hosted by
publicationslist.org
    

Mahadevan Gomathisankaran

University of North Texas
Computer Science and Engineering
1155 Union Circle #311366
Denton, TX - 76203
mgomathi@unt.edu


I am an Assistant Professor at the Department of Computer Science and Engineering, University of North Texas.

Journal articles

2009
Mahadevan Gomathisankaran, Akhilesh Tyagi (2009)  Relating Boolean gate truth tables to one-way functions   Integrated Computer-Aided Engineering 16: 2. 141-150 01  
Abstract: We present a schema to build one way functions from a family of Boolean gates. Moreover, we relate characteristics of these Boolean gate truth tables to properties of the derived one-way functions. We believe this to be the first attempt at establishing cryptographic properties from the Boolean cube spaces of the component gates. This schema is then used to build a family of compression functions, which in turn can be used to get block encryption and hash functions. These functions are based on reconfigurable gates. We prove cryptographically relevant properties for these function implementations. Various applications incorporating these one-way functions, specifically memory integrity in processor architecture, are presented.
Notes: 10.3233/ICA-2009-0307
2006
Mahadevan Gomathisankaran, Akhilesh Tyagi (2006)  WARM SRAM : A Novel Scheme to Reduce Static Leakage Energy in SRAM Arrays   J. Low Power Electronics 2: 3. 388-400  
Abstract: The increasing sub-threshold leakage current levels with newer technology nodes has been identified by ITRS as one of the major fundamental problems faced by the semiconductor industry. Concurrently, the expected performance improvement and functionality integration expectations drive the continued reduction in feature size. This results in ever-increasing power per unit area and the accompanying problem of heat removal and cooling. Portable battery-powered applications, fuelled by pervasive and embedded computing, in the last few years have seen a tremendous growth and have reached a point where battery power can't be increased further. This raises the computational throughput per watt target for the future technology nodes. SRAM arrays which are used widely as a system component, such as caches and register files, in both high-performance and portable systems, are getting to be dominant power consumers because of their large capacity and area. Hence any reduction in cache energy can result in considerable overall power reduction. In this paper, we propose a novel circuit technique using depletion mode devices, to reduce the static energy of SRAM array in an on-chip cache by 90% without any performance impact.
Notes:
Mahadevan Gomathisankaran, Akhilesh Tyagi (2006)  Architecture Support for 3D Obfuscation   IEEE Trans. Computers 55: 5. 497-507  
Abstract: Software obfuscation is defined as a transformation of a program P into T(P) such that the whitebox and blackbox behaviors of T(P) are computationally indistinguishable. However, robust obfuscation is impossible to achieve with the existing software only solutions. This results from the power of the adversary model in Digital Rights Management systems, which is significantly more than in the traditional security scenarios. The adversary has complete control of the computing node—supervisory privileges along with the full physical as well as architectural object observational capabilities. In essence, this makes the operating system (or any other layer around the architecture) untrustworthy. Thus, the trust has to be provided by the underlying architecture. In this paper, we develop an architecture to support 3D obfuscation through the use of well-known cryptographic methods and show how it provides copy-protection, IP-protection, and tamper-resistance.
Notes:

Conference papers

2012
2011
2010
2009
2008
Mahadevan Gomathisankaran, Ka-Ming Keung, Akhilesh Tyagi (2008)  REBEL: Reconfigurable Block Encryption Logic   In: International Conference on Security and Cryptography (SECRYPT) Institute for Systems and Technologies of Information, Control and Communication (INSTICC)  
Abstract: REBEL is a fiestel network based block encryption function which uses reconfigurable gates instead of substituition boxes. This novel design approach has many advantages such as the key size can be much greater than the block size, security can be reduced to boolean square root problem (Kutz, 2004) and resitant to known cryptanalytic attacks. The implementation results show that our proposed design can better AES in every design parameter at the same time providing much higher security.
Notes:
Mahadevan Gomathisankaran, Akhilesh Tyagi (2008)  Relating Boolean Gate Truth Tables to One-Way Functions   In: IEEE International Conference on Electro/Information Technology Iowa State University Ames, IA: IEEE  
Abstract: We present a schema to build one way functions from a family of Boolean gates. Moreover, we relate characteristics of these Boolean gate truth tables to properties of the derived one-way functions. We believe this to be the first attempt at establishing cryptographic properties from the Boolean cube spaces of the component gates. This schema is then used to build a family of compression functions, which in turn can be used to get block encryption and hash functions. These functions are based on reconfigurable gates. We prove cryptographically relevant properties for these function implementations. Various applications incorporating these one-way functions, specifically memory integrity in processor architecture, are presented.
Notes:
2005
Mahadevan Gomathisankaran, Akhilesh Tyagi (2005)  TIVA : Trusted Integrity Verification Architecture   In: DRMTICS : Technologies, Issues, Challenges and Systems, First International Conference, DRMTICS 2005, Sydney, Australia, October 31 - November 2, 2005, Revised Selected Papers Edited by:Reihaneh Safavi-Naini, Moti Yung. 13-31 Springer  
Abstract: We are moving towards the era of pervasive computing. The embedded computing devices are everywhere and they need to interact in many insecure ways. Verifying the integrity of the software running on these devices in such a scenario is an interesting and difficult problem. The problem is simplified if the verifying entity has access to the original binary image. However, the verifier itself may not be trusted with the intellectual property built into the software. Hence an acceptable and practical solution would not reveal the intellectual property (IP) of the verified software, and yet must verify its integrity. We propose one such novel solution, TIVA, in this paper.
Notes:
Mahadevan Gomathisankaran, Akhilesh Tyagi (2005)  Arc3D : A 3D Obfuscation Architecture   In: High Performance Embedded Architectures and Compilers 184-199 Springer  
Abstract: In DRM domain, the adversary has complete control of the computing node - supervisory privileges along with full physical as well as architectural object observational capabilities. Thus robust obfuscation is impossible to achieve with the existing software only solutions. In this paper, we develop architecture level support for obfuscation with the help of well known cryptographic methods. The three protected dimensions of this architecture Arc3D are address sequencing, contents associated with an address, and the temporal reuse of address sequences such as loops. Such an obfuscation makes the detection of good tampering points infinitesimally likely providing tamper resistance. With the use of already known software distribution model of ABYSS and XOM, we can also ensure copy protection. This results in a complete DRM architecture to provide both copy protection and IP protection.
Notes:
2004
Mahadevan Gomathisankaran, Akhilesh Tyagi (2004)  WARM SRAM : A Novel Scheme to Reduce Static Leakage Energy in SRAM Arrays   In: ISVLSI 105-114 IEEE Computer Society  
Abstract: The increasing sub-threshold leakage current levels with newer technology nodes has been identified by ITRS [1] as one of the major fundamental problems faced by the semiconductor industry. Concurrently, the expected performance improvement and functionality integration expectations drive the continued reduction in feature size. This results in ever-increasing power per unit area and the accompanying problem of heat removal and cooling [2]. Portable battery-powered applications, fuelled by pervasive and embedded computing, have seen tremendous growth and have reached a point where battery energy and power density can’t be increased further [3]. This raises the computational throughput per watt target for the future technology nodes. SRAM arrays which are used widely as a system component, such as caches and register files, in both high-performance and portable systems, are getting to be dominant power consumers because of their large capacity and area. Hence any reduction in cache energy can result in considerable overall power reduction. In this paper, we propose a novel circuit technique using depletion mode devices, to reduce the static energy of SRAM array in an on-chip cache by 90% without any performance impact.
Notes:

Technical reports

2008
2004
2002

PhD theses

2006

Tutorials

2008

Talks

2005
2004

Patents

2006
Powered by PublicationsList.org.