Követés
Anubhab Baksi
Anubhab Baksi
E-mail megerősítve itt: e.ntu.edu.sg
Cím
Hivatkozott rá
Hivatkozott rá
Év
Machine learning-assisted differential distinguishers for lightweight ciphers
A Baksi
Classical and Physical Security of Symmetric Key Cryptographic Algorithms …, 2022
1092022
A survey on fault attacks on symmetric key cryptosystems
A Baksi, S Bhasin, J Breier, D Jap, D Saha
ACM Computing Surveys 55 (4), 1-34, 2022
83*2022
Quantum Analysis of AES
K Jang, A Baksi, H Kim, G Song, H Seo, A Chattopadhyay
Cryptology ePrint Archive, 2022
782022
LIGHTER-R: Optimized Reversible Circuit Implementation for SBoxes
VA Dasu, A Baksi, S Sarkar, A Chattopadhyay
2019 32nd IEEE International System-on-Chip Conference (SOCC), 260-265, 2019
512019
Side-channel and fault-injection attacks over lattice-based post-quantum schemes (Kyber, Dilithium): Survey and new results
P Ravi, A Chattopadhyay, JP D’Anvers, A Baksi
ACM Transactions on Embedded Computing Systems 23 (2), 1-54, 2024
492024
A practical fault attack on arx-like ciphers with a case study on chacha20
SVD Kumar, S Patranabis, J Breier, D Mukhopadhyay, S Bhasin, ...
2017 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 33-40, 2017
452017
Key Recovery from State Information of Sprout: Application to Cryptanalysis and Fault Attack
S Maitra, S Sarkar, A Baksi, P Dey
IACR Cryptology ePrint Archive 2015, 2015
432015
Quantum implementation and resource estimates for Rectangle and Knot
A Baksi, K Jang, G Song, H Seo, Z Xiang
Quantum Information Processing 20, 1-24, 2021
372021
DEFAULT: Cipher-Level Resistance Against Differential Fault Attack
A Baksi
Classical and Physical Security of Symmetric Key Cryptographic Algorithms …, 2022
352022
Side Channel Attack on Stream Ciphers: A Three-Step Approach to State/Key Recovery
S Kumar, VA Dasu, A Baksi, S Sarkar, D Jap, J Breier, S Bhasin
IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022 (2), 166-191, 2022
312022
Quantum implementation and analysis of Default
K Jang, A Baksi, J Breier, H Seo, A Chattopadhyay
Cryptology ePrint Archive, 2022
292022
An overview of hash based signatures
V Srivastava, A Baksi, SK Debnath
Cryptology ePrint Archive, 2023
282023
Protecting Block Ciphers against Differential Fault Attacks without Re-keying (Extended Version)
A Baksi, S Bhasin, J Breier, M Khairallah, T Peyrin
IACR Cryptol. ePrint Arch. 2018, 85, 2018
27*2018
Classical and physical security of symmetric key cryptographic algorithms
A Baksi
2021 IFIP/IEEE 29th International Conference on Very Large Scale Integration …, 2021
25*2021
Observing biases in the state: Case studies with Trivium and Trivia-SC
S Sarkar, S Maitra, A Baksi
Designs, Codes and Cryptography 82 (1-2), 351-375, 2017
212017
New results on machine learning-based distinguishers
A Baksi, J Breier, VA Dasu, X Hou, H Kim, H Seo
IEEE Access 11, 54175-54187, 2023
17*2023
Dorcis: Depth Optimized Quantum Implementation of Substitution Boxes
M Chun, A Baksi, A Chattopadhyay
Cryptology ePrint Archive, 2023
172023
Three Input Exclusive-OR Gate Support For Boyar-Peralta's Algorithm (Extended Version)
A Baksi, VA Dasu, B Karmakar, A Chattopadhyay, T Isobe
Cryptology ePrint Archive, 2021
17*2021
Depth-optimized quantum circuits for ascon: Aead and hash
Y Oh, K Jang, A Baksi, H Seo
Mathematics 12 (9), 1337, 2024
16*2024
To Infect Or Not To Infect: A Critical Analysis Of Infective Countermeasures In Fault Attacks
A Baksi, D Saha, S Sarkar
https://eprint.iacr.org/2019/355, 2019
162019
A rendszer jelenleg nem tudja elvégezni a műveletet. Próbálkozzon újra később.
Cikkek 1–20