| Publication | Date of Publication | Type |
|---|
| Non-malleable codes from leakage resilient cryptographic primitives | 2024-07-19 | Paper |
| Synthesis of maximum length cellular automata with nonlinearity injections | 2023-09-04 | Paper |
| A Family of Subfield Hyperelliptic Curves for Use in Cryptography | 2022-12-21 | Paper |
| CArrency: an energy-efficient proof-of-work scheme for crypto-currencies | 2022-10-07 | Paper |
| Image encryption with parallel evolution of 2-D cellular automata | 2022-10-07 | Paper |
| Investigating four neighbourhood cellular automata as better cryptographic primitives | 2022-04-19 | Paper |
| Generating nonlinear codes for multi-bit symbol error correction using cellular automata | 2022-03-16 | Paper |
| Preventing fault attack on stream ciphers by fault detection and correction | 2021-08-31 | Paper |
| Design of hash function using two dimensional cellular automata | 2021-08-31 | Paper |
| Preventing differential fault analysis attack on AEGIS family of ciphers | 2021-08-31 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5010296 | 2021-08-25 | Paper |
| Design of fault-resilient S-boxes for AES-like block ciphers | 2021-07-13 | Paper |
| Achieving better security using nonlinear cellular automata as a cryptographic primitive | 2020-06-29 | Paper |
| Study of five-neighborhood linear hybrid cellular automata and their synthesis | 2020-06-29 | Paper |
| Prevention of fault attacks in cellular automata based stream ciphers | 2020-03-12 | Paper |
| Preventing fault attacks using fault randomisation with a case study on AES | 2018-11-26 | Paper |
| \textsc{Gain}: practical key-recovery attacks on round-reduced \texttt{PAEQ} | 2018-10-26 | Paper |
| \textsc{EnCounter}: on breaking the nonce barrier in differential fault analysis with a case-study on PAEQ | 2018-02-14 | Paper |
| On the security of designing a cellular automata based stream cipher | 2017-08-25 | Paper |
| Leakage squeezing using cellular automata and its application to scan attack | 2016-06-10 | Paper |
| \textsc{scope}: on the side channel vulnerability of releasing unverified plaintexts | 2016-05-19 | Paper |
| CASca: a CA based scalable stream cipher | 2015-11-04 | Paper |
| NOCAS: a nonlinear cellular automata based stream cipher | 2015-11-02 | Paper |
| Preventing fault attacks using fault randomization with a case study on AES | 2015-10-20 | Paper |
| \textsc{escape}: diagonal fault analysis of APE | 2015-09-10 | Paper |
| Practical distinguishers against 6-round Keccak-\(f\) exploiting self-symmetry | 2014-06-24 | Paper |
| Leakage squeezing using cellular automata | 2013-10-10 | Paper |
| CAvium -- strengthening Trivium stream cipher using cellular automata | 2013-04-03 | Paper |
| Nimix : An involutary nonlinear vectorial Boolean function | 2012-06-18 | Paper |
| On usage of cellular automata in strengthening stream ciphers | 2012-06-18 | Paper |
| Fault analysis of grain-128 by targeting NFSR | 2011-06-29 | Paper |
| Null boundary 90/150 cellular automata for multi-byte error correcting code | 2010-10-04 | Paper |
| Provably secure key establishment protocol using one-way functions | 2010-05-25 | Paper |
| An Integrated ECC-MAC Based on RS Code | 2009-05-12 | Paper |
| Parallel crypto-devices for GF\((p)\) elliptic curve multiplication resistant against side channel attacks | 2009-03-20 | Paper |
| An Efficient n ×n Boolean Mapping Using Additive Cellular Automata | 2008-11-27 | Paper |
| An Improved Double Byte Error Correcting Code Using Cellular Automata | 2008-11-27 | Paper |
| Characterization of a Class of Complemented Group Cellular Automata | 2005-08-17 | Paper |
| Design of CAECC - cellular automata based error correcting code | 2003-10-16 | Paper |
| Theory and application of nongroup cellular automata for synthesis of easily testable finite state machines | 1996-01-01 | Paper |
| CA-based byte error-correcting code | 1995-01-01 | Paper |
| A low-cost high-capacity associative memory design using cellular automata | 1995-01-01 | Paper |