Santanu Sarkar

From MaRDI portal
Revision as of 18:20, 6 October 2023 by Import231006081045 (talk | contribs) (Created automatically from import231006081045)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Person:260043

Available identifiers

zbMath Open sarkar.santanuMaRDI QIDQ260043

List of research outcomes





PublicationDate of PublicationType
Memory-efficient attacks on small LWE keys2024-10-11Paper
Analytic Kramer sampling and quasi Lagrange-type interpolation in vector valued RKHS2024-10-09Paper
Memory-efficient attacks on small LWE keys2024-09-13Paper
Differential faultt attack on \texttt{DEFAULT}2024-08-06Paper
Enhanced differential-linear attacks on reduced round ChaCha2024-07-18Paper
Revisiting modular inversion hidden number problem and its applications2024-07-18Paper
Spread and asymmetry of typical quantum coherence and their inhibition in response to glassy disorder2024-06-21Paper
Analysis of RIPEMD-160: new collision attacks and finding characteristics with MILP2023-12-08Paper
Representing the inverse map as a composition of quadratics in a finite field of characteristic $2$2023-09-29Paper
Algebraic meet-in-the-middle attack on LowMC2023-08-25Paper
Improving bounds on elliptic curve hidden number problem for ECDH key exchange2023-08-25Paper
Some results on lightweight stream ciphers Fountain v1 \& lizard2023-07-07Paper
Latin dances reloaded: improved cryptanalysis against Salsa and ChaCha, and the proposal of Forró2023-07-05Paper
Cryptanalysis of reduced round SPEEDY2023-06-02Paper
Partial key exposure attack on short secret exponent CRT-RSA2023-05-12Paper
Algebraic attacks on Rasta and Dasta using low-degree equations2023-05-12Paper
Boundedness of composition operator on several variable Paley-Wiener space2023-01-04Paper
Differential Fault Attack on Grain v1, ACORN v3 and Lizard2022-12-09Paper
Revisiting Cryptanalysis on ChaCha From Crypto 2020 and Eurocrypt 20212022-10-11Paper
The inverse of \(\chi\) and its applications to Rasta-like ciphers2022-10-06Paper
Revamped differential-linear cryptanalysis on reduced round ChaCha2022-08-30Paper
Approximate divisor multiples -- factoring with only a third of the secret CRT-exponents2022-08-30Paper
Some Conditional Cube Testers for Grain-128a of Reduced Rounds2022-08-05Paper
On One-Dimensional Linear Minimal Codes Over Finite (Commutative) Rings2022-07-13Paper
Revisiting orthogonal lattice attacks on approximate common divisor problems2022-03-23Paper
A state bit recovery algorithm with TMDTO attack on Lizard and Grain-128a2022-03-21Paper
Recursive MDS matrices over finite commutative rings2021-09-30Paper
A theoretical investigation on the distinguishers of Salsa and ChaCha2021-08-02Paper
Proving the biases of Salsa and ChaCha in differential attack2020-09-22Paper
New results on Modular Inversion Hidden Number problem and inversive congruential generator2020-05-20Paper
Some cryptanalytic results on TRIAD2020-05-12Paper
Revisiting approximate polynomial common divisor problem and noisy multipolynomial reconstruction2020-05-12Paper
Cryptanalysis of elliptic curve hidden number problem from PKC 20172020-01-31Paper
New cube distinguishers on NFSR-based stream ciphers2020-01-09Paper
Revisiting design principles of Salsa and ChaCha2019-09-19Paper
Settling the mystery of \(Z_{r} = r\) in RC42019-07-10Paper
Some results on Fruit2019-02-20Paper
Cryptanalysis of multi-prime \(\varPhi \)-hiding assumption2018-10-18Paper
Solving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generator2018-07-13Paper
A Differential Fault Attack on Plantlet2018-06-27Paper
Properties of singular integral operators \(S_{\alpha,\beta}\)2018-05-31Paper
Generalization of roos bias in RC4 and some results on key-keystream relations2018-04-10Paper
Analysis of hidden number problem with hidden multiplier2018-01-15Paper
Multiplication operators with deficiency indices \((p,p)\) and sampling formulas in reproducing kernel Hilbert spaces of entire vector valued functions2017-10-17Paper
Approximate Integer Common Divisor Problem Relates to Implicit Factorization2017-07-12Paper
Improved analysis for reduced round Salsa and ChaCha2017-06-19Paper
Cryptanalysis of an RSA variant with moduli \(N=p^r q^l\)2017-06-12Paper
Differential Fault Attack against Grain Family with Very Few Faults and Minimal Assumptions2017-05-16Paper
Probabilistic signature based generalized framework for differential fault analysis of stream ciphers2017-03-27Paper
Revisiting (nested) Roos bias in RC4 key scheduling algorithm2017-02-10Paper
Observing biases in the state: case studies with Trivium and Trivia-SC2017-02-10Paper
On acyclic edge-coloring of complete bipartite graphs2016-12-22Paper
Revisiting prime power RSA2016-03-18Paper
Cryptanalysis of Variants of RSA with Multiple Small Secret Exponents2016-01-12Paper
Further non-randomness in RC4, RC4A and VMPC2015-11-19Paper
On acyclic edge-coloring of the complete bipartite graphs \(K_{2p-1, 2p-1}\) for odd prime \(p\)2015-10-08Paper
Proving TLS-attack related open biases of RC42015-09-30Paper
Dependence in IV-Related Bytes of RC4 Key Enhances Vulnerabilities in WPA2015-09-18Paper
Partial Key Exposure Attack on CRT-RSA2015-09-10Paper
A Differential Fault Attack on the Grain Family under Reasonable Assumptions2014-08-20Paper
Small secret exponent attack on RSA variant with modulus \(N=p^rq\)2014-08-18Paper
Proving empirical key-correlations in RC42014-04-15Paper
(Non-)random sequences from (non-)random permutations -- analysis of RC4 stream cipher2014-04-01Paper
Security Analysis of the RC4+ Stream Cipher2014-01-14Paper
https://portal.mardi4nfdi.de/entity/Q28555752013-10-25Paper
A Chosen IV Related Key Attack on Grain-128a2013-06-28Paper
New Results on Generalization of Roos-Type Biases and Related Keystreams of RC42013-06-07Paper
Relaxing IND-CCA: Indistinguishability against Chosen Ciphertext Verification Attack2013-03-13Paper
Some Results on Related Key-IV Pairs of Grain2013-03-13Paper
A Differential Fault Attack on Grain-128a Using MACs2013-03-13Paper
Reduction in Lossiness of RSA Trapdoor Permutation2013-03-13Paper
Cryptanalytic results on `Dual CRT' and `Common Prime' RSA2013-01-28Paper
The defect sequence for contractive tuples2013-01-21Paper
A Differential Fault Attack on the Grain Family of Stream Ciphers2012-11-13Paper
Side Channel Attack to Actual Cryptanalysis: Breaking CRT-RSA with Low Weight Decryption Exponents2012-11-13Paper
Proof of Empirical RC4 Biases and New Key Correlations2012-06-08Paper
Partial Key Exposure: Generalized Framework to Attack RSA2011-12-16Paper
On the Evolution of GGHN Cipher2011-12-16Paper
Some applications of lattice based root finding techniques2011-06-03Paper
Partial Key Exposure Attack on RSA – Improvements for Limited Lattice Dimensions2010-12-07Paper
Cryptanalysis of RSA with two decryption exponents2010-09-07Paper
Cryptanalysis of RSA with more than one decryption exponent2010-09-07Paper
Factoring RSA Modulus Using Prime Reconstruction from Random Known Bits2010-05-04Paper
Efficient CRT-RSA Decryption for Small Encryption Exponents2010-03-16Paper
Further results on implicit factoring in polynomial time2010-03-10Paper
PARTIAL KEY EXPOSURE ATTACKS ON RSA AND ITS VARIANT BY GUESSING A FEW BITS OF ONE OF THE PRIME FACTORS2009-08-06Paper
Improved Partial Key Exposure Attacks on RSA by Guessing a Few Bits of One of the Prime Factors2009-03-24Paper
A New Class of Weak Encryption Exponents in RSA2009-01-22Paper
Revisiting Wiener’s Attack – New Weak Keys in RSA2008-11-20Paper

Research outcomes over time

This page was built for person: Santanu Sarkar