关注
Anubhab Baksi
Anubhab Baksi
在 e.ntu.edu.sg 的电子邮件经过验证
标题
引用次数
引用次数
年份
Machine learning-assisted differential distinguishers for lightweight ciphers
A Baksi
Classical and Physical Security of Symmetric Key Cryptographic Algorithms …, 2022
842022
A survey on fault attacks on symmetric key cryptosystems
A Baksi, S Bhasin, J Breier, D Jap, D Saha
ACM Computing Surveys 55 (4), 1-34, 2022
58*2022
Quantum Analysis of AES
K Jang, A Baksi, H Kim, G Song, H Seo, A Chattopadhyay
Cryptology ePrint Archive, 2022
532022
A practical fault attack on arx-like ciphers with a case study on chacha20
SVD Kumar, S Patranabis, J Breier, D Mukhopadhyay, S Bhasin, ...
2017 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 33-40, 2017
422017
Key Recovery from State Information of Sprout: Application to Cryptanalysis and Fault Attack
S Maitra, S Sarkar, A Baksi, P Dey
IACR Cryptology ePrint Archive 2015, 2015
422015
LIGHTER-R: optimized reversible circuit implementation for SBoxes
VA Dasu, A Baksi, S Sarkar, A Chattopadhyay
2019 32nd IEEE International System-on-Chip Conference (SOCC), 260-265, 2019
362019
Quantum implementation and resource estimates for Rectangle and Knot
A Baksi, K Jang, G Song, H Seo, Z Xiang
Quantum Information Processing 20, 1-24, 2021
332021
Side-channel and fault-injection attacks over lattice-based post-quantum schemes (Kyber, Dilithium): Survey and new results
P Ravi, A Chattopadhyay, JP D’Anvers, A Baksi
ACM Transactions on Embedded Computing Systems 23 (2), 1-54, 2024
262024
DEFAULT: Cipher-Level Resistance Against Differential Fault Attack
A Baksi
Classical and Physical Security of Symmetric Key Cryptographic Algorithms …, 2022
252022
Protecting Block Ciphers against Differential Fault Attacks without Re-keying (Extended Version)
A Baksi, S Bhasin, J Breier, M Khairallah, T Peyrin
IACR Cryptol. ePrint Arch. 2018, 85, 2018
24*2018
Quantum implementation and analysis of Default
K Jang, A Baksi, J Breier, H Seo, A Chattopadhyay
Cryptology ePrint Archive, 2022
212022
Classical and physical security of symmetric key cryptographic algorithms
A Baksi
2021 IFIP/IEEE 29th International Conference on Very Large Scale Integration …, 2021
19*2021
Observing biases in the state: case studies with Trivium and Trivia-SC
S Sarkar, S Maitra, A Baksi
Designs, Codes and Cryptography 82 (1-2), 351-375, 2017
192017
To Infect Or Not To Infect: A Critical Analysis Of Infective Countermeasures In Fault Attacks
A Baksi, D Saha, S Sarkar
https://eprint.iacr.org/2019/355, 2019
162019
Side channel attack on stream ciphers: a three-step approach to state/key recovery
S Kumar, VA Dasu, A Baksi, S Sarkar, D Jap, J Breier, S Bhasin
IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022 (2), 166-191, 2022
142022
New results on machine learning-based distinguishers
A Baksi, J Breier, VA Dasu, X Hou, H Kim, H Seo
IEEE Access 11, 54175-54187, 2023
13*2023
New insights on differential and linear bounds using mixed integer linear programming
A Baksi
Classical and Physical Security of Symmetric Key Cryptographic Algorithms …, 2022
13*2022
An overview of hash based signatures
V Srivastava, A Baksi, SK Debnath
Cryptology ePrint Archive, 2023
122023
Three Input Exclusive-OR Gate Support For Boyar-Peralta's Algorithm (Extended Version)
A Baksi, VA Dasu, B Karmakar, A Chattopadhyay, T Isobe
Cryptology ePrint Archive, 2021
12*2021
Improved quantum analysis of SPECK and LOWMC (full version)
K Jang, A Baksi, H Kim, H Seo, A Chattopadhyay
Cryptology ePrint Archive, 2022
11*2022
系统目前无法执行此操作,请稍后再试。
文章 1–20