Somitra Sanadhya
Somitra Sanadhya
Dept. of Computer Science & Engg., IIT Ropar
Verified email at iitrpr.ac.in - Homepage
Title
Cited by
Cited by
Year
New collision attacks against up to 24-step SHA-2
SK Sanadhya, P Sarkar
International conference on cryptology in India, 91-103, 2008
792008
Linear Cryptanalysis of Round Reduced SIMON.
J Alizadeh, N Bagheri, P Gauravaram, A Kumar, SK Sanadhya
IACR Cryptol. ePrint Arch. 2013, 663, 2013
432013
Security analysis of LMAP++, an RFID authentication protocol
M Safkhani, N Bagheri, M Naderi, SK Sanadhya
2011 International Conference for Internet Technology and Secured …, 2011
382011
Cryptanalysis of SIMON variants with connections
J Alizadeh, HA Alkhzaimi, MR Aref, N Bagheri, P Gauravaram, A Kumar, ...
International Workshop on Radio Frequency Identification: Security and …, 2015
372015
Differential fault analysis of SHA-3
N Bagheri, N Ghaedi, SK Sanadhya
International Conference on Cryptology in India, 253-269, 2015
252015
Non-linear reduced round attacks against SHA-2 hash family
SK Sanadhya, P Sarkar
Australasian Conference on Information Security and Privacy, 254-266, 2008
222008
New local collisions for the SHA-2 hash family
SK Sanadhya, P Sarkar
International conference on information security and cryptology, 193-205, 2007
192007
Attacking reduced round SHA-256
SK Sanadhya, P Sarkar
International Conference on Applied Cryptography and Network Security, 130-143, 2008
162008
Bicliques with minimal data and time complexity for AES
A Bogdanov, D Chang, M Ghosh, SK Sanadhya
International Conference on Information Security and Cryptology, 160-174, 2014
152014
Rig: A Simple, Secure and Flexible Design for Password Hashing
D Chang, A Jati, S Mishra, SK Sanadhya
International Conference on Information Security and Cryptology, 361-381, 2014
142014
Cryptanalysis of improved Yeh et al.'s authentication Protocol: An EPC Class-1 Generation-2 standard compliant protocol.
M Safkhani, N Bagheri, SK Sanadhya, M Naderi
IACR Cryptol. ePrint Arch. 2011, 426, 2011
142011
FPGA-based true random number generation using programmable delays in oscillator-rings
NN Anandakumar, SK Sanadhya, MS Hashmi
IEEE Transactions on Circuits and Systems II: Express Briefs 67 (3), 570-574, 2019
132019
Threshold Implementations of GIFT: A Trade-off Analysis.
N Gupta, A Jati, A Chattopadhyay, SK Sanadhya, D Chang
IACR Cryptol. ePrint Arch. 2017, 1040, 2017
132017
Compact implementations of FPGA-based PUFs with enhanced performance
NN Anandakumar, MS Hashmi, SK Sanadhya
2017 30th International Conference on VLSI Design and 2017 16th …, 2017
122017
1st and 2nd Preimage Attacks on 7, 8 and 9 Rounds of Keccak-224,256,384,512
D Chang, A Kumar, P Morawiecki, SK Sanadhya
SHA-3 workshop, 2014
122014
On the Security of Mutual Authentication Protocols for RFID Systems: The Case of Wei et al.’s Protocol
M Safkhani, N Bagheri, SK Sanadhya, M Naderi, H Behnam
Data Privacy Management and Autonomous Spontaneus Security, 90-103, 2011
92011
RCB: leakage-resilient authenticated encryption via re-keying
M Agrawal, TK Bansal, D Chang, AK Chauhan, S Hong, J Kang, ...
The Journal of Supercomputing 74 (9), 4173-4198, 2018
82018
sp-AELM: Sponge based authenticated encryption scheme for memory constrained devices
M Agrawal, D Chang, S Sanadhya
Australasian Conference on Information Security and Privacy, 451-468, 2015
82015
Cryptanalysis of Some Protocols for RFID Systems.
M Safkhani, M Naderi, N Bagheri, SK Sanadhya
IACR Cryptol. ePrint Arch. 2011, 61, 2011
82011
Deterministic constructions of 21-step collisions for the SHA-2 hash family
SK Sanadhya, P Sarkar
International Conference on Information Security, 244-259, 2008
82008
The system can't perform the operation now. Try again later.
Articles 1–20