@article{NJPS22, author = {Nath, Anirban and Jana, Amit and Paul, Goutam and Saha, Dhiman}, title = {Differential Fault Analysis of {NORX} Using Variants of the Coupon Collector Problem}, journal = {Journal of Cryptographic Engineering}, publisher = {{Springer}}, year = {2022}, abbr = {JCEN} }
Nath, Anirban and Jana, Amit and Paul, Goutam and Saha, Dhiman ▲ Journal of Cryptographic Engineering, Volume:-, Pages:, 2022
@article{Mandal2021, author = {Mandal, Kalikinkar and Saha, Dhiman and Sarkar, Sumanta and Todo, Yosuke}, title = {Sycon: {A} New Milestone in Designing ASCON-like Permutations}, journal = {Journal of Cryptographic Engineering}, volume = {2190-8516}, year = {2021}, url = {https://doi.org/10.1007/s13389-021-00272-9}, abbr = {JCEN} }
Mandal, Kalikinkar and Saha, Dhiman and Sarkar, Sumanta and Todo, Yosuke ▲ Journal of Cryptographic Engineering, Volume:2190-8516-, Pages:, 2021
@article{DBLP:journals/tosc/RahmanS021, author = {Rahman, Mostafizar and Saha, Dhiman and Paul, Goutam}, title = {Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on {AES} and Pholkos}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2021}, number = {3}, pages = {137--169}, year = {2021}, abbr = {ToSC} }
Rahman, Mostafizar and Saha, Dhiman and Paul, Goutam ▲ IACR Trans. Symmetric Cryptol., Volume:2021-3, Pages:137–169, 2021
@article{DBLP:journals/corr/abs-2103-16360, author = {Dabholkar, Ahaan and Kakarla, Sourya and Saha, Dhiman}, title = {Looney Tunes: Exposing the Lack of {DRM} Protection in Indian Music Streaming Services}, journal = {CoRR}, volume = {abs/2103.16360}, year = {2021}, url = {https://arxiv.org/abs/2103.16360}, archiveprefix = {arXiv}, eprint = {2103.16360}, timestamp = {Wed, 07 Apr 2021 15:31:46 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-16360.bib}, bibsource = {dblp computer science bibliography, https://dblp.org}, abbr = {arXiv} }
Dabholkar, Ahaan and Kakarla, Sourya and Saha, Dhiman ▲ CoRR, Volume:abs/2103.16360-, Pages:, 2021
@article{DBLP:journals/iacr/MandalSST21, author = {Mandal, Kalikinkar and Saha, Dhiman and Sarkar, Sumanta and Todo, Yosuke}, title = {Sycon: {A} New Milestone in Designing ASCON-like Permutations}, journal = {{IACR} Cryptol. ePrint Arch.}, volume = {2021}, pages = {157}, year = {2021}, url = {https://eprint.iacr.org/2021/157}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/MandalSST21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org}, abbr = {ePrint} }
Mandal, Kalikinkar and Saha, Dhiman and Sarkar, Sumanta and Todo, Yosuke ▲ IACR Cryptol. ePrint Arch., Volume:2021-, Pages:157, 2021
https://doi.org/10.1007/s13389-020-00224-9
@article{DBLP:journals/JCE/BaksiA20, author = {Baksi, Anubhab and Saha, Dhiman and Sarkar, Sumanta}, title = {To infect or not to infect: a critical analysis of infective countermeasures in fault attacks}, journal = {{JCEN}Journal of Cryptographic Engineering}, year = {2020}, url = {https://doi.org/10.1007/s13389-020-00224-9}, doi = {10.1007/s13389-020-00224-9}, timestamp = {Wed, 10 Jun 2020 01:00:00 +0200}, note = {Available On-line} }
Baksi, Anubhab and Saha, Dhiman and Sarkar, Sumanta ▲ JCENJournal of Cryptographic Engineering, Volume:-, Pages:, 2020
@conference{DBLP:conf/ACISP/BaksiA2020, author = {Baksi, Anubhab and Kumar, Vinay B. Y. and Karmakar, Banashri and Bhasin, Shivam and Saha, Dhiman and Chattopadhya, Anupam}, title = { A Novel Duplication Based Countermeasure To Statistical Ineffective Fault Analysis}, booktitle = {Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, Australia, November 25--27, 2020, Proceedings}, year = {2020} }
Baksi, Anubhab and Kumar, Vinay B. Y. and Karmakar, Banashri and Bhasin, Shivam and Saha, Dhiman and Chattopadhya, Anupam ▲ Information Security and Privacy - 25th Australasian Conference, ACISP 2020, Perth, Australia, November 25–27, 2020, Proceedings, Volume:-, Pages:, 2020
@conference{DBLP:conf/AFRICACRYPT/SuryawanshiS20, author = {Suryawanshi, Sahiba and Saha, Dhiman and Sachan, Satyam}, title = { New Results on the SymSum Distinguisher on Round-Reduced SHA-3}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2020 - 12th International Conference on Cryptology in Africa, Cairo, Egypt, July 22-22, 2020. Proceedings}, year = {2020} }
Suryawanshi, Sahiba and Saha, Dhiman and Sachan, Satyam ▲ Progress in Cryptology - AFRICACRYPT 2020 - 12th International Conference on Cryptology in Africa, Cairo, Egypt, July 22-22, 2020. Proceedings, Volume:-, Pages:, 2020
@conference{DBLP:conf/AFRICACRYPT/RahmanM2020, author = {Rahman, Mostafizar and Saha, Dhiman and Paul, Goutam}, title = { Cryptanalysis of FlexAEAD}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2020 - 12th International Conference on Cryptology in Africa, Cairo, Egypt, July 22-22, 2020. Proceedings}, year = {2020} }
Rahman, Mostafizar and Saha, Dhiman and Paul, Goutam ▲ Progress in Cryptology - AFRICACRYPT 2020 - 12th International Conference on Cryptology in Africa, Cairo, Egypt, July 22-22, 2020. Proceedings, Volume:-, Pages:, 2020
@conference{DBLP:conf/HOST/AIKATA20, author = {Aikata and Karmakar, Banashri and Saha, Dhiman}, title = { DESIV: Differential Fault Analysis of SIV-Rijndael256 with a Single Fault}, booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2020, San Jose, CA, USA, December 6-9, 2020}, year = {2020} }
Aikata and Karmakar, Banashri and Saha, Dhiman ▲ IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2020, San Jose, CA, USA, December 6-9, 2020, Volume:-, Pages:, 2020
https://doi.org/10.1049/iet-ifs.2018.5033
@article{DBLP:journals/iet-ifs/SahaKC19, author = {Saha, Dhiman and Kakarla, Sourya and Chowdhury, Dipanwita Roy}, title = {Dinamite: internal differential match-in-the-end attack on eight-round {PAEQ}}, journal = {{IET} Information Security}, volume = {13}, number = {4}, pages = {378--388}, year = {2019}, url = {https://doi.org/10.1049/iet-ifs.2018.5033}, doi = {10.1049/iet-ifs.2018.5033}, timestamp = {Wed, 26 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/SahaKC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
Saha, Dhiman and Kakarla, Sourya and Chowdhury, Dipanwita Roy ▲ IET Information Security, Volume:13-4, Pages:378–388, 2019
https://doi.org/10.1007/s13389-017-0179-0
@article{DBLP:journals/jce/SahaC19, author = {Saha, Dhiman and Chowdhury, Dipanwita Roy}, title = {Internal differential fault analysis of parallelizable ciphers in the counter-mode}, journal = {J. Cryptographic Engineering}, volume = {9}, number = {1}, pages = {53--67}, year = {2019}, url = {https://doi.org/10.1007/s13389-017-0179-0}, doi = {10.1007/s13389-017-0179-0}, timestamp = {Wed, 29 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/SahaC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
Saha, Dhiman and Chowdhury, Dipanwita Roy ▲ J. Cryptographic Engineering, Volume:9-1, Pages:53–67, 2019
https://doi.org/10.1007/978-3-030-21568-2_3
@inproceedings{DBLP:conf/acns/BanikBJLLMRSS19, author = {Banik, Subhadeep and Bossert, Jannis and Jana, Amit and List, Eik and Lucks, Stefan and Meier, Willi and Rahman, Mostafizar and Saha, Dhiman and Sasaki, Yu}, editor = {Deng, Robert H. and Gauthier{-}Uma{\~{n}}a, Val{\'{e}}rie and Ochoa, Mart{\'{\i}}n and Yung, Moti}, title = {Cryptanalysis of ForkAES}, booktitle = {Applied Cryptography and Network Security - 17th International Conference, {ACNS} 2019, Bogota, Colombia, June 5-7, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11464}, pages = {43--63}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21568-2\_3}, doi = {10.1007/978-3-030-21568-2\_3}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/BanikBJLLMRSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
Banik, Subhadeep and Bossert, Jannis and Jana, Amit and List, Eik and Lucks, Stefan and Meier, Willi and Rahman, Mostafizar and Saha, Dhiman and Sasaki, Yu ▲ Applied Cryptography and Network Security - 17th International Conference, ACNS 2019, Bogota, Colombia, June 5-7, 2019, Proceedings, Volume:11464-, Pages:43–63, 2019
https://doi.org/10.1007/978-3-030-35423-7_18
@inproceedings{DBLP:conf/indocrypt/SarkarMS19, author = {Sarkar, Sumanta and Mandal, Kalikinkar and Saha, Dhiman}, editor = {Hao, Feng and Ruj, Sushmita and Gupta, Sourav Sen}, title = {On the Relationship Between Resilient Boolean Functions and Linear Branch Number of S-Boxes}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2019 - 20th International Conference on Cryptology in India, Hyderabad, India, December 15-18, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11898}, pages = {361--374}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-35423-7\_18}, doi = {10.1007/978-3-030-35423-7\_18}, timestamp = {Thu, 12 Dec 2019 16:07:27 +0100}, biburl = {https://dblp.org/rec/conf/indocrypt/SarkarMS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
Sarkar, Sumanta and Mandal, Kalikinkar and Saha, Dhiman ▲ Progress in Cryptology - INDOCRYPT 2019 - 20th International Conference on Cryptology in India, Hyderabad, India, December 15-18, 2019, Proceedings, Volume:11898-, Pages:361–374, 2019
@article{DBLP:journals/iacr/BanikBJLLMRSS19, author = {Banik, Subhadeep and Bossert, Jannis and Jana, Amit and List, Eik and Lucks, Stefan and Meier, Willi and Rahman, Mostafizar and Saha, Dhiman and Sasaki, Yu}, title = {Cryptanalysis of ForkAES}, journal = {{IACR} Cryptol. ePrint Arch.}, volume = {2019}, pages = {289}, year = {2019}, url = {https://eprint.iacr.org/2019/289}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BanikBJLLMRSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
Banik, Subhadeep and Bossert, Jannis and Jana, Amit and List, Eik and Lucks, Stefan and Meier, Willi and Rahman, Mostafizar and Saha, Dhiman and Sasaki, Yu ▲ IACR Cryptol. ePrint Arch., Volume:2019-, Pages:289, 2019
@article{DBLP:journals/iacr/BaksiSS19, author = {Baksi, Anubhab and Saha, Dhiman and Sarkar, Sumanta}, title = {To Infect Or Not To Infect: {A} Critical Analysis Of Infective Countermeasures In Fault Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, volume = {2019}, pages = {355}, year = {2019}, url = {https://eprint.iacr.org/2019/355}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaksiSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
Baksi, Anubhab and Saha, Dhiman and Sarkar, Sumanta ▲ IACR Cryptol. ePrint Arch., Volume:2019-, Pages:355, 2019
@article{DBLP:journals/iacr/RahmanS019, author = {Rahman, Mostafizar and Saha, Dhiman and Paul, Goutam}, title = {Iterated Truncated Differential for Internal Keyed Permutation of FlexAEAD}, journal = {{IACR} Cryptol. ePrint Arch.}, volume = {2019}, pages = {539}, year = {2019}, url = {https://eprint.iacr.org/2019/539}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RahmanS019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
Rahman, Mostafizar and Saha, Dhiman and Paul, Goutam ▲ IACR Cryptol. ePrint Arch., Volume:2019-, Pages:539, 2019
@article{DBLP:journals/iacr/JanaSP19, author = {Jana, Amit and Saha, Dhiman and Paul, Goutam}, title = {Differential Fault Analysis of {NORX}}, journal = {{IACR} Cryptol. ePrint Arch.}, volume = {2019}, pages = {760}, year = {2019}, url = {https://eprint.iacr.org/2019/760}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JanaSP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
Jana, Amit and Saha, Dhiman and Paul, Goutam ▲ IACR Cryptol. ePrint Arch., Volume:2019-, Pages:760, 2019
@article{DBLP:journals/iacr/SarkarMS19, author = {Sarkar, Sumanta and Mandal, Kalikinkar and Saha, Dhiman}, title = {On the Relationship between Resilient Boolean Functions and Linear Branch Number of S-boxes}, journal = {{IACR} Cryptol. ePrint Arch.}, volume = {2019}, pages = {1427}, year = {2019}, url = {https://eprint.iacr.org/2019/1427}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SarkarMS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
Sarkar, Sumanta and Mandal, Kalikinkar and Saha, Dhiman ▲ IACR Cryptol. ePrint Arch., Volume:2019-, Pages:1427, 2019
https://doi.org/10.13154/tosc.v2018.i4.102-127
@article{DBLP:journals/tosc/SahaR018, author = {Saha, Dhiman and Rahman, Mostafizar and Paul, Goutam}, title = {New Yoyo Tricks with AES-based Permutations}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {4}, pages = {102--127}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i4.102-127}, doi = {10.13154/tosc.v2018.i4.102-127}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/SahaR018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
Saha, Dhiman and Rahman, Mostafizar and Paul, Goutam ▲ IACR Trans. Symmetric Cryptol., Volume:2018-4, Pages:102–127, 2018
https://doi.org/10.1504/IJACT.2017.10007295
@article{DBLP:journals/ijact/GhoshSSC17, author = {Ghosh, Shamit and Saha, Dhiman and Sengupta, Abhrajit and Chowdhury, Dipanwita Roy}, title = {Preventing fault attacks using fault randomisation with a case study on {AES}}, journal = {{IJACT}}, volume = {3}, number = {3}, pages = {225--235}, year = {2017}, url = {https://doi.org/10.1504/IJACT.2017.10007295}, doi = {10.1504/IJACT.2017.10007295}, timestamp = {Mon, 09 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/GhoshSSC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
Ghosh, Shamit and Saha, Dhiman and Sengupta, Abhrajit and Chowdhury, Dipanwita Roy ▲ IJACT, Volume:3-3, Pages:225–235, 2017
https://doi.org/10.1007/s41635-017-0010-5
@article{DBLP:journals/jhss/SahaKMC17, author = {Saha, Dhiman and Kakarla, Sourya and Mandava, Srinath and Chowdhury, Dipanwita Roy}, title = {Gain: Practical Key-Recovery Attacks on Round-Reduced {PAEQ}}, journal = {J. Hardware and Systems Security}, volume = {1}, number = {3}, pages = {282--296}, year = {2017}, url = {https://doi.org/10.1007/s41635-017-0010-5}, doi = {10.1007/s41635-017-0010-5}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jhss/SahaKMC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
Saha, Dhiman and Kakarla, Sourya and Mandava, Srinath and Chowdhury, Dipanwita Roy ▲ J. Hardware and Systems Security, Volume:1-3, Pages:282–296, 2017
https://doi.org/10.13154/tosc.v2017.i1.240-258
@article{DBLP:journals/tosc/SahaKC17, author = {Saha, Dhiman and Kuila, Sukhendu and Chowdhury, Dipanwita Roy}, title = {SymSum: Symmetric-Sum Distinguishers Against Round Reduced {SHA3}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {1}, pages = {240--258}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i1.240-258}, doi = {10.13154/tosc.v2017.i1.240-258}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/SahaKC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
Saha, Dhiman and Kuila, Sukhendu and Chowdhury, Dipanwita Roy ▲ IACR Trans. Symmetric Cryptol., Volume:2017-1, Pages:240–258, 2017
https://doi.org/10.1007/978-981-10-5421-1_6
@inproceedings{DBLP:conf/atis/KakarlaMSC17, author = {Kakarla, Sourya and Mandava, Srinath and Saha, Dhiman and Chowdhury, Dipanwita Roy}, editor = {Batten, Lynn and Kim, Dong Seong and Zhang, Xuyun and Li, Gang}, title = {On the Practical Implementation of Impossible Differential Cryptanalysis on Reduced-Round {AES}}, booktitle = {Applications and Techniques in Information Security - 8th International Conference, {ATIS} 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings}, series = {Communications in Computer and Information Science}, volume = {719}, pages = {58--72}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-981-10-5421-1\_6}, doi = {10.1007/978-981-10-5421-1\_6}, timestamp = {Mon, 21 Oct 2019 09:19:25 +0200}, biburl = {https://dblp.org/rec/conf/atis/KakarlaMSC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
Kakarla, Sourya and Mandava, Srinath and Saha, Dhiman and Chowdhury, Dipanwita Roy ▲ Applications and Techniques in Information Security - 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings, Volume:719-, Pages:58–72, 2017
@article{DBLP:journals/iacr/SahaKC17, author = {Saha, Dhiman and Kuila, Sukhendu and Chowdhury, Dipanwita Roy}, title = {SymSum: Symmetric-Sum Distinguishers Against Round Reduced {SHA3}}, journal = {{IACR} Cryptol. ePrint Arch.}, volume = {2017}, pages = {165}, year = {2017}, url = {http://eprint.iacr.org/2017/165}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SahaKC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
Saha, Dhiman and Kuila, Sukhendu and Chowdhury, Dipanwita Roy ▲ IACR Cryptol. ePrint Arch., Volume:2017-, Pages:165, 2017
https://doi.org/10.1007/978-3-662-53140-2_28
@inproceedings{DBLP:conf/ches/SahaC16, author = {Saha, Dhiman and Chowdhury, Dipanwita Roy}, editor = {Gierlichs, Benedikt and Poschmann, Axel Y.}, title = {EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis with a Case-Study on {PAEQ}}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9813}, pages = {581--601}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53140-2\_28}, doi = {10.1007/978-3-662-53140-2\_28}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/SahaC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
Saha, Dhiman and Chowdhury, Dipanwita Roy ▲ Cryptographic Hardware and Embedded Systems - CHES 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings, Volume:9813-, Pages:581–601, 2016
https://doi.org/10.1007/978-3-662-52993-5_27
@inproceedings{DBLP:conf/fse/BouraCLPSSS16, author = {Boura, Christina and Chakraborti, Avik and Leurent, Ga{\"{e}}tan and Paul, Goutam and Saha, Dhiman and Soleimany, Hadi and Suder, Valentin}, editor = {Peyrin, Thomas}, title = {Key Recovery Attack Against 2.5-Round {\textbackslash}pi -Cipher}, booktitle = {Fast Software Encryption - 23rd International Conference, {FSE} 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9783}, pages = {535--553}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-52993-5\_27}, doi = {10.1007/978-3-662-52993-5\_27}, timestamp = {Fri, 27 Mar 2020 08:58:25 +0100}, biburl = {https://dblp.org/rec/conf/fse/BouraCLPSSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
Boura, Christina and Chakraborti, Avik and Leurent, Gaëtan and Paul, Goutam and Saha, Dhiman and Soleimany, Hadi and Suder, Valentin ▲ Fast Software Encryption - 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers, Volume:9783-, Pages:535–553, 2016
https://doi.org/10.1007/978-3-319-49445-6_11
@inproceedings{DBLP:conf/space/SahaKMC16, author = {Saha, Dhiman and Kakarla, Sourya and Mandava, Srinath and Chowdhury, Dipanwita Roy}, editor = {Carlet, Claude and Hasan, M. Anwar and Saraswat, Vishal}, title = {Gain: Practical Key-Recovery Attacks on Round-reduced {PAEQ}}, booktitle = {Security, Privacy, and Applied Cryptography Engineering - 6th International Conference, {SPACE} 2016, Hyderabad, India, December 14-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10076}, pages = {194--210}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49445-6\_11}, doi = {10.1007/978-3-319-49445-6\_11}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/space/SahaKMC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
Saha, Dhiman and Kakarla, Sourya and Mandava, Srinath and Chowdhury, Dipanwita Roy ▲ Security, Privacy, and Applied Cryptography Engineering - 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings, Volume:10076-, Pages:194–210, 2016
@article{DBLP:journals/iacr/BouraCLPSSS16, author = {Boura, Christina and Chakraborti, Avik and Leurent, Ga{\"{e}}tan and Paul, Goutam and Saha, Dhiman and Soleimany, Hadi and Suder, Valentin}, title = {Key Recovery Attack against 2.5-round pi-Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, volume = {2016}, pages = {502}, year = {2016}, url = {http://eprint.iacr.org/2016/502}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BouraCLPSSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
Boura, Christina and Chakraborti, Avik and Leurent, Gaëtan and Paul, Goutam and Saha, Dhiman and Soleimany, Hadi and Suder, Valentin ▲ IACR Cryptol. ePrint Arch., Volume:2016-, Pages:502, 2016
@article{DBLP:journals/iacr/SahaC16, author = {Saha, Dhiman and Chowdhury, Dipanwita Roy}, title = {EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis with a Case-Study on {PAEQ}}, journal = {{IACR} Cryptol. ePrint Arch.}, volume = {2016}, pages = {623}, year = {2016}, url = {http://eprint.iacr.org/2016/623}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SahaC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
Saha, Dhiman and Chowdhury, Dipanwita Roy ▲ IACR Cryptol. ePrint Arch., Volume:2016-, Pages:623, 2016
https://doi.org/10.1007/978-3-319-19962-7_20
@inproceedings{DBLP:conf/acisp/GhoshSSC15, author = {Ghosh, Shamit and Saha, Dhiman and Sengupta, Abhrajit and Chowdhury, Dipanwita Roy}, editor = {Foo, Ernest and Stebila, Douglas}, title = {Preventing Fault Attacks Using Fault Randomization with a Case Study on {AES}}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {343--355}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_20}, doi = {10.1007/978-3-319-19962-7\_20}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/GhoshSSC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
Ghosh, Shamit and Saha, Dhiman and Sengupta, Abhrajit and Chowdhury, Dipanwita Roy ▲ Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings, Volume:9144-, Pages:343–355, 2015
https://doi.org/10.1109/HST.2015.7140246
@inproceedings{DBLP:conf/host/SahaC15, author = {Saha, Dhiman and Chowdhury, Dipanwita Roy}, title = {Diagonal fault analysis of Gr{\(\oslash\)}stl in dedicated {MAC} mode}, booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2015, Washington, DC, USA, 5-7 May, 2015}, pages = {100--105}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/HST.2015.7140246}, doi = {10.1109/HST.2015.7140246}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/host/SahaC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
Saha, Dhiman and Chowdhury, Dipanwita Roy ▲ IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015, Volume:-, Pages:100–105, 2015
https://doi.org/10.1007/978-3-319-31301-6_24
@inproceedings{DBLP:conf/sacrypt/SahaC15, author = {Saha, Dhiman and Chowdhury, Dipanwita Roy}, editor = {Dunkelman, Orr and Keliher, Liam}, title = {Scope: On the Side Channel Vulnerability of Releasing Unverified Plaintexts}, booktitle = {Selected Areas in Cryptography - {SAC} 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9566}, pages = {417--438}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31301-6\_24}, doi = {10.1007/978-3-319-31301-6\_24}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/SahaC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
Saha, Dhiman and Chowdhury, Dipanwita Roy ▲ Selected Areas in Cryptography - SAC 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers, Volume:9566-, Pages:417–438, 2015
https://doi.org/10.1007/978-3-319-11520-7_8
@inproceedings{DBLP:conf/acri/GhoshSSC14, author = {Ghosh, Shamit and Sengupta, Abhrajit and Saha, Dhiman and Chowdhury, Dipanwita Roy}, editor = {Was, Jaroslaw and Sirakoulis, Georgios Ch. and Bandini, Stefania}, title = {A Scalable Method for Constructing Non-linear Cellular Automata with Period 2 n - 1}, booktitle = {Cellular Automata - 11th International Conference on Cellular Automata for Research and Industry, {ACRI} 2014, Krakow, Poland, September 22-25, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8751}, pages = {65--74}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11520-7\_8}, doi = {10.1007/978-3-319-11520-7\_8}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/acri/GhoshSSC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
Ghosh, Shamit and Sengupta, Abhrajit and Saha, Dhiman and Chowdhury, Dipanwita Roy ▲ Cellular Automata - 11th International Conference on Cellular Automata for Research and Industry, ACRI 2014, Krakow, Poland, September 22-25, 2014. Proceedings, Volume:8751-, Pages:65–74, 2014
https://doi.org/10.1007/978-3-319-06734-6_6
@inproceedings{DBLP:conf/africacrypt/KuilaSPC14, author = {Kuila, Sukhendu and Saha, Dhiman and Pal, Madhumangal and Chowdhury, Dipanwita Roy}, editor = {Pointcheval, David and Vergnaud, Damien}, title = {Practical Distinguishers against 6-Round Keccak-f Exploiting Self-Symmetry}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2014 - 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8469}, pages = {88--108}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06734-6\_6}, doi = {10.1007/978-3-319-06734-6\_6}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/KuilaSPC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
Kuila, Sukhendu and Saha, Dhiman and Pal, Madhumangal and Chowdhury, Dipanwita Roy ▲ Progress in Cryptology - AFRICACRYPT 2014 - 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings, Volume:8469-, Pages:88–108, 2014
https://doi.org/10.1007/978-3-319-13039-2_12
@inproceedings{DBLP:conf/indocrypt/SahaKC14, author = {Saha, Dhiman and Kuila, Sukhendu and Chowdhury, Dipanwita Roy}, editor = {Meier, Willi and Mukhopadhyay, Debdeep}, title = {EscApe: Diagonal Fault Analysis of {APE}}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2014 - 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8885}, pages = {197--216}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13039-2\_12}, doi = {10.1007/978-3-319-13039-2\_12}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/SahaKC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
Saha, Dhiman and Kuila, Sukhendu and Chowdhury, Dipanwita Roy ▲ Progress in Cryptology - INDOCRYPT 2014 - 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings, Volume:8885-, Pages:197–216, 2014
https://doi.org/10.1007/978-3-319-12060-7_5
@inproceedings{DBLP:conf/space/KuilaSPC14, author = {Kuila, Sukhendu and Saha, Dhiman and Pal, Madhumangal and Chowdhury, Dipanwita Roy}, editor = {Chakraborty, Rajat Subhra and Matyas, Vashek and Schaumont, Patrick}, title = {{CASH:} Cellular Automata Based Parameterized Hash}, booktitle = {Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, {SPACE} 2014, Pune, India, October 18-22, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8804}, pages = {59--75}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12060-7\_5}, doi = {10.1007/978-3-319-12060-7\_5}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/space/KuilaSPC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
Kuila, Sukhendu and Saha, Dhiman and Pal, Madhumangal and Chowdhury, Dipanwita Roy ▲ Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings, Volume:8804-, Pages:59–75, 2014
https://doi.org/10.1007/978-3-319-12060-7_11
@inproceedings{DBLP:conf/space/SenguptaSGMC14, author = {Sengupta, Abhrajit and Saha, Dhiman and Ghosh, Shamit and Mehta, Deval and Chowdhury, Dipanwita Roy}, editor = {Chakraborty, Rajat Subhra and Matyas, Vashek and Schaumont, Patrick}, title = {{AEC:} {A} Practical Scheme for Authentication with Error Correction}, booktitle = {Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, {SPACE} 2014, Pune, India, October 18-22, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8804}, pages = {155--170}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12060-7\_11}, doi = {10.1007/978-3-319-12060-7\_11}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/space/SenguptaSGMC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
Sengupta, Abhrajit and Saha, Dhiman and Ghosh, Shamit and Mehta, Deval and Chowdhury, Dipanwita Roy ▲ Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings, Volume:8804-, Pages:155–170, 2014
https://doi.org/10.1007/978-3-642-25578-6_3
@inproceedings{DBLP:conf/indocrypt/SahaMC11, author = {Saha, Dhiman and Mukhopadhyay, Debdeep and Chowdhury, Dipanwita Roy}, editor = {Bernstein, Daniel J. and Chatterjee, Sanjit}, title = {{PKDPA:} An Enhanced Probabilistic Differential Power Attack Methodology}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2011 - 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7107}, pages = {3--21}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25578-6\_3}, doi = {10.1007/978-3-642-25578-6\_3}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/SahaMC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
Saha, Dhiman and Mukhopadhyay, Debdeep and Chowdhury, Dipanwita Roy ▲ Progress in Cryptology - INDOCRYPT 2011 - 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings, Volume:7107-, Pages:3–21, 2011
@article{DBLP:journals/iacr/SahaMC09, author = {Saha, Dhiman and Mukhopadhyay, Debdeep and Chowdhury, Dipanwita Roy}, title = {A Diagonal Fault Attack on the Advanced Encryption Standard}, journal = {{IACR} Cryptol. ePrint Arch.}, volume = {2009}, pages = {581}, year = {2009}, url = {http://eprint.iacr.org/2009/581}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SahaMC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
Saha, Dhiman and Mukhopadhyay, Debdeep and Chowdhury, Dipanwita Roy ▲ IACR Cryptol. ePrint Arch., Volume:2009-, Pages:581, 2009
https://doi.org/10.1007/978-3-540-89754-5_18
@inproceedings{DBLP:conf/indocrypt/AgrawalKSM08, author = {Agrawal, Mukesh and Karmakar, Sandip and Saha, Dhiman and Mukhopadhyay, Debdeep}, editor = {Chowdhury, Dipanwita Roy and Rijmen, Vincent and Das, Abhijit}, title = {Scan Based Side Channel Attacks on Stream Ciphers and Their Counter-Measures}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5365}, pages = {226--238}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89754-5\_18}, doi = {10.1007/978-3-540-89754-5\_18}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/AgrawalKSM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
Agrawal, Mukesh and Karmakar, Sandip and Saha, Dhiman and Mukhopadhyay, Debdeep ▲ Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings, Volume:5365-, Pages:226–238, 2008
https://doi.org/10.1007/978-3-540-73458-1_3
@inproceedings{DBLP:conf/acisp/BhattacharyaMSC07, author = {Bhattacharya, Debojyoti and Mukhopadhyay, Debdeep and Saha, Dhiman and Chowdhury, Dipanwita Roy}, editor = {Pieprzyk, Josef and Ghodosi, Hossein and Dawson, Ed}, title = {Strengthening {NLS} Against Crossword Puzzle Attack}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {29--44}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_3}, doi = {10.1007/978-3-540-73458-1\_3}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BhattacharyaMSC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
Bhattacharya, Debojyoti and Mukhopadhyay, Debdeep and Saha, Dhiman and Chowdhury, Dipanwita Roy ▲ Information Security and Privacy, 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings, Volume:4586-, Pages:29–44, 2007