Suivre
Dhiman Saha
Dhiman Saha
Indian Institute of Technology Bhilai
Adresse e-mail validée de iitbhilai.ac.in - Page d'accueil
Titre
Citée par
Citée par
Année
A diagonal fault attack on the advanced encryption standard
D Saha, D Mukhopadhyay, D RoyChowdhury
Cryptology ePrint Archive, 2009
1432009
Scan based side channel attacks on stream ciphers and their counter-measures
M Agrawal, S Karmakar, D Saha, D Mukhopadhyay
Progress in Cryptology-INDOCRYPT 2008: 9th International Conference on …, 2008
842008
Fault attacks in symmetric key cryptosystems
A Baksi, S Bhasin, J Breier, D Jap, D Saha
Cryptology ePrint Archive, 2020
292020
Preventing fault attacks using fault randomisation with a case study on AES
S Ghosh, D Saha, A Sengupta, DR Chowdhury
International Journal of Applied Cryptography 3 (3), 225-235, 2017
272017
On the security margin of TinyJAMBU with refined differential and linear cryptanalysis
D Saha, Y Sasaki, D Shi, F Sibleyras, S Sun, Y Zhang
IACR Transactions on Symmetric Cryptology, 152-174, 2020
262020
A survey on fault attacks on symmetric key cryptosystems
A Baksi, S Bhasin, J Breier, D Jap, D Saha
ACM Computing Surveys 55 (4), 1-34, 2022
212022
Boomeyong: Embedding yoyo within boomerang and its applications to key recovery attacks on AES and pholkos
M Rahman, D Saha, G Paul
Cryptology ePrint Archive, 2022
172022
To infect or not to infect: a critical analysis of infective countermeasures in fault attacks
A Baksi, D Saha, S Sarkar
Journal of Cryptographic Engineering 10, 355-374, 2020
172020
EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis with a Case-Study on PAEQ
D Saha, DR Chowdhury
International Conference on Cryptographic Hardware and Embedded Systems, 581-601, 2016
172016
EscApe: Diagonal Fault Analysis of APE
D Saha, S Kuila, D Roy Chowdhury
International Conference on Cryptology in India, 197-216, 2014
172014
A Scalable Method for Constructing Non-linear Cellular Automata with Period 2 n  − 1
S Ghosh, A Sengupta, D Saha, DR Chowdhury
Cellular Automata: 11th International Conference on Cellular Automata for …, 2014
172014
Practical Distinguishers against 6-Round Keccak-f Exploiting Self-Symmetry
S Kuila, D Saha, M Pal, D Roy Chowdhury
Progress in Cryptology–AFRICACRYPT 2014: 7th International Conference on …, 2014
152014
Cryptanalysis of forkaes
S Banik, J Bossert, A Jana, E List, S Lucks, W Meier, M Rahman, D Saha, ...
Applied Cryptography and Network Security: 17th International Conference …, 2019
142019
Symsum: Symmetric-sum distinguishers against round reduced SHA3
D Saha, S Kuila, DR Chowdhury
IACR Transactions on Symmetric Cryptology, 240-258, 2017
142017
CASH: cellular automata based parameterized hash
S Kuila, D Saha, M Pal, DR Chowdhury
Security, Privacy, and Applied Cryptography Engineering: 4th International …, 2014
122014
Internal differential fault analysis of parallelizable ciphers in the counter-mode
D Saha, DR Chowdhury
Journal of Cryptographic Engineering 9 (1), 53-67, 2019
112019
Key Recovery Attack Against 2.5-Round-Cipher
C Boura, A Chakraborti, G Leurent, G Paul, D Saha, H Soleimany, ...
International Conference on Fast Software Encryption, 535-553, 2016
112016
A Novel Duplication-Based Countermeasure to Statistical Ineffective Fault Analysis
A Baksi, A Baksi
Classical and Physical Security of Symmetric Key Cryptographic Algorithms …, 2022
102022
On the relationship between resilient Boolean functions and linear branch number of S-boxes
S Sarkar, K Mandal, D Saha
International Conference on Cryptology in India, 361-374, 2019
92019
Scope: On the Side Channel Vulnerability of Releasing Unverified Plaintexts
D Saha, DR Chowdhury
International Conference on Selected Areas in Cryptography, 417-438, 2015
92015
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20