryptography, Volume 90, Issue 04, pp 1059-1079, Springer, 2022. doi:10.1007/s10623-022-01028-0.

    2. de Silva, R.; Navarathna, I.; Kumarasiri, M.; Alawatugoda, J. and Chuah, C.W. On Power Analysis Attacks against Hardware Stream Ciphers. In International Journal of Information and Computer Security (IJICS), Volume 17, Issue 1/2, pp 21-35, Inderscience, 2022. doi:10.1504/IJICS.2022.121289.

    3. de Silva, R.; Navarathna, I.; Kumarasiri, M.; Chuah, C.W. and Alawatugoda, J. Correlation Power Analysis Attack on Software Implementation of TRIVIUM Stream Cipher. (To appear) In International Journal of Information and Computer Security (IJICS), Inderscience. doi:10.1504/IJICS.2022.10046026.

    4. Edussuriya, C.; Vithanage, K.; Bandara, N.; Alawatugoda, J.; Sandirigama, M.; Jayasinghe, U.; Shone, N. and Lee Myoung, G. BAT-Block Analytics Tool Integrated with Blockchain Based IoT Platform. In Electronics, Volume 9, Issue 9, MDPI, 2020. doi:10.3390/electronics9091525.

    5. Alawatugoda, J. Public-Key Encryption in The Standard Model Against Strong Leakage Adversary. In The Computer Journal, Volume 63, Issue 12, pp 1904-1914, Oxford University Press, 2020. doi:10.1093/comjnl/bxaa055.

    6. Chakraborty, S.; Alawatugoda, J. and Pandu Rangan, C. New Approach to Practical Leakage-Resilient Public-Key Cryptography. In Journal of Mathematical Cryptology, Volume 14, Issue 1, pp 172-201, de Gruyter, 2020. doi:10.1515/jmc-2019-0014.

    7. Wei, C.C.Z.; Chuah, C.W.; Alawatugoda, J. Review on Leakage Resilient Key Exchange Security Models.  In International Journal of Communication Networks and Information Security (IJCNIS), Volume 11, Issue 01, pp 119-127, Institute of Information Technology, Kohat University of Science and Technology, 2019.

    8. Chuah, C.W.; Samylingam, V.; Darmawan, I.; Palaniappan, P.S.S.; Foozy, C.F.M.; Ramli, S.N. and Alawatugoda, J. Analysis of Four Historical Ciphers against Known Plaintext Frequency Statistical Attack. In International Journal of Integrated Engineering, Special Issue 2018: Data Information Engineering, Volume 10, Issue 6, pp 183-192, Penerbit UTHM, 2018. doi:10.30880/ijie.2018.10.06.026.

    9. Alawatugoda, J.; Seralathan, V.; Peiris, N.; Wickramasinghe, C. and Chuah, C.W. Implementation of an eCK-secure Key Exchange Protocol for OpenSSL. In International Journal on Advanced Science, Engineering and Information Technology, Volume 8, Issue 5, pages 2205-2210, INSIGHT - Indonesian Society for Knowledge and Human Development, 2018. doi:10.18517/ijaseit.8.5.5046.

    10.         Alawatugoda, J. On the Leakage-Resilient Key Exchange. In Journal of Mathematical Cryptology, Volume 11, Issue 4, pp 215-269, de Gruyter, 2017. doi:10.1515/jmc-2016-0003.

    11. Alupotha, J.; Prasadi, S.; Fawzan, M.; Alawatugoda, J.  and Ragel, R. Implementing a Proven-secure and Cost-effective Countermeasure against the Compression Ratio Info-leak Mass Exploitation (CRIME) Attack. In Proceedings of the 12th IEEE International Conference on Industrial and Information Systems (ICIIS 2017), IEEE Press, 2017. doi:10.1109/ICIINFS.2017.8300359.

    12. Chakraborty, S.; Alawatugoda, J.  and Pandu Rangan, C. Leakage-Resilient Non-Interactive Key Exchange in the Continuous-Memory Leakage Setting. In Provable Security, Volume 10592 of the series Lecture Notes in Computer Science (LNCS), Chapter 10, pp 167-187, Springer, 2017. doi:10.1007/978-3-319-68637-0_10.

    13. Alawatugoda, J. Generic Construction of an eCK-secure Key Exchange Protocol in the Standard Model.  In International Journal of Information Security, Volume 16, Issue 5, pp 541-557, Springer, 2017. doi:10.1007/s10207-016-0346-9.

    14. Alawatugoda, J.; Ragel, R.; Eranga, D.; Jayanath, N. and Somathilaka, C. Implementing a Leakage-Resilient Storage Scheme and its Refreshing Protocol to prevent Continuous Leakage Attacks. In Proceedings of the 2016 IEEE Conference on Information and Automation for Sustainability (ICIAfS 2016). IEEE Press, 2016. doi:10.1109/ICIAFS.2016.7946548.

    15. Weerasooriya, I.; Dhanushka, T.; Amarasinghe, N.; Alawatugoda, J.  and Ragel, R. On Implementing a Client-Server setting to prevent the Browser Reconnaissance and Exfiltration via Adaptive Compression of Hypertext (BREACH) Attacks. In Proceedings of the Manufacturing and Industrial Engineering Symposium (MIES 2016). IEEE Press, 2016. doi:10.1109/MIES.2016.7780263.

    16. Alawatugoda, J.; Stebila, D. and Boyd, C. Continuous After-the-fact Leakage-Resilient eCK-secure Key Exchange. In Cryptography and Coding, Volume 9496 of the series Lecture Notes in Computer Science (LNCS), Chapter 17, pp 277-294, Springer, 2015. doi:10.1007/978-3-319-27239-9_17.

    17. Alawatugoda, J.; Stebila, D. and Boyd, C. Protecting Encrypted Cookies from Compression Side-Channel Attacks. In Financial Cryptography and Data Security, Volume 8975 of the series Lecture Notes in Computer Science (LNCS), Chapter 6, pp 86-106, Springer, 2015. doi:10.1007/978-3-662-47854-7_6.

    18. Alawatugoda, J.; Boyd, C. and Stebila, D. Continuous After-the-fact Leakage-Resilient Key Exchange. In Information Security and Privacy, Volume 8544 of the series Lecture Notes in Computer Science (LNCS), Chapter 17, pp 258-273, Springer, 2014. doi:10.1007/978-3-319-08344-5_17.

    19. Alawatugoda, J.; Stebila, D. and Boyd, C. Modelling After-the-fact Leakage for Key Exchange. In Proceedings of the 9th ACM Symposium in Information, Computer and Communications Security (ASIACCS 2014), ACM Press, 2014. doi:10.1145/2590296.2590317.

    20. Herath, U.; Alawatugoda, J. and Ragel, R. Software Implementation Level Countermeasure Against Cache Timing Attacks on AES. In Proceedings of the 8th IEEE International Conference on Industrial and Information Systems (ICIIS 2013), IEEE Press, 2013. doi:10.1109/ICIInfS.2013.6731958.

    21. Alawatugoda, J.; Jayasinghe, D. and Ragel, R. Countermeasures against Bernstein’s Remote Cache Timing Attack. In Proceedings of the 6th IEEE International Conference on Industrial and Information Systems (ICIIS 2011), IEEE Press, 2011. doi:10.1109/ICIINFS.2011.6038038.

    Peer-reviewed abstract publications

     

    1.    Prasadi, S.; Alupotha, J.; Fawzan, M. and Alawatugoda, J. and Ragel, R. On Compression Ratio Info-leak Mass Exploitation (CRIME) Attack and Countermeasures. In Proceedings of Kelaniya International Conference on Advances in Computing and Technology (KICACT 2017), pp 37, 2017 (Best presentation award).

    2.    Eranga, D.; Jayanath, N.; Somathilaka, C.; Alawatugoda, J. and Ragel, R. Implementing a Leakage-Resilient Storage Scheme and its Refreshing Protocol to prevent Continuous Leakage Attacks.  In Proceedings of the Annual International Research Sessions of the University of Peradeniya (iPURS 2016), pp 284, 2016.

    3.    Weerasooriya, I.; Jayawardhana, D.; Amarasinghe, N.; Alawatugoda, J. and Ragel, R. Implementing a Client-Server setting to prevent the Browser Reconnaissance and Exfiltration via Adaptive Compression of Hypertext Attacks.  In Proceedings of the Annual International Research Sessions of the University of Peradeniya (iPURS 2016), pp 282, 2016.

     

    Peer-reviewed articles at Magazines

     

    1. Alawatugoda, J. Information Security against Stronger Attackers: Leakage-Resilient Encryption (A Research Brief Article). In Hanthana Vision - Research Magazine of the University of Peradeniya, Volume 06, Issue 2, pp 7, 2020.

    2. Alawatugoda, J. A Safer Walk through the Information Age (A Feature Article). In Hanthana Vision - Research Magazine of the University of Peradeniya, Volume 07, Issue 1, pp 24, 2021.

    3. Alawatugoda, J. Constructing robust algorithms to protect data from powerful attackers (A Research Brief Article). In Hanthana Vision - Research Magazine of the University of Peradeniya, Volume 11, Issue 2, pp 7, 2021.

جاناكا الاواتوجودا
An error has occurred. This application may no longer respond until reloaded. Reload 🗙