[go: up one dir, main page]

Follow
Somitra Sanadhya
Somitra Sanadhya
Wadhwani School of AI & Intelligent Systems
Verified email at iitk.ac.in - Homepage
Title
Cited by
Cited by
Year
FPGA-based true random number generation using programmable delays in oscillator-rings
NN Anandakumar, SK Sanadhya, MS Hashmi
IEEE Transactions on Circuits and Systems II: Express Briefs 67 (3), 570-574, 2019
1432019
New collision attacks against up to 24-step SHA-2
SK Sanadhya, P Sarkar
Progress in Cryptology-INDOCRYPT 2008: 9th International Conference on …, 2008
1192008
A configurable crystals-kyber hardware implementation with side-channel protection
A Jati, N Gupta, A Chattopadhyay, SK Sanadhya
ACM Transactions on Embedded Computing Systems 23 (2), 1-25, 2024
582024
Compact implementations of FPGA-based PUFs with enhanced performance
NN Anandakumar, MS Hashmi, SK Sanadhya
2017 30th International Conference on VLSI Design and 2017 16th …, 2017
582017
Cryptanalysis of SIMON variants with connections
J Alizadeh, HA Alkhzaimi, MR Aref, N Bagheri, P Gauravaram, A Kumar, ...
International Workshop on Radio Frequency Identification: Security and …, 2014
532014
Differential fault analysis of SHA-3
N Bagheri, N Ghaedi, SK Sanadhya
Progress in Cryptology--INDOCRYPT 2015: 16th International Conference on …, 2015
452015
Linear cryptanalysis of round reduced SIMON
J Alizadeh, N Bagheri, P Gauravaram, A Kumar, SK Sanadhya
Cryptology ePrint Archive, 2013
452013
Security analysis of LMAP++, an RFID authentication protocol
M Safkhani, N Bagheri, M Naderi, SK Sanadhya
2011 International Conference for Internet Technology and Secured …, 2011
422011
Design and analysis of FPGA-based PUFs with enhanced performance for hardware-oriented security
NN Anandakumar, MS Hashmi, SK Sanadhya
ACM Journal on Emerging Technologies in Computing Systems (JETC) 18 (4), 1-26, 2022
402022
Generation of secure and reliable honeywords, preventing false detection
D Chang, A Goel, S Mishra, SK Sanadhya
IEEE Transactions on Dependable and Secure Computing 16 (5), 757-769, 2018
402018
FbHash: A new similarity hashing scheme for digital forensics
D Chang, M Ghosh, SK Sanadhya, M Singh, DR White
Digital Investigation 29, S113-S123, 2019
382019
Threshold Implementations of : A Trade-Off Analysis
A Jati, N Gupta, A Chattopadhyay, SK Sanadhya, D Chang
IEEE Transactions on Information Forensics and Security 15, 2110-2120, 2019
372019
Release of unverified plaintext: Tight unified model and application to ANYDAE
D Chang, N Datta, A Dutta, B Mennink, M Nandi, S Sanadhya, F Sibleyras
IACR Transactions on Symmetric Cryptology 2019 (4), 119-146, 2019
332019
Bicliques with minimal data and time complexity for AES
A Bogdanov, D Chang, M Ghosh, SK Sanadhya
Information Security and Cryptology-ICISC 2014: 17th International …, 2015
312015
Quantum resource estimates of grover’s key search on aria
AK Chauhan, SK Sanadhya
Security, Privacy, and Applied Cryptography Engineering: 10th International …, 2020
282020
Efficient and lightweight FPGA-based hybrid PUFs with improved performance
NN Anandakumar, MS Hashmi, SK Sanadhya
Microprocessors and Microsystems 77, 103180, 2020
272020
Non-linear reduced round attacks against SHA-2 hash family
SK Sanadhya, P Sarkar
Australasian Conference on Information Security and Privacy, 254-266, 2008
262008
Attacking reduced round SHA-256
SK Sanadhya, P Sarkar
Applied Cryptography and Network Security: 6th International Conference …, 2008
232008
Quantum free-start collision attacks on double block length hashing with round-reduced AES-256
AK Chauhan, A Kumar, SK Sanadhya
IACR Transactions on Symmetric Cryptology, 316-336, 2021
222021
Reconfigurable hardware architecture for authenticated key agreement protocol over binary edwards curve
NN Anandakumar, MPL Das, SK Sanadhya, MS Hashmi
ACM Transactions on Reconfigurable Technology and Systems (TRETS) 11 (2), 1-19, 2018
212018
The system can't perform the operation now. Try again later.
Articles 1–20