Santanu Sarkar

From MaRDI portal
(Redirected from Person:260043)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Beyond sequential walks: parallelizing the GA-dlog problem2026-03-23Paper
Improved modeling for substitution boxes with negative samples and beyond2026-03-23Paper
Memory-efficient attacks on small LWE keys
Journal of Cryptology
2024-10-11Paper
Analytic Kramer sampling and quasi Lagrange-type interpolation in vector valued RKHS
Results in Mathematics
2024-10-09Paper
Memory-efficient attacks on small LWE keys2024-09-13Paper
Differential faultt attack on \texttt{DEFAULT}
Advances in Mathematics of Communications
2024-08-06Paper
Enhanced differential-linear attacks on reduced round ChaCha
IEEE Transactions on Information Theory
2024-07-18Paper
Revisiting modular inversion hidden number problem and its applications
IEEE Transactions on Information Theory
2024-07-18Paper
Spread and asymmetry of typical quantum coherence and their inhibition in response to glassy disorder
New Journal of Physics
2024-06-21Paper
Analysis of RIPEMD-160: new collision attacks and finding characteristics with MILP
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
Representing the inverse map as a composition of quadratics in a finite field of characteristic $2$2023-09-29Paper
Improving bounds on elliptic curve hidden number problem for ECDH key exchange
Advances in Cryptology – ASIACRYPT 2022
2023-08-25Paper
Algebraic meet-in-the-middle attack on LowMC
Advances in Cryptology – ASIACRYPT 2022
2023-08-25Paper
Some results on lightweight stream ciphers Fountain v1 \& lizard
Advances in Mathematics of Communications
2023-07-07Paper
Latin dances reloaded: improved cryptanalysis against Salsa and ChaCha, and the proposal of Forró
Journal of Cryptology
2023-07-05Paper
Cryptanalysis of reduced round SPEEDY
Progress in Cryptology - AFRICACRYPT 2022
2023-06-02Paper
Algebraic attacks on Rasta and Dasta using low-degree equations
Lecture Notes in Computer Science
2023-05-12Paper
Partial key exposure attack on short secret exponent CRT-RSA
Lecture Notes in Computer Science
2023-05-12Paper
Boundedness of composition operator on several variable Paley-Wiener space
Linear Algebra and its Applications
2023-01-04Paper
Differential Fault Attack on Grain v1, ACORN v3 and Lizard
Security, Privacy, and Applied Cryptography Engineering
2022-12-09Paper
Revisiting Cryptanalysis on ChaCha From Crypto 2020 and Eurocrypt 2021
IEEE Transactions on Information Theory
2022-10-11Paper
The inverse of \(\chi\) and its applications to Rasta-like ciphers
Journal of Cryptology
2022-10-06Paper
Revamped differential-linear cryptanalysis on reduced round ChaCha2022-08-30Paper
Approximate divisor multiples -- factoring with only a third of the secret CRT-exponents2022-08-30Paper
Some Conditional Cube Testers for Grain-128a of Reduced Rounds
IEEE Transactions on Computers
2022-08-05Paper
On One-Dimensional Linear Minimal Codes Over Finite (Commutative) Rings
IEEE Transactions on Information Theory
2022-07-13Paper
Revisiting orthogonal lattice attacks on approximate common divisor problems
Theoretical Computer Science
2022-03-23Paper
A state bit recovery algorithm with TMDTO attack on Lizard and Grain-128a
Designs, Codes and Cryptography
2022-03-21Paper
Recursive MDS matrices over finite commutative rings
Discrete Applied Mathematics
2021-09-30Paper
A theoretical investigation on the distinguishers of Salsa and ChaCha
Discrete Applied Mathematics
2021-08-02Paper
Proving the biases of Salsa and ChaCha in differential attack
Designs, Codes and Cryptography
2020-09-22Paper
New results on Modular Inversion Hidden Number problem and inversive congruential generator2020-05-20Paper
Some cryptanalytic results on TRIAD2020-05-12Paper
Revisiting approximate polynomial common divisor problem and noisy multipolynomial reconstruction2020-05-12Paper
Cryptanalysis of elliptic curve hidden number problem from PKC 2017
Designs, Codes and Cryptography
2020-01-31Paper
New cube distinguishers on NFSR-based stream ciphers
Designs, Codes and Cryptography
2020-01-09Paper
Revisiting design principles of Salsa and ChaCha
Advances in Mathematics of Communications
2019-09-19Paper
Settling the mystery of \(Z_{r} = r\) in RC4
Cryptography and Communications
2019-07-10Paper
Some results on Fruit
Designs, Codes and Cryptography
2019-02-20Paper
Cryptanalysis of multi-prime \(\varPhi \)-hiding assumption2018-10-18Paper
Solving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generator
Designs, Codes and Cryptography
2018-07-13Paper
A Differential Fault Attack on Plantlet
IEEE Transactions on Computers
2018-06-27Paper
Properties of singular integral operators \(S_{\alpha,\beta}\)
Proceedings of the Indian Academy of Sciences. Mathematical Sciences
2018-05-31Paper
Generalization of roos bias in RC4 and some results on key-keystream relations
Journal of Mathematical Cryptology
2018-04-10Paper
Analysis of hidden number problem with hidden multiplier
Advances in Mathematics of Communications
2018-01-15Paper
Multiplication operators with deficiency indices \((p,p)\) and sampling formulas in reproducing kernel Hilbert spaces of entire vector valued functions
Journal of Functional Analysis
2017-10-17Paper
Approximate Integer Common Divisor Problem Relates to Implicit Factorization
IEEE Transactions on Information Theory
2017-07-12Paper
Improved analysis for reduced round Salsa and ChaCha
Discrete Applied Mathematics
2017-06-19Paper
Cryptanalysis of an RSA variant with moduli \(N=p^r q^l\)
Journal of Mathematical Cryptology
2017-06-12Paper
Differential Fault Attack against Grain Family with Very Few Faults and Minimal Assumptions
IEEE Transactions on Computers
2017-05-16Paper
Probabilistic signature based generalized framework for differential fault analysis of stream ciphers
Cryptography and Communications
2017-03-27Paper
Revisiting (nested) Roos bias in RC4 key scheduling algorithm
Designs, Codes and Cryptography
2017-02-10Paper
Observing biases in the state: case studies with Trivium and Trivia-SC
Designs, Codes and Cryptography
2017-02-10Paper
On acyclic edge-coloring of complete bipartite graphs
Discrete Mathematics
2016-12-22Paper
Revisiting prime power RSA
Discrete Applied Mathematics
2016-03-18Paper
Cryptanalysis of variants of RSA with multiple small secret exponents
Progress in Cryptology -- INDOCRYPT 2015
2016-01-12Paper
Further non-randomness in RC4, RC4A and VMPC
Cryptography and Communications
2015-11-19Paper
On acyclic edge-coloring of the complete bipartite graphs \(K_{2p-1, 2p-1}\) for odd prime \(p\)
Discrete Mathematics
2015-10-08Paper
Proving TLS-attack related open biases of RC4
Designs, Codes and Cryptography
2015-09-30Paper
Dependence in IV-related bytes of RC4 key enhances vulnerabilities in WPA
Fast Software Encryption
2015-09-18Paper
Partial key exposure attack on CRT-RSA
Progress in Cryptology -- INDOCRYPT 2014
2015-09-10Paper
A Differential Fault Attack on the Grain Family under Reasonable Assumptions
Lecture Notes in Computer Science
2014-08-20Paper
Small secret exponent attack on RSA variant with modulus \(N=p^rq\)
Designs, Codes and Cryptography
2014-08-18Paper
Proving empirical key-correlations in RC4
Information Processing Letters
2014-04-15Paper
(Non-)random sequences from (non-)random permutations -- analysis of RC4 stream cipher
Journal of Cryptology
2014-04-01Paper
Security analysis of the RC4+ stream cipher
Lecture Notes in Computer Science
2014-01-14Paper
Counting Heron triangles with constraints
Integers
2013-10-25Paper
A chosen IV related key attack on Grain-128a
Information Security and Privacy
2013-06-28Paper
New Results on Generalization of Roos-Type Biases and Related Keystreams of RC4
Progress in Cryptology – AFRICACRYPT 2013
2013-06-07Paper
A differential fault attack on Grain-128a using macs
Security, Privacy, and Applied Cryptography Engineering
2013-03-13Paper
Some results on related key-IV pairs of grain
Security, Privacy, and Applied Cryptography Engineering
2013-03-13Paper
Relaxing IND-CCA: indistinguishability against chosen ciphertext verification attack
Security, Privacy, and Applied Cryptography Engineering
2013-03-13Paper
Reduction in lossiness of RSA trapdoor permutation
Security, Privacy, and Applied Cryptography Engineering
2013-03-13Paper
Cryptanalytic results on `Dual CRT' and `Common Prime' RSA
Designs, Codes and Cryptography
2013-01-28Paper
The defect sequence for contractive tuples
Linear Algebra and its Applications
2013-01-21Paper
A differential fault attack on the grain family of stream ciphers
Cryptographic Hardware and Embedded Systems – CHES 2012
2012-11-13Paper
Side channel attack to actual cryptanalysis: breaking CRT-RSA with low weight decryption exponents
Cryptographic Hardware and Embedded Systems – CHES 2012
2012-11-13Paper
Proof of empirical RC4 biases and new key correlations
Selected Areas in Cryptography
2012-06-08Paper
Partial key exposure: generalized framework to attack RSA
Lecture Notes in Computer Science
2011-12-16Paper
On the evolution of GGHN cipher
Lecture Notes in Computer Science
2011-12-16Paper
Some applications of lattice based root finding techniques
Advances in Mathematics of Communications
2011-06-03Paper
Partial key exposure attack on RSA -- improvements for limited lattice dimensions
Progress in Cryptology - INDOCRYPT 2010
2010-12-07Paper
Cryptanalysis of RSA with two decryption exponents
Information Processing Letters
2010-09-07Paper
Cryptanalysis of RSA with more than one decryption exponent
Information Processing Letters
2010-09-07Paper
Factoring RSA modulus using prime reconstruction from random known bits
Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings
2010-05-04Paper
Efficient CRT-RSA decryption for small encryption exponents
Topics in Cryptology - CT-RSA 2010
2010-03-16Paper
Further results on implicit factoring in polynomial time
Advances in Mathematics of Communications
2010-03-10Paper
PARTIAL KEY EXPOSURE ATTACKS ON RSA AND ITS VARIANT BY GUESSING A FEW BITS OF ONE OF THE PRIME FACTORS
Bulletin of the Korean Mathematical Society
2009-08-06Paper
Improved Partial Key Exposure Attacks on RSA by Guessing a Few Bits of One of the Prime Factors
Information Security and Cryptology – ICISC 2008
2009-03-24Paper
A New Class of Weak Encryption Exponents in RSA
Progress in Cryptology - INDOCRYPT 2008
2009-01-22Paper
Revisiting Wiener’s Attack – New Weak Keys in RSA
Lecture Notes in Computer Science
2008-11-20Paper


Research outcomes over time


This page was built for person: Santanu Sarkar