Dhiman Saha
Dhiman Saha
Indian Institute of Technology Bhilai
Verified email at iitbhilai.ac.in - Homepage
Title
Cited by
Cited by
Year
A Diagonal Fault Attack on the Advanced Encryption Standard.
D Saha, D Mukhopadhyay, DR Chowdhury
IACR Cryptol. ePrint Arch. 2009 (581), 2009
1202009
Scan based side channel attacks on stream ciphers and their counter-measures
M Agrawal, S Karmakar, D Saha, D Mukhopadhyay
International Conference on Cryptology in India, 226-238, 2008
702008
Preventing fault attacks using fault randomisation with a case study on AES
S Ghosh, D Saha, A Sengupta, DR Chowdhury
International Journal of Applied Cryptography 3 (3), 225-235, 2017
172017
Preventing Fault Attacks using Fault Randomization with a case study on AES
DRC Shamit Ghosh, Dhiman Saha, Abhrajit Sengupta
Australasian Conference on Information Security and Privacy, ACISP 2015 9144 …, 2015
17*2015
EscApe: Diagonal Fault Analysis of APE
D Saha, S Kuila, DR Chowdhury
International Conference on Cryptology in India, 197-216, 2014
152014
A Scalable Method for Constructing Non-linear Cellular Automata with Period 2 n  − 1
S Ghosh, A Sengupta, D Saha, DR Chowdhury
International Conference on Cellular Automata, 65-74, 2014
112014
Practical distinguishers against 6-round keccak-f exploiting self-symmetry
S Kuila, D Saha, M Pal, DR Chowdhury
International Conference on Cryptology in Africa, 88-108, 2014
102014
EnCounter: on breaking the nonce barrier in differential fault analysis with a case-study on PAEQ
D Saha, DR Chowdhury
International Conference on Cryptographic Hardware and Embedded Systems, 581-601, 2016
92016
Symsum: Symmetric-sum distinguishers against round reduced SHA3
D Saha, S Kuila, DR Chowdhury
IACR Transactions on Symmetric Cryptology, 240-258, 2017
82017
Key Recovery Attack Against 2.5-Round -Cipher
C Boura, A Chakraborti, G Leurent, G Paul, D Saha, H Soleimany, ...
International Conference on Fast Software Encryption, 535-553, 2016
82016
CASH: cellular automata based parameterized hash
S Kuila, D Saha, M Pal, DR Chowdhury
International Conference on Security, Privacy, and Applied Cryptography …, 2014
72014
To infect or not to infect: a critical analysis of infective countermeasures in fault attacks
A Baksi, D Saha, S Sarkar
Journal of Cryptographic Engineering 10, 355-374, 2020
62020
Cryptanalysis of forkaes
S Banik, J Bossert, A Jana, E List, S Lucks, W Meier, M Rahman, D Saha, ...
International Conference on Applied Cryptography and Network Security, 43-63, 2019
62019
Internal differential fault analysis of parallelizable ciphers in the counter-mode
D Saha, DR Chowdhury
Journal of Cryptographic Engineering 9 (1), 53-67, 2019
52019
Gain: Practical Key-Recovery Attacks on Round-reduced PAEQ
D Saha, S Kakarla, S Mandava, DR Chowdhury
International Conference on Security, Privacy, and Applied Cryptography …, 2016
52016
Scope: On the Side Channel Vulnerability of Releasing Unverified Plaintexts
D Saha, DR Chowdhury
International Conference on Selected Areas in Cryptography, 417-438, 2015
52015
Strengthening nls against crossword puzzle attack
D Bhattacharya, D Mukhopadhyay, D Saha, D RoyChowdhury
Australasian Conference on Information Security and Privacy, 29-44, 2007
42007
Fault attacks in symmetric key cryptosystems
A Baksi, S Bhasin, J Breier, D Jap, D Saha
Cryptology ePrint Archive, Report 2020/1267, 2020, https://eprint. iacr. org …, 2020
32020
New Yoyo tricks with AES-based permutations
D Saha, M Rahman, G Paul
IACR Transactions on Symmetric Cryptology, 102-127, 2018
32018
Gain: practical key-recovery attacks on round-reduced PAEQ
D Saha, S Kakarla, S Mandava, DR Chowdhury
Journal of Hardware and Systems Security 1 (3), 282-296, 2017
32017
The system can't perform the operation now. Try again later.
Articles 1–20