| Publication | Date of Publication | Type |
|---|
| Efficient and optimized modeling of S-Boxes | 2026-01-08 | Paper |
| Security analysis of WG-7 lightweight stream cipher against cube attack | 2025-02-05 | Paper |
| Verifiable delay function based on non-linear hybrid cellular automata | 2025-02-05 | Paper |
| Key-dependent dynamic sbox for KASUMI block cipher | 2025-02-05 | Paper |
| Deep learning-based differential distinguishers for NIST standard authenticated encryption and permutations | 2025-02-05 | Paper |
| Non-malleable codes from leakage resilient cryptographic primitives | 2024-07-19 | Paper |
| Synthesis of maximum length cellular automata with nonlinearity injections | 2023-09-04 | Paper |
A Family of Subfield Hyperelliptic Curves for Use in Cryptography 1515.94069 | 2022-12-21 | Paper |
| CArrency: an energy-efficient proof-of-work scheme for crypto-currencies | 2022-10-07 | Paper |
| Image encryption with parallel evolution of 2-D cellular automata | 2022-10-07 | Paper |
Investigating four neighbourhood cellular automata as better cryptographic primitives Journal of Discrete Mathematical Sciences and Cryptography | 2022-04-19 | Paper |
Generating nonlinear codes for multi-bit symbol error correction using cellular automata Physica D | 2022-03-16 | Paper |
| Preventing fault attack on stream ciphers by fault detection and correction | 2021-08-31 | Paper |
| Design of hash function using two dimensional cellular automata | 2021-08-31 | Paper |
| Preventing differential fault analysis attack on AEGIS family of ciphers | 2021-08-31 | Paper |
| scientific article; zbMATH DE number 7385042 (Why is no real title available?) | 2021-08-25 | Paper |
Design of fault-resilient S-boxes for AES-like block ciphers Cryptography and Communications | 2021-07-13 | Paper |
Achieving better security using nonlinear cellular automata as a cryptographic primitive Communications in Computer and Information Science | 2020-06-29 | Paper |
Study of five-neighborhood linear hybrid cellular automata and their synthesis Communications in Computer and Information Science | 2020-06-29 | Paper |
| Prevention of fault attacks in cellular automata based stream ciphers | 2020-03-12 | Paper |
Preventing fault attacks using fault randomisation with a case study on AES International Journal of Applied Cryptography | 2018-11-26 | Paper |
| \textsc{Gain}: practical key-recovery attacks on round-reduced \texttt{PAEQ} | 2018-10-26 | Paper |
| \textsc{EnCounter}: on breaking the nonce barrier in differential fault analysis with a case-study on PAEQ | 2018-02-14 | Paper |
| On the security of designing a cellular automata based stream cipher | 2017-08-25 | Paper |
Leakage squeezing using cellular automata and its application to scan attack Journal of Cellular Automata | 2016-06-10 | Paper |
\textsc{scope}: on the side channel vulnerability of releasing unverified plaintexts Lecture Notes in Computer Science | 2016-05-19 | Paper |
CASca: a CA based scalable stream cipher Springer Proceedings in Mathematics & Statistics | 2015-11-04 | Paper |
| NOCAS: a nonlinear cellular automata based stream cipher | 2015-11-02 | Paper |
Preventing fault attacks using fault randomization with a case study on AES Information Security and Privacy | 2015-10-20 | Paper |
\textsc{escape}: diagonal fault analysis of APE Progress in Cryptology -- INDOCRYPT 2014 | 2015-09-10 | Paper |
Practical distinguishers against 6-round Keccak-\(f\) exploiting self-symmetry Progress in Cryptology – AFRICACRYPT 2014 | 2014-06-24 | Paper |
Leakage squeezing using cellular automata Cellular Automata and Discrete Complex Systems | 2013-10-10 | Paper |
| CAvium -- strengthening Trivium stream cipher using cellular automata | 2013-04-03 | Paper |
Nimix : An involutary nonlinear vectorial Boolean function Journal of Discrete Mathematical Sciences & Cryptography | 2012-06-18 | Paper |
On usage of cellular automata in strengthening stream ciphers Journal of Discrete Mathematical Sciences & Cryptography | 2012-06-18 | Paper |
Fault analysis of grain-128 by targeting NFSR Lecture Notes in Computer Science | 2011-06-29 | Paper |
Null boundary 90/150 cellular automata for multi-byte error correcting code Lecture Notes in Computer Science | 2010-10-04 | Paper |
Provably secure key establishment protocol using one-way functions Journal of Discrete Mathematical Sciences and Cryptography | 2010-05-25 | Paper |
An Integrated ECC-MAC Based on RS Code Transactions on Computational Science IV | 2009-05-12 | Paper |
Parallel crypto-devices for GF(p) elliptic curve multiplication resistant against side channel attacks Computers and Electrical Engineering | 2009-03-20 | Paper |
An Efficient n ×n Boolean Mapping Using Additive Cellular Automata Lecture Notes in Computer Science | 2008-11-27 | Paper |
An Improved Double Byte Error Correcting Code Using Cellular Automata Lecture Notes in Computer Science | 2008-11-27 | Paper |
Characterization of a Class of Complemented Group Cellular Automata Lecture Notes in Computer Science | 2005-08-17 | Paper |
Design of CAECC - cellular automata based error correcting code IEEE Transactions on Computers | 2003-10-16 | Paper |
Theory and application of nongroup cellular automata for synthesis of easily testable finite state machines IEEE Transactions on Computers | 1996-01-01 | Paper |
CA-based byte error-correcting code IEEE Transactions on Computers | 1995-01-01 | Paper |
A low-cost high-capacity associative memory design using cellular automata IEEE Transactions on Computers | 1995-01-01 | Paper |