Profiles
Research Units
Publications
Sign Up
Faculty Login
X
54 Publications
23 Journals
Somitra Kumar Sanadhya
Professor
Department of Computer Science & Engineering
somitra@iitj.ac.in (Work)
Follow
Publications - 54
Overview
Publications (54)
Publications (54)
Sort by Year (most recent)
Sort by Year (most recent)
Sort by Year (oldest first)
Sort by Most Cited
Sort by Recently Added
Sort (A-Z)
Sort (Z-A)
Conferences
Exploiting the leakage: Analysis of some authenticated encryption schemes
D. Chang
,
A.K. Chauhan
,
...
,
Somitra Kumar Sanadhya
(5 authors)
2016 | Springer Verlag
Conferences
Single key recovery attacks on 9-Round Kalyna-128/256 and Kalyna-256/512
Akshima
,
D. Chang
,
...
,
Somitra Kumar Sanadhya
(5 authors)
2016 | Springer Verlag
Conferences
Biclique cryptanalysis of full round AES-128 based hashing modes
D. Chang
,
M. Ghosh
and
Somitra Kumar Sanadhya
2016 | Springer Verlag
Conferences
Collision attack on 4-branch, type-2 GFN based hash functions using sliced biclique cryptanalysis technique
M. Agrawal
,
D. Chang
,
...
,
Somitra Kumar Sanadhya
(4 authors)
2015 | Springer Verlag
Conferences
Rig: A simple, secure and flexible design for password hashing
D. Chang
,
A. Jati
,
...
,
Somitra Kumar Sanadhya
(4 authors)
2015 | Springer Verlag
Book Chapter
PPAE: Practical parazoa authenticated encryption family
D. Chang
,
R. Sumesh Manjunath
and
Somitra Kumar Sanadhya
2015 | Springer Verlag
Conferences
Sponge based CCA2 secure asymmetric encryption for arbitrary length message
T.K. Bansal
,
D. Chang
and
Somitra Kumar Sanadhya
2015 | Springer Verlag
Conferences
New HMAC message patches: Secret patch and CrOw patch
D. Chang
,
Somitra Kumar Sanadhya
and
N. Sharma
2015 | Springer Verlag
Conferences
Improved meet-in-the-middle attacks on 7 and 8-round ARIA-192 and ARIA-256
Akshima
,
D. Chang
,
...
,
Somitra Kumar Sanadhya
(5 authors)
2015 | Springer Verlag
Conferences
Sp-AELM: Sponge based authenticated encryption scheme for memory constrained devices
M. Agrawal
,
D. Chang
and
Somitra Kumar Sanadhya
2015 | Springer Verlag
Conferences
Cryptographic module based approach for password hashing schemes
D. Chang
,
A. Jati
,
...
,
Somitra Kumar Sanadhya
(4 authors)
2015 | Springer Verlag
Conferences
Differential fault analysis of SHA-3
N. Bagheri
,
N. Ghaedi
and
Somitra Kumar Sanadhya
2015 | Springer Verlag
Articles
Cryptanalysis of SIMON variants with connections
J. Alizadeh
,
H.A. Alkhzaimi
,
...
,
Somitra Kumar Sanadhya
(8 authors)
2014 | Springer Verlag
Conferences
Bicliques with minimal data and time complexity for AES
A. Bogdanov
,
D. Chang
,
...
,
Somitra Kumar Sanadhya
(4 authors)
2014 | Springer Verlag
Conferences
Security analysis of GFN: 8-round distinguisher for 4-branch type-2 GFN
D. Chang
,
A. Kumar
and
Somitra Kumar Sanadhya
2013 | Springer Verlag
Conferences
Desynchronization and traceability attacks on RIPTA-DA protocol
N. Bagheri
,
P. Gauravaram
,
...
,
Somitra Kumar Sanadhya
(4 authors)
2013 | Springer Verlag
Conferences
On the security of two RFID mutual authentication protocols
S.F. Aghili
,
N. Bagheri
,
...
,
Somitra Kumar Sanadhya
(5 authors)
2013 | Springer Verlag
Conferences
Cryptanalysis of a digital watermarking scheme based on support vector regression
M. Siddula
,
Somitra Kumar Sanadhya
and
A.V. Subramanyam
2013
Other
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface
A. Bogdanov
and
Somitra Kumar Sanadhya
2012
Conferences
On the security of mutual authentication protocols for RFID systems: The case of Wei et al 's protocol
M. Safkhani
,
N. Bagheri
,
Somitra Kumar Sanadhya
,
...
,
H. Behnam
(5 authors)
2012 | Springer Verlag
Showing 21-40 of 54 results
prev
1
2
3
next
Get all the updates from Somitra Kumar Sanadhya
Follow