Dhiman Saha
Orcid: 0000-0002-4668-073X
According to our database1,
Dhiman Saha
authored at least 51 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Simple Vs Vectorial: Exploiting Structural Symmetry to Beat the ZeroSum Distinguisher Applications to SHA3, Xoodyak and Bash.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
SUPI-Rear: Privacy-Preserving Subscription Permanent Identification Strategy in 5G-AKA.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2024
2023
IACR Cryptol. ePrint Arch., 2023
Where are the constants? New Insights On The Role of Round Constant Addition in The SymSum Distinguisher.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Switching the Top Slice of the Sandwich with Extra Filling Yields a Stronger Boomerang for NLFSR-based Block Ciphers.
IACR Cryptol. ePrint Arch., 2023
Proceedings of the 15th International Conference on COMmunication Systems & NETworkS, 2023
2022
J. Cryptogr. Eng., 2022
DEEPAND: In-Depth Modeling of Correlated AND Gates for NLFSR-based Lightweight Block Ciphers.
IACR Cryptol. ePrint Arch., 2022
Radian: Leveraging PKI for Long-Term Validation Enabled Digital Academic Testimonials - A Case-Study.
Proceedings of the IEEE International Conference on Public Key Infrastructure and its Applications, 2022
2021
Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos.
IACR Trans. Symmetric Cryptol., 2021
Looney Tunes: Exposing the Lack of DRM Protection in Indian Music Streaming Services.
CoRR, 2021
2020
On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis.
IACR Trans. Symmetric Cryptol., 2020
To infect or not to infect: a critical analysis of infective countermeasures in fault attacks.
J. Cryptogr. Eng., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the 2020 IEEE International Symposium on Hardware Oriented Security and Trust, 2020
Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware Security Workshop, 2020
Proceedings of the Progress in Cryptology - AFRICACRYPT 2020, 2020
2019
J. Cryptogr. Eng., 2019
IET Inf. Secur., 2019
On the Relationship between Resilient Boolean Functions and Linear Branch Number of S-boxes.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
2018
2017
IACR Trans. Symmetric Cryptol., 2017
J. Hardw. Syst. Secur., 2017
Int. J. Appl. Cryptogr., 2017
On the Practical Implementation of Impossible Differential Cryptanalysis on Reduced-Round AES.
Proceedings of the Applications and Techniques in Information Security, 2017
2016
EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis with a Case-Study on PAEQ.
IACR Cryptol. ePrint Arch., 2016
2015
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2015
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015
2014
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2014
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2014
Proceedings of the Progress in Cryptology - INDOCRYPT 2014, 2014
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014
Proceedings of the Cellular Automata, 2014
2011
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011
2009
IACR Cryptol. ePrint Arch., 2009
2008
Proceedings of the Progress in Cryptology, 2008
2007
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007