publications

Dedicated to all Crypto-Lovers.

2023

  1. ACNS
    Divide and Rule: DiFA - Division Property Based Fault Attacks on PRESENT and GIFT
    Kundu, Anup, Ghosh, Shibam, Saha, Dhiman, and Rahman, Mostafizar
    In Applied Cryptography and Network Security - 21st International Conference, ACNS 2023, Kyoto, Japan, June 19-22, 2023, Proceedings 2023
  2. ACNS
    TIDAL: Practical Collisions on State-Reduced Keccak Variants
    Suryawanshi, Sahiba, Saha, Dhiman, and Jaiswal, Shashwat
    In Applied Cryptography and Network Security - 21st International Conference, ACNS 2023, Kyoto, Japan, June 19-22, 2023, Proceedings 2023
  3. ACM
    A Survey on Fault Attacks on Symmetric Key Cryptosystems
    Baksi, Anubhab, Bhasin, Shivam, Breier, Jakub, Jap, Dirmanto, and Saha, Dhiman
    ACM Comput. Surv. 2023

2022

  1. JCEN
    Fault analysis of the PRINCE family of lightweight ciphers
    Kundu, Anup Kumar, Aikata, , Karmakar, Banashri, and Saha, Dhiman
    J. Cryptogr. Eng. 2022
  2. ePrint
    DEEPAND: In-Depth Modeling of Correlated AND Gates for NLFSR-based Lightweight Block Ciphers
    Jana, Amit, Rahman, Mostafizar, and Saha, Dhiman
    IACR Cryptol. ePrint Arch. 2022
  3. PKIA
    Radian: Leveraging PKI for Long-Term Validation Enabled Digital Academic Testimonials - A Case-Study
    Pan, Souvik, Saha, Dhiman, and Moona, Rajat
    In IEEE International Conference on Public Key Infrastructure and its Applications, PKIA 2022, Bangalore, India, September 9-10, 2022 2022
  4. JCEN
    Differential fault analysis of NORX using variants of coupon collector problem
    Jana, Amit, Nath, Anirban, Paul, Goutam, and Saha, Dhiman
    J. Cryptogr. Eng. 2022

2021

  1. JCEN
    Sycon: A New Milestone in Designing ASCON-like Permutations
    Mandal, Kalikinkar, Saha, Dhiman, Sarkar, Sumanta, and Todo, Yosuke
    Journal of Cryptographic Engineering 2021
  2. ToSC
    Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos
    Rahman, Mostafizar, Saha, Dhiman, and Paul, Goutam
    IACR Trans. Symmetric Cryptol. 2021
  3. arXiv
    Looney Tunes: Exposing the Lack of DRM Protection in Indian Music Streaming Services
    Dabholkar, Ahaan, Kakarla, Sourya, and Saha, Dhiman
    CoRR 2021
  4. ePrint
    Sycon: A New Milestone in Designing ASCON-like Permutations
    Mandal, Kalikinkar, Saha, Dhiman, Sarkar, Sumanta, and Todo, Yosuke
    IACR Cryptol. ePrint Arch. 2021

2020

  1. JCEN
    To infect or not to infect: a critical analysis of infective countermeasures in fault attacks
    Baksi, Anubhab, Saha, Dhiman, and Sarkar, Sumanta
    J. Cryptogr. Eng. 2020
  2. ToSC
    On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis
    Saha, Dhiman, Sasaki, Yu, Shi, Danping, Sibleyras, Ferdinand, Sun, Siwei, and Zhang, Yingjie
    IACR Trans. Symmetric Cryptol. 2020
  3. ACISP
    A Novel Duplication Based Countermeasure to Statistical Ineffective Fault Analysis
    Baksi, Anubhab, Kumar, Vinay B. Y., Karmakar, Banashri, Bhasin, Shivam, Saha, Dhiman, and Chattopadhyay, Anupam
    In Information Security and Privacy - 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings 2020
  4. AFRICACRYPT
    New Results on the SymSum Distinguisher on Round-Reduced SHA3
    Suryawanshi, Sahiba, Saha, Dhiman, and Sachan, Satyam
    In Progress in Cryptology - AFRICACRYPT 2020 - 12th International Conference on Cryptology in Africa, Cairo, Egypt, July 20-22, 2020, Proceedings 2020
  5. AFRICACRYPT
    Cryptanalysis of FlexAEAD
    Rahman, Mostafizar, Saha, Dhiman, and Paul, Goutam
    In Progress in Cryptology - AFRICACRYPT 2020 - 12th International Conference on Cryptology in Africa, Cairo, Egypt, July 20-22, 2020, Proceedings 2020
  6. ASHES@CCS
    Differential Fault Analysis of NORX
    Jana, Amit, Saha, Dhiman, and Paul, Goutam
    In Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware Security Workshop, ASHES@CCS 2020, Virtual Event, USA, November 13, 2020 2020
  7. ASHES@CCS
    PRINCE under Differential Fault Attack: Now in 3D
    Aikata, , Karmakar, Banashri, and Saha, Dhiman
    In Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware Security Workshop, ASHES@CCS 2020, Virtual Event, USA, November 13, 2020 2020
  8. HOST
    DESIV: Differential Fault Analysis of SIV-Rijndael256 with a Single Fault
    Aikata, , Karmakar, Banashri, and Saha, Dhiman
    In 2020 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2020, San Jose, CA, USA, December 7-11, 2020 2020
  9. ePrint
    New Results on the SymSum Distinguisher on Round-Reduced SHA3
    Suryawanshi, Sahiba, Saha, Dhiman, and Sachan, Satyam
    IACR Cryptol. ePrint Arch. 2020
  10. ePrint
    On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis
    Saha, Dhiman, Sasaki, Yu, Shi, Danping, Sibleyras, Ferdinand, Sun, Siwei, and Zhang, Yingjie
    IACR Cryptol. ePrint Arch. 2020
  11. ePrint
    Fault Attacks In Symmetric Key Cryptosystems
    Baksi, Anubhab, Bhasin, Shivam, Breier, Jakub, Jap, Dirmanto, and Saha, Dhiman
    IACR Cryptol. ePrint Arch. 2020
  12. ePrint
    A Novel Duplication Based Countermeasure To Statistical Ineffective Fault Analysis
    Baksi, Anubhab, Kumar, Vinay B. Y., Karmakar, Banashri, Bhasin, Shivam, Saha, Dhiman, and Chattopadhyay, Anupam
    IACR Cryptol. ePrint Arch. 2020

2019

  1. IET InfoSec
    Dinamite: internal differential match-in-the-end attack on eight-round PAEQ
    Saha, Dhiman, Kakarla, Sourya, and Chowdhury, Dipanwita Roy
    IET Information Security 2019
  2. JCEN
    Internal differential fault analysis of parallelizable ciphers in the counter-mode
    Saha, Dhiman, and Chowdhury, Dipanwita Roy
    J. Cryptographic Engineering 2019
  3. ACNS
    Cryptanalysis of ForkAES
    Banik, Subhadeep, Bossert, Jannis, Jana, Amit, List, Eik, Lucks, Stefan, Meier, Willi, Rahman, Mostafizar, Saha, Dhiman, and Sasaki, Yu
    In Applied Cryptography and Network Security - 17th International Conference, ACNS 2019, Bogota, Colombia, June 5-7, 2019, Proceedings 2019
  4. INDOCRYPT
    On the Relationship Between Resilient Boolean Functions and Linear Branch Number of S-Boxes
    Sarkar, Sumanta, Mandal, Kalikinkar, and Saha, Dhiman
    In Progress in Cryptology - INDOCRYPT 2019 - 20th International Conference on Cryptology in India, Hyderabad, India, December 15-18, 2019, Proceedings 2019
  5. ePrint
    Cryptanalysis of ForkAES
    Banik, Subhadeep, Bossert, Jannis, Jana, Amit, List, Eik, Lucks, Stefan, Meier, Willi, Rahman, Mostafizar, Saha, Dhiman, and Sasaki, Yu
    IACR Cryptol. ePrint Arch. 2019
  6. ePrint
    To Infect Or Not To Infect: A Critical Analysis Of Infective Countermeasures In Fault Attacks
    Baksi, Anubhab, Saha, Dhiman, and Sarkar, Sumanta
    IACR Cryptol. ePrint Arch. 2019
  7. ePrint
    Iterated Truncated Differential for Internal Keyed Permutation of FlexAEAD
    Rahman, Mostafizar, Saha, Dhiman, and Paul, Goutam
    IACR Cryptol. ePrint Arch. 2019
  8. ePrint
    Differential Fault Analysis of NORX
    Jana, Amit, Saha, Dhiman, and Paul, Goutam
    IACR Cryptol. ePrint Arch. 2019
  9. ePrint
    On the Relationship between Resilient Boolean Functions and Linear Branch Number of S-boxes
    Sarkar, Sumanta, Mandal, Kalikinkar, and Saha, Dhiman
    IACR Cryptol. ePrint Arch. 2019

2018

  1. ToSC
    New Yoyo Tricks with AES-based Permutations
    Saha, Dhiman, Rahman, Mostafizar, and Paul, Goutam
    IACR Trans. Symmetric Cryptol. 2018

2017

  1. IJACT
    Preventing fault attacks using fault randomisation with a case study on AES
    Ghosh, Shamit, Saha, Dhiman, Sengupta, Abhrajit, and Chowdhury, Dipanwita Roy
    IJACT 2017
  2. SPACE
    Gain: Practical Key-Recovery Attacks on Round-Reduced PAEQ
    Saha, Dhiman, Kakarla, Sourya, Mandava, Srinath, and Chowdhury, Dipanwita Roy
    J. Hardware and Systems Security 2017
  3. ToSC
    SymSum: Symmetric-Sum Distinguishers Against Round Reduced SHA3
    Saha, Dhiman, Kuila, Sukhendu, and Chowdhury, Dipanwita Roy
    IACR Trans. Symmetric Cryptol. 2017
  4. ATIS
    On the Practical Implementation of Impossible Differential Cryptanalysis on Reduced-Round AES
    Kakarla, Sourya, Mandava, Srinath, Saha, Dhiman, and Chowdhury, Dipanwita Roy
    In Applications and Techniques in Information Security - 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings 2017
  5. ePrint
    SymSum: Symmetric-Sum Distinguishers Against Round Reduced SHA3
    Saha, Dhiman, Kuila, Sukhendu, and Chowdhury, Dipanwita Roy
    IACR Cryptol. ePrint Arch. 2017

2016

  1. CHES
    EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis with a Case-Study on PAEQ
    Saha, Dhiman, and Chowdhury, Dipanwita Roy
    In Cryptographic Hardware and Embedded Systems - CHES 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings 2016
  2. FSE
    Key Recovery Attack Against 2.5-Round }pi -Cipher
    Boura, Christina, Chakraborti, Avik, Leurent, Gaëtan, Paul, Goutam, Saha, Dhiman, Soleimany, Hadi, and Suder, Valentin
    In Fast Software Encryption - 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers 2016
  3. SPACE
    Gain: Practical Key-Recovery Attacks on Round-reduced PAEQ
    Saha, Dhiman, Kakarla, Sourya, Mandava, Srinath, and Chowdhury, Dipanwita Roy
    In Security, Privacy, and Applied Cryptography Engineering - 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings 2016
  4. ePrint
    Key Recovery Attack against 2.5-round pi-Cipher
    Boura, Christina, Chakraborti, Avik, Leurent, Gaëtan, Paul, Goutam, Saha, Dhiman, Soleimany, Hadi, and Suder, Valentin
    IACR Cryptol. ePrint Arch. 2016
  5. ePrint
    EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis with a Case-Study on PAEQ
    Saha, Dhiman, and Chowdhury, Dipanwita Roy
    IACR Cryptol. ePrint Arch. 2016

2015

  1. ACISP
    Preventing Fault Attacks Using Fault Randomization with a Case Study on AES
    Ghosh, Shamit, Saha, Dhiman, Sengupta, Abhrajit, and Chowdhury, Dipanwita Roy
    In Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings 2015
  2. HOST
    Diagonal fault analysis of Gr\(⊘\)stl in dedicated MAC mode
    Saha, Dhiman, and Chowdhury, Dipanwita Roy
    In IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015 2015
  3. SAC
    Scope: On the Side Channel Vulnerability of Releasing Unverified Plaintexts
    Saha, Dhiman, and Chowdhury, Dipanwita Roy
    In Selected Areas in Cryptography - SAC 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers 2015

2014

  1. ACRI
    A Scalable Method for Constructing Non-linear Cellular Automata with Period 2^n - 1
    Ghosh, Shamit, Sengupta, Abhrajit, Saha, Dhiman, and Chowdhury, Dipanwita Roy
    In Cellular Automata - 11th International Conference on Cellular Automata for Research and Industry, ACRI 2014, Krakow, Poland, September 22-25, 2014. Proceedings 2014
  2. AFRICACRYPT
    Practical Distinguishers against 6-Round Keccak-f Exploiting Self-Symmetry
    Kuila, Sukhendu, Saha, Dhiman, Pal, Madhumangal, and Chowdhury, Dipanwita Roy
    In Progress in Cryptology - AFRICACRYPT 2014 - 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings 2014
  3. INDOCRYPT
    EscApe: Diagonal Fault Analysis of APE
    Saha, Dhiman, Kuila, Sukhendu, and Chowdhury, Dipanwita Roy
    In Progress in Cryptology - INDOCRYPT 2014 - 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings 2014
  4. SPACE
    CASH: Cellular Automata Based Parameterized Hash
    Kuila, Sukhendu, Saha, Dhiman, Pal, Madhumangal, and Chowdhury, Dipanwita Roy
    In Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings 2014
  5. SPACE
    AEC: A Practical Scheme for Authentication with Error Correction
    Sengupta, Abhrajit, Saha, Dhiman, Ghosh, Shamit, Mehta, Deval, and Chowdhury, Dipanwita Roy
    In Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings 2014

2011

  1. INDOCRYPT
    PKDPA: An Enhanced Probabilistic Differential Power Attack Methodology
    Saha, Dhiman, Mukhopadhyay, Debdeep, and Chowdhury, Dipanwita Roy
    In Progress in Cryptology - INDOCRYPT 2011 - 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings 2011

2009

  1. ePrint
    A Diagonal Fault Attack on the Advanced Encryption Standard
    Saha, Dhiman, Mukhopadhyay, Debdeep, and Chowdhury, Dipanwita Roy
    IACR Cryptol. ePrint Arch. 2009

2008

  1. INDOCRYPT
    Scan Based Side Channel Attacks on Stream Ciphers and Their Counter-Measures
    Agrawal, Mukesh, Karmakar, Sandip, Saha, Dhiman, and Mukhopadhyay, Debdeep
    In Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings 2008

2007

  1. ACISP
    Strengthening NLS Against Crossword Puzzle Attack
    Bhattacharya, Debojyoti, Mukhopadhyay, Debdeep, Saha, Dhiman, and Chowdhury, Dipanwita Roy
    In Information Security and Privacy, 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings 2007