Sujoy Sinha Roy

I am an Assistant Professor (lecturer in the UK system) in Cyber Security at the University of Birmingham's School of Computer Science, and a member of the Security and Privacy research group. The National Cyber Security Centre (NCSC) and the Engineering and Physical Sciences Research Council (EPSRC) jointly recognise our research group as an Academic Centre of Excellence in Cyber Security Research (ACE-CSR).

PhD and Postdoc Position Openings

I am looking for Postdoc and PhDs in my team. Experience in processor design (on ASIC or FPGA), hardware/Software implementation etc. is desired. If you are interested in a Postdoc or PhD position, please contact me with a CV.

In addition to the aforementioned positions, there are scholarships for the Chinese students funded by the China Scholarship Council Scholarships scheme. The deadline for applications to be received is 17 January 2020.

Why Birmingham?

Why PhD with us?
+ PhD students receive close supervision. Students meet their supervisors whenever they want.
+ Funding is available for 3.5 years (which is generally the span of a PhD).
+ We do *not* require a GRE score.
+ Bachelors degree (BS) students with excellent grades are eligible for direct PhD admission.
+ PhD curriculum does *not* involve any major coursework. It is research-focused and hence more fun!
+ Researchers collaborate. We have weekly group discussions and seminars.
+ We are social. Work is fun here!

Team

I work closely with my PhD and UG/MSc project students.

Andrea Basso (PhD, Lattice-based crypto)

Zhuang Xu (PhD, Side-channel analysis of post-quantum crypto)

Kiera Woolridge (PhD, Isogeny-based post-quantum crypto)


Giacomo Fiorindo (UG Project Student)

Kexin Sun (UG Project Student)

Matthew Walters (Completed MSci project on Constant-time BCH Error-Correcting Code. His project received appreciation from the NIST and resulted in a publication in ISCAS 2020. Congratulations Matt!)

Master/Bachelor project topics:

1. Design and analysis of post-quantum public-key cryptographic schemes

2. their efficient implementations

3. their side-channel security

4. Privacy-preserving cloud computing

Github

https://github.com/sujoyetc

Updates

  • SaberX4 is a software implementation of Saber to achieve higher throughput, i.e., more KEM operations per second, on server machines with AVX2 support. A server needs to compute thousands of key exchanges every second; hence high throughput is desired in server applications. SaberX4 batches four Saber KEM operations and computes them in parallel using AVX2 instructions, most of the time. Source code is available at Saber.
  • Our paper Generic Side-channel attacks on CCA-secure lattice-based PKE and KEM schemes

  • News article published in NewStatesman How to prevent a crypto-apocalypse

  • Our post-quantum public-key encapsulation scheme 'Saber' has moved to the Round 2 of NIST's Post-Quantum Standardization Project. More information on Saber.
  • Our paper on computer architecture design for homomorphic computing on encrypted data has been accepted in High Performance Computing Architecture (HPCA 2019). It is a top conference in Computing Systems with acceptance rate 19%.
  • FWO has awarded my PhD thesis “Public Key Cryptography on Hardware Platforms: Design and Analysis of Elliptic Curve and Lattice-based Cryptoprocessors“ the IBM Innovation Award 2018. The Award is a scientific prize that acknowledges an outstanding doctoral thesis in informatics.
  • Our paper "Constant-time discrete Gaussian sampling" has been selected as featured article in IEEE Transactions on Computers, November 2018. More info here. Video
  • My article "Public Key Cryptography on Hardware Platforms: Design and Analysis of Lattice-based Cryptoprocessors" is now available in GeniaaL, issue 42.
  • Blog on constant-time Gaussian sampling for lattice-based cryptography is now available.
  • Our paper "Saber on ARM: CCA-secure module lattice-based key encapsulation on ARM" has been published in TCHES 2018. Author’s version of the paper is available in Eprint 2018/682 and the source codes are available in Github
  • Research

    Research Interests: I am interested in developing efficient algorithms, design methodologies and hardware/software architectures for computation-intensive tasks targeting new-generation heterogeneous computing platforms. I have contributed to the progress of hardware security by designing and engineering cryptosystems, analyzing their physical security properties and implementing countermeasures against side-channel and fault attacks. I am one of the developers of SABER KEM which is a candidate in NIST's 2nd round Post-Quantum Cryptography Standardization project.

    My research experience spans two broad areas: Public-key Cryptography and Privacy-preserving Cloud Computing using Homomorphic Encryption, with focus on implementation aspects.

    Projects

    • Implementation of post-Quantum Crypto in HW/SW.

    • Hardware Acceleration of Homomorphic Encryption.

    • Elliptic Curve Cryptoprocessor.

    Program Committee

    • In the program committees of SAC 2018, SPACE 2018, VLSID 2018, CHES 2019, Indocrypt 2019, SPACE 2019, VLSID 2019.
    • Reviewer of IEEE Transactions on VLSI, IEEE Transactions on Circuits and Systems, IEEE Transactions on Computers, IEEE Transactions on Information Forensics and Security, Journal of Cryptographic Engineering.

    Biography

    I received the PhD degree with `Summa cum laude with congratulations from the examination committee' (~top 5%) from the Computer Security and Industrial Cryptography (COSIC) group, Department of Electrical Engineering (ESAT), KU Leuven, Belgium. My doctoral thesis received the 'IBM Innovation Award 2018' which recognizes of an outstanding doctoral thesis in informatics. I joined the School of Computer Science, University of Birmingham in September 2018.

     

    Publications

    P. Ravi, S. Sinha Roy, A. Chattopadhyay and S. Bhasin, "Generic Side-channel attacks on CCA-secure lattice-based PKE and KEM schemes." In Cryptology ePrint Archive, Report 2019/948, 2019.
    M. Walters and S. Sinha Roy, "Constant-time BCH Error-Correcting Code." Accepted in IEEE International Symposium on Circuits & Systems (ISCAS 2020). Full version in Cryptology ePrint Archive, Report 2019/155, 2019.
    S. Sinha Roy, "SaberX4: High-throughput Software Implementationof Saber Key Encapsulation Mechanism." In International Conference on Computer Design (ICCD) 2019.
    A. Karmakar, S. Sinha Roy, I. Verbauwhede, and F. Vercauteren, "Pushing the speed limit of constant-time discrete Gaussian sampling. A case study on Falcon.," In 2019th Design Automation Conference (DAC 2019), IEEE, 16 pages, 2019.
    S. Sinha Roy, F. Turan, K. Jarvinen, F. Vercauteren, and I. Verbauwhede, "FPGA-based High-Performance Parallel Architecture for Homomorphic Computing on Encrypted Data," In 25th IEEE International Symposium on High-Performance Computer Architecture (HPCA), IEEE, 12 pages, 2019.
    J. Balasch, A. Beckers, D. Bozilov, S. Sinha Roy, F. Turan, and I. Verbauwhede, "Teaching HW/SW codesign with a Zynq ARM/FPGA SoC," In European Workshop on Microelectronics Education, IEEE, pp. 63-66, 2018.
    A. Karmakar, J. Bermudo Mera, S. Sinha Roy, and I. Verbauwhede, "Saber on ARM. CCA-secure module lattice-based key encapsulation on ARM," In Transactions in Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science, Springer-Verlag, 24 pages, 2018.
    J. P. D'Anvers, A. Karmakar, S. Sinha Roy, and F. Vercauteren, "Saber: Module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM," In Progress in Cryptology - AFRICACRYPT 2018, Lecture Notes in Computer Science, Springer-Verlag, 23 pages, 2018.
    J. P. D'Anvers, A. Karmakar, S. Sinha Roy, and F. Vercauteren, "SABER: Mod-LWR based KEM," In First PQC Standardization Conference, 31 pages, 2018.
    S. Sinha Roy, K. Järvinen, J. Vliegen, F. Vercauteren, and I. Verbauwhede, "HEPCloud: An FPGA-Based Multicore Processor for FV Somewhat Homomorphic Function Evaluation," IEEE Transactions on Computers 67(11), pp. 1637-1650, 2018.
    K. Järvinen, S. Sinha Roy, and I. Verbauwhede, "Arithmetic of tau-adic expansions for lightweight Koblitz curve cryptography," Journal of Cryptographic Engineering 8(4), pp. 285 - 300, 2018.
    A. Karmakar, S. Sinha Roy, O. Reparaz, I. Verbauwhede, and F. Vercauteren, "Constant-time Discrete Gaussian Sampling," IEEE Transactions on Computers SI PQcrypto(accepted), 12 pages, 2017.
    Z. Liu, T. Poppelmann, T. Oder, H. Seo, J. Großschädl, T. Güneysu, H. Kim, S. Sinha Roy, and I. Verbauwhede, "High-Performance Ideal Lattice-Based Cryptography on 8-Bit AVR Microcontrollers," Transactions on Embedded Computing Systems (TECS) - Special Issue on Secure and Fault-Tolerant 16(117), 24 pages, 2017.
    S. Sinha Roy, "Public Key Cryptography on Hardware Platforms: Design and Analysis of Elliptic Curve and Lattice-based Cryptoprocessors," PhD thesis, KU Leuven, I. Verbauwhede, and F. Vercauteren (promotors), 192 pages, 2017.
    S. Sinha Roy, F. Vercauteren, J. Vliegen, and I. Verbauwhede, "Hardware Assisted Fully Homomorphic Function Evaluation and Encrypted Search," IEEE Transactions on Computers PP(99), pp. 1-12, 2017.
    S. Sinha Roy, A. Karmakar, and I. Verbauwhede, "Ring-LWE: Applications to cryptography andtheir efficient realization," In International Conference on Security, Privacy and Applied Cryptography Engineering, Lecture Notes in Computer Science 8204, A. Agarwal, M. Arun Kumar, and S. Chamarty (eds.), Springer-Verlag, 10 pages, 2016.
    A. Karmakar, S. Sinha Roy, I. Verbauwhede, and F. Vercauteren, "Efficient Finite Field Multiplication for Isogeny Based Post Quantum Cryptography," In International Workshop on the Arithmetic of Finite Fields (WAIFI 2016), Lecture Notes in Computer Science, Springer-Verlag, 15 pages, 2016.
    O. Reparaz, S. Sinha Roy, R. De Clercq, I. Verbauwhede, and F. Vercauteren, "Masking ring-LWE," Journal of Cryptographic Engineering 6(2), 17 pages, 2016.
    J. Bosmans, S. Sinha Roy, K. Jarvinen, and I. Verbauwhede, "A Tiny Coprocessor for Elliptic Curve Cryptography over the 256-bit NIST Prime Field.," VLSI Design and 2016 15th International Conference on Embedded Systems (VLSID) -(-), 6 pages, 2016.
    O. Reparaz, S. Sinha Roy, R. De Clercq, F. Vercauteren, and I. Verbauwhede, "Additively Homomorphic ring-LWE Masking," In Post-Quantum Cryptography, Lecture Notes in Computer Science 9606, T. Takagi (ed.), Springer-Verlag, pp. 233-244, 2016.
    D. Mukhopadhyay, S. Sinha Roy, and I. Verbauwhede, "Tutorial: Embedded Security," VLSI Design and 2016 15th International Conference on Embedded Systems (VLSID), Kolkata, IN, 2016.
    O. Reparaz, S. Sinha Roy, I. Verbauwhede, and F. Vercauteren, "A masked ring-LWE implementation," In Cryptographic Hardware and Embedded Systems - CHES 2015, Lecture Notes in Computer Science 9293, T. Güneysu, and H. Handschuh (eds.), Springer-Verlag, pp. 683-702, 2015.
    Z. Liu, H. Seo, S. Sinha Roy, J. Großschädl, H. Kim, and I. Verbauwhede, "Efficient Ring-LWE Encryption on 8-bit AVR Processors," In Cryptographic Hardware and Embedded Systems - CHES 2015, Lecture Notes in Computer Science 9293, T. Güneysu, and H. Handschuh (eds.), Springer-Verlag, 22 pages, 2015.
    See all publications