A survey on lightweight authenticated encryption and challenges for securing industrial IoT M Agrawal, J Zhou, D Chang Security and privacy trends in the industrial internet of things, 71-94, 2019 | 39 | 2019 |
CAN-FD-Sec: improving security of CAN-FD protocol M Agrawal, T Huang, J Zhou, D Chang International Workshop on Cyber Security for Intelligent Transportation …, 2018 | 21 | 2018 |
sp-AELM: Sponge based authenticated encryption scheme for memory constrained devices M Agrawal, D Chang, S Sanadhya Information Security and Privacy: 20th Australasian Conference, ACISP 2015 …, 2015 | 13 | 2015 |
RCB: leakage-resilient authenticated encryption via re-keying M Agrawal, TK Bansal, D Chang, AK Chauhan, S Hong, J Kang, ... The Journal of Supercomputing 74, 4173-4198, 2018 | 12 | 2018 |
A new authenticated encryption technique for handling long ciphertexts in memory constrained devices M Agrawal, D Chang, SK Sanadhya International Journal of Applied Cryptography 3 (3), 236-261, 2017 | 10 | 2017 |
Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis Technique SS Megha Agrawal, Donghoon Chang Inscrypt-2014 8957 (Lecture Notes in Computer Science), 343--360, 2014 | 3* | 2014 |
Authenticated encryption for memory constrained devices M Agrawal, D Chang, SK Sanadhya IIIT-Delhi, 2020 | | 2020 |
Deterministic Authenticated Encryption Scheme for Memory Constrained Devices M Agrawal, D Chang, J Kang Cryptography 2 (4), 37, 2018 | | 2018 |