Grover on katan: Quantum resource estimation M Rahman, G Paul IEEE Transactions on Quantum Engineering 3, 1-9, 2022 | 19 | 2022 |
Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos M Rahman, D Saha, G Paul IACR Transactions on Symmetric Cryptology, 137-169, 2021 | 18 | 2021 |
Quantum Attacks on HCTR and its Variants M Rahman, G Paul IEEE Transactions on Quantum Engineering 1, 1-8, 2020 | 15* | 2020 |
Cryptanalysis of forkaes S Banik, J Bossert, A Jana, E List, S Lucks, W Meier, M Rahman, D Saha, ... Applied Cryptography and Network Security: 17th International Conference …, 2019 | 14 | 2019 |
New Yoyo Tricks with AES-based Permutations D Saha, M Rahman, G Paul IACR Transactions on Symmetric Cryptology, 102-127, 2018 | 9 | 2018 |
Grover on Present: Quantum Resource Estimation M Rahman, G Paul Cryptology ePrint Archive, 2021 | 3 | 2021 |
Key Committing Attacks against AES-based AEAD Schemes P Derbez, PA Fouque, T Isobe, M Rahman, A Schrottenloher IACR Transactions on Symmetric Cryptology 2024 (1), 135-157, 2024 | 2 | 2024 |
DEEPAND: In-Depth Modeling of Correlated AND Gates for NLFSR-based Lightweight Block Ciphers A Jana, M Rahman, D Saha Cryptology ePrint Archive, 2022 | 2 | 2022 |
Iterated Truncated Differential for Internal Keyed Permutation of FlexAEAD. M Rahman, D Saha, G Paul IACR Cryptol. ePrint Arch. 2019, 539, 2019 | 2 | 2019 |
Revisiting the Boomerang Attack from a Perspective of 3-differential L Wang, L Song, B Wu, M Rahman, T Isobe IEEE Transactions on Information Theory, 2023 | 1 | 2023 |
Ghidle: Efficient Large-State Block Ciphers for Post-quantum Security M Nakahashi, R Shiba, R Anand, M Rahman, K Sakamoto, F Liu, T Isobe Australasian Conference on Information Security and Privacy, 403-430, 2023 | 1 | 2023 |
Divide and Rule: DiFA-Division Property Based Fault Attacks on PRESENT and GIFT AK Kundu, S Ghosh, D Saha, M Rahman International Conference on Applied Cryptography and Network Security, 89-116, 2023 | 1 | 2023 |
Key Committing Security Analysis of AEGIS T Isobe, M Rahman Cryptology ePrint Archive, 2023 | 1 | 2023 |
Cryptanalysis of FlexAEAD M Rahman, D Saha, G Paul Progress in Cryptology-AFRICACRYPT 2020: 12th International Conference on …, 2020 | 1 | 2020 |
Gleeok: A Family of Low-Latency PRFs and its Applications to Authenticated Encryption R Anand, S Banik, A Caforio, T Ishikawa, T Isobe, F Liu, K Minematsu, ... IACR Transactions on Cryptographic Hardware and Embedded Systems 2024 (2 …, 2024 | | 2024 |
Revisiting Yoyo Tricks on AES SK Mondal, M Rahman, S Sarkar, A Adhikari IACR Transactions on Symmetric Cryptology 2023 (4), 28-57, 2023 | | 2023 |
Yoyo cryptanalysis on Future SK Mondal, M Rahman, S Sarkar, A Adhikari Int. J. Applied Cryptography 4 (3/4), 2023 | | 2023 |
Switching the Top Slice of the Sandwich with Extra Filling Yields a Stronger Boomerang for NLFSR-based Block Ciphers A Jana, M Rahman, D Saha, G Paul Cryptology ePrint Archive, 2023 | | 2023 |
Cryptanalysis of Symmetric Key Schemes using Classical and Quantum Techniques M Rahman Indian Statistical Institute, Kolkata, 2022 | | 2022 |