Somitra Kumar Sanadhya

From MaRDI portal
Person:1032493

Available identifiers

zbMath Open sanadhya.somitra-kumarMaRDI QIDQ1032493

List of research outcomes

PublicationDate of PublicationType
On the Structure of Format Preserving Sets in the Diffusion Layer of Block Ciphers2024-03-14Paper
Implementing Grover oracle for lightweight block ciphers under depth constraints2023-07-26Paper
eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices2022-12-09Paper
Counting active S-boxes is not enough2022-07-06Paper
Quantum resource estimates of Grover's key search on ARIA2021-12-08Paper
A new authenticated encryption technique for handling long ciphertexts in memory constrained devices2018-11-26Paper
Sponge-based CCA2 secure asymmetric encryption for arbitrary length message (extended version)2018-11-26Paper
Exploiting the leakage: analysis of some authenticated encryption schemes2018-10-26Paper
SPF: A New Family of Efficient Format-Preserving Encryption Algorithms2017-05-05Paper
Biclique Cryptanalysis of Full Round AES-128 Based Hashing Modes2016-07-25Paper
Single Key Recovery Attacks on 9-Round Kalyna-128/256 and Kalyna-256/5122016-05-19Paper
PPAE: Practical Parazoa Authenticated Encryption Family2016-01-27Paper
Improved Meet-in-the-Middle Attacks on 7 and 8-Round ARIA-192 and ARIA-2562016-01-12Paper
Differential Fault Analysis of SHA-32016-01-12Paper
Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis Technique2015-11-25Paper
Rig: A Simple, Secure and Flexible Design for Password Hashing2015-11-25Paper
Sponge Based CCA2 Secure Asymmetric Encryption for Arbitrary Length Message2015-10-20Paper
sp-AELM: Sponge Based Authenticated Encryption Scheme for Memory Constrained Devices2015-10-20Paper
Bicliques with Minimal Data and Time Complexity for AES2015-09-11Paper
Security Analysis of GFN: 8-Round Distinguisher for 4-Branch Type-2 GFN2014-01-14Paper
Cryptanalysis of Tav-128 Hash Function2010-12-07Paper
A combinatorial analysis of recent attacks on step reduced SHA-2 family2009-10-26Paper
New Collision Attacks against Up to 24-Step SHA-22009-01-22Paper
Deterministic Constructions of 21-Step Collisions for the SHA-2 Hash Family2008-11-20Paper
Non-linear Reduced Round Attacks against SHA-2 Hash Family2008-07-08Paper
Attacking Reduced Round SHA-2562008-06-13Paper
On identifying marker genes from gene expression data in a neural framework through online feature analysis2006-05-16Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Somitra Kumar Sanadhya