
@article{NJPS22,
  author = {Nath, Anirban and Jana, Amit and Paul, Goutam and Saha, Dhiman},
  title = {Differential Fault Analysis of {NORX} Using Variants of the Coupon Collector Problem},
  journal = {Journal of Cryptographic Engineering},
  publisher = {{Springer}},
  year = {2022},
  abbr = {JCEN}
}
Nath, Anirban and Jana, Amit and Paul, Goutam and Saha, Dhiman ▲ Journal of Cryptographic Engineering, Volume:-, Pages:, 2022

@article{Mandal2021,
  author = {Mandal, Kalikinkar and Saha, Dhiman and Sarkar, Sumanta and Todo, Yosuke},
  title = {Sycon: {A} New Milestone in Designing ASCON-like Permutations},
  journal = {Journal of Cryptographic Engineering},
  volume = {2190-8516},
  year = {2021},
  url = {https://doi.org/10.1007/s13389-021-00272-9},
  abbr = {JCEN}
}
Mandal, Kalikinkar and Saha, Dhiman and Sarkar, Sumanta and Todo, Yosuke ▲ Journal of Cryptographic Engineering, Volume:2190-8516-, Pages:, 2021

@article{DBLP:journals/tosc/RahmanS021,
  author = {Rahman, Mostafizar and Saha, Dhiman and Paul, Goutam},
  title = {Boomeyong: Embedding Yoyo within Boomerang and its Applications to
  	Key Recovery Attacks on {AES} and Pholkos},
  journal = {{IACR} Trans. Symmetric Cryptol.},
  volume = {2021},
  number = {3},
  pages = {137--169},
  year = {2021},
  abbr = {ToSC}
}
Rahman, Mostafizar and Saha, Dhiman and Paul, Goutam ▲ IACR Trans. Symmetric Cryptol., Volume:2021-3, Pages:137–169, 2021

@article{DBLP:journals/corr/abs-2103-16360,
  author = {Dabholkar, Ahaan and Kakarla, Sourya and Saha, Dhiman},
  title = {Looney Tunes: Exposing the Lack of {DRM} Protection in Indian Music
  	Streaming Services},
  journal = {CoRR},
  volume = {abs/2103.16360},
  year = {2021},
  url = {https://arxiv.org/abs/2103.16360},
  archiveprefix = {arXiv},
  eprint = {2103.16360},
  timestamp = {Wed, 07 Apr 2021 15:31:46 +0200},
  biburl = {https://dblp.org/rec/journals/corr/abs-2103-16360.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org},
  abbr = {arXiv}
}
Dabholkar, Ahaan and Kakarla, Sourya and Saha, Dhiman ▲ CoRR, Volume:abs/2103.16360-, Pages:, 2021

@article{DBLP:journals/iacr/MandalSST21,
  author = {Mandal, Kalikinkar and Saha, Dhiman and Sarkar, Sumanta and Todo, Yosuke},
  title = {Sycon: {A} New Milestone in Designing ASCON-like Permutations},
  journal = {{IACR} Cryptol. ePrint Arch.},
  volume = {2021},
  pages = {157},
  year = {2021},
  url = {https://eprint.iacr.org/2021/157},
  timestamp = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl = {https://dblp.org/rec/journals/iacr/MandalSST21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org},
  abbr = {ePrint}
}
Mandal, Kalikinkar and Saha, Dhiman and Sarkar, Sumanta and Todo, Yosuke ▲ IACR Cryptol. ePrint Arch., Volume:2021-, Pages:157, 2021

https://doi.org/10.1007/s13389-020-00224-9

@article{DBLP:journals/JCE/BaksiA20,
  author = {Baksi, Anubhab and Saha, Dhiman and Sarkar, Sumanta},
  title = {To infect or not to infect: a critical analysis of infective countermeasures in fault attacks},
  journal = {{JCEN}Journal of Cryptographic Engineering},
  year = {2020},
  url = {https://doi.org/10.1007/s13389-020-00224-9},
  doi = {10.1007/s13389-020-00224-9},
  timestamp = {Wed, 10 Jun 2020 01:00:00 +0200},
  note = {Available On-line}
}
Baksi, Anubhab and Saha, Dhiman and Sarkar, Sumanta ▲ JCENJournal of Cryptographic Engineering, Volume:-, Pages:, 2020

@conference{DBLP:conf/ACISP/BaksiA2020,
  author = {Baksi, Anubhab and Kumar, Vinay B. Y. and Karmakar, Banashri and Bhasin, Shivam and Saha, Dhiman and Chattopadhya, Anupam},
  title = { A Novel Duplication Based Countermeasure To Statistical Ineffective Fault Analysis},
  booktitle = {Information Security and Privacy - 25th Australasian Conference, {ACISP}
                 2020, Perth, Australia, November 25--27, 2020, Proceedings},
  year = {2020}
}
Baksi, Anubhab and Kumar, Vinay B. Y. and Karmakar, Banashri and Bhasin, Shivam and Saha, Dhiman and Chattopadhya, Anupam ▲ Information Security and Privacy - 25th Australasian Conference, ACISP 2020, Perth, Australia, November 25–27, 2020, Proceedings, Volume:-, Pages:, 2020

@conference{DBLP:conf/AFRICACRYPT/SuryawanshiS20,
  author = {Suryawanshi, Sahiba and Saha, Dhiman and Sachan, Satyam},
  title = { New Results on the SymSum Distinguisher on Round-Reduced SHA-3},
  booktitle = {Progress in Cryptology - {AFRICACRYPT} 2020 - 12th International Conference
                 on Cryptology in Africa, Cairo, Egypt, July 22-22, 2020. Proceedings},
  year = {2020}
}
Suryawanshi, Sahiba and Saha, Dhiman and Sachan, Satyam ▲ Progress in Cryptology - AFRICACRYPT 2020 - 12th International Conference on Cryptology in Africa, Cairo, Egypt, July 22-22, 2020. Proceedings, Volume:-, Pages:, 2020

@conference{DBLP:conf/AFRICACRYPT/RahmanM2020,
  author = {Rahman, Mostafizar and Saha, Dhiman and Paul, Goutam},
  title = { Cryptanalysis of FlexAEAD},
  booktitle = {Progress in Cryptology - {AFRICACRYPT} 2020 - 12th International Conference
                 on Cryptology in Africa, Cairo, Egypt, July 22-22, 2020. Proceedings},
  year = {2020}
}
Rahman, Mostafizar and Saha, Dhiman and Paul, Goutam ▲ Progress in Cryptology - AFRICACRYPT 2020 - 12th International Conference on Cryptology in Africa, Cairo, Egypt, July 22-22, 2020. Proceedings, Volume:-, Pages:, 2020

@conference{DBLP:conf/HOST/AIKATA20,
  author = {Aikata and Karmakar, Banashri and Saha, Dhiman},
  title = { DESIV: Differential Fault Analysis of SIV-Rijndael256 with a Single Fault},
  booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
                 {HOST} 2020, San Jose, CA, USA, December 6-9, 2020},
  year = {2020}
}
Aikata and Karmakar, Banashri and Saha, Dhiman ▲ IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2020, San Jose, CA, USA, December 6-9, 2020, Volume:-, Pages:, 2020

https://doi.org/10.1049/iet-ifs.2018.5033

@article{DBLP:journals/iet-ifs/SahaKC19,
  author = {Saha, Dhiman and Kakarla, Sourya and Chowdhury, Dipanwita Roy},
  title = {Dinamite: internal differential match-in-the-end attack on eight-round
                 {PAEQ}},
  journal = {{IET} Information Security},
  volume = {13},
  number = {4},
  pages = {378--388},
  year = {2019},
  url = {https://doi.org/10.1049/iet-ifs.2018.5033},
  doi = {10.1049/iet-ifs.2018.5033},
  timestamp = {Wed, 26 Jun 2019 01:00:00 +0200},
  biburl = {https://dblp.org/rec/journals/iet-ifs/SahaKC19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
Saha, Dhiman and Kakarla, Sourya and Chowdhury, Dipanwita Roy ▲ IET Information Security, Volume:13-4, Pages:378–388, 2019

https://doi.org/10.1007/s13389-017-0179-0

@article{DBLP:journals/jce/SahaC19,
  author = {Saha, Dhiman and Chowdhury, Dipanwita Roy},
  title = {Internal differential fault analysis of parallelizable ciphers in
                 the counter-mode},
  journal = {J. Cryptographic Engineering},
  volume = {9},
  number = {1},
  pages = {53--67},
  year = {2019},
  url = {https://doi.org/10.1007/s13389-017-0179-0},
  doi = {10.1007/s13389-017-0179-0},
  timestamp = {Wed, 29 May 2019 01:00:00 +0200},
  biburl = {https://dblp.org/rec/journals/jce/SahaC19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
Saha, Dhiman and Chowdhury, Dipanwita Roy ▲ J. Cryptographic Engineering, Volume:9-1, Pages:53–67, 2019

https://doi.org/10.1007/978-3-030-21568-2_3

@inproceedings{DBLP:conf/acns/BanikBJLLMRSS19,
  author = {Banik, Subhadeep and Bossert, Jannis and Jana, Amit and List, Eik and Lucks, Stefan and Meier, Willi and Rahman, Mostafizar and Saha, Dhiman and Sasaki, Yu},
  editor = {Deng, Robert H. and Gauthier{-}Uma{\~{n}}a, Val{\'{e}}rie and Ochoa, Mart{\'{\i}}n and Yung, Moti},
  title = {Cryptanalysis of ForkAES},
  booktitle = {Applied Cryptography and Network Security - 17th International Conference,
                 {ACNS} 2019, Bogota, Colombia, June 5-7, 2019, Proceedings},
  series = {Lecture Notes in Computer Science},
  volume = {11464},
  pages = {43--63},
  publisher = {Springer},
  year = {2019},
  url = {https://doi.org/10.1007/978-3-030-21568-2\_3},
  doi = {10.1007/978-3-030-21568-2\_3},
  timestamp = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl = {https://dblp.org/rec/conf/acns/BanikBJLLMRSS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
Banik, Subhadeep and Bossert, Jannis and Jana, Amit and List, Eik and Lucks, Stefan and Meier, Willi and Rahman, Mostafizar and Saha, Dhiman and Sasaki, Yu ▲ Applied Cryptography and Network Security - 17th International Conference, ACNS 2019, Bogota, Colombia, June 5-7, 2019, Proceedings, Volume:11464-, Pages:43–63, 2019

https://doi.org/10.1007/978-3-030-35423-7_18

@inproceedings{DBLP:conf/indocrypt/SarkarMS19,
  author = {Sarkar, Sumanta and Mandal, Kalikinkar and Saha, Dhiman},
  editor = {Hao, Feng and Ruj, Sushmita and Gupta, Sourav Sen},
  title = {On the Relationship Between Resilient Boolean Functions and Linear
                 Branch Number of S-Boxes},
  booktitle = {Progress in Cryptology - {INDOCRYPT} 2019 - 20th International Conference
                 on Cryptology in India, Hyderabad, India, December 15-18, 2019, Proceedings},
  series = {Lecture Notes in Computer Science},
  volume = {11898},
  pages = {361--374},
  publisher = {Springer},
  year = {2019},
  url = {https://doi.org/10.1007/978-3-030-35423-7\_18},
  doi = {10.1007/978-3-030-35423-7\_18},
  timestamp = {Thu, 12 Dec 2019 16:07:27 +0100},
  biburl = {https://dblp.org/rec/conf/indocrypt/SarkarMS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
Sarkar, Sumanta and Mandal, Kalikinkar and Saha, Dhiman ▲ Progress in Cryptology - INDOCRYPT 2019 - 20th International Conference on Cryptology in India, Hyderabad, India, December 15-18, 2019, Proceedings, Volume:11898-, Pages:361–374, 2019

@article{DBLP:journals/iacr/BanikBJLLMRSS19,
  author = {Banik, Subhadeep and Bossert, Jannis and Jana, Amit and List, Eik and Lucks, Stefan and Meier, Willi and Rahman, Mostafizar and Saha, Dhiman and Sasaki, Yu},
  title = {Cryptanalysis of ForkAES},
  journal = {{IACR} Cryptol. ePrint Arch.},
  volume = {2019},
  pages = {289},
  year = {2019},
  url = {https://eprint.iacr.org/2019/289},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl = {https://dblp.org/rec/journals/iacr/BanikBJLLMRSS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
Banik, Subhadeep and Bossert, Jannis and Jana, Amit and List, Eik and Lucks, Stefan and Meier, Willi and Rahman, Mostafizar and Saha, Dhiman and Sasaki, Yu ▲ IACR Cryptol. ePrint Arch., Volume:2019-, Pages:289, 2019

@article{DBLP:journals/iacr/BaksiSS19,
  author = {Baksi, Anubhab and Saha, Dhiman and Sarkar, Sumanta},
  title = {To Infect Or Not To Infect: {A} Critical Analysis Of Infective Countermeasures
                 In Fault Attacks},
  journal = {{IACR} Cryptol. ePrint Arch.},
  volume = {2019},
  pages = {355},
  year = {2019},
  url = {https://eprint.iacr.org/2019/355},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl = {https://dblp.org/rec/journals/iacr/BaksiSS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
Baksi, Anubhab and Saha, Dhiman and Sarkar, Sumanta ▲ IACR Cryptol. ePrint Arch., Volume:2019-, Pages:355, 2019

@article{DBLP:journals/iacr/RahmanS019,
  author = {Rahman, Mostafizar and Saha, Dhiman and Paul, Goutam},
  title = {Iterated Truncated Differential for Internal Keyed Permutation of
                 FlexAEAD},
  journal = {{IACR} Cryptol. ePrint Arch.},
  volume = {2019},
  pages = {539},
  year = {2019},
  url = {https://eprint.iacr.org/2019/539},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl = {https://dblp.org/rec/journals/iacr/RahmanS019.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
Rahman, Mostafizar and Saha, Dhiman and Paul, Goutam ▲ IACR Cryptol. ePrint Arch., Volume:2019-, Pages:539, 2019

@article{DBLP:journals/iacr/JanaSP19,
  author = {Jana, Amit and Saha, Dhiman and Paul, Goutam},
  title = {Differential Fault Analysis of {NORX}},
  journal = {{IACR} Cryptol. ePrint Arch.},
  volume = {2019},
  pages = {760},
  year = {2019},
  url = {https://eprint.iacr.org/2019/760},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl = {https://dblp.org/rec/journals/iacr/JanaSP19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
Jana, Amit and Saha, Dhiman and Paul, Goutam ▲ IACR Cryptol. ePrint Arch., Volume:2019-, Pages:760, 2019

@article{DBLP:journals/iacr/SarkarMS19,
  author = {Sarkar, Sumanta and Mandal, Kalikinkar and Saha, Dhiman},
  title = {On the Relationship between Resilient Boolean Functions and Linear
                 Branch Number of S-boxes},
  journal = {{IACR} Cryptol. ePrint Arch.},
  volume = {2019},
  pages = {1427},
  year = {2019},
  url = {https://eprint.iacr.org/2019/1427},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl = {https://dblp.org/rec/journals/iacr/SarkarMS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
Sarkar, Sumanta and Mandal, Kalikinkar and Saha, Dhiman ▲ IACR Cryptol. ePrint Arch., Volume:2019-, Pages:1427, 2019

https://doi.org/10.13154/tosc.v2018.i4.102-127

@article{DBLP:journals/tosc/SahaR018,
  author = {Saha, Dhiman and Rahman, Mostafizar and Paul, Goutam},
  title = {New Yoyo Tricks with AES-based Permutations},
  journal = {{IACR} Trans. Symmetric Cryptol.},
  volume = {2018},
  number = {4},
  pages = {102--127},
  year = {2018},
  url = {https://doi.org/10.13154/tosc.v2018.i4.102-127},
  doi = {10.13154/tosc.v2018.i4.102-127},
  timestamp = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl = {https://dblp.org/rec/journals/tosc/SahaR018.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
Saha, Dhiman and Rahman, Mostafizar and Paul, Goutam ▲ IACR Trans. Symmetric Cryptol., Volume:2018-4, Pages:102–127, 2018

https://doi.org/10.1504/IJACT.2017.10007295

@article{DBLP:journals/ijact/GhoshSSC17,
  author = {Ghosh, Shamit and Saha, Dhiman and Sengupta, Abhrajit and Chowdhury, Dipanwita Roy},
  title = {Preventing fault attacks using fault randomisation with a case study
                 on {AES}},
  journal = {{IJACT}},
  volume = {3},
  number = {3},
  pages = {225--235},
  year = {2017},
  url = {https://doi.org/10.1504/IJACT.2017.10007295},
  doi = {10.1504/IJACT.2017.10007295},
  timestamp = {Mon, 09 Oct 2017 01:00:00 +0200},
  biburl = {https://dblp.org/rec/journals/ijact/GhoshSSC17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
Ghosh, Shamit and Saha, Dhiman and Sengupta, Abhrajit and Chowdhury, Dipanwita Roy ▲ IJACT, Volume:3-3, Pages:225–235, 2017

https://doi.org/10.1007/s41635-017-0010-5

@article{DBLP:journals/jhss/SahaKMC17,
  author = {Saha, Dhiman and Kakarla, Sourya and Mandava, Srinath and Chowdhury, Dipanwita Roy},
  title = {Gain: Practical Key-Recovery Attacks on Round-Reduced {PAEQ}},
  journal = {J. Hardware and Systems Security},
  volume = {1},
  number = {3},
  pages = {282--296},
  year = {2017},
  url = {https://doi.org/10.1007/s41635-017-0010-5},
  doi = {10.1007/s41635-017-0010-5},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl = {https://dblp.org/rec/journals/jhss/SahaKMC17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
Saha, Dhiman and Kakarla, Sourya and Mandava, Srinath and Chowdhury, Dipanwita Roy ▲ J. Hardware and Systems Security, Volume:1-3, Pages:282–296, 2017

https://doi.org/10.13154/tosc.v2017.i1.240-258

@article{DBLP:journals/tosc/SahaKC17,
  author = {Saha, Dhiman and Kuila, Sukhendu and Chowdhury, Dipanwita Roy},
  title = {SymSum: Symmetric-Sum Distinguishers Against Round Reduced {SHA3}},
  journal = {{IACR} Trans. Symmetric Cryptol.},
  volume = {2017},
  number = {1},
  pages = {240--258},
  year = {2017},
  url = {https://doi.org/10.13154/tosc.v2017.i1.240-258},
  doi = {10.13154/tosc.v2017.i1.240-258},
  timestamp = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl = {https://dblp.org/rec/journals/tosc/SahaKC17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
Saha, Dhiman and Kuila, Sukhendu and Chowdhury, Dipanwita Roy ▲ IACR Trans. Symmetric Cryptol., Volume:2017-1, Pages:240–258, 2017

https://doi.org/10.1007/978-981-10-5421-1_6

@inproceedings{DBLP:conf/atis/KakarlaMSC17,
  author = {Kakarla, Sourya and Mandava, Srinath and Saha, Dhiman and Chowdhury, Dipanwita Roy},
  editor = {Batten, Lynn and Kim, Dong Seong and Zhang, Xuyun and Li, Gang},
  title = {On the Practical Implementation of Impossible Differential Cryptanalysis
                 on Reduced-Round {AES}},
  booktitle = {Applications and Techniques in Information Security - 8th International
                 Conference, {ATIS} 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings},
  series = {Communications in Computer and Information Science},
  volume = {719},
  pages = {58--72},
  publisher = {Springer},
  year = {2017},
  url = {https://doi.org/10.1007/978-981-10-5421-1\_6},
  doi = {10.1007/978-981-10-5421-1\_6},
  timestamp = {Mon, 21 Oct 2019 09:19:25 +0200},
  biburl = {https://dblp.org/rec/conf/atis/KakarlaMSC17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
Kakarla, Sourya and Mandava, Srinath and Saha, Dhiman and Chowdhury, Dipanwita Roy ▲ Applications and Techniques in Information Security - 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings, Volume:719-, Pages:58–72, 2017

@article{DBLP:journals/iacr/SahaKC17,
  author = {Saha, Dhiman and Kuila, Sukhendu and Chowdhury, Dipanwita Roy},
  title = {SymSum: Symmetric-Sum Distinguishers Against Round Reduced {SHA3}},
  journal = {{IACR} Cryptol. ePrint Arch.},
  volume = {2017},
  pages = {165},
  year = {2017},
  url = {http://eprint.iacr.org/2017/165},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl = {https://dblp.org/rec/journals/iacr/SahaKC17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
Saha, Dhiman and Kuila, Sukhendu and Chowdhury, Dipanwita Roy ▲ IACR Cryptol. ePrint Arch., Volume:2017-, Pages:165, 2017

https://doi.org/10.1007/978-3-662-53140-2_28

@inproceedings{DBLP:conf/ches/SahaC16,
  author = {Saha, Dhiman and Chowdhury, Dipanwita Roy},
  editor = {Gierlichs, Benedikt and Poschmann, Axel Y.},
  title = {EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis
                 with a Case-Study on {PAEQ}},
  booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International
                 Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings},
  series = {Lecture Notes in Computer Science},
  volume = {9813},
  pages = {581--601},
  publisher = {Springer},
  year = {2016},
  url = {https://doi.org/10.1007/978-3-662-53140-2\_28},
  doi = {10.1007/978-3-662-53140-2\_28},
  timestamp = {Tue, 14 May 2019 10:00:47 +0200},
  biburl = {https://dblp.org/rec/conf/ches/SahaC16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
Saha, Dhiman and Chowdhury, Dipanwita Roy ▲ Cryptographic Hardware and Embedded Systems - CHES 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings, Volume:9813-, Pages:581–601, 2016

https://doi.org/10.1007/978-3-662-52993-5_27

@inproceedings{DBLP:conf/fse/BouraCLPSSS16,
  author = {Boura, Christina and Chakraborti, Avik and Leurent, Ga{\"{e}}tan and Paul, Goutam and Saha, Dhiman and Soleimany, Hadi and Suder, Valentin},
  editor = {Peyrin, Thomas},
  title = {Key Recovery Attack Against 2.5-Round {\textbackslash}pi -Cipher},
  booktitle = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
                 Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  series = {Lecture Notes in Computer Science},
  volume = {9783},
  pages = {535--553},
  publisher = {Springer},
  year = {2016},
  url = {https://doi.org/10.1007/978-3-662-52993-5\_27},
  doi = {10.1007/978-3-662-52993-5\_27},
  timestamp = {Fri, 27 Mar 2020 08:58:25 +0100},
  biburl = {https://dblp.org/rec/conf/fse/BouraCLPSSS16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
Boura, Christina and Chakraborti, Avik and Leurent, Gaëtan and Paul, Goutam and Saha, Dhiman and Soleimany, Hadi and Suder, Valentin ▲ Fast Software Encryption - 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers, Volume:9783-, Pages:535–553, 2016

https://doi.org/10.1007/978-3-319-49445-6_11

@inproceedings{DBLP:conf/space/SahaKMC16,
  author = {Saha, Dhiman and Kakarla, Sourya and Mandava, Srinath and Chowdhury, Dipanwita Roy},
  editor = {Carlet, Claude and Hasan, M. Anwar and Saraswat, Vishal},
  title = {Gain: Practical Key-Recovery Attacks on Round-reduced {PAEQ}},
  booktitle = {Security, Privacy, and Applied Cryptography Engineering - 6th International
                 Conference, {SPACE} 2016, Hyderabad, India, December 14-18, 2016,
                 Proceedings},
  series = {Lecture Notes in Computer Science},
  volume = {10076},
  pages = {194--210},
  publisher = {Springer},
  year = {2016},
  url = {https://doi.org/10.1007/978-3-319-49445-6\_11},
  doi = {10.1007/978-3-319-49445-6\_11},
  timestamp = {Tue, 14 May 2019 10:00:40 +0200},
  biburl = {https://dblp.org/rec/conf/space/SahaKMC16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
Saha, Dhiman and Kakarla, Sourya and Mandava, Srinath and Chowdhury, Dipanwita Roy ▲ Security, Privacy, and Applied Cryptography Engineering - 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings, Volume:10076-, Pages:194–210, 2016

@article{DBLP:journals/iacr/BouraCLPSSS16,
  author = {Boura, Christina and Chakraborti, Avik and Leurent, Ga{\"{e}}tan and Paul, Goutam and Saha, Dhiman and Soleimany, Hadi and Suder, Valentin},
  title = {Key Recovery Attack against 2.5-round pi-Cipher},
  journal = {{IACR} Cryptol. ePrint Arch.},
  volume = {2016},
  pages = {502},
  year = {2016},
  url = {http://eprint.iacr.org/2016/502},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl = {https://dblp.org/rec/journals/iacr/BouraCLPSSS16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
Boura, Christina and Chakraborti, Avik and Leurent, Gaëtan and Paul, Goutam and Saha, Dhiman and Soleimany, Hadi and Suder, Valentin ▲ IACR Cryptol. ePrint Arch., Volume:2016-, Pages:502, 2016

@article{DBLP:journals/iacr/SahaC16,
  author = {Saha, Dhiman and Chowdhury, Dipanwita Roy},
  title = {EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis
                 with a Case-Study on {PAEQ}},
  journal = {{IACR} Cryptol. ePrint Arch.},
  volume = {2016},
  pages = {623},
  year = {2016},
  url = {http://eprint.iacr.org/2016/623},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl = {https://dblp.org/rec/journals/iacr/SahaC16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
Saha, Dhiman and Chowdhury, Dipanwita Roy ▲ IACR Cryptol. ePrint Arch., Volume:2016-, Pages:623, 2016

https://doi.org/10.1007/978-3-319-19962-7_20

@inproceedings{DBLP:conf/acisp/GhoshSSC15,
  author = {Ghosh, Shamit and Saha, Dhiman and Sengupta, Abhrajit and Chowdhury, Dipanwita Roy},
  editor = {Foo, Ernest and Stebila, Douglas},
  title = {Preventing Fault Attacks Using Fault Randomization with a Case Study
                 on {AES}},
  booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series = {Lecture Notes in Computer Science},
  volume = {9144},
  pages = {343--355},
  publisher = {Springer},
  year = {2015},
  url = {https://doi.org/10.1007/978-3-319-19962-7\_20},
  doi = {10.1007/978-3-319-19962-7\_20},
  timestamp = {Tue, 14 May 2019 10:00:46 +0200},
  biburl = {https://dblp.org/rec/conf/acisp/GhoshSSC15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
Ghosh, Shamit and Saha, Dhiman and Sengupta, Abhrajit and Chowdhury, Dipanwita Roy ▲ Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings, Volume:9144-, Pages:343–355, 2015

https://doi.org/10.1109/HST.2015.7140246

@inproceedings{DBLP:conf/host/SahaC15,
  author = {Saha, Dhiman and Chowdhury, Dipanwita Roy},
  title = {Diagonal fault analysis of Gr{\(\oslash\)}stl in dedicated {MAC} mode},
  booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
                 {HOST} 2015, Washington, DC, USA, 5-7 May, 2015},
  pages = {100--105},
  publisher = {{IEEE} Computer Society},
  year = {2015},
  url = {https://doi.org/10.1109/HST.2015.7140246},
  doi = {10.1109/HST.2015.7140246},
  timestamp = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl = {https://dblp.org/rec/conf/host/SahaC15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
Saha, Dhiman and Chowdhury, Dipanwita Roy ▲ IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015, Volume:-, Pages:100–105, 2015

https://doi.org/10.1007/978-3-319-31301-6_24

@inproceedings{DBLP:conf/sacrypt/SahaC15,
  author = {Saha, Dhiman and Chowdhury, Dipanwita Roy},
  editor = {Dunkelman, Orr and Keliher, Liam},
  title = {Scope: On the Side Channel Vulnerability of Releasing Unverified Plaintexts},
  booktitle = {Selected Areas in Cryptography - {SAC} 2015 - 22nd International Conference,
                 Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers},
  series = {Lecture Notes in Computer Science},
  volume = {9566},
  pages = {417--438},
  publisher = {Springer},
  year = {2015},
  url = {https://doi.org/10.1007/978-3-319-31301-6\_24},
  doi = {10.1007/978-3-319-31301-6\_24},
  timestamp = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl = {https://dblp.org/rec/conf/sacrypt/SahaC15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
Saha, Dhiman and Chowdhury, Dipanwita Roy ▲ Selected Areas in Cryptography - SAC 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers, Volume:9566-, Pages:417–438, 2015

https://doi.org/10.1007/978-3-319-11520-7_8

@inproceedings{DBLP:conf/acri/GhoshSSC14,
  author = {Ghosh, Shamit and Sengupta, Abhrajit and Saha, Dhiman and Chowdhury, Dipanwita Roy},
  editor = {Was, Jaroslaw and Sirakoulis, Georgios Ch. and Bandini, Stefania},
  title = {A Scalable Method for Constructing Non-linear Cellular Automata with
                 Period 2 n - 1},
  booktitle = {Cellular Automata - 11th International Conference on Cellular Automata
                 for Research and Industry, {ACRI} 2014, Krakow, Poland, September
                 22-25, 2014. Proceedings},
  series = {Lecture Notes in Computer Science},
  volume = {8751},
  pages = {65--74},
  publisher = {Springer},
  year = {2014},
  url = {https://doi.org/10.1007/978-3-319-11520-7\_8},
  doi = {10.1007/978-3-319-11520-7\_8},
  timestamp = {Tue, 14 May 2019 10:00:44 +0200},
  biburl = {https://dblp.org/rec/conf/acri/GhoshSSC14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
Ghosh, Shamit and Sengupta, Abhrajit and Saha, Dhiman and Chowdhury, Dipanwita Roy ▲ Cellular Automata - 11th International Conference on Cellular Automata for Research and Industry, ACRI 2014, Krakow, Poland, September 22-25, 2014. Proceedings, Volume:8751-, Pages:65–74, 2014

https://doi.org/10.1007/978-3-319-06734-6_6

@inproceedings{DBLP:conf/africacrypt/KuilaSPC14,
  author = {Kuila, Sukhendu and Saha, Dhiman and Pal, Madhumangal and Chowdhury, Dipanwita Roy},
  editor = {Pointcheval, David and Vergnaud, Damien},
  title = {Practical Distinguishers against 6-Round Keccak-f Exploiting Self-Symmetry},
  booktitle = {Progress in Cryptology - {AFRICACRYPT} 2014 - 7th International Conference
                 on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings},
  series = {Lecture Notes in Computer Science},
  volume = {8469},
  pages = {88--108},
  publisher = {Springer},
  year = {2014},
  url = {https://doi.org/10.1007/978-3-319-06734-6\_6},
  doi = {10.1007/978-3-319-06734-6\_6},
  timestamp = {Tue, 14 May 2019 10:00:52 +0200},
  biburl = {https://dblp.org/rec/conf/africacrypt/KuilaSPC14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
Kuila, Sukhendu and Saha, Dhiman and Pal, Madhumangal and Chowdhury, Dipanwita Roy ▲ Progress in Cryptology - AFRICACRYPT 2014 - 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings, Volume:8469-, Pages:88–108, 2014

https://doi.org/10.1007/978-3-319-13039-2_12

@inproceedings{DBLP:conf/indocrypt/SahaKC14,
  author = {Saha, Dhiman and Kuila, Sukhendu and Chowdhury, Dipanwita Roy},
  editor = {Meier, Willi and Mukhopadhyay, Debdeep},
  title = {EscApe: Diagonal Fault Analysis of {APE}},
  booktitle = {Progress in Cryptology - {INDOCRYPT} 2014 - 15th International Conference
                 on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings},
  series = {Lecture Notes in Computer Science},
  volume = {8885},
  pages = {197--216},
  publisher = {Springer},
  year = {2014},
  url = {https://doi.org/10.1007/978-3-319-13039-2\_12},
  doi = {10.1007/978-3-319-13039-2\_12},
  timestamp = {Tue, 14 May 2019 10:00:51 +0200},
  biburl = {https://dblp.org/rec/conf/indocrypt/SahaKC14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
Saha, Dhiman and Kuila, Sukhendu and Chowdhury, Dipanwita Roy ▲ Progress in Cryptology - INDOCRYPT 2014 - 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings, Volume:8885-, Pages:197–216, 2014

https://doi.org/10.1007/978-3-319-12060-7_5

@inproceedings{DBLP:conf/space/KuilaSPC14,
  author = {Kuila, Sukhendu and Saha, Dhiman and Pal, Madhumangal and Chowdhury, Dipanwita Roy},
  editor = {Chakraborty, Rajat Subhra and Matyas, Vashek and Schaumont, Patrick},
  title = {{CASH:} Cellular Automata Based Parameterized Hash},
  booktitle = {Security, Privacy, and Applied Cryptography Engineering - 4th International
                 Conference, {SPACE} 2014, Pune, India, October 18-22, 2014. Proceedings},
  series = {Lecture Notes in Computer Science},
  volume = {8804},
  pages = {59--75},
  publisher = {Springer},
  year = {2014},
  url = {https://doi.org/10.1007/978-3-319-12060-7\_5},
  doi = {10.1007/978-3-319-12060-7\_5},
  timestamp = {Tue, 14 May 2019 10:00:40 +0200},
  biburl = {https://dblp.org/rec/conf/space/KuilaSPC14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
Kuila, Sukhendu and Saha, Dhiman and Pal, Madhumangal and Chowdhury, Dipanwita Roy ▲ Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings, Volume:8804-, Pages:59–75, 2014

https://doi.org/10.1007/978-3-319-12060-7_11

@inproceedings{DBLP:conf/space/SenguptaSGMC14,
  author = {Sengupta, Abhrajit and Saha, Dhiman and Ghosh, Shamit and Mehta, Deval and Chowdhury, Dipanwita Roy},
  editor = {Chakraborty, Rajat Subhra and Matyas, Vashek and Schaumont, Patrick},
  title = {{AEC:} {A} Practical Scheme for Authentication with Error Correction},
  booktitle = {Security, Privacy, and Applied Cryptography Engineering - 4th International
                 Conference, {SPACE} 2014, Pune, India, October 18-22, 2014. Proceedings},
  series = {Lecture Notes in Computer Science},
  volume = {8804},
  pages = {155--170},
  publisher = {Springer},
  year = {2014},
  url = {https://doi.org/10.1007/978-3-319-12060-7\_11},
  doi = {10.1007/978-3-319-12060-7\_11},
  timestamp = {Tue, 14 May 2019 10:00:40 +0200},
  biburl = {https://dblp.org/rec/conf/space/SenguptaSGMC14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
Sengupta, Abhrajit and Saha, Dhiman and Ghosh, Shamit and Mehta, Deval and Chowdhury, Dipanwita Roy ▲ Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings, Volume:8804-, Pages:155–170, 2014

https://doi.org/10.1007/978-3-642-25578-6_3

@inproceedings{DBLP:conf/indocrypt/SahaMC11,
  author = {Saha, Dhiman and Mukhopadhyay, Debdeep and Chowdhury, Dipanwita Roy},
  editor = {Bernstein, Daniel J. and Chatterjee, Sanjit},
  title = {{PKDPA:} An Enhanced Probabilistic Differential Power Attack Methodology},
  booktitle = {Progress in Cryptology - {INDOCRYPT} 2011 - 12th International Conference
                 on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings},
  series = {Lecture Notes in Computer Science},
  volume = {7107},
  pages = {3--21},
  publisher = {Springer},
  year = {2011},
  url = {https://doi.org/10.1007/978-3-642-25578-6\_3},
  doi = {10.1007/978-3-642-25578-6\_3},
  timestamp = {Tue, 14 May 2019 10:00:51 +0200},
  biburl = {https://dblp.org/rec/conf/indocrypt/SahaMC11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
Saha, Dhiman and Mukhopadhyay, Debdeep and Chowdhury, Dipanwita Roy ▲ Progress in Cryptology - INDOCRYPT 2011 - 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings, Volume:7107-, Pages:3–21, 2011

@article{DBLP:journals/iacr/SahaMC09,
  author = {Saha, Dhiman and Mukhopadhyay, Debdeep and Chowdhury, Dipanwita Roy},
  title = {A Diagonal Fault Attack on the Advanced Encryption Standard},
  journal = {{IACR} Cryptol. ePrint Arch.},
  volume = {2009},
  pages = {581},
  year = {2009},
  url = {http://eprint.iacr.org/2009/581},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl = {https://dblp.org/rec/journals/iacr/SahaMC09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
Saha, Dhiman and Mukhopadhyay, Debdeep and Chowdhury, Dipanwita Roy ▲ IACR Cryptol. ePrint Arch., Volume:2009-, Pages:581, 2009

https://doi.org/10.1007/978-3-540-89754-5_18

@inproceedings{DBLP:conf/indocrypt/AgrawalKSM08,
  author = {Agrawal, Mukesh and Karmakar, Sandip and Saha, Dhiman and Mukhopadhyay, Debdeep},
  editor = {Chowdhury, Dipanwita Roy and Rijmen, Vincent and Das, Abhijit},
  title = {Scan Based Side Channel Attacks on Stream Ciphers and Their Counter-Measures},
  booktitle = {Progress in Cryptology - {INDOCRYPT} 2008, 9th International Conference
                 on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings},
  series = {Lecture Notes in Computer Science},
  volume = {5365},
  pages = {226--238},
  publisher = {Springer},
  year = {2008},
  url = {https://doi.org/10.1007/978-3-540-89754-5\_18},
  doi = {10.1007/978-3-540-89754-5\_18},
  timestamp = {Tue, 14 May 2019 10:00:51 +0200},
  biburl = {https://dblp.org/rec/conf/indocrypt/AgrawalKSM08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
Agrawal, Mukesh and Karmakar, Sandip and Saha, Dhiman and Mukhopadhyay, Debdeep ▲ Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings, Volume:5365-, Pages:226–238, 2008

https://doi.org/10.1007/978-3-540-73458-1_3

@inproceedings{DBLP:conf/acisp/BhattacharyaMSC07,
  author = {Bhattacharya, Debojyoti and Mukhopadhyay, Debdeep and Saha, Dhiman and Chowdhury, Dipanwita Roy},
  editor = {Pieprzyk, Josef and Ghodosi, Hossein and Dawson, Ed},
  title = {Strengthening {NLS} Against Crossword Puzzle Attack},
  booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                 2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series = {Lecture Notes in Computer Science},
  volume = {4586},
  pages = {29--44},
  publisher = {Springer},
  year = {2007},
  url = {https://doi.org/10.1007/978-3-540-73458-1\_3},
  doi = {10.1007/978-3-540-73458-1\_3},
  timestamp = {Tue, 14 May 2019 10:00:46 +0200},
  biburl = {https://dblp.org/rec/conf/acisp/BhattacharyaMSC07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
Bhattacharya, Debojyoti and Mukhopadhyay, Debdeep and Saha, Dhiman and Chowdhury, Dipanwita Roy ▲ Information Security and Privacy, 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings, Volume:4586-, Pages:29–44, 2007