Sujoy Sinha Roy

I am an Assistant Professor (lecturer in the UK system) at the University of Birmingham's Security and Privacy group. I am leading the Cryptographic Engineering subgroup. Together with my students, we aim to be a world leader in cryptographic engineering.

The National Cyber Security Centre (NCSC) and the Engineering and Physical Sciences Research Council (EPSRC) jointly recognise the Security and Privacy group as an Academic Centre of Excellence in Cyber Security Research (ACE-CSR).

PhD and Postdoc Position Openings

If you are interested in a PhD position, please contact me with a CV.

Why Birmingham?

Why PhD with us?
+ PhD students receive close supervision. Students meet their supervisors whenever they want.
+ Funding is available for 3.5 years (which is generally the span of a PhD).
+ We do *not* require a GRE score.
+ Bachelors degree (BS) students with excellent grades are eligible for direct PhD admission.
+ PhD curriculum does *not* involve any major coursework. It is research-focused and hence more fun!
+ Researchers collaborate. We have weekly group discussions and seminars.
+ We are social. Work is fun here!

Team

I work closely with my PhD and UG/MSc project students.

Andrea Basso (PhD, Lattice-based crypto)

Zhuang Xu (PhD, Side-channel analysis of post-quantum crypto)


Giacomo Fiorindo (UG Project Student). Project "Machine Learning on Encrypted Data."

Kexin Sun (UG Project Student). Project "Batched implementation of Saber on Platforms with SIMD."

Matthew Walters (Completed MSci project on Constant-time BCH Error-Correcting Code. His project received appreciation from the NIST and resulted in a publication in ISCAS 2020. Congratulations Matt!)

Master/Bachelor project topics:

1. Design and analysis of post-quantum public-key cryptographic schemes

2. their efficient implementations

3. their side-channel security

4. Privacy-preserving cloud computing

Github

https://github.com/sujoyetc

Updates

  • Joint work with Furkan Turan and Ingrid Verbauwhede on hardware acceleration of homomorphic encryption using Amazon AWS cloud is published in IEEE TC. A video presentation of the abstracrt HEAWS - Homomorphic Encryption on AWS F1
  • Joint work with my PhD student Andrea Basso on hardware implementation of Saber KEM is available on ePrint High-speed Instruction-set Coprocessor for Lattice-based Key Encapsulation Mechanism: Saber in Hardware
  • My paper Compact Ring-LWE Cryptoprocessor is one of the most cited papers that got published in CHES2014 to CHES2019.
  • Generic Side-channel attacks on CCA-secure lattice-based PKE and KEM schemes has been accepted in TCHES 2020.
  • "HEAWS: An Accelerator for Homomorphic Encryption on the Amazon AWS FPGA" has been accepted in Transactions on Computers 2020.
  • SaberX4 is a software implementation of Saber to achieve higher throughput, i.e., more KEM operations per second, on server machines with AVX2 support. A server needs to compute thousands of key exchanges every second; hence high throughput is desired in server applications. SaberX4 batches four Saber KEM operations and computes them in parallel using AVX2 instructions, most of the time. Source code is available at Saber.
  • Our paper Generic Side-channel attacks on CCA-secure lattice-based PKE and KEM schemes

  • News article published in NewStatesman How to prevent a crypto-apocalypse

  • Our post-quantum public-key encapsulation scheme 'Saber' has moved to the Round 2 of NIST's Post-Quantum Standardization Project. More information on Saber.
  • Our paper on computer architecture design for homomorphic computing on encrypted data has been accepted in High Performance Computing Architecture (HPCA 2019). It is a top conference in Computing Systems with acceptance rate 19%.
  • FWO has awarded my PhD thesis “Public Key Cryptography on Hardware Platforms: Design and Analysis of Elliptic Curve and Lattice-based Cryptoprocessors“ the IBM Innovation Award 2018. The Award is a scientific prize that acknowledges an outstanding doctoral thesis in informatics.
  • Our paper "Constant-time discrete Gaussian sampling" has been selected as featured article in IEEE Transactions on Computers, November 2018. More info here. Video
  • My article "Public Key Cryptography on Hardware Platforms: Design and Analysis of Lattice-based Cryptoprocessors" is now available in GeniaaL, issue 42.
  • Blog on constant-time Gaussian sampling for lattice-based cryptography is now available.
  • Our paper "Saber on ARM: CCA-secure module lattice-based key encapsulation on ARM" has been published in TCHES 2018. Author’s version of the paper is available in Eprint 2018/682 and the source codes are available in Github
  • Research

    Research Interests: I am interested in developing efficient algorithms, design methodologies and hardware/software architectures for computation-intensive tasks targeting new-generation heterogeneous computing platforms. I have contributed to the progress of hardware security by designing and engineering cryptosystems, analyzing their physical security properties and implementing countermeasures against side-channel and fault attacks. I am one of the developers of SABER KEM which is a candidate in NIST's 2nd round Post-Quantum Cryptography Standardization project.

    My research experience spans two broad areas: Public-key Cryptography and Privacy-preserving Cloud Computing using Homomorphic Encryption, with focus on implementation aspects.

    Projects

    • Implementation of post-Quantum Crypto in HW/SW.

    • Hardware Acceleration of Homomorphic Encryption.

    Program Committee

    • In the program committees of SAC 2018, SPACE 2018, VLSID 2018, CHES 2019, Indocrypt 2019, SPACE 2019, VLSID 2019.
    • Reviewer of IEEE Transactions on VLSI, IEEE Transactions on Circuits and Systems, IEEE Transactions on Computers, IEEE Transactions on Information Forensics and Security, Journal of Cryptographic Engineering.

    Biography

    I received the PhD degree with `Summa cum laude with congratulations from the examination committee' (~top 5%) from the Computer Security and Industrial Cryptography (COSIC) group, Department of Electrical Engineering (ESAT), KU Leuven, Belgium. My doctoral thesis received the 'IBM Innovation Award 2018' which recognizes of an outstanding doctoral thesis in informatics. I joined the School of Computer Science, University of Birmingham in September 2018.

     

    Publications

    2020

    P. Ravi, S Bhasin, S. Sinha Roy and A. Chattopadhyay, "Drop by Drop you break the rock - Exploiting generic vulnerabilities in Lattice-based PKE/KEMs using EM-based Physical Attacks." In Cryptology ePrint Archive, Report 2020/549.
    S. Sinha Roy and A. Basso, "High-speed Instruction-set Coprocessor for Lattice-based Key Encapsulation Mechanism: Saber in Hardware." In Cryptology ePrint Archive, Report 2020/434.
    F. Turan, S. Sinha Roy, and I. Verbauwhede, ""HEAWS: An Accelerator for Homomorphic Encryption on the Amazon AWS FPGA." Accepted in IEEE Transactions on Computers 2020.
    P. Ravi, S. Sinha Roy, A. Chattopadhyay and S. Bhasin, "Generic Side-channel attacks on CCA-secure lattice-based PKE and KEM schemes." Accepted in TCHES 2020. In Cryptology ePrint Archive, Report 2019/948, 2019.
    J. Bermudo Mera, F. Turan, A. Karmakar, S. Sinha Roy, and I. Verbauwhede , "Compact domain-specific co-processor for accelerating module lattice-based key encapsulation mechanism." Accepted in Design Automation Conference (DAC) 2020. In Cryptology ePrint Archive, Report 2020/321, 2020.
    M. Walters and S. Sinha Roy, "Constant-time BCH Error-Correcting Code." Accepted in IEEE International Symposium on Circuits & Systems (ISCAS 2020). Full version in Cryptology ePrint Archive, Report 2019/155, 2019.

    2019--

    S. Sinha Roy, "SaberX4: High-throughput Software Implementationof Saber Key Encapsulation Mechanism." In International Conference on Computer Design (ICCD) 2019.
    A. Karmakar, S. Sinha Roy, I. Verbauwhede, and F. Vercauteren, "Pushing the speed limit of constant-time discrete Gaussian sampling. A case study on Falcon.," In 2019th Design Automation Conference (DAC 2019), IEEE, 16 pages, 2019.
    S. Sinha Roy, F. Turan, K. Jarvinen, F. Vercauteren, and I. Verbauwhede, "FPGA-based High-Performance Parallel Architecture for Homomorphic Computing on Encrypted Data," In 25th IEEE International Symposium on High-Performance Computer Architecture (HPCA), IEEE, 12 pages, 2019.
    J. Balasch, A. Beckers, D. Bozilov, S. Sinha Roy, F. Turan, and I. Verbauwhede, "Teaching HW/SW codesign with a Zynq ARM/FPGA SoC," In European Workshop on Microelectronics Education, IEEE, pp. 63-66, 2018.
    A. Karmakar, J. Bermudo Mera, S. Sinha Roy, and I. Verbauwhede, "Saber on ARM. CCA-secure module lattice-based key encapsulation on ARM," In Transactions in Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science, Springer-Verlag, 24 pages, 2018.
    J. P. D'Anvers, A. Karmakar, S. Sinha Roy, and F. Vercauteren, "Saber: Module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM," In Progress in Cryptology - AFRICACRYPT 2018, Lecture Notes in Computer Science, Springer-Verlag, 23 pages, 2018.
    J. P. D'Anvers, A. Karmakar, S. Sinha Roy, and F. Vercauteren, "SABER: Mod-LWR based KEM," In First PQC Standardization Conference, 31 pages, 2018.
    S. Sinha Roy, K. Järvinen, J. Vliegen, F. Vercauteren, and I. Verbauwhede, "HEPCloud: An FPGA-Based Multicore Processor for FV Somewhat Homomorphic Function Evaluation," IEEE Transactions on Computers 67(11), pp. 1637-1650, 2018.
    K. Järvinen, S. Sinha Roy, and I. Verbauwhede, "Arithmetic of tau-adic expansions for lightweight Koblitz curve cryptography," Journal of Cryptographic Engineering 8(4), pp. 285 - 300, 2018.
    A. Karmakar, S. Sinha Roy, O. Reparaz, I. Verbauwhede, and F. Vercauteren, "Constant-time Discrete Gaussian Sampling," IEEE Transactions on Computers SI PQcrypto(accepted), 12 pages, 2017.
    Z. Liu, T. Poppelmann, T. Oder, H. Seo, J. Großschädl, T. Güneysu, H. Kim, S. Sinha Roy, and I. Verbauwhede, "High-Performance Ideal Lattice-Based Cryptography on 8-Bit AVR Microcontrollers," Transactions on Embedded Computing Systems (TECS) - Special Issue on Secure and Fault-Tolerant 16(117), 24 pages, 2017.
    S. Sinha Roy, "Public Key Cryptography on Hardware Platforms: Design and Analysis of Elliptic Curve and Lattice-based Cryptoprocessors," PhD thesis, KU Leuven, I. Verbauwhede, and F. Vercauteren (promotors), 192 pages, 2017.
    S. Sinha Roy, F. Vercauteren, J. Vliegen, and I. Verbauwhede, "Hardware Assisted Fully Homomorphic Function Evaluation and Encrypted Search," IEEE Transactions on Computers PP(99), pp. 1-12, 2017.
    S. Sinha Roy, A. Karmakar, and I. Verbauwhede, "Ring-LWE: Applications to cryptography andtheir efficient realization," In International Conference on Security, Privacy and Applied Cryptography Engineering, Lecture Notes in Computer Science 8204, A. Agarwal, M. Arun Kumar, and S. Chamarty (eds.), Springer-Verlag, 10 pages, 2016.
    A. Karmakar, S. Sinha Roy, I. Verbauwhede, and F. Vercauteren, "Efficient Finite Field Multiplication for Isogeny Based Post Quantum Cryptography," In International Workshop on the Arithmetic of Finite Fields (WAIFI 2016), Lecture Notes in Computer Science, Springer-Verlag, 15 pages, 2016.
    O. Reparaz, S. Sinha Roy, R. De Clercq, I. Verbauwhede, and F. Vercauteren, "Masking ring-LWE," Journal of Cryptographic Engineering 6(2), 17 pages, 2016.
    J. Bosmans, S. Sinha Roy, K. Jarvinen, and I. Verbauwhede, "A Tiny Coprocessor for Elliptic Curve Cryptography over the 256-bit NIST Prime Field.," VLSI Design and 2016 15th International Conference on Embedded Systems (VLSID) -(-), 6 pages, 2016.
    O. Reparaz, S. Sinha Roy, R. De Clercq, F. Vercauteren, and I. Verbauwhede, "Additively Homomorphic ring-LWE Masking," In Post-Quantum Cryptography, Lecture Notes in Computer Science 9606, T. Takagi (ed.), Springer-Verlag, pp. 233-244, 2016.
    D. Mukhopadhyay, S. Sinha Roy, and I. Verbauwhede, "Tutorial: Embedded Security," VLSI Design and 2016 15th International Conference on Embedded Systems (VLSID), Kolkata, IN, 2016.
    O. Reparaz, S. Sinha Roy, I. Verbauwhede, and F. Vercauteren, "A masked ring-LWE implementation," In Cryptographic Hardware and Embedded Systems - CHES 2015, Lecture Notes in Computer Science 9293, T. Güneysu, and H. Handschuh (eds.), Springer-Verlag, pp. 683-702, 2015.
    Z. Liu, H. Seo, S. Sinha Roy, J. Großschädl, H. Kim, and I. Verbauwhede, "Efficient Ring-LWE Encryption on 8-bit AVR Processors," In Cryptographic Hardware and Embedded Systems - CHES 2015, Lecture Notes in Computer Science 9293, T. Güneysu, and H. Handschuh (eds.), Springer-Verlag, 22 pages, 2015.
    See all publications