Arnab Roy

Orcid: 0000-0002-3284-7076

Affiliations:
  • University of Innsbruck, Security and Privacy Lab, Austria
  • University of Klagenfurt, Austria (former)
  • University of Bristol, UK (former)
  • Technical University of Denmark (DTU), Copenhagen, Denmark (former)
  • University of Luxembourg (former, PhD 2014)


According to our database1, Arnab Roy authored at least 33 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Quantum cryptanalysis of Farfalle and (generalised) key-alternating Feistel networks.
Des. Codes Cryptogr., February, 2024

Generalized Triangular Dynamical System: An Algebraic System for Constructing Cryptographic Permutations over Finite Fields.
IACR Cryptol. ePrint Arch., 2024

On Efficient and Secure Compression Modes for Arithmetization-Oriented Hashing.
IACR Cryptol. ePrint Arch., 2024

On Efficient and Secure Compression Functions for Arithmetization-Oriented Hashing.
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024

Leakage Certification Made Simple.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Skye: An Expanding PRF based Fast KDF and its Applications.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
PIE: p-adic Encoding for High-Precision Arithmetic in Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2023

Skye: A Fast KDF based on Expanding PRF and its Application to Signal.
IACR Cryptol. ePrint Arch., 2023

Not optimal but efficient: a distinguisher based on the Kruskal-Wallis test.
IACR Cryptol. ePrint Arch., 2023

Arion: Arithmetization-Oriented Permutation and Hashing from Generalized Triangular Dynamical Systems.
CoRR, 2023

2022
Masked Iterate-Fork-Iterate: A new Design Paradigm for Tweakable Expanding Pseudorandom Function.
IACR Cryptol. ePrint Arch., 2022

Consistent, Efficient and Leakage-Model Free Mutual Information Estimation.
IACR Cryptol. ePrint Arch., 2022

An Algebraic System for Constructing Cryptographic Permutations over Finite Fields.
CoRR, 2022

Quantum Cryptanalysis of Farfalle and (Generalised) Feistel Network.
CoRR, 2022

2021
Compactness of Hashing Modes and Efficiency beyond Merkle Tree.
IACR Cryptol. ePrint Arch., 2021

Interpolation Cryptanalysis of Unbalanced Feistel Networks with Low Degree Round Functions.
IACR Cryptol. ePrint Arch., 2021

Poseidon: A New Hash Function for Zero-Knowledge Proof Systems.
Proceedings of the 30th USENIX Security Symposium, 2021

2019
Starkad and Poseidon: New Hash Functions for Zero Knowledge Proof Systems.
IACR Cryptol. ePrint Arch., 2019

Forkcipher: a New Primitive for Authenticated Encryption of Very Short Messages.
IACR Cryptol. ePrint Arch., 2019

Feistel Structures for MPC, and More.
IACR Cryptol. ePrint Arch., 2019

2018
A Systematic Study of the Impact of Graphical Models on Inference-based Attacks on AES.
IACR Cryptol. ePrint Arch., 2018

Constructing TI-friendly Substitution Boxes using Shift-Invariant Permutations.
IACR Cryptol. ePrint Arch., 2018

2016
MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity.
IACR Cryptol. ePrint Arch., 2016

2015
Fast evaluation of polynomials over binary finite fields and application to side-channel countermeasures.
J. Cryptogr. Eng., 2015

A Brief Comparison of Simon and Simeck.
IACR Cryptol. ePrint Arch., 2015

2014
Security Aspects of Symmetric-Key Primitives.
PhD thesis, 2014

Differential Analysis of Block Ciphers SIMON and SPECK.
IACR Cryptol. ePrint Arch., 2014

Error-Tolerant Side-Channel Cube Attack Revisited.
Proceedings of the Selected Areas in Cryptography - SAC 2014, 2014

2013
Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012.
IACR Cryptol. ePrint Arch., 2013

Secure Message Authentication Against Related-Key Attack.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013

2012
Cryptanalysis of the "Kindle" Cipher.
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012

Boomerang Attacks on Hash Function Using Auxiliary Differentials.
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012

2011
Boomerang Attacks on BLAKE-32.
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011


  Loading...