Follow
Somitra Sanadhya
Somitra Sanadhya
Dept. of CSE, IIT Jodhpur
Verified email at iitj.ac.in - Homepage
Title
Cited by
Cited by
Year
New collision attacks against up to 24-step SHA-2
SK Sanadhya, P Sarkar
Progress in Cryptology-INDOCRYPT 2008: 9th International Conference on …, 2008
1112008
FPGA-based true random number generation using programmable delays in oscillator-rings
NN Anandakumar, SK Sanadhya, MS Hashmi
IEEE Transactions on Circuits and Systems II: Express Briefs 67 (3), 570-574, 2019
1092019
Compact implementations of FPGA-based PUFs with enhanced performance
NN Anandakumar, MS Hashmi, SK Sanadhya
2017 30th International Conference on VLSI Design and 2017 16th …, 2017
502017
Cryptanalysis of SIMON variants with connections
J Alizadeh, HA Alkhzaimi, MR Aref, N Bagheri, P Gauravaram, A Kumar, ...
International Workshop on Radio Frequency Identification: Security and …, 2014
502014
Linear cryptanalysis of round reduced SIMON
J Alizadeh, N Bagheri, P Gauravaram, A Kumar, SK Sanadhya
Cryptology ePrint Archive, 2013
432013
Security analysis of LMAP++, an RFID authentication protocol
M Safkhani, N Bagheri, M Naderi, SK Sanadhya
2011 International Conference for Internet Technology and Secured …, 2011
422011
Differential fault analysis of SHA-3
N Bagheri, N Ghaedi, SK Sanadhya
Progress in Cryptology--INDOCRYPT 2015: 16th International Conference on …, 2015
412015
Threshold Implementations of : A Trade-Off Analysis
A Jati, N Gupta, A Chattopadhyay, SK Sanadhya, D Chang
IEEE Transactions on Information Forensics and Security 15, 2110-2120, 2019
322019
FbHash: A new similarity hashing scheme for digital forensics
D Chang, M Ghosh, SK Sanadhya, M Singh, DR White
Digital Investigation 29, S113-S123, 2019
312019
Generation of secure and reliable honeywords, preventing false detection
D Chang, A Goel, S Mishra, SK Sanadhya
IEEE Transactions on Dependable and Secure Computing 16 (5), 757-769, 2018
312018
A configurable crystals-kyber hardware implementation with side-channel protection
A Jati, N Gupta, A Chattopadhyay, SK Sanadhya
ACM Transactions on Embedded Computing Systems 23 (2), 1-25, 2024
302024
Design and analysis of FPGA-based PUFs with enhanced performance for hardware-oriented security
NN Anandakumar, MS Hashmi, SK Sanadhya
ACM Journal on Emerging Technologies in Computing Systems (JETC) 18 (4), 1-26, 2022
292022
Bicliques with minimal data and time complexity for AES
A Bogdanov, D Chang, M Ghosh, SK Sanadhya
Information Security and Cryptology-ICISC 2014: 17th International …, 2015
282015
Non-linear reduced round attacks against SHA-2 hash family
SK Sanadhya, P Sarkar
Information Security and Privacy: 13th Australasian Conference, ACISP 2008 …, 2008
242008
Release of unverified plaintext: Tight unified model and application to ANYDAE
D Chang, N Datta, A Dutta, B Mennink, M Nandi, S Sanadhya, F Sibleyras
IACR Transactions on Symmetric Cryptology, 119-146, 2019
232019
Quantum free-start collision attacks on double block length hashing with round-reduced AES-256
AK Chauhan, A Kumar, SK Sanadhya
IACR Transactions on Symmetric Cryptology, 316-336, 2021
212021
Attacking reduced round SHA-256
SK Sanadhya, P Sarkar
Applied Cryptography and Network Security: 6th International Conference …, 2008
212008
Threshold implementations of GIFT: A trade-off analysis
N Gupta, A Jati, SK Sanadhya, A Chattopadhyay, D Chang
202021
Efficient and lightweight FPGA-based hybrid PUFs with improved performance
NN Anandakumar, MS Hashmi, SK Sanadhya
Microprocessors and Microsystems 77, 103180, 2020
202020
Reconfigurable hardware architecture for authenticated key agreement protocol over binary edwards curve
NN Anandakumar, MPL Das, SK Sanadhya, MS Hashmi
ACM Transactions on Reconfigurable Technology and Systems (TRETS) 11 (2), 1-19, 2018
202018
The system can't perform the operation now. Try again later.
Articles 1–20