Ravi Anand

Orcid: 0000-0003-2158-6226

According to our database1, Ravi Anand authored at least 26 papers between 2018 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Differential fault attack on AES-based encryption schemes: application to B5G/6G ciphers - Rocca, Rocca-S and AEGIS.
J. Cryptogr. Eng., November, 2024

A Novel 5L Boosting Inverter With Reduced Spike Current.
IEEE Trans. Circuits Syst. II Express Briefs, October, 2024

Analysis of Atom against quantum attacks.
IET Quantum Commun., March, 2024

Gleeok: A Family of Low-Latency PRFs and its Applications to Authenticated Encryption.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024

Quantum Key Recovery Attacks on 4-round Iterated Even-Mansour with Two Keys.
IACR Cryptol. ePrint Arch., 2024

2023
Quantum security analysis of Rocca.
Quantum Inf. Process., April, 2023

Cubicle: A family of space-hard ciphers for IoT.
IET Inf. Secur., January, 2023

Analysis of RIPEMD-160: New Collision Attacks and Finding Characteristics with MILP.
IACR Cryptol. ePrint Arch., 2023

Some results on lightweight stream ciphers Fountain v1 & Lizard.
Adv. Math. Commun., 2023

Independently Operational Dual-Frequency Band Metamaterial Based EM Biosensor for Identification and Quantification of Impurities in Vegetable Oils.
Proceedings of the 2023 IEEE SENSORS, Vienna, Austria, October 29 - Nov. 1, 2023, 2023

On the Road to the Development of Noninvasive Highly Sensitive Electromagnetic Bio-Sensor for Bone Crack Detection.
Proceedings of the 2023 IEEE SENSORS, Vienna, Austria, October 29 - Nov. 1, 2023, 2023

GoSage: Heterogeneous Graph Neural Network Using Hierarchical Attention for Collusion Fraud Detection.
Proceedings of the 4th ACM International Conference on AI in Finance, 2023

An Ultra-High Throughput AES-Based Authenticated Encryption Scheme for 6G: Design and Implementation.
Proceedings of the Computer Security - ESORICS 2023, 2023

Ghidle: Efficient Large-State Block Ciphers for Post-quantum Security.
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023

2022
Coefficient Grouping: Breaking Chaghri and More.
IACR Cryptol. ePrint Arch., 2022

2021
Evaluation of Grover's algorithm toward quantum cryptanalysis on ChaCha.
Quantum Inf. Process., 2021

Differential fault location identification by machine learning.
CAAI Trans. Intell. Technol., 2021

Differential Fault Attack on Espresso.
Proceedings of the Progress in Cryptology - INDOCRYPT 2021, 2021

Quantum Resource Estimation for FSR Based Symmetric Ciphers and Related Grover's Attacks.
Proceedings of the Progress in Cryptology - INDOCRYPT 2021, 2021

Differential Fault Attack on Rocca.
Proceedings of the Information Security and Cryptology - ICISC 2021, 2021

2020
Grover on $\, SIMON\, $.
Quantum Inf. Process., 2020

Fault Location Identification By Machine Learning.
IACR Cryptol. ePrint Arch., 2020

Resource Estimation of Grovers-kind Quantum Cryptanalysis against FSR based Symmetric Ciphers.
IACR Cryptol. ePrint Arch., 2020

Evaluation of Quantum Cryptanalysis on SPECK.
Proceedings of the Progress in Cryptology - INDOCRYPT 2020, 2020

2018
A TMDTO Attack Against Lizard.
IEEE Trans. Computers, 2018

Differential Fault Attack on SIMON with Very Few Faults.
Proceedings of the Progress in Cryptology - INDOCRYPT 2018, 2018


  Loading...