Somitra Sanadhya
Somitra Sanadhya
Dept. of Computer Science & Engg., IIT Ropar
Verified email at iitrpr.ac.in - Homepage
TitleCited byYear
New collision attacks against up to 24-step SHA-2
SK Sanadhya, P Sarkar
International conference on cryptology in India, 91-103, 2008
712008
Linear Cryptanalysis of Round Reduced SIMON.
J Alizadeh, N Bagheri, P Gauravaram, A Kumar, SK Sanadhya
IACR Cryptology ePrint Archive 2013, 663, 2013
372013
Security analysis of LMAP++, an RFID authentication protocol
M Safkhani, N Bagheri, M Naderi, SK Sanadhya
2011 International Conference for Internet Technology and Secured …, 2011
352011
Cryptanalysis of SIMON variants with connections
J Alizadeh, HA Alkhzaimi, MR Aref, N Bagheri, P Gauravaram, A Kumar, ...
International Workshop on Radio Frequency Identification: Security and …, 2015
312015
Non-linear reduced round attacks against SHA-2 hash family
SK Sanadhya, P Sarkar
Australasian Conference on Information Security and Privacy, 254-266, 2008
222008
New local collisions for the SHA-2 hash family
SK Sanadhya, P Sarkar
International conference on information security and cryptology, 193-205, 2007
192007
Differential fault analysis of SHA-3
N Bagheri, N Ghaedi, SK Sanadhya
International Conference on Cryptology in India, 253-269, 2015
172015
Attacking reduced round SHA-256
SK Sanadhya, P Sarkar
International Conference on Applied Cryptography and Network Security, 130-143, 2008
162008
Cryptanalysis of improved Yeh et al.'s authentication Protocol: An EPC Class-1 Generation-2 standard compliant protocol.
M Safkhani, N Bagheri, SK Sanadhya, M Naderi
IACR Cryptology ePrint Archive 2011, 426, 2011
132011
Rig: A Simple, Secure and Flexible Design for Password Hashing
D Chang, A Jati, S Mishra, SK Sanadhya
International Conference on Information Security and Cryptology, 361-381, 2014
112014
Bicliques with minimal data and time complexity for AES
A Bogdanov, D Chang, M Ghosh, SK Sanadhya
International Conference on Information Security and Cryptology, 160-174, 2014
112014
1st and 2nd Preimage Attacks on 7, 8 and 9 Rounds of Keccak-224,256,384,512
D Chang, A Kumar, P Morawiecki, S Sanadhya
SHA-3 Workshop, 2014
92014
Deterministic constructions of 21-step collisions for the SHA-2 hash family
SK Sanadhya, P Sarkar
International Conference on Information Security, 244-259, 2008
82008
Threshold Implementations of GIFT: A Trade-off Analysis.
N Gupta, A Jati, A Chattopadhyay, SK Sanadhya, D Chang
IACR Cryptology ePrint Archive 2017, 1040, 2017
72017
Security analysis of GFN: 8-round distinguisher for 4-branch type-2 GFN
D Chang, A Kumar, S Sanadhya
International Conference on Cryptology in India, 136-148, 2013
72013
On the security of two RFID mutual authentication protocols
SF Aghili, N Bagheri, P Gauravaram, M Safkhani, SK Sanadhya
International Workshop on Radio Frequency Identification: Security and …, 2013
72013
Cryptanalysis of Some Protocols for RFID Systems.
M Safkhani, M Naderi, N Bagheri, SK Sanadhya
IACR Cryptology ePrint Archive 2011, 61, 2011
72011
Improved Meet-in-the-Middle Attacks on 7 and 8-Round ARIA-192 and ARIA-256
D Chang, M Ghosh, A Goel, SK Sanadhya
International Conference on Cryptology in India, 198-217, 2015
62015
sp-AELM: Sponge based authenticated encryption scheme for memory constrained devices
M Agrawal, D Chang, S Sanadhya
Australasian Conference on Information Security and Privacy, 451-468, 2015
62015
On the Security of Mutual Authentication Protocols for RFID Systems: The Case of Wei et al.’s Protocol
M Safkhani, N Bagheri, SK Sanadhya, M Naderi, H Behnam
Data Privacy Management and Autonomous Spontaneus Security, 90-103, 2011
62011
The system can't perform the operation now. Try again later.
Articles 1–20