sp-AELM: Sponge based authenticated encryption scheme for memory constrained devices M Agrawal, D Chang, S Sanadhya Australasian Conference on Information Security and Privacy, 451-468, 2015 | 6 | 2015 |
RCB: leakage-resilient authenticated encryption via re-keying M Agrawal, TK Bansal, D Chang, AK Chauhan, S Hong, J Kang, ... The Journal of Supercomputing 74 (9), 4173-4198, 2018 | 5 | 2018 |
A New Authenticated Encryption Technique for Handling Long Ciphertexts in Memory Constrained Devices. M Agrawal, D Chang, SK Sanadhya IJACT 3 (3), 236-261, 2017 | 3 | 2017 |
Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis Technique SS Megha Agrawal, Donghoon Chang Inscrypt-2014 8957 (Lecture Notes in Computer Science), 343--360, 2014 | 3* | 2014 |
CAN-FD-Sec: Improving Security of CAN-FD Protocol M Agrawal, T Huang, J Zhou, D Chang Security and Safety Interplay of Intelligent Software Systems, 77-93, 2018 | 1 | 2018 |
A Survey on Lightweight Authenticated Encryption and Challenges for Securing Industrial IoT M Agrawal, J Zhou, D Chang Security and Privacy Trends in the Industrial Internet of Things, 71-94, 2019 | | 2019 |
Deterministic Authenticated Encryption Scheme for Memory Constrained Devices M Agrawal, D Chang, J Kang Cryptography 2 (4), 37, 2018 | | 2018 |