A diagonal fault attack on the advanced encryption standard D Saha, D Mukhopadhyay, D RoyChowdhury Cryptology ePrint Archive, 2009 | 146 | 2009 |
Scan based side channel attacks on stream ciphers and their counter-measures M Agrawal, S Karmakar, D Saha, D Mukhopadhyay Progress in Cryptology-INDOCRYPT 2008: 9th International Conference on …, 2008 | 84 | 2008 |
Fault attacks in symmetric key cryptosystems A Baksi, S Bhasin, J Breier, D Jap, D Saha Cryptology ePrint Archive, 2020 | 29 | 2020 |
On the security margin of TinyJAMBU with refined differential and linear cryptanalysis D Saha, Y Sasaki, D Shi, F Sibleyras, S Sun, Y Zhang IACR Transactions on Symmetric Cryptology, 152-174, 2020 | 28 | 2020 |
Preventing fault attacks using fault randomisation with a case study on AES S Ghosh, D Saha, A Sengupta, DR Chowdhury International Journal of Applied Cryptography 3 (3), 225-235, 2017 | 28 | 2017 |
A survey on fault attacks on symmetric key cryptosystems A Baksi, S Bhasin, J Breier, D Jap, D Saha ACM Computing Surveys 55 (4), 1-34, 2022 | 27 | 2022 |
Boomeyong: Embedding yoyo within boomerang and its applications to key recovery attacks on AES and pholkos M Rahman, D Saha, G Paul Cryptology ePrint Archive, 2022 | 18 | 2022 |
EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis with a Case-Study on PAEQ D Saha, DR Chowdhury International Conference on Cryptographic Hardware and Embedded Systems, 581-601, 2016 | 18 | 2016 |
To infect or not to infect: a critical analysis of infective countermeasures in fault attacks A Baksi, D Saha, S Sarkar Journal of Cryptographic Engineering 10, 355-374, 2020 | 17 | 2020 |
EscApe: Diagonal Fault Analysis of APE D Saha, S Kuila, D Roy Chowdhury International Conference on Cryptology in India, 197-216, 2014 | 17 | 2014 |
A Scalable Method for Constructing Non-linear Cellular Automata with Period 2 n − 1 S Ghosh, A Sengupta, D Saha, DR Chowdhury Cellular Automata: 11th International Conference on Cellular Automata for …, 2014 | 17 | 2014 |
Cryptanalysis of forkaes S Banik, J Bossert, A Jana, E List, S Lucks, W Meier, M Rahman, D Saha, ... Applied Cryptography and Network Security: 17th International Conference …, 2019 | 15 | 2019 |
Practical Distinguishers against 6-Round Keccak-f Exploiting Self-Symmetry S Kuila, D Saha, M Pal, D Roy Chowdhury Progress in Cryptology–AFRICACRYPT 2014: 7th International Conference on …, 2014 | 15 | 2014 |
Symsum: Symmetric-sum distinguishers against round reduced SHA3 D Saha, S Kuila, DR Chowdhury IACR Transactions on Symmetric Cryptology, 240-258, 2017 | 14 | 2017 |
CASH: cellular automata based parameterized hash S Kuila, D Saha, M Pal, DR Chowdhury Security, Privacy, and Applied Cryptography Engineering: 4th International …, 2014 | 12 | 2014 |
Internal differential fault analysis of parallelizable ciphers in the counter-mode D Saha, DR Chowdhury Journal of Cryptographic Engineering 9 (1), 53-67, 2019 | 11 | 2019 |
Key Recovery Attack Against 2.5-Round-Cipher C Boura, A Chakraborti, G Leurent, G Paul, D Saha, H Soleimany, ... International Conference on Fast Software Encryption, 535-553, 2016 | 11 | 2016 |
A Novel Duplication-Based Countermeasure to Statistical Ineffective Fault Analysis A Baksi, A Baksi Classical and Physical Security of Symmetric Key Cryptographic Algorithms …, 2022 | 10 | 2022 |
On the relationship between resilient Boolean functions and linear branch number of S-boxes S Sarkar, K Mandal, D Saha International Conference on Cryptology in India, 361-374, 2019 | 10 | 2019 |
Sycon: A new milestone in designing ASCON-like permutations K Mandal, D Saha, S Sarkar, Y Todo Journal of Cryptographic Engineering 12 (3), 305-327, 2022 | 9 | 2022 |