| Publication | Date of Publication | Type |
|---|
Memory-efficient attacks on small LWE keys Journal of Cryptology | 2024-10-11 | Paper |
Analytic Kramer sampling and quasi Lagrange-type interpolation in vector valued RKHS Results in Mathematics | 2024-10-09 | Paper |
Memory-efficient attacks on small LWE keys | 2024-09-13 | Paper |
Differential faultt attack on \texttt{DEFAULT} Advances in Mathematics of Communications | 2024-08-06 | Paper |
Enhanced differential-linear attacks on reduced round ChaCha IEEE Transactions on Information Theory | 2024-07-18 | Paper |
Revisiting modular inversion hidden number problem and its applications IEEE Transactions on Information Theory | 2024-07-18 | Paper |
Spread and asymmetry of typical quantum coherence and their inhibition in response to glassy disorder New Journal of Physics | 2024-06-21 | Paper |
Analysis of RIPEMD-160: new collision attacks and finding characteristics with MILP Advances in Cryptology – EUROCRYPT 2023 | 2023-12-08 | Paper |
Representing the inverse map as a composition of quadratics in a finite field of characteristic $2$ | 2023-09-29 | Paper |
Improving bounds on elliptic curve hidden number problem for ECDH key exchange Advances in Cryptology – ASIACRYPT 2022 | 2023-08-25 | Paper |
Algebraic meet-in-the-middle attack on LowMC Advances in Cryptology – ASIACRYPT 2022 | 2023-08-25 | Paper |
Some results on lightweight stream ciphers Fountain v1 \& lizard Advances in Mathematics of Communications | 2023-07-07 | Paper |
Latin dances reloaded: improved cryptanalysis against Salsa and ChaCha, and the proposal of Forró Journal of Cryptology | 2023-07-05 | Paper |
Cryptanalysis of reduced round SPEEDY Progress in Cryptology - AFRICACRYPT 2022 | 2023-06-02 | Paper |
Algebraic attacks on Rasta and Dasta using low-degree equations Lecture Notes in Computer Science | 2023-05-12 | Paper |
Partial key exposure attack on short secret exponent CRT-RSA Lecture Notes in Computer Science | 2023-05-12 | Paper |
Boundedness of composition operator on several variable Paley-Wiener space Linear Algebra and its Applications | 2023-01-04 | Paper |
Differential Fault Attack on Grain v1, ACORN v3 and Lizard Security, Privacy, and Applied Cryptography Engineering | 2022-12-09 | Paper |
Revisiting Cryptanalysis on ChaCha From Crypto 2020 and Eurocrypt 2021 IEEE Transactions on Information Theory | 2022-10-11 | Paper |
The inverse of \(\chi\) and its applications to Rasta-like ciphers Journal of Cryptology | 2022-10-06 | Paper |
Revamped differential-linear cryptanalysis on reduced round ChaCha | 2022-08-30 | Paper |
Approximate divisor multiples -- factoring with only a third of the secret CRT-exponents | 2022-08-30 | Paper |
Some Conditional Cube Testers for Grain-128a of Reduced Rounds IEEE Transactions on Computers | 2022-08-05 | Paper |
On One-Dimensional Linear Minimal Codes Over Finite (Commutative) Rings IEEE Transactions on Information Theory | 2022-07-13 | Paper |
Revisiting orthogonal lattice attacks on approximate common divisor problems Theoretical Computer Science | 2022-03-23 | Paper |
A state bit recovery algorithm with TMDTO attack on Lizard and Grain-128a Designs, Codes and Cryptography | 2022-03-21 | Paper |
Recursive MDS matrices over finite commutative rings Discrete Applied Mathematics | 2021-09-30 | Paper |
A theoretical investigation on the distinguishers of Salsa and ChaCha Discrete Applied Mathematics | 2021-08-02 | Paper |
Proving the biases of Salsa and ChaCha in differential attack Designs, Codes and Cryptography | 2020-09-22 | Paper |
New results on Modular Inversion Hidden Number problem and inversive congruential generator | 2020-05-20 | Paper |
Some cryptanalytic results on TRIAD | 2020-05-12 | Paper |
Revisiting approximate polynomial common divisor problem and noisy multipolynomial reconstruction | 2020-05-12 | Paper |
Cryptanalysis of elliptic curve hidden number problem from PKC 2017 Designs, Codes and Cryptography | 2020-01-31 | Paper |
New cube distinguishers on NFSR-based stream ciphers Designs, Codes and Cryptography | 2020-01-09 | Paper |
Revisiting design principles of Salsa and ChaCha Advances in Mathematics of Communications | 2019-09-19 | Paper |
Settling the mystery of \(Z_{r} = r\) in RC4 Cryptography and Communications | 2019-07-10 | Paper |
Some results on Fruit Designs, Codes and Cryptography | 2019-02-20 | Paper |
Cryptanalysis of multi-prime \(\varPhi \)-hiding assumption | 2018-10-18 | Paper |
Solving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generator Designs, Codes and Cryptography | 2018-07-13 | Paper |
A Differential Fault Attack on Plantlet IEEE Transactions on Computers | 2018-06-27 | Paper |
Properties of singular integral operators \(S_{\alpha,\beta}\) Proceedings of the Indian Academy of Sciences. Mathematical Sciences | 2018-05-31 | Paper |
Generalization of roos bias in RC4 and some results on key-keystream relations Journal of Mathematical Cryptology | 2018-04-10 | Paper |
Analysis of hidden number problem with hidden multiplier Advances in Mathematics of Communications | 2018-01-15 | Paper |
Multiplication operators with deficiency indices \((p,p)\) and sampling formulas in reproducing kernel Hilbert spaces of entire vector valued functions Journal of Functional Analysis | 2017-10-17 | Paper |
Approximate Integer Common Divisor Problem Relates to Implicit Factorization IEEE Transactions on Information Theory | 2017-07-12 | Paper |
Improved analysis for reduced round Salsa and ChaCha Discrete Applied Mathematics | 2017-06-19 | Paper |
Cryptanalysis of an RSA variant with moduli \(N=p^r q^l\) Journal of Mathematical Cryptology | 2017-06-12 | Paper |
Differential Fault Attack against Grain Family with Very Few Faults and Minimal Assumptions IEEE Transactions on Computers | 2017-05-16 | Paper |
Probabilistic signature based generalized framework for differential fault analysis of stream ciphers Cryptography and Communications | 2017-03-27 | Paper |
Revisiting (nested) Roos bias in RC4 key scheduling algorithm Designs, Codes and Cryptography | 2017-02-10 | Paper |
Observing biases in the state: case studies with Trivium and Trivia-SC Designs, Codes and Cryptography | 2017-02-10 | Paper |
On acyclic edge-coloring of complete bipartite graphs Discrete Mathematics | 2016-12-22 | Paper |
Revisiting prime power RSA Discrete Applied Mathematics | 2016-03-18 | Paper |
Cryptanalysis of variants of RSA with multiple small secret exponents Progress in Cryptology -- INDOCRYPT 2015 | 2016-01-12 | Paper |
Further non-randomness in RC4, RC4A and VMPC Cryptography and Communications | 2015-11-19 | Paper |
On acyclic edge-coloring of the complete bipartite graphs \(K_{2p-1, 2p-1}\) for odd prime \(p\) Discrete Mathematics | 2015-10-08 | Paper |
Proving TLS-attack related open biases of RC4 Designs, Codes and Cryptography | 2015-09-30 | Paper |
Dependence in IV-related bytes of RC4 key enhances vulnerabilities in WPA Fast Software Encryption | 2015-09-18 | Paper |
Partial key exposure attack on CRT-RSA Progress in Cryptology -- INDOCRYPT 2014 | 2015-09-10 | Paper |
A Differential Fault Attack on the Grain Family under Reasonable Assumptions Lecture Notes in Computer Science | 2014-08-20 | Paper |
Small secret exponent attack on RSA variant with modulus \(N=p^rq\) Designs, Codes and Cryptography | 2014-08-18 | Paper |
Proving empirical key-correlations in RC4 Information Processing Letters | 2014-04-15 | Paper |
(Non-)random sequences from (non-)random permutations -- analysis of RC4 stream cipher Journal of Cryptology | 2014-04-01 | Paper |
Security analysis of the RC4+ stream cipher Lecture Notes in Computer Science | 2014-01-14 | Paper |
Counting Heron triangles with constraints Integers | 2013-10-25 | Paper |
A chosen IV related key attack on Grain-128a Information Security and Privacy | 2013-06-28 | Paper |
New Results on Generalization of Roos-Type Biases and Related Keystreams of RC4 Progress in Cryptology – AFRICACRYPT 2013 | 2013-06-07 | Paper |
A differential fault attack on Grain-128a using macs Security, Privacy, and Applied Cryptography Engineering | 2013-03-13 | Paper |
Some results on related key-IV pairs of grain Security, Privacy, and Applied Cryptography Engineering | 2013-03-13 | Paper |
Relaxing IND-CCA: indistinguishability against chosen ciphertext verification attack Security, Privacy, and Applied Cryptography Engineering | 2013-03-13 | Paper |
Reduction in lossiness of RSA trapdoor permutation Security, Privacy, and Applied Cryptography Engineering | 2013-03-13 | Paper |
Cryptanalytic results on `Dual CRT' and `Common Prime' RSA Designs, Codes and Cryptography | 2013-01-28 | Paper |
The defect sequence for contractive tuples Linear Algebra and its Applications | 2013-01-21 | Paper |
A differential fault attack on the grain family of stream ciphers Cryptographic Hardware and Embedded Systems – CHES 2012 | 2012-11-13 | Paper |
Side channel attack to actual cryptanalysis: breaking CRT-RSA with low weight decryption exponents Cryptographic Hardware and Embedded Systems – CHES 2012 | 2012-11-13 | Paper |
Proof of empirical RC4 biases and new key correlations Selected Areas in Cryptography | 2012-06-08 | Paper |
Partial key exposure: generalized framework to attack RSA Lecture Notes in Computer Science | 2011-12-16 | Paper |
On the evolution of GGHN cipher Lecture Notes in Computer Science | 2011-12-16 | Paper |
Some applications of lattice based root finding techniques Advances in Mathematics of Communications | 2011-06-03 | Paper |
Partial key exposure attack on RSA -- improvements for limited lattice dimensions Progress in Cryptology - INDOCRYPT 2010 | 2010-12-07 | Paper |
Cryptanalysis of RSA with two decryption exponents Information Processing Letters | 2010-09-07 | Paper |
Cryptanalysis of RSA with more than one decryption exponent Information Processing Letters | 2010-09-07 | Paper |
Factoring RSA modulus using prime reconstruction from random known bits Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings | 2010-05-04 | Paper |
Efficient CRT-RSA decryption for small encryption exponents Topics in Cryptology - CT-RSA 2010 | 2010-03-16 | Paper |
Further results on implicit factoring in polynomial time Advances in Mathematics of Communications | 2010-03-10 | Paper |
PARTIAL KEY EXPOSURE ATTACKS ON RSA AND ITS VARIANT BY GUESSING A FEW BITS OF ONE OF THE PRIME FACTORS Bulletin of the Korean Mathematical Society | 2009-08-06 | Paper |
Improved Partial Key Exposure Attacks on RSA by Guessing a Few Bits of One of the Prime Factors Information Security and Cryptology – ICISC 2008 | 2009-03-24 | Paper |
A New Class of Weak Encryption Exponents in RSA Progress in Cryptology - INDOCRYPT 2008 | 2009-01-22 | Paper |
Revisiting Wiener’s Attack – New Weak Keys in RSA Lecture Notes in Computer Science | 2008-11-20 | Paper |