I am an Assistant Professor (lecturer in the UK system) at the University of Birmingham's Security and Privacy group. I am leading the Cryptographic Engineering subgroup. Together with my students, we aim to be a world leader in cryptographic engineering.
The National Cyber Security Centre (NCSC) and the Engineering and Physical Sciences Research Council (EPSRC) jointly recognise the Security and Privacy group as an Academic Centre of Excellence in Cyber Security Research (ACE-CSR).
PhD and Postdoc Position Openings
If you are interested in a PhD position, please contact me with a CV.
Why PhD with us?
+ PhD students receive close supervision. Students meet their supervisors whenever they want.
+ Funding is available for 3.5 years (which is generally the span of a PhD).
+ We do *not* require a GRE score.
+ Bachelors degree (BS) students with excellent grades are eligible for direct PhD admission.
+ PhD curriculum does *not* involve any major coursework. It is research-focused and hence more fun!
+ Researchers collaborate. We have weekly group discussions and seminars.
+ We are social. Work is fun here!
TeamI work closely with my PhD and UG/MSc project students.
Andrea Basso (PhD, Lattice-based crypto)
Zhuang Xu (PhD, Side-channel analysis of post-quantum crypto)
Giacomo Fiorindo (UG Project Student). Project "Machine Learning on Encrypted Data."
Kexin Sun (UG Project Student). Project "Batched implementation of Saber on Platforms with SIMD."
Master/Bachelor project topics:
1. Design and analysis of post-quantum public-key cryptographic schemes
2. their efficient implementations
3. their side-channel security
4. Privacy-preserving cloud computing
I am interested in developing efficient algorithms, design methodologies and hardware/software architectures for computation-intensive tasks targeting new-generation heterogeneous computing platforms. I have contributed to the progress of hardware security by designing and engineering cryptosystems, analyzing their physical security properties and implementing countermeasures against side-channel and fault attacks. I am one of the developers of SABER KEM which is a candidate in NIST's 2nd round Post-Quantum Cryptography Standardization project.
My research experience spans two broad areas: Public-key Cryptography and Privacy-preserving Cloud Computing using Homomorphic Encryption, with focus on implementation aspects.
Implementation of post-Quantum Crypto in HW/SW.
Hardware Acceleration of Homomorphic Encryption.
- In the program committees of SAC 2018, SPACE 2018, VLSID 2018, CHES 2019, Indocrypt 2019, SPACE 2019, VLSID 2019.
- Reviewer of IEEE Transactions on VLSI, IEEE Transactions on Circuits and Systems, IEEE Transactions on Computers, IEEE Transactions on Information Forensics and Security, Journal of Cryptographic Engineering.
I received the PhD degree with `Summa cum laude with congratulations from the examination committee' (~top 5%) from the Computer Security and Industrial Cryptography (COSIC) group, Department of Electrical Engineering (ESAT), KU Leuven, Belgium. My doctoral thesis received the 'IBM Innovation Award 2018' which recognizes of an outstanding doctoral thesis in informatics. I joined the School of Computer Science, University of Birmingham in September 2018.
2020P. Ravi, S Bhasin, S. Sinha Roy and A. Chattopadhyay, "Drop by Drop you break the rock - Exploiting generic vulnerabilities in Lattice-based PKE/KEMs using EM-based Physical Attacks." In Cryptology ePrint Archive, Report 2020/549.
|S. Sinha Roy and A. Basso, "High-speed Instruction-set Coprocessor for Lattice-based Key Encapsulation Mechanism: Saber in Hardware." In Cryptology ePrint Archive, Report 2020/434.|
|F. Turan, S. Sinha Roy, and I. Verbauwhede, ""HEAWS: An Accelerator for Homomorphic Encryption on the Amazon AWS FPGA." Accepted in IEEE Transactions on Computers 2020.|
|P. Ravi, S. Sinha Roy, A. Chattopadhyay and S. Bhasin, "Generic Side-channel attacks on CCA-secure lattice-based PKE and KEM schemes." Accepted in TCHES 2020. In Cryptology ePrint Archive, Report 2019/948, 2019.|
|J. Bermudo Mera, F. Turan, A. Karmakar, S. Sinha Roy, and I. Verbauwhede , "Compact domain-specific co-processor for accelerating module lattice-based key encapsulation mechanism." Accepted in Design Automation Conference (DAC) 2020. In Cryptology ePrint Archive, Report 2020/321, 2020.|
|M. Walters and S. Sinha Roy, "Constant-time BCH Error-Correcting Code." Accepted in IEEE International Symposium on Circuits & Systems (ISCAS 2020). Full version in Cryptology ePrint Archive, Report 2019/155, 2019.|
2019--S. Sinha Roy, "SaberX4: High-throughput Software Implementationof Saber Key Encapsulation Mechanism." In International Conference on Computer Design (ICCD) 2019.
|A. Karmakar, S. Sinha Roy, I. Verbauwhede, and F. Vercauteren, "Pushing the speed limit of constant-time discrete Gaussian sampling. A case study on Falcon.," In 2019th Design Automation Conference (DAC 2019), IEEE, 16 pages, 2019.|
|S. Sinha Roy, F. Turan, K. Jarvinen, F. Vercauteren, and I. Verbauwhede, "FPGA-based High-Performance Parallel Architecture for Homomorphic Computing on Encrypted Data," In 25th IEEE International Symposium on High-Performance Computer Architecture (HPCA), IEEE, 12 pages, 2019.|
|J. Balasch, A. Beckers, D. Bozilov, S. Sinha Roy, F. Turan, and I. Verbauwhede, "Teaching HW/SW codesign with a Zynq ARM/FPGA SoC," In European Workshop on Microelectronics Education, IEEE, pp. 63-66, 2018.|
|A. Karmakar, J. Bermudo Mera, S. Sinha Roy, and I. Verbauwhede, "Saber on ARM. CCA-secure module lattice-based key encapsulation on ARM," In Transactions in Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science, Springer-Verlag, 24 pages, 2018.|
|J. P. D'Anvers, A. Karmakar, S. Sinha Roy, and F. Vercauteren, "Saber: Module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM," In Progress in Cryptology - AFRICACRYPT 2018, Lecture Notes in Computer Science, Springer-Verlag, 23 pages, 2018.|
|J. P. D'Anvers, A. Karmakar, S. Sinha Roy, and F. Vercauteren, "SABER: Mod-LWR based KEM," In First PQC Standardization Conference, 31 pages, 2018.|
|S. Sinha Roy, K. Järvinen, J. Vliegen, F. Vercauteren, and I. Verbauwhede, "HEPCloud: An FPGA-Based Multicore Processor for FV Somewhat Homomorphic Function Evaluation," IEEE Transactions on Computers 67(11), pp. 1637-1650, 2018.|
|K. Järvinen, S. Sinha Roy, and I. Verbauwhede, "Arithmetic of tau-adic expansions for lightweight Koblitz curve cryptography," Journal of Cryptographic Engineering 8(4), pp. 285 - 300, 2018.|
|A. Karmakar, S. Sinha Roy, O. Reparaz, I. Verbauwhede, and F. Vercauteren, "Constant-time Discrete Gaussian Sampling," IEEE Transactions on Computers SI PQcrypto(accepted), 12 pages, 2017.|
|Z. Liu, T. Poppelmann, T. Oder, H. Seo, J. Großschädl, T. Güneysu, H. Kim, S. Sinha Roy, and I. Verbauwhede, "High-Performance Ideal Lattice-Based Cryptography on 8-Bit AVR Microcontrollers," Transactions on Embedded Computing Systems (TECS) - Special Issue on Secure and Fault-Tolerant 16(117), 24 pages, 2017.|
|S. Sinha Roy, "Public Key Cryptography on Hardware Platforms: Design and Analysis of Elliptic Curve and Lattice-based Cryptoprocessors," PhD thesis, KU Leuven, I. Verbauwhede, and F. Vercauteren (promotors), 192 pages, 2017.|
|S. Sinha Roy, F. Vercauteren, J. Vliegen, and I. Verbauwhede, "Hardware Assisted Fully Homomorphic Function Evaluation and Encrypted Search," IEEE Transactions on Computers PP(99), pp. 1-12, 2017.|
|S. Sinha Roy, A. Karmakar, and I. Verbauwhede, "Ring-LWE: Applications to cryptography andtheir efficient realization," In International Conference on Security, Privacy and Applied Cryptography Engineering, Lecture Notes in Computer Science 8204, A. Agarwal, M. Arun Kumar, and S. Chamarty (eds.), Springer-Verlag, 10 pages, 2016.|
|A. Karmakar, S. Sinha Roy, I. Verbauwhede, and F. Vercauteren, "Efficient Finite Field Multiplication for Isogeny Based Post Quantum Cryptography," In International Workshop on the Arithmetic of Finite Fields (WAIFI 2016), Lecture Notes in Computer Science, Springer-Verlag, 15 pages, 2016.|
|O. Reparaz, S. Sinha Roy, R. De Clercq, I. Verbauwhede, and F. Vercauteren, "Masking ring-LWE," Journal of Cryptographic Engineering 6(2), 17 pages, 2016.|
|J. Bosmans, S. Sinha Roy, K. Jarvinen, and I. Verbauwhede, "A Tiny Coprocessor for Elliptic Curve Cryptography over the 256-bit NIST Prime Field.," VLSI Design and 2016 15th International Conference on Embedded Systems (VLSID) -(-), 6 pages, 2016.|
|O. Reparaz, S. Sinha Roy, R. De Clercq, F. Vercauteren, and I. Verbauwhede, "Additively Homomorphic ring-LWE Masking," In Post-Quantum Cryptography, Lecture Notes in Computer Science 9606, T. Takagi (ed.), Springer-Verlag, pp. 233-244, 2016.|
|D. Mukhopadhyay, S. Sinha Roy, and I. Verbauwhede, "Tutorial: Embedded Security," VLSI Design and 2016 15th International Conference on Embedded Systems (VLSID), Kolkata, IN, 2016.|
|O. Reparaz, S. Sinha Roy, I. Verbauwhede, and F. Vercauteren, "A masked ring-LWE implementation," In Cryptographic Hardware and Embedded Systems - CHES 2015, Lecture Notes in Computer Science 9293, T. Güneysu, and H. Handschuh (eds.), Springer-Verlag, pp. 683-702, 2015.|
|Z. Liu, H. Seo, S. Sinha Roy, J. Großschädl, H. Kim, and I. Verbauwhede, "Efficient Ring-LWE Encryption on 8-bit AVR Processors," In Cryptographic Hardware and Embedded Systems - CHES 2015, Lecture Notes in Computer Science 9293, T. Güneysu, and H. Handschuh (eds.), Springer-Verlag, 22 pages, 2015.|