Megha Agrawal
Megha Agrawal
Verified email at iiitd.ac.in
TitleCited byYear
sp-AELM: Sponge based authenticated encryption scheme for memory constrained devices
M Agrawal, D Chang, S Sanadhya
Australasian Conference on Information Security and Privacy, 451-468, 2015
62015
RCB: leakage-resilient authenticated encryption via re-keying
M Agrawal, TK Bansal, D Chang, AK Chauhan, S Hong, J Kang, ...
The Journal of Supercomputing 74 (9), 4173-4198, 2018
52018
A New Authenticated Encryption Technique for Handling Long Ciphertexts in Memory Constrained Devices.
M Agrawal, D Chang, SK Sanadhya
IJACT 3 (3), 236-261, 2017
32017
Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis Technique
SS Megha Agrawal, Donghoon Chang
Inscrypt-2014 8957 (Lecture Notes in Computer Science), 343--360, 2014
3*2014
CAN-FD-Sec: Improving Security of CAN-FD Protocol
M Agrawal, T Huang, J Zhou, D Chang
Security and Safety Interplay of Intelligent Software Systems, 77-93, 2018
12018
A Survey on Lightweight Authenticated Encryption and Challenges for Securing Industrial IoT
M Agrawal, J Zhou, D Chang
Security and Privacy Trends in the Industrial Internet of Things, 71-94, 2019
2019
Deterministic Authenticated Encryption Scheme for Memory Constrained Devices
M Agrawal, D Chang, J Kang
Cryptography 2 (4), 37, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–7