The following pages link to Santanu Sarkar (Q260043):
Displaying 50 items.
- Revisiting prime power RSA (Q260044) (← links)
- Small secret exponent attack on RSA variant with modulus \(N=p^rq\) (Q398942) (← links)
- Proving TLS-attack related open biases of RC4 (Q499670) (← links)
- On acyclic edge-coloring of the complete bipartite graphs \(K_{2p-1, 2p-1}\) for odd prime \(p\) (Q501029) (← links)
- Revisiting (nested) Roos bias in RC4 key scheduling algorithm (Q510460) (← links)
- Observing biases in the state: case studies with Trivium and Trivia-SC (Q510484) (← links)
- Probabilistic signature based generalized framework for differential fault analysis of stream ciphers (Q517727) (← links)
- Some applications of lattice based root finding techniques (Q540395) (← links)
- On acyclic edge-coloring of complete bipartite graphs (Q729782) (← links)
- Further non-randomness in RC4, RC4A and VMPC (Q892388) (← links)
- Cryptanalysis of RSA with two decryption exponents (Q991745) (← links)
- Cryptanalysis of RSA with more than one decryption exponent (Q991798) (← links)
- Solving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generator (Q1650812) (← links)
- Analysis of hidden number problem with hidden multiplier (Q1691252) (← links)
- Some results on Fruit (Q1727353) (← links)
- Properties of singular integral operators \(S_{\alpha,\beta}\) (Q1754558) (← links)
- Cryptanalysis of multi-prime \(\varPhi \)-hiding assumption (Q1799204) (← links)
- The defect sequence for contractive tuples (Q1932607) (← links)
- Cryptanalytic results on `Dual CRT' and `Common Prime' RSA (Q1934238) (← links)
- A theoretical investigation on the distinguishers of Salsa and ChaCha (Q2043369) (← links)
- The inverse of \(\chi\) and its applications to Rasta-like ciphers (Q2089404) (← links)
- A state bit recovery algorithm with TMDTO attack on Lizard and Grain-128a (Q2115734) (← links)
- Revisiting orthogonal lattice attacks on approximate common divisor problems (Q2118873) (← links)
- Revamped differential-linear cryptanalysis on reduced round ChaCha (Q2170082) (← links)
- Approximate divisor multiples -- factoring with only a third of the secret CRT-exponents (Q2170085) (← links)
- Some cryptanalytic results on TRIAD (Q2179386) (← links)
- Revisiting approximate polynomial common divisor problem and noisy multipolynomial reconstruction (Q2179403) (← links)
- New results on Modular Inversion Hidden Number problem and inversive congruential generator (Q2181854) (← links)
- Proving the biases of Salsa and ChaCha in differential attack (Q2200515) (← links)
- Recursive MDS matrices over finite commutative rings (Q2231784) (← links)
- Further results on implicit factoring in polynomial time (Q2268250) (← links)
- Revisiting design principles of Salsa and ChaCha (Q2274242) (← links)
- New cube distinguishers on NFSR-based stream ciphers (Q2285784) (← links)
- Cryptanalysis of elliptic curve hidden number problem from PKC 2017 (Q2291665) (← links)
- Settling the mystery of \(Z_{r} = r\) in RC4 (Q2311426) (← links)
- Improved analysis for reduced round Salsa and ChaCha (Q2357133) (← links)
- Multiplication operators with deficiency indices \((p,p)\) and sampling formulas in reproducing kernel Hilbert spaces of entire vector valued functions (Q2410353) (← links)
- Generalization of roos bias in RC4 and some results on key-keystream relations (Q2413290) (← links)
- (Non-)random sequences from (non-)random permutations -- analysis of RC4 stream cipher (Q2442647) (← links)
- Proving empirical key-correlations in RC4 (Q2446064) (← links)
- Cryptanalysis of an RSA variant with moduli \(N=p^r q^l\) (Q2628124) (← links)
- Boundedness of composition operator on several variable Paley-Wiener space (Q2680589) (← links)
- (Q2855575) (← links)
- Security Analysis of the RC4+ Stream Cipher (Q2872063) (← links)
- A Differential Fault Attack on the Grain Family under Reasonable Assumptions (Q2876933) (← links)
- Proof of Empirical RC4 Biases and New Key Correlations (Q2889868) (← links)
- Partial Key Exposure Attack on CRT-RSA (Q2945387) (← links)
- Dependence in IV-Related Bytes of RC4 Key Enhances Vulnerabilities in WPA (Q2946918) (← links)
- Differential Fault Attack against Grain Family with Very Few Faults and Minimal Assumptions (Q2982244) (← links)
- Partial Key Exposure Attack on RSA – Improvements for Limited Lattice Dimensions (Q3058709) (← links)