The following pages link to Somitra Kumar Sanadhya (Q1032493):
Displayed 27 items.
- A combinatorial analysis of recent attacks on step reduced SHA-2 family (Q1032494) (← links)
- A new authenticated encryption technique for handling long ciphertexts in memory constrained devices (Q1626126) (← links)
- Sponge-based CCA2 secure asymmetric encryption for arbitrary length message (extended version) (Q1626128) (← links)
- Exploiting the leakage: analysis of some authenticated encryption schemes (Q1989638) (← links)
- Quantum resource estimates of Grover's key search on ARIA (Q2056976) (← links)
- Counting active S-boxes is not enough (Q2152037) (← links)
- Single Key Recovery Attacks on 9-Round Kalyna-128/256 and Kalyna-256/512 (Q2806766) (← links)
- Security Analysis of GFN: 8-Round Distinguisher for 4-Branch Type-2 GFN (Q2872047) (← links)
- Bicliques with Minimal Data and Time Complexity for AES (Q2942833) (← links)
- SPF: A New Family of Efficient Format-Preserving Encryption Algorithms (Q2980846) (← links)
- Cryptanalysis of Tav-128 Hash Function (Q3058719) (← links)
- Sponge Based CCA2 Secure Asymmetric Encryption for Arbitrary Length Message (Q3194591) (← links)
- sp-AELM: Sponge Based Authenticated Encryption Scheme for Memory Constrained Devices (Q3194622) (← links)
- Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis Technique (Q3454593) (← links)
- Rig: A Simple, Secure and Flexible Design for Password Hashing (Q3454594) (← links)
- Improved Meet-in-the-Middle Attacks on 7 and 8-Round ARIA-192 and ARIA-256 (Q3460176) (← links)
- Differential Fault Analysis of SHA-3 (Q3460180) (← links)
- PPAE: Practical Parazoa Authenticated Encryption Family (Q3467164) (← links)
- Attacking Reduced Round SHA-256 (Q3506406) (← links)
- Non-linear Reduced Round Attacks against SHA-2 Hash Family (Q3511168) (← links)
- Deterministic Constructions of 21-Step Collisions for the SHA-2 Hash Family (Q3540148) (← links)
- eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices (Q5055965) (← links)
- On identifying marker genes from gene expression data in a neural framework through online feature analysis (Q5468838) (← links)
- New Collision Attacks against Up to 24-Step SHA-2 (Q5504614) (← links)
- Biclique Cryptanalysis of Full Round AES-128 Based Hashing Modes (Q5740233) (← links)
- Implementing Grover oracle for lightweight block ciphers under depth constraints (Q6108773) (← links)
- On the Structure of Format Preserving Sets in the Diffusion Layer of Block Ciphers (Q6195832) (← links)