Bio
Current Affiliations:
-
- Senior Lecturer at the Department of Computer Engineering, University of Peradeniya, Sri Lanka
- Adjunct Research Fellow at the Institute for Integrated and Intelligent Systems of Griffith University, Australia.
- Visiting Lecturer, Postgraduate Institute of Science, University of Peradeniya, Sri Lanka.
Previous Affiliations (selected):
-
- NRC Postdoctoral Fellow at the University of Peradeniya, Sri Lanka, in 2016 – 2017
- Intern at the Nippon Telegraph and Telephone (NTT) Corporation, Japan, in 2015
- Software Engineer at the Industrial and Financial Systems (IFS), Sri Lanka, in 2011 – 2012
Professional Memberships/Fellowships:
-
- Fellow of the British Computer Society (BCS)
- Member of the Association for Computing Machinery (ACM)
- Member of the Computer Society of Sri Lanka (CSSL)
- Member of the International Association for Cryptologic Research (IACR)
- Member of the Young Scientists Forum of the National Science and Technology Commission, Sri Lanka
Research Interests:
-
- Cryptography
- Complexity
- Information Security
Research Group: Cryptography Research Laboratory Talks and Lectures: Youtube Channel
Education:
-
- Distinguished as a Young Researcher in the Hanthana Vision Research Magazine of the University of Peradeniya, Vol 7, Issue 1, in June 2021.
- 2020 Faculty Research Excellence Commendation for 2018-2019.
- 2018 Faculty Research Excellence Commendation for 2016-2017.
Teaching:
-
- Programming Methodologies (CO222)
- Software Construction (CO225)
- Network and Web Application Design (CO324)
- Computer and Network Security (CO325)
- Software Engineering (CO328)
Administrative (selected):
-
- Form and lead the Cryptography Research Laboratory (CRL) research group of the Department of Computer Engineering, University of Peradeniya, since 2016.
- Curriculum development for the Faculty of Engineering, University of Peradeniya (Cloud Computing, Computer Systems Security, Software Design and Development): Ongoing.
- Curriculum development for the Faculty of Engineering, Rajarata Universit of Sri Lanka (Software Engineering, Computer and Network Security), 2017/2018.
- Senior Student Counselor of the Faculty of Engineering, University of Peradeniya, 2021.
- Engineering Students’ Conference at Peradeniya (ESCaPe) Editor in 2015, 2016, 2020, 2021.
Research Grants:
-
- Chebyshev Grant to participate in the 2022 International Congress of Mathematicians (ICM 2022) in St. Petersburg, Russia (Grant No: ICM № 49808412).
- 2021 UNESCO-TWAS Research Grant for Individual Scientists (Grant No: 21-021 RG/MATHS/AS_I-FR3240319461), 2021-2023. (Role: Principal Investigator)
- 2019 National Research Council postdoctoral fellowship grant (Grant No: NRC 19-064), 2019-2022. (Role: Collaborator)
- Tier 1 Internal Research Grant of Research Management Centre, Tun Hussein Onn University of Malaysia (Grant Code: H082), 2018-2020. (Role: External Researcher)
- 2018 University Research Grants of University of Peradeniya, Sri Lanka (Grant No: URG/2018/19/E), 2018-2019. (Role: Principal Investigator)
- 2016 National Research Council postdoctoral fellowship grant (Grant No: NRC 16-020), 2016-2017. (Role: Principal Investigator)
Research Publications:
2021
2020
2019
2018
2017
2016
2015
Older
2021
-
Tennakoon, P.; Karunathilaka, S.; Lavakumar, R. and Alawatugoda, J. Anonymous and Distributed Authentication for Peer-to-Peer Networks. In IACR Cryptology ePrint Archive, Report 2021/838.
-
Alawatugoda, J. and Okamoto, T. Standard Model Leakage-Resilient Authenticated Key Exchange using Inner-product Extractors. In IACR Cryptology ePrint Archive, Report 2021/861.
2020
-
Edussuriya, C.; Vithanage, K.; Bandara, N.; Alawatugoda, J.; Sandirigama, M.; Jayasinghe, U.; Shone, N. and Lee, G.M. BAT—Block Analytics Tool Integrated with Blockchain Based IoT Platform. In Electronics, Volume 09, Issue 09, pp 1525, MDPI, Switzerland.
-
Alawatugoda, J. Public-Key Encryption In The Standard Model Against Strong Leakage Adversary. In The Computer Journal, Volume 63, Issue 12, pp 1904–1914, Oxford University Press, UK.
-
Chakraborty, S.; Alawatugoda, J. and Pandu Rangan, C. New Approach to Practical Leakage-Resilient Public-Key Cryptography. In Journal of Mathematical Cryptology, Volume 14, Issue 01, pp 172-201, de Gruyter, Germany.
2019
-
de Silva, R.; Navarathna, I.; Kumarasiri, M.; Alawatugoda, J. and Chuah, C.W. On Power Analysis Attacks against Hardware Stream Ciphers. (in press). In International Journal of Information and Computer Security (IJICS), Volume xx, Issue xx, pp xxx-xxx, Inderscience, UK.
-
Wei, C.C.Z.; Chuah, C.W.; Alawatugoda, J. Review on Leakage Resilient Key Exchange Security Models. In International Journal of Communication Networks and Information Security (IJCNIS), Volume 11, Issue 01, pp 119-127, Institute of Information Technology, Kohat University of Science and Technology, Pakistan.
2018
-
Chuah, C.W.; Samylingam, V.; Darmawan, I.; Palaniappan, P.S.S.; Foozy, C.F.M.; Ramli, S.N. and Alawatugoda, J. Analysis of Four Historical Ciphers against Known Plaintext Frequency Statistical Attack. In International Journal of Integrated Engineering, Special Issue 2018: Data Information Engineering, Volume 10, Issue 6, pp 183-192, Penerbit UTHM, Malaysia.
-
Alawatugoda, J.; Seralathan, V.; Peiris, N.; Wickramasinghe, C. and Chuah, C.W. Implementation of an eCK-secure Key Exchange Protocol for OpenSSL. In International Journal on Advanced Science, Engineering and Information Technology, Volume 8, Issue 5, pages 2205-2210, INSIGHT – Indonesian Society for Knowledge and Human Development, Indonesia.
2017
-
Alupotha, J.; Prasadi, S.; Fawzan, M.; Alawatugoda, J. and Ragel, R. Implementing a Proven-secure and Cost-effective Countermeasure against the Compression Ratio Info- leak Mass Exploitation (CRIME) Attack. In Proceedings of the 12th IEEE International Conference on Industrial and Information Systems (ICIIS 2017), IEEE Press, USA.
-
Alawatugoda, J. Generic Construction of an eCK-secure Key Exchange Protocol in the Standard Model. In International Journal of Information Security, Volume 16, Issue 5, pp 541-557, Springer, Germany.
-
Chakraborty, S.; Alawatugoda, J. and Pandu Rangan, C. Leakage-Resilient Non-Interactive Key Exchange in the Continuous-Memory Leakage Setting. In Provable Security, Volume 10592 of the series Lecture Notes in Computer Science (LNCS), Chapter 10, pp 167-187, Springer, Germany.
-
Alawatugoda, J. On the Leakage-Resilient Key Exchange. In Journal of Mathematical Cryptology, Volume 11, Issue 4, pp 215-269, Walter de Gruyter, Germany.
2016
-
Alawatugoda, J.; Ragel, R.; Eranga, D.; Jayanath, N. and Somathilaka, C. Implementing a Leakage-Resilient Storage Scheme and its Refreshing Protocol to prevent Continuous Leakage Attacks. In Proceedings of the 8th IEEE Conference on Information and Automation for Sustainability (ICIAfS 2016). IEEE Press, USA.
-
Weerasooriya, I.; Dhanushka, T.; Amarasinghe, N.; Alawatugoda, J. and Ragel, R. On Implementing a Client-Server setting to prevent the Browser Reconnaissance and Exfiltration via Adaptive Compression of Hypertext (BREACH) Attacks. In Proceedings of the 2016 Manufacturing and Industrial Engineering Symposium (MIES 2016). IEEE Press, USA.
2015
-
Alawatugoda, J.; Stebila, D. and Boyd, C. Continuous After-the-fact Leakage-Resilient eCK-secure Key Exchange. In Cryptography and Coding, Volume 9496 of the series Lecture Notes in Computer Science (LNCS), Chapter 17, pp 277-294, Springer, Germany.
-
Alawatugoda, J.; Stebila, D. and Boyd, C. Protecting Encrypted Cookies from Compression Side-Channel Attacks. In Financial Cryptography and Data Security, Volume 8975 of the series Lecture Notes in Computer Science (LNCS), Chapter 6, pp 86-106, Springer, Germany.
Older
-
Alawatugoda, J.; Boyd, C. and Stebila, D. Continuous After-the-fact Leakage-Resilient Key Exchange. In Information Security and Privacy, Volume 8544 of the series Lecture Notes in Computer Science (LNCS), Chapter 17, pp 258-273, Springer, Germany.
-
Alawatugoda, J.; Stebila, D. and Boyd, C. Modelling After-the-fact Leakage for Key Exchange. In Proceedings of the 9th ACM Symposium in Information, Computer and Communications Security (ASIACCS 2014), ACM Press, USA.
-
Herath, U.; Alawatugoda, J. and Ragel, R. Software Implementation Level Countermeasure Against Cache Timing Attacks on AES. In Proceedings of the 8th IEEE International Conference on Industrial and Information Systems (ICIIS 2013), IEEE Press, USA.
-
Alawatugoda, J.; Jayasinghe, D. and Ragel, R. Countermeasures against Bernstein’s Remote Cache Timing Attack. In Proceedings of the 6th IEEE International Conference on Industrial and Information Systems (ICIIS 2011), IEEE Press, USA.