Publications

They say “Publish or Perish”. We say “Publish and Cherish”. Below are some of the contributions of the lab to the world of Crypto.

2022

  1. @article{NJPS22,
      author = {Nath, Anirban and Jana, Amit and Paul, Goutam and Saha, Dhiman},
      title = {Differential Fault Analysis of {NORX} Using Variants of the Coupon Collector Problem},
      journal = {Journal of Cryptographic Engineering},
      publisher = {{Springer}},
      year = {2022},
      abbr = {JCEN}
    }
    
    DIFFERENTIAL FAULT ANALYSIS OF NORX USING VARIANTS OF THE COUPON COLLECTOR PROBLEM
    ARTICLE

    Nath, Anirban and Jana, Amit and Paul, Goutam and Saha, Dhiman ▲ Journal of Cryptographic Engineering, Volume:-, Pages:, 2022

2021

  1. @article{Mandal2021,
      author = {Mandal, Kalikinkar and Saha, Dhiman and Sarkar, Sumanta and Todo, Yosuke},
      title = {Sycon: {A} New Milestone in Designing ASCON-like Permutations},
      journal = {Journal of Cryptographic Engineering},
      volume = {2190-8516},
      year = {2021},
      url = {https://doi.org/10.1007/s13389-021-00272-9},
      abbr = {JCEN}
    }
    
    SYCON: A NEW MILESTONE IN DESIGNING ASCON-LIKE PERMUTATIONS
    ARTICLE

    Mandal, Kalikinkar and Saha, Dhiman and Sarkar, Sumanta and Todo, Yosuke ▲ Journal of Cryptographic Engineering, Volume:2190-8516-, Pages:, 2021

  2. @article{DBLP:journals/tosc/RahmanS021,
      author = {Rahman, Mostafizar and Saha, Dhiman and Paul, Goutam},
      title = {Boomeyong: Embedding Yoyo within Boomerang and its Applications to
      	Key Recovery Attacks on {AES} and Pholkos},
      journal = {{IACR} Trans. Symmetric Cryptol.},
      volume = {2021},
      number = {3},
      pages = {137--169},
      year = {2021},
      abbr = {ToSC}
    }
    
    BOOMEYONG: EMBEDDING YOYO WITHIN BOOMERANG AND ITS APPLICATIONS TO KEY RECOVERY ATTACKS ON AES AND PHOLKOS
    ARTICLE

    Rahman, Mostafizar and Saha, Dhiman and Paul, Goutam ▲ IACR Trans. Symmetric Cryptol., Volume:2021-3, Pages:137–169, 2021

  3. @article{DBLP:journals/corr/abs-2103-16360,
      author = {Dabholkar, Ahaan and Kakarla, Sourya and Saha, Dhiman},
      title = {Looney Tunes: Exposing the Lack of {DRM} Protection in Indian Music
      	Streaming Services},
      journal = {CoRR},
      volume = {abs/2103.16360},
      year = {2021},
      url = {https://arxiv.org/abs/2103.16360},
      archiveprefix = {arXiv},
      eprint = {2103.16360},
      timestamp = {Wed, 07 Apr 2021 15:31:46 +0200},
      biburl = {https://dblp.org/rec/journals/corr/abs-2103-16360.bib},
      bibsource = {dblp computer science bibliography, https://dblp.org},
      abbr = {arXiv}
    }
    
    LOONEY TUNES: EXPOSING THE LACK OF DRM PROTECTION IN INDIAN MUSIC STREAMING SERVICES
    ARTICLE

    Dabholkar, Ahaan and Kakarla, Sourya and Saha, Dhiman ▲ CoRR, Volume:abs/2103.16360-, Pages:, 2021

  4. @article{DBLP:journals/iacr/MandalSST21,
      author = {Mandal, Kalikinkar and Saha, Dhiman and Sarkar, Sumanta and Todo, Yosuke},
      title = {Sycon: {A} New Milestone in Designing ASCON-like Permutations},
      journal = {{IACR} Cryptol. ePrint Arch.},
      volume = {2021},
      pages = {157},
      year = {2021},
      url = {https://eprint.iacr.org/2021/157},
      timestamp = {Tue, 02 Mar 2021 00:00:00 +0100},
      biburl = {https://dblp.org/rec/journals/iacr/MandalSST21.bib},
      bibsource = {dblp computer science bibliography, https://dblp.org},
      abbr = {ePrint}
    }
    
    SYCON: A NEW MILESTONE IN DESIGNING ASCON-LIKE PERMUTATIONS
    ARTICLE

    Mandal, Kalikinkar and Saha, Dhiman and Sarkar, Sumanta and Todo, Yosuke ▲ IACR Cryptol. ePrint Arch., Volume:2021-, Pages:157, 2021

2020

  1. https://doi.org/10.1007/s13389-020-00224-9
    @article{DBLP:journals/JCE/BaksiA20,
      author = {Baksi, Anubhab and Saha, Dhiman and Sarkar, Sumanta},
      title = {To infect or not to infect: a critical analysis of infective countermeasures in fault attacks},
      journal = {{JCEN}Journal of Cryptographic Engineering},
      year = {2020},
      url = {https://doi.org/10.1007/s13389-020-00224-9},
      doi = {10.1007/s13389-020-00224-9},
      timestamp = {Wed, 10 Jun 2020 01:00:00 +0200},
      note = {Available On-line}
    }
    
    TO INFECT OR NOT TO INFECT: A CRITICAL ANALYSIS OF INFECTIVE COUNTERMEASURES IN FAULT ATTACKS
    ARTICLE

    Baksi, Anubhab and Saha, Dhiman and Sarkar, Sumanta ▲ JCENJournal of Cryptographic Engineering, Volume:-, Pages:, 2020

  2. @conference{DBLP:conf/ACISP/BaksiA2020,
      author = {Baksi, Anubhab and Kumar, Vinay B. Y. and Karmakar, Banashri and Bhasin, Shivam and Saha, Dhiman and Chattopadhya, Anupam},
      title = { A Novel Duplication Based Countermeasure To Statistical Ineffective Fault Analysis},
      booktitle = {Information Security and Privacy - 25th Australasian Conference, {ACISP}
                     2020, Perth, Australia, November 25--27, 2020, Proceedings},
      year = {2020}
    }
    
    A NOVEL DUPLICATION BASED COUNTERMEASURE TO STATISTICAL INEFFECTIVE FAULT ANALYSIS
    CONFERENCE

    Baksi, Anubhab and Kumar, Vinay B. Y. and Karmakar, Banashri and Bhasin, Shivam and Saha, Dhiman and Chattopadhya, Anupam ▲ Information Security and Privacy - 25th Australasian Conference, ACISP 2020, Perth, Australia, November 25–27, 2020, Proceedings, Volume:-, Pages:, 2020

  3. @conference{DBLP:conf/AFRICACRYPT/SuryawanshiS20,
      author = {Suryawanshi, Sahiba and Saha, Dhiman and Sachan, Satyam},
      title = { New Results on the SymSum Distinguisher on Round-Reduced SHA-3},
      booktitle = {Progress in Cryptology - {AFRICACRYPT} 2020 - 12th International Conference
                     on Cryptology in Africa, Cairo, Egypt, July 22-22, 2020. Proceedings},
      year = {2020}
    }
    
    NEW RESULTS ON THE SYMSUM DISTINGUISHER ON ROUND-REDUCED SHA-3
    CONFERENCE

    Suryawanshi, Sahiba and Saha, Dhiman and Sachan, Satyam ▲ Progress in Cryptology - AFRICACRYPT 2020 - 12th International Conference on Cryptology in Africa, Cairo, Egypt, July 22-22, 2020. Proceedings, Volume:-, Pages:, 2020

  4. @conference{DBLP:conf/AFRICACRYPT/RahmanM2020,
      author = {Rahman, Mostafizar and Saha, Dhiman and Paul, Goutam},
      title = { Cryptanalysis of FlexAEAD},
      booktitle = {Progress in Cryptology - {AFRICACRYPT} 2020 - 12th International Conference
                     on Cryptology in Africa, Cairo, Egypt, July 22-22, 2020. Proceedings},
      year = {2020}
    }
    
    CRYPTANALYSIS OF FLEXAEAD
    CONFERENCE

    Rahman, Mostafizar and Saha, Dhiman and Paul, Goutam ▲ Progress in Cryptology - AFRICACRYPT 2020 - 12th International Conference on Cryptology in Africa, Cairo, Egypt, July 22-22, 2020. Proceedings, Volume:-, Pages:, 2020

  5. @conference{DBLP:conf/HOST/AIKATA20,
      author = {Aikata and Karmakar, Banashri and Saha, Dhiman},
      title = { DESIV: Differential Fault Analysis of SIV-Rijndael256 with a Single Fault},
      booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
                     {HOST} 2020, San Jose, CA, USA, December 6-9, 2020},
      year = {2020}
    }
    
    DESIV: DIFFERENTIAL FAULT ANALYSIS OF SIV-RIJNDAEL256 WITH A SINGLE FAULT
    CONFERENCE

    Aikata and Karmakar, Banashri and Saha, Dhiman ▲ IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2020, San Jose, CA, USA, December 6-9, 2020, Volume:-, Pages:, 2020

2019

  1. https://doi.org/10.1049/iet-ifs.2018.5033
    @article{DBLP:journals/iet-ifs/SahaKC19,
      author = {Saha, Dhiman and Kakarla, Sourya and Chowdhury, Dipanwita Roy},
      title = {Dinamite: internal differential match-in-the-end attack on eight-round
                     {PAEQ}},
      journal = {{IET} Information Security},
      volume = {13},
      number = {4},
      pages = {378--388},
      year = {2019},
      url = {https://doi.org/10.1049/iet-ifs.2018.5033},
      doi = {10.1049/iet-ifs.2018.5033},
      timestamp = {Wed, 26 Jun 2019 01:00:00 +0200},
      biburl = {https://dblp.org/rec/journals/iet-ifs/SahaKC19.bib},
      bibsource = {dblp computer science bibliography, https://dblp.org}
    }
    
    DINAMITE: INTERNAL DIFFERENTIAL MATCH-IN-THE-END ATTACK ON EIGHT-ROUND PAEQ
    ARTICLE

    Saha, Dhiman and Kakarla, Sourya and Chowdhury, Dipanwita Roy ▲ IET Information Security, Volume:13-4, Pages:378–388, 2019

  2. https://doi.org/10.1007/s13389-017-0179-0
    @article{DBLP:journals/jce/SahaC19,
      author = {Saha, Dhiman and Chowdhury, Dipanwita Roy},
      title = {Internal differential fault analysis of parallelizable ciphers in
                     the counter-mode},
      journal = {J. Cryptographic Engineering},
      volume = {9},
      number = {1},
      pages = {53--67},
      year = {2019},
      url = {https://doi.org/10.1007/s13389-017-0179-0},
      doi = {10.1007/s13389-017-0179-0},
      timestamp = {Wed, 29 May 2019 01:00:00 +0200},
      biburl = {https://dblp.org/rec/journals/jce/SahaC19.bib},
      bibsource = {dblp computer science bibliography, https://dblp.org}
    }
    
    INTERNAL DIFFERENTIAL FAULT ANALYSIS OF PARALLELIZABLE CIPHERS IN THE COUNTER-MODE
    ARTICLE

    Saha, Dhiman and Chowdhury, Dipanwita Roy ▲ J. Cryptographic Engineering, Volume:9-1, Pages:53–67, 2019

  3. https://doi.org/10.1007/978-3-030-21568-2_3
    @inproceedings{DBLP:conf/acns/BanikBJLLMRSS19,
      author = {Banik, Subhadeep and Bossert, Jannis and Jana, Amit and List, Eik and Lucks, Stefan and Meier, Willi and Rahman, Mostafizar and Saha, Dhiman and Sasaki, Yu},
      editor = {Deng, Robert H. and Gauthier{-}Uma{\~{n}}a, Val{\'{e}}rie and Ochoa, Mart{\'{\i}}n and Yung, Moti},
      title = {Cryptanalysis of ForkAES},
      booktitle = {Applied Cryptography and Network Security - 17th International Conference,
                     {ACNS} 2019, Bogota, Colombia, June 5-7, 2019, Proceedings},
      series = {Lecture Notes in Computer Science},
      volume = {11464},
      pages = {43--63},
      publisher = {Springer},
      year = {2019},
      url = {https://doi.org/10.1007/978-3-030-21568-2\_3},
      doi = {10.1007/978-3-030-21568-2\_3},
      timestamp = {Fri, 27 Dec 2019 00:00:00 +0100},
      biburl = {https://dblp.org/rec/conf/acns/BanikBJLLMRSS19.bib},
      bibsource = {dblp computer science bibliography, https://dblp.org}
    }
    
    CRYPTANALYSIS OF FORKAES
    INPROCEEDINGS

    Banik, Subhadeep and Bossert, Jannis and Jana, Amit and List, Eik and Lucks, Stefan and Meier, Willi and Rahman, Mostafizar and Saha, Dhiman and Sasaki, Yu ▲ Applied Cryptography and Network Security - 17th International Conference, ACNS 2019, Bogota, Colombia, June 5-7, 2019, Proceedings, Volume:11464-, Pages:43–63, 2019

  4. https://doi.org/10.1007/978-3-030-35423-7_18
    @inproceedings{DBLP:conf/indocrypt/SarkarMS19,
      author = {Sarkar, Sumanta and Mandal, Kalikinkar and Saha, Dhiman},
      editor = {Hao, Feng and Ruj, Sushmita and Gupta, Sourav Sen},
      title = {On the Relationship Between Resilient Boolean Functions and Linear
                     Branch Number of S-Boxes},
      booktitle = {Progress in Cryptology - {INDOCRYPT} 2019 - 20th International Conference
                     on Cryptology in India, Hyderabad, India, December 15-18, 2019, Proceedings},
      series = {Lecture Notes in Computer Science},
      volume = {11898},
      pages = {361--374},
      publisher = {Springer},
      year = {2019},
      url = {https://doi.org/10.1007/978-3-030-35423-7\_18},
      doi = {10.1007/978-3-030-35423-7\_18},
      timestamp = {Thu, 12 Dec 2019 16:07:27 +0100},
      biburl = {https://dblp.org/rec/conf/indocrypt/SarkarMS19.bib},
      bibsource = {dblp computer science bibliography, https://dblp.org}
    }
    
    ON THE RELATIONSHIP BETWEEN RESILIENT BOOLEAN FUNCTIONS AND LINEAR BRANCH NUMBER OF S-BOXES
    INPROCEEDINGS

    Sarkar, Sumanta and Mandal, Kalikinkar and Saha, Dhiman ▲ Progress in Cryptology - INDOCRYPT 2019 - 20th International Conference on Cryptology in India, Hyderabad, India, December 15-18, 2019, Proceedings, Volume:11898-, Pages:361–374, 2019

  5. @article{DBLP:journals/iacr/BanikBJLLMRSS19,
      author = {Banik, Subhadeep and Bossert, Jannis and Jana, Amit and List, Eik and Lucks, Stefan and Meier, Willi and Rahman, Mostafizar and Saha, Dhiman and Sasaki, Yu},
      title = {Cryptanalysis of ForkAES},
      journal = {{IACR} Cryptol. ePrint Arch.},
      volume = {2019},
      pages = {289},
      year = {2019},
      url = {https://eprint.iacr.org/2019/289},
      timestamp = {Mon, 11 May 2020 01:00:00 +0200},
      biburl = {https://dblp.org/rec/journals/iacr/BanikBJLLMRSS19.bib},
      bibsource = {dblp computer science bibliography, https://dblp.org}
    }
    
    CRYPTANALYSIS OF FORKAES
    ARTICLE

    Banik, Subhadeep and Bossert, Jannis and Jana, Amit and List, Eik and Lucks, Stefan and Meier, Willi and Rahman, Mostafizar and Saha, Dhiman and Sasaki, Yu ▲ IACR Cryptol. ePrint Arch., Volume:2019-, Pages:289, 2019

  6. @article{DBLP:journals/iacr/BaksiSS19,
      author = {Baksi, Anubhab and Saha, Dhiman and Sarkar, Sumanta},
      title = {To Infect Or Not To Infect: {A} Critical Analysis Of Infective Countermeasures
                     In Fault Attacks},
      journal = {{IACR} Cryptol. ePrint Arch.},
      volume = {2019},
      pages = {355},
      year = {2019},
      url = {https://eprint.iacr.org/2019/355},
      timestamp = {Mon, 11 May 2020 01:00:00 +0200},
      biburl = {https://dblp.org/rec/journals/iacr/BaksiSS19.bib},
      bibsource = {dblp computer science bibliography, https://dblp.org}
    }
    
    TO INFECT OR NOT TO INFECT: A CRITICAL ANALYSIS OF INFECTIVE COUNTERMEASURES IN FAULT ATTACKS
    ARTICLE

    Baksi, Anubhab and Saha, Dhiman and Sarkar, Sumanta ▲ IACR Cryptol. ePrint Arch., Volume:2019-, Pages:355, 2019

  7. @article{DBLP:journals/iacr/RahmanS019,
      author = {Rahman, Mostafizar and Saha, Dhiman and Paul, Goutam},
      title = {Iterated Truncated Differential for Internal Keyed Permutation of
                     FlexAEAD},
      journal = {{IACR} Cryptol. ePrint Arch.},
      volume = {2019},
      pages = {539},
      year = {2019},
      url = {https://eprint.iacr.org/2019/539},
      timestamp = {Mon, 11 May 2020 01:00:00 +0200},
      biburl = {https://dblp.org/rec/journals/iacr/RahmanS019.bib},
      bibsource = {dblp computer science bibliography, https://dblp.org}
    }
    
    ITERATED TRUNCATED DIFFERENTIAL FOR INTERNAL KEYED PERMUTATION OF FLEXAEAD
    ARTICLE

    Rahman, Mostafizar and Saha, Dhiman and Paul, Goutam ▲ IACR Cryptol. ePrint Arch., Volume:2019-, Pages:539, 2019

  8. @article{DBLP:journals/iacr/JanaSP19,
      author = {Jana, Amit and Saha, Dhiman and Paul, Goutam},
      title = {Differential Fault Analysis of {NORX}},
      journal = {{IACR} Cryptol. ePrint Arch.},
      volume = {2019},
      pages = {760},
      year = {2019},
      url = {https://eprint.iacr.org/2019/760},
      timestamp = {Mon, 11 May 2020 01:00:00 +0200},
      biburl = {https://dblp.org/rec/journals/iacr/JanaSP19.bib},
      bibsource = {dblp computer science bibliography, https://dblp.org}
    }
    
    DIFFERENTIAL FAULT ANALYSIS OF NORX
    ARTICLE

    Jana, Amit and Saha, Dhiman and Paul, Goutam ▲ IACR Cryptol. ePrint Arch., Volume:2019-, Pages:760, 2019

  9. @article{DBLP:journals/iacr/SarkarMS19,
      author = {Sarkar, Sumanta and Mandal, Kalikinkar and Saha, Dhiman},
      title = {On the Relationship between Resilient Boolean Functions and Linear
                     Branch Number of S-boxes},
      journal = {{IACR} Cryptol. ePrint Arch.},
      volume = {2019},
      pages = {1427},
      year = {2019},
      url = {https://eprint.iacr.org/2019/1427},
      timestamp = {Mon, 11 May 2020 01:00:00 +0200},
      biburl = {https://dblp.org/rec/journals/iacr/SarkarMS19.bib},
      bibsource = {dblp computer science bibliography, https://dblp.org}
    }
    
    ON THE RELATIONSHIP BETWEEN RESILIENT BOOLEAN FUNCTIONS AND LINEAR BRANCH NUMBER OF S-BOXES
    ARTICLE

    Sarkar, Sumanta and Mandal, Kalikinkar and Saha, Dhiman ▲ IACR Cryptol. ePrint Arch., Volume:2019-, Pages:1427, 2019

2018

  1. https://doi.org/10.13154/tosc.v2018.i4.102-127
    @article{DBLP:journals/tosc/SahaR018,
      author = {Saha, Dhiman and Rahman, Mostafizar and Paul, Goutam},
      title = {New Yoyo Tricks with AES-based Permutations},
      journal = {{IACR} Trans. Symmetric Cryptol.},
      volume = {2018},
      number = {4},
      pages = {102--127},
      year = {2018},
      url = {https://doi.org/10.13154/tosc.v2018.i4.102-127},
      doi = {10.13154/tosc.v2018.i4.102-127},
      timestamp = {Tue, 04 Feb 2020 00:00:00 +0100},
      biburl = {https://dblp.org/rec/journals/tosc/SahaR018.bib},
      bibsource = {dblp computer science bibliography, https://dblp.org}
    }
    
    NEW YOYO TRICKS WITH AES-BASED PERMUTATIONS
    ARTICLE

    Saha, Dhiman and Rahman, Mostafizar and Paul, Goutam ▲ IACR Trans. Symmetric Cryptol., Volume:2018-4, Pages:102–127, 2018

2017

  1. https://doi.org/10.1504/IJACT.2017.10007295
    @article{DBLP:journals/ijact/GhoshSSC17,
      author = {Ghosh, Shamit and Saha, Dhiman and Sengupta, Abhrajit and Chowdhury, Dipanwita Roy},
      title = {Preventing fault attacks using fault randomisation with a case study
                     on {AES}},
      journal = {{IJACT}},
      volume = {3},
      number = {3},
      pages = {225--235},
      year = {2017},
      url = {https://doi.org/10.1504/IJACT.2017.10007295},
      doi = {10.1504/IJACT.2017.10007295},
      timestamp = {Mon, 09 Oct 2017 01:00:00 +0200},
      biburl = {https://dblp.org/rec/journals/ijact/GhoshSSC17.bib},
      bibsource = {dblp computer science bibliography, https://dblp.org}
    }
    
    PREVENTING FAULT ATTACKS USING FAULT RANDOMISATION WITH A CASE STUDY ON AES
    ARTICLE

    Ghosh, Shamit and Saha, Dhiman and Sengupta, Abhrajit and Chowdhury, Dipanwita Roy ▲ IJACT, Volume:3-3, Pages:225–235, 2017

  2. https://doi.org/10.1007/s41635-017-0010-5
    @article{DBLP:journals/jhss/SahaKMC17,
      author = {Saha, Dhiman and Kakarla, Sourya and Mandava, Srinath and Chowdhury, Dipanwita Roy},
      title = {Gain: Practical Key-Recovery Attacks on Round-Reduced {PAEQ}},
      journal = {J. Hardware and Systems Security},
      volume = {1},
      number = {3},
      pages = {282--296},
      year = {2017},
      url = {https://doi.org/10.1007/s41635-017-0010-5},
      doi = {10.1007/s41635-017-0010-5},
      timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
      biburl = {https://dblp.org/rec/journals/jhss/SahaKMC17.bib},
      bibsource = {dblp computer science bibliography, https://dblp.org}
    }
    
    GAIN: PRACTICAL KEY-RECOVERY ATTACKS ON ROUND-REDUCED PAEQ
    ARTICLE

    Saha, Dhiman and Kakarla, Sourya and Mandava, Srinath and Chowdhury, Dipanwita Roy ▲ J. Hardware and Systems Security, Volume:1-3, Pages:282–296, 2017

  3. https://doi.org/10.13154/tosc.v2017.i1.240-258
    @article{DBLP:journals/tosc/SahaKC17,
      author = {Saha, Dhiman and Kuila, Sukhendu and Chowdhury, Dipanwita Roy},
      title = {SymSum: Symmetric-Sum Distinguishers Against Round Reduced {SHA3}},
      journal = {{IACR} Trans. Symmetric Cryptol.},
      volume = {2017},
      number = {1},
      pages = {240--258},
      year = {2017},
      url = {https://doi.org/10.13154/tosc.v2017.i1.240-258},
      doi = {10.13154/tosc.v2017.i1.240-258},
      timestamp = {Tue, 04 Feb 2020 00:00:00 +0100},
      biburl = {https://dblp.org/rec/journals/tosc/SahaKC17.bib},
      bibsource = {dblp computer science bibliography, https://dblp.org}
    }
    
    SYMSUM: SYMMETRIC-SUM DISTINGUISHERS AGAINST ROUND REDUCED SHA3
    ARTICLE

    Saha, Dhiman and Kuila, Sukhendu and Chowdhury, Dipanwita Roy ▲ IACR Trans. Symmetric Cryptol., Volume:2017-1, Pages:240–258, 2017

  4. https://doi.org/10.1007/978-981-10-5421-1_6
    @inproceedings{DBLP:conf/atis/KakarlaMSC17,
      author = {Kakarla, Sourya and Mandava, Srinath and Saha, Dhiman and Chowdhury, Dipanwita Roy},
      editor = {Batten, Lynn and Kim, Dong Seong and Zhang, Xuyun and Li, Gang},
      title = {On the Practical Implementation of Impossible Differential Cryptanalysis
                     on Reduced-Round {AES}},
      booktitle = {Applications and Techniques in Information Security - 8th International
                     Conference, {ATIS} 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings},
      series = {Communications in Computer and Information Science},
      volume = {719},
      pages = {58--72},
      publisher = {Springer},
      year = {2017},
      url = {https://doi.org/10.1007/978-981-10-5421-1\_6},
      doi = {10.1007/978-981-10-5421-1\_6},
      timestamp = {Mon, 21 Oct 2019 09:19:25 +0200},
      biburl = {https://dblp.org/rec/conf/atis/KakarlaMSC17.bib},
      bibsource = {dblp computer science bibliography, https://dblp.org}
    }
    
    ON THE PRACTICAL IMPLEMENTATION OF IMPOSSIBLE DIFFERENTIAL CRYPTANALYSIS ON REDUCED-ROUND AES
    INPROCEEDINGS

    Kakarla, Sourya and Mandava, Srinath and Saha, Dhiman and Chowdhury, Dipanwita Roy ▲ Applications and Techniques in Information Security - 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings, Volume:719-, Pages:58–72, 2017

  5. @article{DBLP:journals/iacr/SahaKC17,
      author = {Saha, Dhiman and Kuila, Sukhendu and Chowdhury, Dipanwita Roy},
      title = {SymSum: Symmetric-Sum Distinguishers Against Round Reduced {SHA3}},
      journal = {{IACR} Cryptol. ePrint Arch.},
      volume = {2017},
      pages = {165},
      year = {2017},
      url = {http://eprint.iacr.org/2017/165},
      timestamp = {Mon, 11 May 2020 01:00:00 +0200},
      biburl = {https://dblp.org/rec/journals/iacr/SahaKC17.bib},
      bibsource = {dblp computer science bibliography, https://dblp.org}
    }
    
    SYMSUM: SYMMETRIC-SUM DISTINGUISHERS AGAINST ROUND REDUCED SHA3
    ARTICLE

    Saha, Dhiman and Kuila, Sukhendu and Chowdhury, Dipanwita Roy ▲ IACR Cryptol. ePrint Arch., Volume:2017-, Pages:165, 2017

2016

  1. https://doi.org/10.1007/978-3-662-53140-2_28
    @inproceedings{DBLP:conf/ches/SahaC16,
      author = {Saha, Dhiman and Chowdhury, Dipanwita Roy},
      editor = {Gierlichs, Benedikt and Poschmann, Axel Y.},
      title = {EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis
                     with a Case-Study on {PAEQ}},
      booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International
                     Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings},
      series = {Lecture Notes in Computer Science},
      volume = {9813},
      pages = {581--601},
      publisher = {Springer},
      year = {2016},
      url = {https://doi.org/10.1007/978-3-662-53140-2\_28},
      doi = {10.1007/978-3-662-53140-2\_28},
      timestamp = {Tue, 14 May 2019 10:00:47 +0200},
      biburl = {https://dblp.org/rec/conf/ches/SahaC16.bib},
      bibsource = {dblp computer science bibliography, https://dblp.org}
    }
    
    ENCOUNTER: ON BREAKING THE NONCE BARRIER IN DIFFERENTIAL FAULT ANALYSIS WITH A CASE-STUDY ON PAEQ
    INPROCEEDINGS

    Saha, Dhiman and Chowdhury, Dipanwita Roy ▲ Cryptographic Hardware and Embedded Systems - CHES 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings, Volume:9813-, Pages:581–601, 2016

  2. https://doi.org/10.1007/978-3-662-52993-5_27
    @inproceedings{DBLP:conf/fse/BouraCLPSSS16,
      author = {Boura, Christina and Chakraborti, Avik and Leurent, Ga{\"{e}}tan and Paul, Goutam and Saha, Dhiman and Soleimany, Hadi and Suder, Valentin},
      editor = {Peyrin, Thomas},
      title = {Key Recovery Attack Against 2.5-Round {\textbackslash}pi -Cipher},
      booktitle = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
                     Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
      series = {Lecture Notes in Computer Science},
      volume = {9783},
      pages = {535--553},
      publisher = {Springer},
      year = {2016},
      url = {https://doi.org/10.1007/978-3-662-52993-5\_27},
      doi = {10.1007/978-3-662-52993-5\_27},
      timestamp = {Fri, 27 Mar 2020 08:58:25 +0100},
      biburl = {https://dblp.org/rec/conf/fse/BouraCLPSSS16.bib},
      bibsource = {dblp computer science bibliography, https://dblp.org}
    }
    
    KEY RECOVERY ATTACK AGAINST 2.5-ROUND }PI -CIPHER
    INPROCEEDINGS

    Boura, Christina and Chakraborti, Avik and Leurent, Gaëtan and Paul, Goutam and Saha, Dhiman and Soleimany, Hadi and Suder, Valentin ▲ Fast Software Encryption - 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers, Volume:9783-, Pages:535–553, 2016

  3. https://doi.org/10.1007/978-3-319-49445-6_11
    @inproceedings{DBLP:conf/space/SahaKMC16,
      author = {Saha, Dhiman and Kakarla, Sourya and Mandava, Srinath and Chowdhury, Dipanwita Roy},
      editor = {Carlet, Claude and Hasan, M. Anwar and Saraswat, Vishal},
      title = {Gain: Practical Key-Recovery Attacks on Round-reduced {PAEQ}},
      booktitle = {Security, Privacy, and Applied Cryptography Engineering - 6th International
                     Conference, {SPACE} 2016, Hyderabad, India, December 14-18, 2016,
                     Proceedings},
      series = {Lecture Notes in Computer Science},
      volume = {10076},
      pages = {194--210},
      publisher = {Springer},
      year = {2016},
      url = {https://doi.org/10.1007/978-3-319-49445-6\_11},
      doi = {10.1007/978-3-319-49445-6\_11},
      timestamp = {Tue, 14 May 2019 10:00:40 +0200},
      biburl = {https://dblp.org/rec/conf/space/SahaKMC16.bib},
      bibsource = {dblp computer science bibliography, https://dblp.org}
    }
    
    GAIN: PRACTICAL KEY-RECOVERY ATTACKS ON ROUND-REDUCED PAEQ
    INPROCEEDINGS

    Saha, Dhiman and Kakarla, Sourya and Mandava, Srinath and Chowdhury, Dipanwita Roy ▲ Security, Privacy, and Applied Cryptography Engineering - 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings, Volume:10076-, Pages:194–210, 2016

  4. @article{DBLP:journals/iacr/BouraCLPSSS16,
      author = {Boura, Christina and Chakraborti, Avik and Leurent, Ga{\"{e}}tan and Paul, Goutam and Saha, Dhiman and Soleimany, Hadi and Suder, Valentin},
      title = {Key Recovery Attack against 2.5-round pi-Cipher},
      journal = {{IACR} Cryptol. ePrint Arch.},
      volume = {2016},
      pages = {502},
      year = {2016},
      url = {http://eprint.iacr.org/2016/502},
      timestamp = {Mon, 11 May 2020 01:00:00 +0200},
      biburl = {https://dblp.org/rec/journals/iacr/BouraCLPSSS16.bib},
      bibsource = {dblp computer science bibliography, https://dblp.org}
    }
    
    KEY RECOVERY ATTACK AGAINST 2.5-ROUND PI-CIPHER
    ARTICLE

    Boura, Christina and Chakraborti, Avik and Leurent, Gaëtan and Paul, Goutam and Saha, Dhiman and Soleimany, Hadi and Suder, Valentin ▲ IACR Cryptol. ePrint Arch., Volume:2016-, Pages:502, 2016

  5. @article{DBLP:journals/iacr/SahaC16,
      author = {Saha, Dhiman and Chowdhury, Dipanwita Roy},
      title = {EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis
                     with a Case-Study on {PAEQ}},
      journal = {{IACR} Cryptol. ePrint Arch.},
      volume = {2016},
      pages = {623},
      year = {2016},
      url = {http://eprint.iacr.org/2016/623},
      timestamp = {Mon, 11 May 2020 01:00:00 +0200},
      biburl = {https://dblp.org/rec/journals/iacr/SahaC16.bib},
      bibsource = {dblp computer science bibliography, https://dblp.org}
    }
    
    ENCOUNTER: ON BREAKING THE NONCE BARRIER IN DIFFERENTIAL FAULT ANALYSIS WITH A CASE-STUDY ON PAEQ
    ARTICLE

    Saha, Dhiman and Chowdhury, Dipanwita Roy ▲ IACR Cryptol. ePrint Arch., Volume:2016-, Pages:623, 2016

2015

  1. https://doi.org/10.1007/978-3-319-19962-7_20
    @inproceedings{DBLP:conf/acisp/GhoshSSC15,
      author = {Ghosh, Shamit and Saha, Dhiman and Sengupta, Abhrajit and Chowdhury, Dipanwita Roy},
      editor = {Foo, Ernest and Stebila, Douglas},
      title = {Preventing Fault Attacks Using Fault Randomization with a Case Study
                     on {AES}},
      booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                     2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
      series = {Lecture Notes in Computer Science},
      volume = {9144},
      pages = {343--355},
      publisher = {Springer},
      year = {2015},
      url = {https://doi.org/10.1007/978-3-319-19962-7\_20},
      doi = {10.1007/978-3-319-19962-7\_20},
      timestamp = {Tue, 14 May 2019 10:00:46 +0200},
      biburl = {https://dblp.org/rec/conf/acisp/GhoshSSC15.bib},
      bibsource = {dblp computer science bibliography, https://dblp.org}
    }
    
    PREVENTING FAULT ATTACKS USING FAULT RANDOMIZATION WITH A CASE STUDY ON AES
    INPROCEEDINGS

    Ghosh, Shamit and Saha, Dhiman and Sengupta, Abhrajit and Chowdhury, Dipanwita Roy ▲ Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings, Volume:9144-, Pages:343–355, 2015

  2. https://doi.org/10.1109/HST.2015.7140246
    @inproceedings{DBLP:conf/host/SahaC15,
      author = {Saha, Dhiman and Chowdhury, Dipanwita Roy},
      title = {Diagonal fault analysis of Gr{\(\oslash\)}stl in dedicated {MAC} mode},
      booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
                     {HOST} 2015, Washington, DC, USA, 5-7 May, 2015},
      pages = {100--105},
      publisher = {{IEEE} Computer Society},
      year = {2015},
      url = {https://doi.org/10.1109/HST.2015.7140246},
      doi = {10.1109/HST.2015.7140246},
      timestamp = {Wed, 16 Oct 2019 14:14:56 +0200},
      biburl = {https://dblp.org/rec/conf/host/SahaC15.bib},
      bibsource = {dblp computer science bibliography, https://dblp.org}
    }
    
    DIAGONAL FAULT ANALYSIS OF GR\(⊘\)STL IN DEDICATED MAC MODE
    INPROCEEDINGS

    Saha, Dhiman and Chowdhury, Dipanwita Roy ▲ IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015, Volume:-, Pages:100–105, 2015

  3. https://doi.org/10.1007/978-3-319-31301-6_24
    @inproceedings{DBLP:conf/sacrypt/SahaC15,
      author = {Saha, Dhiman and Chowdhury, Dipanwita Roy},
      editor = {Dunkelman, Orr and Keliher, Liam},
      title = {Scope: On the Side Channel Vulnerability of Releasing Unverified Plaintexts},
      booktitle = {Selected Areas in Cryptography - {SAC} 2015 - 22nd International Conference,
                     Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers},
      series = {Lecture Notes in Computer Science},
      volume = {9566},
      pages = {417--438},
      publisher = {Springer},
      year = {2015},
      url = {https://doi.org/10.1007/978-3-319-31301-6\_24},
      doi = {10.1007/978-3-319-31301-6\_24},
      timestamp = {Tue, 20 Aug 2019 01:00:00 +0200},
      biburl = {https://dblp.org/rec/conf/sacrypt/SahaC15.bib},
      bibsource = {dblp computer science bibliography, https://dblp.org}
    }
    
    SCOPE: ON THE SIDE CHANNEL VULNERABILITY OF RELEASING UNVERIFIED PLAINTEXTS
    INPROCEEDINGS

    Saha, Dhiman and Chowdhury, Dipanwita Roy ▲ Selected Areas in Cryptography - SAC 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers, Volume:9566-, Pages:417–438, 2015

2014

  1. https://doi.org/10.1007/978-3-319-11520-7_8
    @inproceedings{DBLP:conf/acri/GhoshSSC14,
      author = {Ghosh, Shamit and Sengupta, Abhrajit and Saha, Dhiman and Chowdhury, Dipanwita Roy},
      editor = {Was, Jaroslaw and Sirakoulis, Georgios Ch. and Bandini, Stefania},
      title = {A Scalable Method for Constructing Non-linear Cellular Automata with
                     Period 2 n - 1},
      booktitle = {Cellular Automata - 11th International Conference on Cellular Automata
                     for Research and Industry, {ACRI} 2014, Krakow, Poland, September
                     22-25, 2014. Proceedings},
      series = {Lecture Notes in Computer Science},
      volume = {8751},
      pages = {65--74},
      publisher = {Springer},
      year = {2014},
      url = {https://doi.org/10.1007/978-3-319-11520-7\_8},
      doi = {10.1007/978-3-319-11520-7\_8},
      timestamp = {Tue, 14 May 2019 10:00:44 +0200},
      biburl = {https://dblp.org/rec/conf/acri/GhoshSSC14.bib},
      bibsource = {dblp computer science bibliography, https://dblp.org}
    }
    
    A SCALABLE METHOD FOR CONSTRUCTING NON-LINEAR CELLULAR AUTOMATA WITH PERIOD 2 N - 1
    INPROCEEDINGS

    Ghosh, Shamit and Sengupta, Abhrajit and Saha, Dhiman and Chowdhury, Dipanwita Roy ▲ Cellular Automata - 11th International Conference on Cellular Automata for Research and Industry, ACRI 2014, Krakow, Poland, September 22-25, 2014. Proceedings, Volume:8751-, Pages:65–74, 2014

  2. https://doi.org/10.1007/978-3-319-06734-6_6
    @inproceedings{DBLP:conf/africacrypt/KuilaSPC14,
      author = {Kuila, Sukhendu and Saha, Dhiman and Pal, Madhumangal and Chowdhury, Dipanwita Roy},
      editor = {Pointcheval, David and Vergnaud, Damien},
      title = {Practical Distinguishers against 6-Round Keccak-f Exploiting Self-Symmetry},
      booktitle = {Progress in Cryptology - {AFRICACRYPT} 2014 - 7th International Conference
                     on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings},
      series = {Lecture Notes in Computer Science},
      volume = {8469},
      pages = {88--108},
      publisher = {Springer},
      year = {2014},
      url = {https://doi.org/10.1007/978-3-319-06734-6\_6},
      doi = {10.1007/978-3-319-06734-6\_6},
      timestamp = {Tue, 14 May 2019 10:00:52 +0200},
      biburl = {https://dblp.org/rec/conf/africacrypt/KuilaSPC14.bib},
      bibsource = {dblp computer science bibliography, https://dblp.org}
    }
    
    PRACTICAL DISTINGUISHERS AGAINST 6-ROUND KECCAK-F EXPLOITING SELF-SYMMETRY
    INPROCEEDINGS

    Kuila, Sukhendu and Saha, Dhiman and Pal, Madhumangal and Chowdhury, Dipanwita Roy ▲ Progress in Cryptology - AFRICACRYPT 2014 - 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings, Volume:8469-, Pages:88–108, 2014

  3. https://doi.org/10.1007/978-3-319-13039-2_12
    @inproceedings{DBLP:conf/indocrypt/SahaKC14,
      author = {Saha, Dhiman and Kuila, Sukhendu and Chowdhury, Dipanwita Roy},
      editor = {Meier, Willi and Mukhopadhyay, Debdeep},
      title = {EscApe: Diagonal Fault Analysis of {APE}},
      booktitle = {Progress in Cryptology - {INDOCRYPT} 2014 - 15th International Conference
                     on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings},
      series = {Lecture Notes in Computer Science},
      volume = {8885},
      pages = {197--216},
      publisher = {Springer},
      year = {2014},
      url = {https://doi.org/10.1007/978-3-319-13039-2\_12},
      doi = {10.1007/978-3-319-13039-2\_12},
      timestamp = {Tue, 14 May 2019 10:00:51 +0200},
      biburl = {https://dblp.org/rec/conf/indocrypt/SahaKC14.bib},
      bibsource = {dblp computer science bibliography, https://dblp.org}
    }
    
    ESCAPE: DIAGONAL FAULT ANALYSIS OF APE
    INPROCEEDINGS

    Saha, Dhiman and Kuila, Sukhendu and Chowdhury, Dipanwita Roy ▲ Progress in Cryptology - INDOCRYPT 2014 - 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings, Volume:8885-, Pages:197–216, 2014

  4. https://doi.org/10.1007/978-3-319-12060-7_5
    @inproceedings{DBLP:conf/space/KuilaSPC14,
      author = {Kuila, Sukhendu and Saha, Dhiman and Pal, Madhumangal and Chowdhury, Dipanwita Roy},
      editor = {Chakraborty, Rajat Subhra and Matyas, Vashek and Schaumont, Patrick},
      title = {{CASH:} Cellular Automata Based Parameterized Hash},
      booktitle = {Security, Privacy, and Applied Cryptography Engineering - 4th International
                     Conference, {SPACE} 2014, Pune, India, October 18-22, 2014. Proceedings},
      series = {Lecture Notes in Computer Science},
      volume = {8804},
      pages = {59--75},
      publisher = {Springer},
      year = {2014},
      url = {https://doi.org/10.1007/978-3-319-12060-7\_5},
      doi = {10.1007/978-3-319-12060-7\_5},
      timestamp = {Tue, 14 May 2019 10:00:40 +0200},
      biburl = {https://dblp.org/rec/conf/space/KuilaSPC14.bib},
      bibsource = {dblp computer science bibliography, https://dblp.org}
    }
    
    CASH: CELLULAR AUTOMATA BASED PARAMETERIZED HASH
    INPROCEEDINGS

    Kuila, Sukhendu and Saha, Dhiman and Pal, Madhumangal and Chowdhury, Dipanwita Roy ▲ Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings, Volume:8804-, Pages:59–75, 2014

  5. https://doi.org/10.1007/978-3-319-12060-7_11
    @inproceedings{DBLP:conf/space/SenguptaSGMC14,
      author = {Sengupta, Abhrajit and Saha, Dhiman and Ghosh, Shamit and Mehta, Deval and Chowdhury, Dipanwita Roy},
      editor = {Chakraborty, Rajat Subhra and Matyas, Vashek and Schaumont, Patrick},
      title = {{AEC:} {A} Practical Scheme for Authentication with Error Correction},
      booktitle = {Security, Privacy, and Applied Cryptography Engineering - 4th International
                     Conference, {SPACE} 2014, Pune, India, October 18-22, 2014. Proceedings},
      series = {Lecture Notes in Computer Science},
      volume = {8804},
      pages = {155--170},
      publisher = {Springer},
      year = {2014},
      url = {https://doi.org/10.1007/978-3-319-12060-7\_11},
      doi = {10.1007/978-3-319-12060-7\_11},
      timestamp = {Tue, 14 May 2019 10:00:40 +0200},
      biburl = {https://dblp.org/rec/conf/space/SenguptaSGMC14.bib},
      bibsource = {dblp computer science bibliography, https://dblp.org}
    }
    
    AEC: A PRACTICAL SCHEME FOR AUTHENTICATION WITH ERROR CORRECTION
    INPROCEEDINGS

    Sengupta, Abhrajit and Saha, Dhiman and Ghosh, Shamit and Mehta, Deval and Chowdhury, Dipanwita Roy ▲ Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings, Volume:8804-, Pages:155–170, 2014

2011

  1. https://doi.org/10.1007/978-3-642-25578-6_3
    @inproceedings{DBLP:conf/indocrypt/SahaMC11,
      author = {Saha, Dhiman and Mukhopadhyay, Debdeep and Chowdhury, Dipanwita Roy},
      editor = {Bernstein, Daniel J. and Chatterjee, Sanjit},
      title = {{PKDPA:} An Enhanced Probabilistic Differential Power Attack Methodology},
      booktitle = {Progress in Cryptology - {INDOCRYPT} 2011 - 12th International Conference
                     on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings},
      series = {Lecture Notes in Computer Science},
      volume = {7107},
      pages = {3--21},
      publisher = {Springer},
      year = {2011},
      url = {https://doi.org/10.1007/978-3-642-25578-6\_3},
      doi = {10.1007/978-3-642-25578-6\_3},
      timestamp = {Tue, 14 May 2019 10:00:51 +0200},
      biburl = {https://dblp.org/rec/conf/indocrypt/SahaMC11.bib},
      bibsource = {dblp computer science bibliography, https://dblp.org}
    }
    
    PKDPA: AN ENHANCED PROBABILISTIC DIFFERENTIAL POWER ATTACK METHODOLOGY
    INPROCEEDINGS

    Saha, Dhiman and Mukhopadhyay, Debdeep and Chowdhury, Dipanwita Roy ▲ Progress in Cryptology - INDOCRYPT 2011 - 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings, Volume:7107-, Pages:3–21, 2011

2009

  1. @article{DBLP:journals/iacr/SahaMC09,
      author = {Saha, Dhiman and Mukhopadhyay, Debdeep and Chowdhury, Dipanwita Roy},
      title = {A Diagonal Fault Attack on the Advanced Encryption Standard},
      journal = {{IACR} Cryptol. ePrint Arch.},
      volume = {2009},
      pages = {581},
      year = {2009},
      url = {http://eprint.iacr.org/2009/581},
      timestamp = {Mon, 11 May 2020 01:00:00 +0200},
      biburl = {https://dblp.org/rec/journals/iacr/SahaMC09.bib},
      bibsource = {dblp computer science bibliography, https://dblp.org}
    }
    
    A DIAGONAL FAULT ATTACK ON THE ADVANCED ENCRYPTION STANDARD
    ARTICLE

    Saha, Dhiman and Mukhopadhyay, Debdeep and Chowdhury, Dipanwita Roy ▲ IACR Cryptol. ePrint Arch., Volume:2009-, Pages:581, 2009

2008

  1. https://doi.org/10.1007/978-3-540-89754-5_18
    @inproceedings{DBLP:conf/indocrypt/AgrawalKSM08,
      author = {Agrawal, Mukesh and Karmakar, Sandip and Saha, Dhiman and Mukhopadhyay, Debdeep},
      editor = {Chowdhury, Dipanwita Roy and Rijmen, Vincent and Das, Abhijit},
      title = {Scan Based Side Channel Attacks on Stream Ciphers and Their Counter-Measures},
      booktitle = {Progress in Cryptology - {INDOCRYPT} 2008, 9th International Conference
                     on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings},
      series = {Lecture Notes in Computer Science},
      volume = {5365},
      pages = {226--238},
      publisher = {Springer},
      year = {2008},
      url = {https://doi.org/10.1007/978-3-540-89754-5\_18},
      doi = {10.1007/978-3-540-89754-5\_18},
      timestamp = {Tue, 14 May 2019 10:00:51 +0200},
      biburl = {https://dblp.org/rec/conf/indocrypt/AgrawalKSM08.bib},
      bibsource = {dblp computer science bibliography, https://dblp.org}
    }
    
    SCAN BASED SIDE CHANNEL ATTACKS ON STREAM CIPHERS AND THEIR COUNTER-MEASURES
    INPROCEEDINGS

    Agrawal, Mukesh and Karmakar, Sandip and Saha, Dhiman and Mukhopadhyay, Debdeep ▲ Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings, Volume:5365-, Pages:226–238, 2008

2007

  1. https://doi.org/10.1007/978-3-540-73458-1_3
    @inproceedings{DBLP:conf/acisp/BhattacharyaMSC07,
      author = {Bhattacharya, Debojyoti and Mukhopadhyay, Debdeep and Saha, Dhiman and Chowdhury, Dipanwita Roy},
      editor = {Pieprzyk, Josef and Ghodosi, Hossein and Dawson, Ed},
      title = {Strengthening {NLS} Against Crossword Puzzle Attack},
      booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                     2007, Townsville, Australia, July 2-4, 2007, Proceedings},
      series = {Lecture Notes in Computer Science},
      volume = {4586},
      pages = {29--44},
      publisher = {Springer},
      year = {2007},
      url = {https://doi.org/10.1007/978-3-540-73458-1\_3},
      doi = {10.1007/978-3-540-73458-1\_3},
      timestamp = {Tue, 14 May 2019 10:00:46 +0200},
      biburl = {https://dblp.org/rec/conf/acisp/BhattacharyaMSC07.bib},
      bibsource = {dblp computer science bibliography, https://dblp.org}
    }
    
    STRENGTHENING NLS AGAINST CROSSWORD PUZZLE ATTACK
    INPROCEEDINGS

    Bhattacharya, Debojyoti and Mukhopadhyay, Debdeep and Saha, Dhiman and Chowdhury, Dipanwita Roy ▲ Information Security and Privacy, 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings, Volume:4586-, Pages:29–44, 2007