Obserwuj
Somitra Sanadhya
Somitra Sanadhya
Dept. of CSE, IIT Jodhpur
Zweryfikowany adres z iitj.ac.in - Strona główna
Tytuł
Cytowane przez
Cytowane przez
Rok
FPGA-based true random number generation using programmable delays in oscillator-rings
NN Anandakumar, SK Sanadhya, MS Hashmi
IEEE Transactions on Circuits and Systems II: Express Briefs 67 (3), 570-574, 2019
1212019
New collision attacks against up to 24-step SHA-2
SK Sanadhya, P Sarkar
Progress in Cryptology-INDOCRYPT 2008: 9th International Conference on …, 2008
1142008
Compact implementations of FPGA-based PUFs with enhanced performance
NN Anandakumar, MS Hashmi, SK Sanadhya
2017 30th International Conference on VLSI Design and 2017 16th …, 2017
532017
Cryptanalysis of SIMON variants with connections
J Alizadeh, HA Alkhzaimi, MR Aref, N Bagheri, P Gauravaram, A Kumar, ...
International Workshop on Radio Frequency Identification: Security and …, 2014
522014
Linear cryptanalysis of round reduced SIMON
J Alizadeh, N Bagheri, P Gauravaram, A Kumar, SK Sanadhya
Cryptology ePrint Archive, 2013
442013
Differential fault analysis of SHA-3
N Bagheri, N Ghaedi, SK Sanadhya
Progress in Cryptology--INDOCRYPT 2015: 16th International Conference on …, 2015
432015
Security analysis of LMAP++, an RFID authentication protocol
M Safkhani, N Bagheri, M Naderi, SK Sanadhya
2011 International Conference for Internet Technology and Secured …, 2011
432011
A configurable crystals-kyber hardware implementation with side-channel protection
A Jati, N Gupta, A Chattopadhyay, SK Sanadhya
ACM Transactions on Embedded Computing Systems 23 (2), 1-25, 2024
392024
Threshold Implementations of : A Trade-Off Analysis
A Jati, N Gupta, A Chattopadhyay, SK Sanadhya, D Chang
IEEE Transactions on Information Forensics and Security 15, 2110-2120, 2019
352019
Generation of secure and reliable honeywords, preventing false detection
D Chang, A Goel, S Mishra, SK Sanadhya
IEEE Transactions on Dependable and Secure Computing 16 (5), 757-769, 2018
342018
FbHash: A new similarity hashing scheme for digital forensics
D Chang, M Ghosh, SK Sanadhya, M Singh, DR White
Digital Investigation 29, S113-S123, 2019
322019
Design and analysis of FPGA-based PUFs with enhanced performance for hardware-oriented security
NN Anandakumar, MS Hashmi, SK Sanadhya
ACM Journal on Emerging Technologies in Computing Systems (JETC) 18 (4), 1-26, 2022
302022
Bicliques with minimal data and time complexity for AES
A Bogdanov, D Chang, M Ghosh, SK Sanadhya
Information Security and Cryptology-ICISC 2014: 17th International …, 2015
292015
Release of unverified plaintext: Tight unified model and application to ANYDAE
D Chang, N Datta, A Dutta, B Mennink, M Nandi, S Sanadhya, F Sibleyras
IACR Transactions on Symmetric Cryptology 2019 (4), 119-146, 2019
282019
Non-linear reduced round attacks against SHA-2 hash family
SK Sanadhya, P Sarkar
Australasian Conference on Information Security and Privacy, 254-266, 2008
242008
Efficient and lightweight FPGA-based hybrid PUFs with improved performance
NN Anandakumar, MS Hashmi, SK Sanadhya
Microprocessors and Microsystems 77, 103180, 2020
222020
Quantum free-start collision attacks on double block length hashing with round-reduced AES-256
AK Chauhan, A Kumar, SK Sanadhya
IACR Transactions on Symmetric Cryptology, 316-336, 2021
212021
Threshold implementations of GIFT: A trade-off analysis
N Gupta, A Jati, SK Sanadhya, A Chattopadhyay, D Chang
202021
Quantum resource estimates of grover’s key search on aria
AK Chauhan, SK Sanadhya
Security, Privacy, and Applied Cryptography Engineering: 10th International …, 2020
202020
Reconfigurable hardware architecture for authenticated key agreement protocol over binary edwards curve
NN Anandakumar, MPL Das, SK Sanadhya, MS Hashmi
ACM Transactions on Reconfigurable Technology and Systems (TRETS) 11 (2), 1-19, 2018
202018
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20