Folgen
Anubhab Baksi
Anubhab Baksi
Bestätigte E-Mail-Adresse bei e.ntu.edu.sg
Titel
Zitiert von
Zitiert von
Jahr
Machine learning-assisted differential distinguishers for lightweight ciphers
A Baksi
Classical and Physical Security of Symmetric Key Cryptographic Algorithms …, 2022
110*2022
A survey on fault attacks on symmetric key cryptosystems
A Baksi, S Bhasin, J Breier, D Jap, D Saha
ACM Computing Surveys 55 (4), 1-34, 2022
79*2022
Quantum Analysis of AES
K Jang, A Baksi, H Kim, G Song, H Seo, A Chattopadhyay
Cryptology ePrint Archive, 2022
742022
LIGHTER-R: Optimized Reversible Circuit Implementation for SBoxes
VA Dasu, A Baksi, S Sarkar, A Chattopadhyay
2019 32nd IEEE International System-on-Chip Conference (SOCC), 260-265, 2019
512019
A practical fault attack on arx-like ciphers with a case study on chacha20
SVD Kumar, S Patranabis, J Breier, D Mukhopadhyay, S Bhasin, ...
2017 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 33-40, 2017
452017
Side-channel and fault-injection attacks over lattice-based post-quantum schemes (Kyber, Dilithium): Survey and new results
P Ravi, A Chattopadhyay, JP D’Anvers, A Baksi
ACM Transactions on Embedded Computing Systems 23 (2), 1-54, 2024
442024
Key Recovery from State Information of Sprout: Application to Cryptanalysis and Fault Attack
S Maitra, S Sarkar, A Baksi, P Dey
IACR Cryptology ePrint Archive 2015, 2015
422015
Quantum implementation and resource estimates for Rectangle and Knot
A Baksi, K Jang, G Song, H Seo, Z Xiang
Quantum Information Processing 20, 1-24, 2021
372021
DEFAULT: Cipher-Level Resistance Against Differential Fault Attack
A Baksi
Classical and Physical Security of Symmetric Key Cryptographic Algorithms …, 2022
332022
Quantum implementation and analysis of Default
K Jang, A Baksi, J Breier, H Seo, A Chattopadhyay
Cryptology ePrint Archive, 2022
292022
Side Channel Attack on Stream Ciphers: A Three-Step Approach to State/Key Recovery
S Kumar, VA Dasu, A Baksi, S Sarkar, D Jap, J Breier, S Bhasin
IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022 (2), 166-191, 2022
292022
Protecting Block Ciphers against Differential Fault Attacks without Re-keying (Extended Version)
A Baksi, S Bhasin, J Breier, M Khairallah, T Peyrin
IACR Cryptol. ePrint Arch. 2018, 85, 2018
27*2018
An overview of hash based signatures
V Srivastava, A Baksi, SK Debnath
Cryptology ePrint Archive, 2023
252023
Classical and physical security of symmetric key cryptographic algorithms
A Baksi
2021 IFIP/IEEE 29th International Conference on Very Large Scale Integration …, 2021
24*2021
Observing biases in the state: Case studies with Trivium and Trivia-SC
S Sarkar, S Maitra, A Baksi
Designs, Codes and Cryptography 82 (1-2), 351-375, 2017
212017
New results on machine learning-based distinguishers
A Baksi, J Breier, VA Dasu, X Hou, H Kim, H Seo
IEEE Access 11, 54175-54187, 2023
18*2023
To Infect Or Not To Infect: A Critical Analysis Of Infective Countermeasures In Fault Attacks
A Baksi, D Saha, S Sarkar
https://eprint.iacr.org/2019/355, 2019
162019
New insights on differential and linear bounds using mixed integer linear programming
A Baksi
Classical and Physical Security of Symmetric Key Cryptographic Algorithms …, 2022
15*2022
Three Input Exclusive-OR Gate Support For Boyar-Peralta's Algorithm (Extended Version)
A Baksi, VA Dasu, B Karmakar, A Chattopadhyay, T Isobe
Cryptology ePrint Archive, 2021
15*2021
Dorcis: Depth Optimized Quantum Implementation of Substitution Boxes
M Chun, A Baksi, A Chattopadhyay
Cryptology ePrint Archive, 2023
142023
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20