Santanu Sarkar

From MaRDI portal
Revision as of 18:20, 6 October 2023 by Import231006081045 (talk | contribs) (Created automatically from import231006081045)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Person:260043

Available identifiers

zbMath Open sarkar.santanuMaRDI QIDQ260043

List of research outcomes

PublicationDate of PublicationType
Analysis of RIPEMD-160: new collision attacks and finding characteristics with MILP2023-12-08Paper
Representing the inverse map as a composition of quadratics in a finite field of characteristic $2$2023-09-29Paper
Algebraic meet-in-the-middle attack on LowMC2023-08-25Paper
Improving bounds on elliptic curve hidden number problem for ECDH key exchange2023-08-25Paper
Some results on lightweight stream ciphers Fountain v1 \& lizard2023-07-07Paper
Latin dances reloaded: improved cryptanalysis against Salsa and ChaCha, and the proposal of Forró2023-07-05Paper
Cryptanalysis of reduced round SPEEDY2023-06-02Paper
Partial key exposure attack on short secret exponent CRT-RSA2023-05-12Paper
Algebraic attacks on Rasta and Dasta using low-degree equations2023-05-12Paper
Boundedness of composition operator on several variable Paley-Wiener space2023-01-04Paper
Differential Fault Attack on Grain v1, ACORN v3 and Lizard2022-12-09Paper
Revisiting Cryptanalysis on ChaCha From Crypto 2020 and Eurocrypt 20212022-10-11Paper
The inverse of \(\chi\) and its applications to Rasta-like ciphers2022-10-06Paper
Revamped differential-linear cryptanalysis on reduced round ChaCha2022-08-30Paper
Approximate divisor multiples -- factoring with only a third of the secret CRT-exponents2022-08-30Paper
Some Conditional Cube Testers for Grain-128a of Reduced Rounds2022-08-05Paper
On One-Dimensional Linear Minimal Codes Over Finite (Commutative) Rings2022-07-13Paper
Revisiting orthogonal lattice attacks on approximate common divisor problems2022-03-23Paper
A state bit recovery algorithm with TMDTO attack on Lizard and Grain-128a2022-03-21Paper
Recursive MDS matrices over finite commutative rings2021-09-30Paper
A theoretical investigation on the distinguishers of Salsa and ChaCha2021-08-02Paper
Proving the biases of Salsa and ChaCha in differential attack2020-09-22Paper
New results on Modular Inversion Hidden Number problem and inversive congruential generator2020-05-20Paper
Some cryptanalytic results on TRIAD2020-05-12Paper
Revisiting approximate polynomial common divisor problem and noisy multipolynomial reconstruction2020-05-12Paper
Cryptanalysis of elliptic curve hidden number problem from PKC 20172020-01-31Paper
New cube distinguishers on NFSR-based stream ciphers2020-01-09Paper
Revisiting design principles of Salsa and ChaCha2019-09-19Paper
Settling the mystery of \(Z_{r} = r\) in RC42019-07-10Paper
Some results on Fruit2019-02-20Paper
Cryptanalysis of multi-prime \(\varPhi \)-hiding assumption2018-10-18Paper
Solving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generator2018-07-13Paper
A Differential Fault Attack on Plantlet2018-06-27Paper
Properties of singular integral operators \(S_{\alpha,\beta}\)2018-05-31Paper
Generalization of roos bias in RC4 and some results on key-keystream relations2018-04-10Paper
Analysis of hidden number problem with hidden multiplier2018-01-15Paper
Multiplication operators with deficiency indices \((p,p)\) and sampling formulas in reproducing kernel Hilbert spaces of entire vector valued functions2017-10-17Paper
Approximate Integer Common Divisor Problem Relates to Implicit Factorization2017-07-12Paper
Improved analysis for reduced round Salsa and ChaCha2017-06-19Paper
Cryptanalysis of an RSA variant with moduli \(N=p^r q^l\)2017-06-12Paper
Differential Fault Attack against Grain Family with Very Few Faults and Minimal Assumptions2017-05-16Paper
Probabilistic signature based generalized framework for differential fault analysis of stream ciphers2017-03-27Paper
Revisiting (nested) Roos bias in RC4 key scheduling algorithm2017-02-10Paper
Observing biases in the state: case studies with Trivium and Trivia-SC2017-02-10Paper
On acyclic edge-coloring of complete bipartite graphs2016-12-22Paper
Revisiting prime power RSA2016-03-18Paper
Cryptanalysis of Variants of RSA with Multiple Small Secret Exponents2016-01-12Paper
Further non-randomness in RC4, RC4A and VMPC2015-11-19Paper
On acyclic edge-coloring of the complete bipartite graphs \(K_{2p-1, 2p-1}\) for odd prime \(p\)2015-10-08Paper
Proving TLS-attack related open biases of RC42015-09-30Paper
Dependence in IV-Related Bytes of RC4 Key Enhances Vulnerabilities in WPA2015-09-18Paper
Partial Key Exposure Attack on CRT-RSA2015-09-10Paper
A Differential Fault Attack on the Grain Family under Reasonable Assumptions2014-08-20Paper
Small secret exponent attack on RSA variant with modulus \(N=p^rq\)2014-08-18Paper
Proving empirical key-correlations in RC42014-04-15Paper
(Non-)random sequences from (non-)random permutations -- analysis of RC4 stream cipher2014-04-01Paper
Security Analysis of the RC4+ Stream Cipher2014-01-14Paper
https://portal.mardi4nfdi.de/entity/Q28555752013-10-25Paper
A Chosen IV Related Key Attack on Grain-128a2013-06-28Paper
New Results on Generalization of Roos-Type Biases and Related Keystreams of RC42013-06-07Paper
Relaxing IND-CCA: Indistinguishability against Chosen Ciphertext Verification Attack2013-03-13Paper
Some Results on Related Key-IV Pairs of Grain2013-03-13Paper
A Differential Fault Attack on Grain-128a Using MACs2013-03-13Paper
Reduction in Lossiness of RSA Trapdoor Permutation2013-03-13Paper
Cryptanalytic results on `Dual CRT' and `Common Prime' RSA2013-01-28Paper
The defect sequence for contractive tuples2013-01-21Paper
A Differential Fault Attack on the Grain Family of Stream Ciphers2012-11-13Paper
Side Channel Attack to Actual Cryptanalysis: Breaking CRT-RSA with Low Weight Decryption Exponents2012-11-13Paper
Proof of Empirical RC4 Biases and New Key Correlations2012-06-08Paper
Partial Key Exposure: Generalized Framework to Attack RSA2011-12-16Paper
On the Evolution of GGHN Cipher2011-12-16Paper
Some applications of lattice based root finding techniques2011-06-03Paper
Partial Key Exposure Attack on RSA – Improvements for Limited Lattice Dimensions2010-12-07Paper
Cryptanalysis of RSA with two decryption exponents2010-09-07Paper
Cryptanalysis of RSA with more than one decryption exponent2010-09-07Paper
Factoring RSA Modulus Using Prime Reconstruction from Random Known Bits2010-05-04Paper
Efficient CRT-RSA Decryption for Small Encryption Exponents2010-03-16Paper
Further results on implicit factoring in polynomial time2010-03-10Paper
PARTIAL KEY EXPOSURE ATTACKS ON RSA AND ITS VARIANT BY GUESSING A FEW BITS OF ONE OF THE PRIME FACTORS2009-08-06Paper
Improved Partial Key Exposure Attacks on RSA by Guessing a Few Bits of One of the Prime Factors2009-03-24Paper
A New Class of Weak Encryption Exponents in RSA2009-01-22Paper
Revisiting Wiener’s Attack – New Weak Keys in RSA2008-11-20Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Santanu Sarkar