Volgen
Somitra Sanadhya
Somitra Sanadhya
Dept. of CSE, IIT Jodhpur
Geverifieerd e-mailadres voor iitj.ac.in - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
New collision attacks against up to 24-step SHA-2
SK Sanadhya, P Sarkar
Progress in Cryptology-INDOCRYPT 2008: 9th International Conference on …, 2008
1062008
FPGA-based true random number generation using programmable delays in oscillator-rings
NN Anandakumar, SK Sanadhya, MS Hashmi
IEEE Transactions on Circuits and Systems II: Express Briefs 67 (3), 570-574, 2019
932019
Cryptanalysis of SIMON variants with connections
J Alizadeh, HA Alkhzaimi, MR Aref, N Bagheri, P Gauravaram, A Kumar, ...
International Workshop on Radio Frequency Identification: Security and …, 2014
492014
Linear cryptanalysis of round reduced SIMON
J Alizadeh, N Bagheri, P Gauravaram, A Kumar, SK Sanadhya
Cryptology ePrint Archive, 2013
442013
Compact implementations of FPGA-based PUFs with enhanced performance
NN Anandakumar, MS Hashmi, SK Sanadhya
2017 30th International Conference on VLSI Design and 2017 16th …, 2017
422017
Security analysis of LMAP++, an RFID authentication protocol
M Safkhani, N Bagheri, M Naderi, SK Sanadhya
2011 International Conference for Internet Technology and Secured …, 2011
412011
Differential fault analysis of SHA-3
N Bagheri, N Ghaedi, SK Sanadhya
Progress in Cryptology--INDOCRYPT 2015: 16th International Conference on …, 2015
372015
FbHash: A new similarity hashing scheme for digital forensics
D Chang, M Ghosh, SK Sanadhya, M Singh, DR White
Digital Investigation 29, S113-S123, 2019
322019
Bicliques with minimal data and time complexity for AES
A Bogdanov, D Chang, M Ghosh, SK Sanadhya
Information Security and Cryptology-ICISC 2014: 17th International …, 2015
292015
Threshold Implementations of : A Trade-Off Analysis
A Jati, N Gupta, A Chattopadhyay, SK Sanadhya, D Chang
IEEE Transactions on Information Forensics and Security 15, 2110-2120, 2019
282019
Generation of secure and reliable honeywords, preventing false detection
D Chang, A Goel, S Mishra, SK Sanadhya
IEEE Transactions on Dependable and Secure Computing 16 (5), 757-769, 2018
272018
Non-linear reduced round attacks against SHA-2 hash family
SK Sanadhya, P Sarkar
Information Security and Privacy: 13th Australasian Conference, ACISP 2008 …, 2008
232008
Threshold implementations of GIFT: A trade-off analysis
N Gupta, A Jati, SK Sanadhya, A Chattopadhyay, D Chang
202021
Attacking reduced round SHA-256
SK Sanadhya, P Sarkar
Applied Cryptography and Network Security: 6th International Conference …, 2008
192008
New local collisions for the SHA-2 hash family
SK Sanadhya, P Sarkar
International conference on information security and cryptology, 193-205, 2007
192007
A configurable crystals-kyber hardware implementation with side-channel protection
A Jati, N Gupta, A Chattopadhyay, SK Sanadhya
ACM Transactions on Embedded Computing Systems 23 (2), 1-25, 2024
182024
Efficient and lightweight FPGA-based hybrid PUFs with improved performance
NN Anandakumar, MS Hashmi, SK Sanadhya
Microprocessors and Microsystems 77, 103180, 2020
182020
Rig: A Simple, Secure and Flexible Design for Password Hashing
D Chang, A Jati, S Mishra, SK Sanadhya
Information Security and Cryptology: 10th International Conference, Inscrypt …, 2015
182015
Quantum free-start collision attacks on double block length hashing with round-reduced AES-256
AK Chauhan, A Kumar, SK Sanadhya
IACR Transactions on Symmetric Cryptology, 316-336, 2021
172021
Release of unverified plaintext: Tight unified model and application to ANYDAE
D Chang, N Datta, A Dutta, B Mennink, M Nandi, S Sanadhya, F Sibleyras
IACR Transactions on Symmetric Cryptology, 119-146, 2019
172019
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20