
@article{NJPS22,
author = {Nath, Anirban and Jana, Amit and Paul, Goutam and Saha, Dhiman},
title = {Differential Fault Analysis of {NORX} Using Variants of the Coupon Collector Problem},
journal = {Journal of Cryptographic Engineering},
publisher = {{Springer}},
year = {2022},
abbr = {JCEN}
}
Nath, Anirban and Jana, Amit and Paul, Goutam and Saha, Dhiman ▲ Journal of Cryptographic Engineering, Volume:-, Pages:, 2022

@article{Mandal2021,
author = {Mandal, Kalikinkar and Saha, Dhiman and Sarkar, Sumanta and Todo, Yosuke},
title = {Sycon: {A} New Milestone in Designing ASCON-like Permutations},
journal = {Journal of Cryptographic Engineering},
volume = {2190-8516},
year = {2021},
url = {https://doi.org/10.1007/s13389-021-00272-9},
abbr = {JCEN}
}
Mandal, Kalikinkar and Saha, Dhiman and Sarkar, Sumanta and Todo, Yosuke ▲ Journal of Cryptographic Engineering, Volume:2190-8516-, Pages:, 2021

@article{DBLP:journals/tosc/RahmanS021,
author = {Rahman, Mostafizar and Saha, Dhiman and Paul, Goutam},
title = {Boomeyong: Embedding Yoyo within Boomerang and its Applications to
Key Recovery Attacks on {AES} and Pholkos},
journal = {{IACR} Trans. Symmetric Cryptol.},
volume = {2021},
number = {3},
pages = {137--169},
year = {2021},
abbr = {ToSC}
}
Rahman, Mostafizar and Saha, Dhiman and Paul, Goutam ▲ IACR Trans. Symmetric Cryptol., Volume:2021-3, Pages:137–169, 2021

@article{DBLP:journals/corr/abs-2103-16360,
author = {Dabholkar, Ahaan and Kakarla, Sourya and Saha, Dhiman},
title = {Looney Tunes: Exposing the Lack of {DRM} Protection in Indian Music
Streaming Services},
journal = {CoRR},
volume = {abs/2103.16360},
year = {2021},
url = {https://arxiv.org/abs/2103.16360},
archiveprefix = {arXiv},
eprint = {2103.16360},
timestamp = {Wed, 07 Apr 2021 15:31:46 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-2103-16360.bib},
bibsource = {dblp computer science bibliography, https://dblp.org},
abbr = {arXiv}
}
Dabholkar, Ahaan and Kakarla, Sourya and Saha, Dhiman ▲ CoRR, Volume:abs/2103.16360-, Pages:, 2021

@article{DBLP:journals/iacr/MandalSST21,
author = {Mandal, Kalikinkar and Saha, Dhiman and Sarkar, Sumanta and Todo, Yosuke},
title = {Sycon: {A} New Milestone in Designing ASCON-like Permutations},
journal = {{IACR} Cryptol. ePrint Arch.},
volume = {2021},
pages = {157},
year = {2021},
url = {https://eprint.iacr.org/2021/157},
timestamp = {Tue, 02 Mar 2021 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/iacr/MandalSST21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org},
abbr = {ePrint}
}
Mandal, Kalikinkar and Saha, Dhiman and Sarkar, Sumanta and Todo, Yosuke ▲ IACR Cryptol. ePrint Arch., Volume:2021-, Pages:157, 2021

https://doi.org/10.1007/s13389-020-00224-9

@article{DBLP:journals/JCE/BaksiA20,
author = {Baksi, Anubhab and Saha, Dhiman and Sarkar, Sumanta},
title = {To infect or not to infect: a critical analysis of infective countermeasures in fault attacks},
journal = {{JCEN}Journal of Cryptographic Engineering},
year = {2020},
url = {https://doi.org/10.1007/s13389-020-00224-9},
doi = {10.1007/s13389-020-00224-9},
timestamp = {Wed, 10 Jun 2020 01:00:00 +0200},
note = {Available On-line}
}
Baksi, Anubhab and Saha, Dhiman and Sarkar, Sumanta ▲ JCENJournal of Cryptographic Engineering, Volume:-, Pages:, 2020

@conference{DBLP:conf/ACISP/BaksiA2020,
author = {Baksi, Anubhab and Kumar, Vinay B. Y. and Karmakar, Banashri and Bhasin, Shivam and Saha, Dhiman and Chattopadhya, Anupam},
title = { A Novel Duplication Based Countermeasure To Statistical Ineffective Fault Analysis},
booktitle = {Information Security and Privacy - 25th Australasian Conference, {ACISP}
2020, Perth, Australia, November 25--27, 2020, Proceedings},
year = {2020}
}
Baksi, Anubhab and Kumar, Vinay B. Y. and Karmakar, Banashri and Bhasin, Shivam and Saha, Dhiman and Chattopadhya, Anupam ▲ Information Security and Privacy - 25th Australasian Conference, ACISP 2020, Perth, Australia, November 25–27, 2020, Proceedings, Volume:-, Pages:, 2020

@conference{DBLP:conf/AFRICACRYPT/SuryawanshiS20,
author = {Suryawanshi, Sahiba and Saha, Dhiman and Sachan, Satyam},
title = { New Results on the SymSum Distinguisher on Round-Reduced SHA-3},
booktitle = {Progress in Cryptology - {AFRICACRYPT} 2020 - 12th International Conference
on Cryptology in Africa, Cairo, Egypt, July 22-22, 2020. Proceedings},
year = {2020}
}
Suryawanshi, Sahiba and Saha, Dhiman and Sachan, Satyam ▲ Progress in Cryptology - AFRICACRYPT 2020 - 12th International Conference on Cryptology in Africa, Cairo, Egypt, July 22-22, 2020. Proceedings, Volume:-, Pages:, 2020

@conference{DBLP:conf/AFRICACRYPT/RahmanM2020,
author = {Rahman, Mostafizar and Saha, Dhiman and Paul, Goutam},
title = { Cryptanalysis of FlexAEAD},
booktitle = {Progress in Cryptology - {AFRICACRYPT} 2020 - 12th International Conference
on Cryptology in Africa, Cairo, Egypt, July 22-22, 2020. Proceedings},
year = {2020}
}
Rahman, Mostafizar and Saha, Dhiman and Paul, Goutam ▲ Progress in Cryptology - AFRICACRYPT 2020 - 12th International Conference on Cryptology in Africa, Cairo, Egypt, July 22-22, 2020. Proceedings, Volume:-, Pages:, 2020

@conference{DBLP:conf/HOST/AIKATA20,
author = {Aikata and Karmakar, Banashri and Saha, Dhiman},
title = { DESIV: Differential Fault Analysis of SIV-Rijndael256 with a Single Fault},
booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
{HOST} 2020, San Jose, CA, USA, December 6-9, 2020},
year = {2020}
}
Aikata and Karmakar, Banashri and Saha, Dhiman ▲ IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2020, San Jose, CA, USA, December 6-9, 2020, Volume:-, Pages:, 2020

https://doi.org/10.1049/iet-ifs.2018.5033

@article{DBLP:journals/iet-ifs/SahaKC19,
author = {Saha, Dhiman and Kakarla, Sourya and Chowdhury, Dipanwita Roy},
title = {Dinamite: internal differential match-in-the-end attack on eight-round
{PAEQ}},
journal = {{IET} Information Security},
volume = {13},
number = {4},
pages = {378--388},
year = {2019},
url = {https://doi.org/10.1049/iet-ifs.2018.5033},
doi = {10.1049/iet-ifs.2018.5033},
timestamp = {Wed, 26 Jun 2019 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iet-ifs/SahaKC19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Saha, Dhiman and Kakarla, Sourya and Chowdhury, Dipanwita Roy ▲ IET Information Security, Volume:13-4, Pages:378–388, 2019

https://doi.org/10.1007/s13389-017-0179-0

@article{DBLP:journals/jce/SahaC19,
author = {Saha, Dhiman and Chowdhury, Dipanwita Roy},
title = {Internal differential fault analysis of parallelizable ciphers in
the counter-mode},
journal = {J. Cryptographic Engineering},
volume = {9},
number = {1},
pages = {53--67},
year = {2019},
url = {https://doi.org/10.1007/s13389-017-0179-0},
doi = {10.1007/s13389-017-0179-0},
timestamp = {Wed, 29 May 2019 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/jce/SahaC19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Saha, Dhiman and Chowdhury, Dipanwita Roy ▲ J. Cryptographic Engineering, Volume:9-1, Pages:53–67, 2019

https://doi.org/10.1007/978-3-030-21568-2_3

@inproceedings{DBLP:conf/acns/BanikBJLLMRSS19,
author = {Banik, Subhadeep and Bossert, Jannis and Jana, Amit and List, Eik and Lucks, Stefan and Meier, Willi and Rahman, Mostafizar and Saha, Dhiman and Sasaki, Yu},
editor = {Deng, Robert H. and Gauthier{-}Uma{\~{n}}a, Val{\'{e}}rie and Ochoa, Mart{\'{\i}}n and Yung, Moti},
title = {Cryptanalysis of ForkAES},
booktitle = {Applied Cryptography and Network Security - 17th International Conference,
{ACNS} 2019, Bogota, Colombia, June 5-7, 2019, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {11464},
pages = {43--63},
publisher = {Springer},
year = {2019},
url = {https://doi.org/10.1007/978-3-030-21568-2\_3},
doi = {10.1007/978-3-030-21568-2\_3},
timestamp = {Fri, 27 Dec 2019 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/acns/BanikBJLLMRSS19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Banik, Subhadeep and Bossert, Jannis and Jana, Amit and List, Eik and Lucks, Stefan and Meier, Willi and Rahman, Mostafizar and Saha, Dhiman and Sasaki, Yu ▲ Applied Cryptography and Network Security - 17th International Conference, ACNS 2019, Bogota, Colombia, June 5-7, 2019, Proceedings, Volume:11464-, Pages:43–63, 2019

https://doi.org/10.1007/978-3-030-35423-7_18

@inproceedings{DBLP:conf/indocrypt/SarkarMS19,
author = {Sarkar, Sumanta and Mandal, Kalikinkar and Saha, Dhiman},
editor = {Hao, Feng and Ruj, Sushmita and Gupta, Sourav Sen},
title = {On the Relationship Between Resilient Boolean Functions and Linear
Branch Number of S-Boxes},
booktitle = {Progress in Cryptology - {INDOCRYPT} 2019 - 20th International Conference
on Cryptology in India, Hyderabad, India, December 15-18, 2019, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {11898},
pages = {361--374},
publisher = {Springer},
year = {2019},
url = {https://doi.org/10.1007/978-3-030-35423-7\_18},
doi = {10.1007/978-3-030-35423-7\_18},
timestamp = {Thu, 12 Dec 2019 16:07:27 +0100},
biburl = {https://dblp.org/rec/conf/indocrypt/SarkarMS19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Sarkar, Sumanta and Mandal, Kalikinkar and Saha, Dhiman ▲ Progress in Cryptology - INDOCRYPT 2019 - 20th International Conference on Cryptology in India, Hyderabad, India, December 15-18, 2019, Proceedings, Volume:11898-, Pages:361–374, 2019

@article{DBLP:journals/iacr/BanikBJLLMRSS19,
author = {Banik, Subhadeep and Bossert, Jannis and Jana, Amit and List, Eik and Lucks, Stefan and Meier, Willi and Rahman, Mostafizar and Saha, Dhiman and Sasaki, Yu},
title = {Cryptanalysis of ForkAES},
journal = {{IACR} Cryptol. ePrint Arch.},
volume = {2019},
pages = {289},
year = {2019},
url = {https://eprint.iacr.org/2019/289},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/BanikBJLLMRSS19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Banik, Subhadeep and Bossert, Jannis and Jana, Amit and List, Eik and Lucks, Stefan and Meier, Willi and Rahman, Mostafizar and Saha, Dhiman and Sasaki, Yu ▲ IACR Cryptol. ePrint Arch., Volume:2019-, Pages:289, 2019

@article{DBLP:journals/iacr/BaksiSS19,
author = {Baksi, Anubhab and Saha, Dhiman and Sarkar, Sumanta},
title = {To Infect Or Not To Infect: {A} Critical Analysis Of Infective Countermeasures
In Fault Attacks},
journal = {{IACR} Cryptol. ePrint Arch.},
volume = {2019},
pages = {355},
year = {2019},
url = {https://eprint.iacr.org/2019/355},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/BaksiSS19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Baksi, Anubhab and Saha, Dhiman and Sarkar, Sumanta ▲ IACR Cryptol. ePrint Arch., Volume:2019-, Pages:355, 2019

@article{DBLP:journals/iacr/RahmanS019,
author = {Rahman, Mostafizar and Saha, Dhiman and Paul, Goutam},
title = {Iterated Truncated Differential for Internal Keyed Permutation of
FlexAEAD},
journal = {{IACR} Cryptol. ePrint Arch.},
volume = {2019},
pages = {539},
year = {2019},
url = {https://eprint.iacr.org/2019/539},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/RahmanS019.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Rahman, Mostafizar and Saha, Dhiman and Paul, Goutam ▲ IACR Cryptol. ePrint Arch., Volume:2019-, Pages:539, 2019

@article{DBLP:journals/iacr/JanaSP19,
author = {Jana, Amit and Saha, Dhiman and Paul, Goutam},
title = {Differential Fault Analysis of {NORX}},
journal = {{IACR} Cryptol. ePrint Arch.},
volume = {2019},
pages = {760},
year = {2019},
url = {https://eprint.iacr.org/2019/760},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/JanaSP19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Jana, Amit and Saha, Dhiman and Paul, Goutam ▲ IACR Cryptol. ePrint Arch., Volume:2019-, Pages:760, 2019

@article{DBLP:journals/iacr/SarkarMS19,
author = {Sarkar, Sumanta and Mandal, Kalikinkar and Saha, Dhiman},
title = {On the Relationship between Resilient Boolean Functions and Linear
Branch Number of S-boxes},
journal = {{IACR} Cryptol. ePrint Arch.},
volume = {2019},
pages = {1427},
year = {2019},
url = {https://eprint.iacr.org/2019/1427},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/SarkarMS19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Sarkar, Sumanta and Mandal, Kalikinkar and Saha, Dhiman ▲ IACR Cryptol. ePrint Arch., Volume:2019-, Pages:1427, 2019

https://doi.org/10.13154/tosc.v2018.i4.102-127

@article{DBLP:journals/tosc/SahaR018,
author = {Saha, Dhiman and Rahman, Mostafizar and Paul, Goutam},
title = {New Yoyo Tricks with AES-based Permutations},
journal = {{IACR} Trans. Symmetric Cryptol.},
volume = {2018},
number = {4},
pages = {102--127},
year = {2018},
url = {https://doi.org/10.13154/tosc.v2018.i4.102-127},
doi = {10.13154/tosc.v2018.i4.102-127},
timestamp = {Tue, 04 Feb 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/tosc/SahaR018.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Saha, Dhiman and Rahman, Mostafizar and Paul, Goutam ▲ IACR Trans. Symmetric Cryptol., Volume:2018-4, Pages:102–127, 2018

https://doi.org/10.1504/IJACT.2017.10007295

@article{DBLP:journals/ijact/GhoshSSC17,
author = {Ghosh, Shamit and Saha, Dhiman and Sengupta, Abhrajit and Chowdhury, Dipanwita Roy},
title = {Preventing fault attacks using fault randomisation with a case study
on {AES}},
journal = {{IJACT}},
volume = {3},
number = {3},
pages = {225--235},
year = {2017},
url = {https://doi.org/10.1504/IJACT.2017.10007295},
doi = {10.1504/IJACT.2017.10007295},
timestamp = {Mon, 09 Oct 2017 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/ijact/GhoshSSC17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Ghosh, Shamit and Saha, Dhiman and Sengupta, Abhrajit and Chowdhury, Dipanwita Roy ▲ IJACT, Volume:3-3, Pages:225–235, 2017

https://doi.org/10.1007/s41635-017-0010-5

@article{DBLP:journals/jhss/SahaKMC17,
author = {Saha, Dhiman and Kakarla, Sourya and Mandava, Srinath and Chowdhury, Dipanwita Roy},
title = {Gain: Practical Key-Recovery Attacks on Round-Reduced {PAEQ}},
journal = {J. Hardware and Systems Security},
volume = {1},
number = {3},
pages = {282--296},
year = {2017},
url = {https://doi.org/10.1007/s41635-017-0010-5},
doi = {10.1007/s41635-017-0010-5},
timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/jhss/SahaKMC17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Saha, Dhiman and Kakarla, Sourya and Mandava, Srinath and Chowdhury, Dipanwita Roy ▲ J. Hardware and Systems Security, Volume:1-3, Pages:282–296, 2017

https://doi.org/10.13154/tosc.v2017.i1.240-258

@article{DBLP:journals/tosc/SahaKC17,
author = {Saha, Dhiman and Kuila, Sukhendu and Chowdhury, Dipanwita Roy},
title = {SymSum: Symmetric-Sum Distinguishers Against Round Reduced {SHA3}},
journal = {{IACR} Trans. Symmetric Cryptol.},
volume = {2017},
number = {1},
pages = {240--258},
year = {2017},
url = {https://doi.org/10.13154/tosc.v2017.i1.240-258},
doi = {10.13154/tosc.v2017.i1.240-258},
timestamp = {Tue, 04 Feb 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/tosc/SahaKC17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Saha, Dhiman and Kuila, Sukhendu and Chowdhury, Dipanwita Roy ▲ IACR Trans. Symmetric Cryptol., Volume:2017-1, Pages:240–258, 2017

https://doi.org/10.1007/978-981-10-5421-1_6

@inproceedings{DBLP:conf/atis/KakarlaMSC17,
author = {Kakarla, Sourya and Mandava, Srinath and Saha, Dhiman and Chowdhury, Dipanwita Roy},
editor = {Batten, Lynn and Kim, Dong Seong and Zhang, Xuyun and Li, Gang},
title = {On the Practical Implementation of Impossible Differential Cryptanalysis
on Reduced-Round {AES}},
booktitle = {Applications and Techniques in Information Security - 8th International
Conference, {ATIS} 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings},
series = {Communications in Computer and Information Science},
volume = {719},
pages = {58--72},
publisher = {Springer},
year = {2017},
url = {https://doi.org/10.1007/978-981-10-5421-1\_6},
doi = {10.1007/978-981-10-5421-1\_6},
timestamp = {Mon, 21 Oct 2019 09:19:25 +0200},
biburl = {https://dblp.org/rec/conf/atis/KakarlaMSC17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Kakarla, Sourya and Mandava, Srinath and Saha, Dhiman and Chowdhury, Dipanwita Roy ▲ Applications and Techniques in Information Security - 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings, Volume:719-, Pages:58–72, 2017

@article{DBLP:journals/iacr/SahaKC17,
author = {Saha, Dhiman and Kuila, Sukhendu and Chowdhury, Dipanwita Roy},
title = {SymSum: Symmetric-Sum Distinguishers Against Round Reduced {SHA3}},
journal = {{IACR} Cryptol. ePrint Arch.},
volume = {2017},
pages = {165},
year = {2017},
url = {http://eprint.iacr.org/2017/165},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/SahaKC17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Saha, Dhiman and Kuila, Sukhendu and Chowdhury, Dipanwita Roy ▲ IACR Cryptol. ePrint Arch., Volume:2017-, Pages:165, 2017

https://doi.org/10.1007/978-3-662-53140-2_28

@inproceedings{DBLP:conf/ches/SahaC16,
author = {Saha, Dhiman and Chowdhury, Dipanwita Roy},
editor = {Gierlichs, Benedikt and Poschmann, Axel Y.},
title = {EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis
with a Case-Study on {PAEQ}},
booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International
Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {9813},
pages = {581--601},
publisher = {Springer},
year = {2016},
url = {https://doi.org/10.1007/978-3-662-53140-2\_28},
doi = {10.1007/978-3-662-53140-2\_28},
timestamp = {Tue, 14 May 2019 10:00:47 +0200},
biburl = {https://dblp.org/rec/conf/ches/SahaC16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Saha, Dhiman and Chowdhury, Dipanwita Roy ▲ Cryptographic Hardware and Embedded Systems - CHES 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings, Volume:9813-, Pages:581–601, 2016

https://doi.org/10.1007/978-3-662-52993-5_27

@inproceedings{DBLP:conf/fse/BouraCLPSSS16,
author = {Boura, Christina and Chakraborti, Avik and Leurent, Ga{\"{e}}tan and Paul, Goutam and Saha, Dhiman and Soleimany, Hadi and Suder, Valentin},
editor = {Peyrin, Thomas},
title = {Key Recovery Attack Against 2.5-Round {\textbackslash}pi -Cipher},
booktitle = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
series = {Lecture Notes in Computer Science},
volume = {9783},
pages = {535--553},
publisher = {Springer},
year = {2016},
url = {https://doi.org/10.1007/978-3-662-52993-5\_27},
doi = {10.1007/978-3-662-52993-5\_27},
timestamp = {Fri, 27 Mar 2020 08:58:25 +0100},
biburl = {https://dblp.org/rec/conf/fse/BouraCLPSSS16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Boura, Christina and Chakraborti, Avik and Leurent, Gaëtan and Paul, Goutam and Saha, Dhiman and Soleimany, Hadi and Suder, Valentin ▲ Fast Software Encryption - 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers, Volume:9783-, Pages:535–553, 2016

https://doi.org/10.1007/978-3-319-49445-6_11

@inproceedings{DBLP:conf/space/SahaKMC16,
author = {Saha, Dhiman and Kakarla, Sourya and Mandava, Srinath and Chowdhury, Dipanwita Roy},
editor = {Carlet, Claude and Hasan, M. Anwar and Saraswat, Vishal},
title = {Gain: Practical Key-Recovery Attacks on Round-reduced {PAEQ}},
booktitle = {Security, Privacy, and Applied Cryptography Engineering - 6th International
Conference, {SPACE} 2016, Hyderabad, India, December 14-18, 2016,
Proceedings},
series = {Lecture Notes in Computer Science},
volume = {10076},
pages = {194--210},
publisher = {Springer},
year = {2016},
url = {https://doi.org/10.1007/978-3-319-49445-6\_11},
doi = {10.1007/978-3-319-49445-6\_11},
timestamp = {Tue, 14 May 2019 10:00:40 +0200},
biburl = {https://dblp.org/rec/conf/space/SahaKMC16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Saha, Dhiman and Kakarla, Sourya and Mandava, Srinath and Chowdhury, Dipanwita Roy ▲ Security, Privacy, and Applied Cryptography Engineering - 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings, Volume:10076-, Pages:194–210, 2016

@article{DBLP:journals/iacr/BouraCLPSSS16,
author = {Boura, Christina and Chakraborti, Avik and Leurent, Ga{\"{e}}tan and Paul, Goutam and Saha, Dhiman and Soleimany, Hadi and Suder, Valentin},
title = {Key Recovery Attack against 2.5-round pi-Cipher},
journal = {{IACR} Cryptol. ePrint Arch.},
volume = {2016},
pages = {502},
year = {2016},
url = {http://eprint.iacr.org/2016/502},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/BouraCLPSSS16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Boura, Christina and Chakraborti, Avik and Leurent, Gaëtan and Paul, Goutam and Saha, Dhiman and Soleimany, Hadi and Suder, Valentin ▲ IACR Cryptol. ePrint Arch., Volume:2016-, Pages:502, 2016

@article{DBLP:journals/iacr/SahaC16,
author = {Saha, Dhiman and Chowdhury, Dipanwita Roy},
title = {EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis
with a Case-Study on {PAEQ}},
journal = {{IACR} Cryptol. ePrint Arch.},
volume = {2016},
pages = {623},
year = {2016},
url = {http://eprint.iacr.org/2016/623},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/SahaC16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Saha, Dhiman and Chowdhury, Dipanwita Roy ▲ IACR Cryptol. ePrint Arch., Volume:2016-, Pages:623, 2016

https://doi.org/10.1007/978-3-319-19962-7_20

@inproceedings{DBLP:conf/acisp/GhoshSSC15,
author = {Ghosh, Shamit and Saha, Dhiman and Sengupta, Abhrajit and Chowdhury, Dipanwita Roy},
editor = {Foo, Ernest and Stebila, Douglas},
title = {Preventing Fault Attacks Using Fault Randomization with a Case Study
on {AES}},
booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {9144},
pages = {343--355},
publisher = {Springer},
year = {2015},
url = {https://doi.org/10.1007/978-3-319-19962-7\_20},
doi = {10.1007/978-3-319-19962-7\_20},
timestamp = {Tue, 14 May 2019 10:00:46 +0200},
biburl = {https://dblp.org/rec/conf/acisp/GhoshSSC15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Ghosh, Shamit and Saha, Dhiman and Sengupta, Abhrajit and Chowdhury, Dipanwita Roy ▲ Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings, Volume:9144-, Pages:343–355, 2015

https://doi.org/10.1109/HST.2015.7140246

@inproceedings{DBLP:conf/host/SahaC15,
author = {Saha, Dhiman and Chowdhury, Dipanwita Roy},
title = {Diagonal fault analysis of Gr{\(\oslash\)}stl in dedicated {MAC} mode},
booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
{HOST} 2015, Washington, DC, USA, 5-7 May, 2015},
pages = {100--105},
publisher = {{IEEE} Computer Society},
year = {2015},
url = {https://doi.org/10.1109/HST.2015.7140246},
doi = {10.1109/HST.2015.7140246},
timestamp = {Wed, 16 Oct 2019 14:14:56 +0200},
biburl = {https://dblp.org/rec/conf/host/SahaC15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Saha, Dhiman and Chowdhury, Dipanwita Roy ▲ IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015, Volume:-, Pages:100–105, 2015

https://doi.org/10.1007/978-3-319-31301-6_24

@inproceedings{DBLP:conf/sacrypt/SahaC15,
author = {Saha, Dhiman and Chowdhury, Dipanwita Roy},
editor = {Dunkelman, Orr and Keliher, Liam},
title = {Scope: On the Side Channel Vulnerability of Releasing Unverified Plaintexts},
booktitle = {Selected Areas in Cryptography - {SAC} 2015 - 22nd International Conference,
Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers},
series = {Lecture Notes in Computer Science},
volume = {9566},
pages = {417--438},
publisher = {Springer},
year = {2015},
url = {https://doi.org/10.1007/978-3-319-31301-6\_24},
doi = {10.1007/978-3-319-31301-6\_24},
timestamp = {Tue, 20 Aug 2019 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/sacrypt/SahaC15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Saha, Dhiman and Chowdhury, Dipanwita Roy ▲ Selected Areas in Cryptography - SAC 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers, Volume:9566-, Pages:417–438, 2015

https://doi.org/10.1007/978-3-319-11520-7_8

@inproceedings{DBLP:conf/acri/GhoshSSC14,
author = {Ghosh, Shamit and Sengupta, Abhrajit and Saha, Dhiman and Chowdhury, Dipanwita Roy},
editor = {Was, Jaroslaw and Sirakoulis, Georgios Ch. and Bandini, Stefania},
title = {A Scalable Method for Constructing Non-linear Cellular Automata with
Period 2 n - 1},
booktitle = {Cellular Automata - 11th International Conference on Cellular Automata
for Research and Industry, {ACRI} 2014, Krakow, Poland, September
22-25, 2014. Proceedings},
series = {Lecture Notes in Computer Science},
volume = {8751},
pages = {65--74},
publisher = {Springer},
year = {2014},
url = {https://doi.org/10.1007/978-3-319-11520-7\_8},
doi = {10.1007/978-3-319-11520-7\_8},
timestamp = {Tue, 14 May 2019 10:00:44 +0200},
biburl = {https://dblp.org/rec/conf/acri/GhoshSSC14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Ghosh, Shamit and Sengupta, Abhrajit and Saha, Dhiman and Chowdhury, Dipanwita Roy ▲ Cellular Automata - 11th International Conference on Cellular Automata for Research and Industry, ACRI 2014, Krakow, Poland, September 22-25, 2014. Proceedings, Volume:8751-, Pages:65–74, 2014

https://doi.org/10.1007/978-3-319-06734-6_6

@inproceedings{DBLP:conf/africacrypt/KuilaSPC14,
author = {Kuila, Sukhendu and Saha, Dhiman and Pal, Madhumangal and Chowdhury, Dipanwita Roy},
editor = {Pointcheval, David and Vergnaud, Damien},
title = {Practical Distinguishers against 6-Round Keccak-f Exploiting Self-Symmetry},
booktitle = {Progress in Cryptology - {AFRICACRYPT} 2014 - 7th International Conference
on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings},
series = {Lecture Notes in Computer Science},
volume = {8469},
pages = {88--108},
publisher = {Springer},
year = {2014},
url = {https://doi.org/10.1007/978-3-319-06734-6\_6},
doi = {10.1007/978-3-319-06734-6\_6},
timestamp = {Tue, 14 May 2019 10:00:52 +0200},
biburl = {https://dblp.org/rec/conf/africacrypt/KuilaSPC14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Kuila, Sukhendu and Saha, Dhiman and Pal, Madhumangal and Chowdhury, Dipanwita Roy ▲ Progress in Cryptology - AFRICACRYPT 2014 - 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings, Volume:8469-, Pages:88–108, 2014

https://doi.org/10.1007/978-3-319-13039-2_12

@inproceedings{DBLP:conf/indocrypt/SahaKC14,
author = {Saha, Dhiman and Kuila, Sukhendu and Chowdhury, Dipanwita Roy},
editor = {Meier, Willi and Mukhopadhyay, Debdeep},
title = {EscApe: Diagonal Fault Analysis of {APE}},
booktitle = {Progress in Cryptology - {INDOCRYPT} 2014 - 15th International Conference
on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {8885},
pages = {197--216},
publisher = {Springer},
year = {2014},
url = {https://doi.org/10.1007/978-3-319-13039-2\_12},
doi = {10.1007/978-3-319-13039-2\_12},
timestamp = {Tue, 14 May 2019 10:00:51 +0200},
biburl = {https://dblp.org/rec/conf/indocrypt/SahaKC14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Saha, Dhiman and Kuila, Sukhendu and Chowdhury, Dipanwita Roy ▲ Progress in Cryptology - INDOCRYPT 2014 - 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings, Volume:8885-, Pages:197–216, 2014

https://doi.org/10.1007/978-3-319-12060-7_5

@inproceedings{DBLP:conf/space/KuilaSPC14,
author = {Kuila, Sukhendu and Saha, Dhiman and Pal, Madhumangal and Chowdhury, Dipanwita Roy},
editor = {Chakraborty, Rajat Subhra and Matyas, Vashek and Schaumont, Patrick},
title = {{CASH:} Cellular Automata Based Parameterized Hash},
booktitle = {Security, Privacy, and Applied Cryptography Engineering - 4th International
Conference, {SPACE} 2014, Pune, India, October 18-22, 2014. Proceedings},
series = {Lecture Notes in Computer Science},
volume = {8804},
pages = {59--75},
publisher = {Springer},
year = {2014},
url = {https://doi.org/10.1007/978-3-319-12060-7\_5},
doi = {10.1007/978-3-319-12060-7\_5},
timestamp = {Tue, 14 May 2019 10:00:40 +0200},
biburl = {https://dblp.org/rec/conf/space/KuilaSPC14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Kuila, Sukhendu and Saha, Dhiman and Pal, Madhumangal and Chowdhury, Dipanwita Roy ▲ Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings, Volume:8804-, Pages:59–75, 2014

https://doi.org/10.1007/978-3-319-12060-7_11

@inproceedings{DBLP:conf/space/SenguptaSGMC14,
author = {Sengupta, Abhrajit and Saha, Dhiman and Ghosh, Shamit and Mehta, Deval and Chowdhury, Dipanwita Roy},
editor = {Chakraborty, Rajat Subhra and Matyas, Vashek and Schaumont, Patrick},
title = {{AEC:} {A} Practical Scheme for Authentication with Error Correction},
booktitle = {Security, Privacy, and Applied Cryptography Engineering - 4th International
Conference, {SPACE} 2014, Pune, India, October 18-22, 2014. Proceedings},
series = {Lecture Notes in Computer Science},
volume = {8804},
pages = {155--170},
publisher = {Springer},
year = {2014},
url = {https://doi.org/10.1007/978-3-319-12060-7\_11},
doi = {10.1007/978-3-319-12060-7\_11},
timestamp = {Tue, 14 May 2019 10:00:40 +0200},
biburl = {https://dblp.org/rec/conf/space/SenguptaSGMC14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Sengupta, Abhrajit and Saha, Dhiman and Ghosh, Shamit and Mehta, Deval and Chowdhury, Dipanwita Roy ▲ Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings, Volume:8804-, Pages:155–170, 2014

https://doi.org/10.1007/978-3-642-25578-6_3

@inproceedings{DBLP:conf/indocrypt/SahaMC11,
author = {Saha, Dhiman and Mukhopadhyay, Debdeep and Chowdhury, Dipanwita Roy},
editor = {Bernstein, Daniel J. and Chatterjee, Sanjit},
title = {{PKDPA:} An Enhanced Probabilistic Differential Power Attack Methodology},
booktitle = {Progress in Cryptology - {INDOCRYPT} 2011 - 12th International Conference
on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings},
series = {Lecture Notes in Computer Science},
volume = {7107},
pages = {3--21},
publisher = {Springer},
year = {2011},
url = {https://doi.org/10.1007/978-3-642-25578-6\_3},
doi = {10.1007/978-3-642-25578-6\_3},
timestamp = {Tue, 14 May 2019 10:00:51 +0200},
biburl = {https://dblp.org/rec/conf/indocrypt/SahaMC11.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Saha, Dhiman and Mukhopadhyay, Debdeep and Chowdhury, Dipanwita Roy ▲ Progress in Cryptology - INDOCRYPT 2011 - 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings, Volume:7107-, Pages:3–21, 2011

@article{DBLP:journals/iacr/SahaMC09,
author = {Saha, Dhiman and Mukhopadhyay, Debdeep and Chowdhury, Dipanwita Roy},
title = {A Diagonal Fault Attack on the Advanced Encryption Standard},
journal = {{IACR} Cryptol. ePrint Arch.},
volume = {2009},
pages = {581},
year = {2009},
url = {http://eprint.iacr.org/2009/581},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/SahaMC09.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Saha, Dhiman and Mukhopadhyay, Debdeep and Chowdhury, Dipanwita Roy ▲ IACR Cryptol. ePrint Arch., Volume:2009-, Pages:581, 2009

https://doi.org/10.1007/978-3-540-89754-5_18

@inproceedings{DBLP:conf/indocrypt/AgrawalKSM08,
author = {Agrawal, Mukesh and Karmakar, Sandip and Saha, Dhiman and Mukhopadhyay, Debdeep},
editor = {Chowdhury, Dipanwita Roy and Rijmen, Vincent and Das, Abhijit},
title = {Scan Based Side Channel Attacks on Stream Ciphers and Their Counter-Measures},
booktitle = {Progress in Cryptology - {INDOCRYPT} 2008, 9th International Conference
on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings},
series = {Lecture Notes in Computer Science},
volume = {5365},
pages = {226--238},
publisher = {Springer},
year = {2008},
url = {https://doi.org/10.1007/978-3-540-89754-5\_18},
doi = {10.1007/978-3-540-89754-5\_18},
timestamp = {Tue, 14 May 2019 10:00:51 +0200},
biburl = {https://dblp.org/rec/conf/indocrypt/AgrawalKSM08.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Agrawal, Mukesh and Karmakar, Sandip and Saha, Dhiman and Mukhopadhyay, Debdeep ▲ Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings, Volume:5365-, Pages:226–238, 2008

https://doi.org/10.1007/978-3-540-73458-1_3

@inproceedings{DBLP:conf/acisp/BhattacharyaMSC07,
author = {Bhattacharya, Debojyoti and Mukhopadhyay, Debdeep and Saha, Dhiman and Chowdhury, Dipanwita Roy},
editor = {Pieprzyk, Josef and Ghodosi, Hossein and Dawson, Ed},
title = {Strengthening {NLS} Against Crossword Puzzle Attack},
booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
2007, Townsville, Australia, July 2-4, 2007, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {4586},
pages = {29--44},
publisher = {Springer},
year = {2007},
url = {https://doi.org/10.1007/978-3-540-73458-1\_3},
doi = {10.1007/978-3-540-73458-1\_3},
timestamp = {Tue, 14 May 2019 10:00:46 +0200},
biburl = {https://dblp.org/rec/conf/acisp/BhattacharyaMSC07.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Bhattacharya, Debojyoti and Mukhopadhyay, Debdeep and Saha, Dhiman and Chowdhury, Dipanwita Roy ▲ Information Security and Privacy, 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings, Volume:4586-, Pages:29–44, 2007