Santanu Sarkar

From MaRDI portal


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Memory-efficient attacks on small LWE keys
Journal of Cryptology
2024-10-11Paper
Analytic Kramer sampling and quasi Lagrange-type interpolation in vector valued RKHS
Results in Mathematics
2024-10-09Paper
Memory-efficient attacks on small LWE keys
 
2024-09-13Paper
Differential faultt attack on \texttt{DEFAULT}
Advances in Mathematics of Communications
2024-08-06Paper
Enhanced differential-linear attacks on reduced round ChaCha
IEEE Transactions on Information Theory
2024-07-18Paper
Revisiting modular inversion hidden number problem and its applications
IEEE Transactions on Information Theory
2024-07-18Paper
Spread and asymmetry of typical quantum coherence and their inhibition in response to glassy disorder
New Journal of Physics
2024-06-21Paper
Analysis of RIPEMD-160: new collision attacks and finding characteristics with MILP
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
Representing the inverse map as a composition of quadratics in a finite field of characteristic $2$
 
2023-09-29Paper
Improving bounds on elliptic curve hidden number problem for ECDH key exchange
Advances in Cryptology – ASIACRYPT 2022
2023-08-25Paper
Algebraic meet-in-the-middle attack on LowMC
Advances in Cryptology – ASIACRYPT 2022
2023-08-25Paper
Some results on lightweight stream ciphers Fountain v1 \& lizard
Advances in Mathematics of Communications
2023-07-07Paper
Latin dances reloaded: improved cryptanalysis against Salsa and ChaCha, and the proposal of Forró
Journal of Cryptology
2023-07-05Paper
Cryptanalysis of reduced round SPEEDY
Progress in Cryptology - AFRICACRYPT 2022
2023-06-02Paper
Algebraic attacks on Rasta and Dasta using low-degree equations
Lecture Notes in Computer Science
2023-05-12Paper
Partial key exposure attack on short secret exponent CRT-RSA
Lecture Notes in Computer Science
2023-05-12Paper
Boundedness of composition operator on several variable Paley-Wiener space
Linear Algebra and its Applications
2023-01-04Paper
Differential Fault Attack on Grain v1, ACORN v3 and Lizard
Security, Privacy, and Applied Cryptography Engineering
2022-12-09Paper
Revisiting Cryptanalysis on ChaCha From Crypto 2020 and Eurocrypt 2021
IEEE Transactions on Information Theory
2022-10-11Paper
The inverse of \(\chi\) and its applications to Rasta-like ciphers
Journal of Cryptology
2022-10-06Paper
Revamped differential-linear cryptanalysis on reduced round ChaCha
 
2022-08-30Paper
Approximate divisor multiples -- factoring with only a third of the secret CRT-exponents
 
2022-08-30Paper
Some Conditional Cube Testers for Grain-128a of Reduced Rounds
IEEE Transactions on Computers
2022-08-05Paper
On One-Dimensional Linear Minimal Codes Over Finite (Commutative) Rings
IEEE Transactions on Information Theory
2022-07-13Paper
Revisiting orthogonal lattice attacks on approximate common divisor problems
Theoretical Computer Science
2022-03-23Paper
A state bit recovery algorithm with TMDTO attack on Lizard and Grain-128a
Designs, Codes and Cryptography
2022-03-21Paper
Recursive MDS matrices over finite commutative rings
Discrete Applied Mathematics
2021-09-30Paper
A theoretical investigation on the distinguishers of Salsa and ChaCha
Discrete Applied Mathematics
2021-08-02Paper
Proving the biases of Salsa and ChaCha in differential attack
Designs, Codes and Cryptography
2020-09-22Paper
New results on Modular Inversion Hidden Number problem and inversive congruential generator
 
2020-05-20Paper
Some cryptanalytic results on TRIAD
 
2020-05-12Paper
Revisiting approximate polynomial common divisor problem and noisy multipolynomial reconstruction
 
2020-05-12Paper
Cryptanalysis of elliptic curve hidden number problem from PKC 2017
Designs, Codes and Cryptography
2020-01-31Paper
New cube distinguishers on NFSR-based stream ciphers
Designs, Codes and Cryptography
2020-01-09Paper
Revisiting design principles of Salsa and ChaCha
Advances in Mathematics of Communications
2019-09-19Paper
Settling the mystery of \(Z_{r} = r\) in RC4
Cryptography and Communications
2019-07-10Paper
Some results on Fruit
Designs, Codes and Cryptography
2019-02-20Paper
Cryptanalysis of multi-prime \(\varPhi \)-hiding assumption
 
2018-10-18Paper
Solving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generator
Designs, Codes and Cryptography
2018-07-13Paper
A Differential Fault Attack on Plantlet
IEEE Transactions on Computers
2018-06-27Paper
Properties of singular integral operators \(S_{\alpha,\beta}\)
Proceedings of the Indian Academy of Sciences. Mathematical Sciences
2018-05-31Paper
Generalization of roos bias in RC4 and some results on key-keystream relations
Journal of Mathematical Cryptology
2018-04-10Paper
Analysis of hidden number problem with hidden multiplier
Advances in Mathematics of Communications
2018-01-15Paper
Multiplication operators with deficiency indices \((p,p)\) and sampling formulas in reproducing kernel Hilbert spaces of entire vector valued functions
Journal of Functional Analysis
2017-10-17Paper
Approximate Integer Common Divisor Problem Relates to Implicit Factorization
IEEE Transactions on Information Theory
2017-07-12Paper
Improved analysis for reduced round Salsa and ChaCha
Discrete Applied Mathematics
2017-06-19Paper
Cryptanalysis of an RSA variant with moduli \(N=p^r q^l\)
Journal of Mathematical Cryptology
2017-06-12Paper
Differential Fault Attack against Grain Family with Very Few Faults and Minimal Assumptions
IEEE Transactions on Computers
2017-05-16Paper
Probabilistic signature based generalized framework for differential fault analysis of stream ciphers
Cryptography and Communications
2017-03-27Paper
Revisiting (nested) Roos bias in RC4 key scheduling algorithm
Designs, Codes and Cryptography
2017-02-10Paper
Observing biases in the state: case studies with Trivium and Trivia-SC
Designs, Codes and Cryptography
2017-02-10Paper
On acyclic edge-coloring of complete bipartite graphs
Discrete Mathematics
2016-12-22Paper
Revisiting prime power RSA
Discrete Applied Mathematics
2016-03-18Paper
Cryptanalysis of variants of RSA with multiple small secret exponents
Progress in Cryptology -- INDOCRYPT 2015
2016-01-12Paper
Further non-randomness in RC4, RC4A and VMPC
Cryptography and Communications
2015-11-19Paper
On acyclic edge-coloring of the complete bipartite graphs \(K_{2p-1, 2p-1}\) for odd prime \(p\)
Discrete Mathematics
2015-10-08Paper
Proving TLS-attack related open biases of RC4
Designs, Codes and Cryptography
2015-09-30Paper
Dependence in IV-related bytes of RC4 key enhances vulnerabilities in WPA
Fast Software Encryption
2015-09-18Paper
Partial key exposure attack on CRT-RSA
Progress in Cryptology -- INDOCRYPT 2014
2015-09-10Paper
A Differential Fault Attack on the Grain Family under Reasonable Assumptions
Lecture Notes in Computer Science
2014-08-20Paper
Small secret exponent attack on RSA variant with modulus \(N=p^rq\)
Designs, Codes and Cryptography
2014-08-18Paper
Proving empirical key-correlations in RC4
Information Processing Letters
2014-04-15Paper
(Non-)random sequences from (non-)random permutations -- analysis of RC4 stream cipher
Journal of Cryptology
2014-04-01Paper
Security analysis of the RC4+ stream cipher
Lecture Notes in Computer Science
2014-01-14Paper
Counting Heron triangles with constraints
Integers
2013-10-25Paper
A chosen IV related key attack on Grain-128a
Information Security and Privacy
2013-06-28Paper
New Results on Generalization of Roos-Type Biases and Related Keystreams of RC4
Progress in Cryptology – AFRICACRYPT 2013
2013-06-07Paper
A differential fault attack on Grain-128a using macs
Security, Privacy, and Applied Cryptography Engineering
2013-03-13Paper
Some results on related key-IV pairs of grain
Security, Privacy, and Applied Cryptography Engineering
2013-03-13Paper
Relaxing IND-CCA: indistinguishability against chosen ciphertext verification attack
Security, Privacy, and Applied Cryptography Engineering
2013-03-13Paper
Reduction in lossiness of RSA trapdoor permutation
Security, Privacy, and Applied Cryptography Engineering
2013-03-13Paper
Cryptanalytic results on `Dual CRT' and `Common Prime' RSA
Designs, Codes and Cryptography
2013-01-28Paper
The defect sequence for contractive tuples
Linear Algebra and its Applications
2013-01-21Paper
A differential fault attack on the grain family of stream ciphers
Cryptographic Hardware and Embedded Systems – CHES 2012
2012-11-13Paper
Side channel attack to actual cryptanalysis: breaking CRT-RSA with low weight decryption exponents
Cryptographic Hardware and Embedded Systems – CHES 2012
2012-11-13Paper
Proof of empirical RC4 biases and new key correlations
Selected Areas in Cryptography
2012-06-08Paper
Partial key exposure: generalized framework to attack RSA
Lecture Notes in Computer Science
2011-12-16Paper
On the evolution of GGHN cipher
Lecture Notes in Computer Science
2011-12-16Paper
Some applications of lattice based root finding techniques
Advances in Mathematics of Communications
2011-06-03Paper
Partial key exposure attack on RSA -- improvements for limited lattice dimensions
Progress in Cryptology - INDOCRYPT 2010
2010-12-07Paper
Cryptanalysis of RSA with two decryption exponents
Information Processing Letters
2010-09-07Paper
Cryptanalysis of RSA with more than one decryption exponent
Information Processing Letters
2010-09-07Paper
Factoring RSA modulus using prime reconstruction from random known bits
Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings
2010-05-04Paper
Efficient CRT-RSA decryption for small encryption exponents
Topics in Cryptology - CT-RSA 2010
2010-03-16Paper
Further results on implicit factoring in polynomial time
Advances in Mathematics of Communications
2010-03-10Paper
PARTIAL KEY EXPOSURE ATTACKS ON RSA AND ITS VARIANT BY GUESSING A FEW BITS OF ONE OF THE PRIME FACTORS
Bulletin of the Korean Mathematical Society
2009-08-06Paper
Improved Partial Key Exposure Attacks on RSA by Guessing a Few Bits of One of the Prime Factors
Information Security and Cryptology – ICISC 2008
2009-03-24Paper
A New Class of Weak Encryption Exponents in RSA
Progress in Cryptology - INDOCRYPT 2008
2009-01-22Paper
Revisiting Wiener’s Attack – New Weak Keys in RSA
Lecture Notes in Computer Science
2008-11-20Paper


Research outcomes over time


This page was built for person: Santanu Sarkar