Sikhar Patranabis

Orcid: 0000-0002-2309-7939

Affiliations:
  • IBM Research India, Bangalore, India
  • ETH Zurich, Switzerland (former)
  • Nanyang Technological University (NTU), Singapore (former)
  • Indian Institute of Technology (IIT) Kharagpur, Department of Computer Science and Engineering, India (former, PhD 2019)


According to our database1, Sikhar Patranabis authored at least 87 papers between 2015 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Cryptographic Primitives with Hinting Property.
J. Cryptol., September, 2024

SWiSSSE: System-Wide Security for Searchable Symmetric Encryption.
Proc. Priv. Enhancing Technol., January, 2024

Threshold OPRF from Threshold Additive HE.
IACR Cryptol. ePrint Arch., 2024

Public-Key Cryptography through the Lens of Monoid Actions.
IACR Cryptol. ePrint Arch., 2024

GAPP: Generic Aggregation of Polynomial Protocols.
IACR Cryptol. ePrint Arch., 2024

Batching-Efficient RAM using Updatable Lookup Arguments.
IACR Cryptol. ePrint Arch., 2024

Tokenised Multi-client Provisioning for Dynamic Searchable Encryption with Forward and Backward Privacy.
IACR Cryptol. ePrint Arch., 2024

Compact Key Function Secret Sharing with Non-linear Decoder.
IACR Commun. Cryptol., 2024

Asterisk: Super-fast MPC with a Friend.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Efficient Quantum-Safe Distributed PRF and Applications: Playing DiSE in a Quantum World.
Proceedings of the Applied Cryptography and Network Security, 2024

2023
TWo-IN-one-SSE: Fast, Scalable and Storage-Efficient Searchable Symmetric Encryption for Conjunctive and Disjunctive Boolean Queries.
Proc. Priv. Enhancing Technol., January, 2023

Commitments via Physically Related Functions.
IEEE Trans. Inf. Forensics Secur., 2023

CAMiSE: Content Addressable Memory-Integrated Searchable Encryption.
IEEE Trans. Circuits Syst. I Regul. Pap., 2023

Minicrypt Primitives with Algebraic Structure and Applications.
J. Cryptol., 2023

Conjunctive Searchable Symmetric Encryption from Hard Lattices.
IACR Cryptol. ePrint Arch., 2023

SEC: Fast Private Boolean Circuit Evaluation from Encrypted Look-ups.
IACR Cryptol. ePrint Arch., 2023

sfAsterisk: Super-fast MPC with a Friend.
IACR Cryptol. ePrint Arch., 2023

Two-Round Adaptively Secure MPC from Isogenies, LPN, or CDH.
IACR Cryptol. ePrint Arch., 2023

Rethinking Searchable Symmetric Encryption.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Unidirectional Updatable Encryption and Proxy Re-encryption from DDH.
Proceedings of the Public-Key Cryptography - PKC 2023, 2023

Multiparty Noninteractive Key Exchange from Ring Key-Homomorphic Weak PRFs.
Proceedings of the Topics in Cryptology - CT-RSA 2023, 2023

2022
On the Quantum Security of OCB.
IACR Trans. Symmetric Cryptol., 2022

Physically Related Functions: Exploiting Related Inputs of PUFs for Authenticated-Key Exchange.
IEEE Trans. Inf. Forensics Secur., 2022

Safe is the New Smart: PUF-Based Authentication for Load Modification-Resistant Smart Meters.
IEEE Trans. Dependable Secur. Comput., 2022

FlexiPair: An Automated Programmable Framework for Pairing Cryptosystems.
IEEE Trans. Computers, 2022

Unidirectional Updatable Encryption and Proxy Re-encryption from DDH or LWE.
IACR Cryptol. ePrint Arch., 2022

Fully-Secure MPC with Minimal Trust.
IACR Cryptol. ePrint Arch., 2022

Private Certifier Intersection.
IACR Cryptol. ePrint Arch., 2022

Compute, but Verify: Efficient Multiparty Computation over Authenticated Inputs.
IACR Cryptol. ePrint Arch., 2022

Efficient Threshold FHE with Application to Real-Time Systems.
IACR Cryptol. ePrint Arch., 2022

XOR Compositions of Physically Related Functions.
IACR Cryptol. ePrint Arch., 2022

Supersingular Curves You Can Trust.
IACR Cryptol. ePrint Arch., 2022

Statistical Security in Two-Party Computation Revisited.
IACR Cryptol. ePrint Arch., 2022

Round-Optimal Oblivious Transfer and MPC from Computational CSIDH.
IACR Cryptol. ePrint Arch., 2022

Light but Tight: Lightweight Composition of Serialized S-Boxes with Diffusion Layers for Strong Ciphers.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2022

Work-in-Progress: CAMiSE: Content Addressable Memory-integrated Searchable Encryption.
Proceedings of the International Conference on Compilers, 2022

2021
RASSLE: Return Address Stack based Side-channel LEakage.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

Efficient Searchable Symmetric Encryption for Join Queries.
IACR Cryptol. ePrint Arch., 2021

Leakage Perturbation is Not Enough: Breaking Structured Encryption Using Simulated Annealing.
IACR Cryptol. ePrint Arch., 2021

Physically Related Functions: A New Paradigm for Light-weight Key-Exchange.
IACR Cryptol. ePrint Arch., 2021

2020
LAMBDA: Lightweight Assessment of Malware for emBeddeD Architectures.
ACM Trans. Embed. Comput. Syst., 2020

Forward and Backward Private Conjunctive Searchable Symmetric Encryption.
IACR Cryptol. ePrint Arch., 2020

Ring Key-Homomorphic Weak PRFs and Applications.
IACR Cryptol. ePrint Arch., 2020

Cryptographic Group Actions and Applications.
IACR Cryptol. ePrint Arch., 2020

BETA: Biometric Enabled Threshold Authentication.
IACR Cryptol. ePrint Arch., 2020

Cryptographically Secure Multi-tenant Provisioning of FPGAs.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2020

Fault Template Attacks on Block Ciphers Exploiting Fault Propagation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

2019
Automatic Characterization of Exploitable Faults: A Machine Learning Approach.
IEEE Trans. Inf. Forensics Secur., 2019

CC Meets FIPS: A Hybrid Test Methodology for First Order Side Channel Analysis.
IEEE Trans. Computers, 2019

SCADFA: Combined SCA+DFA Attacks on Block Ciphers with Practical Validations.
IEEE Trans. Computers, 2019

Lightweight Design-for-Security Strategies for Combined Countermeasures Against Side Channel and Fault Analysis in IoT Applications.
J. Hardw. Syst. Secur., 2019

Breach the Gate: Exploiting Observability for Fault Template Attacks on Block Ciphers.
IACR Cryptol. ePrint Arch., 2019

Symmetric Primitives with Structured Secrets.
IACR Cryptol. ePrint Arch., 2019

Identity-based key aggregate cryptosystem from multilinear maps.
Adv. Math. Commun., 2019

ALAFA: Automatic Leakage Assessment for Fault Attack Countermeasures.
Proceedings of the 56th Annual Design Automation Conference 2019, 2019

Fault-Tolerant Implementations of Physically Unclonable Functions on FPGA.
Proceedings of the Security and Fault Tolerance in Internet of Things, 2019

2018
Lightweight and Side-channel Secure 4 × 4 S-Boxes from Cellular Automata Rules.
IACR Trans. Symmetric Cryptol., 2018

Function Private Predicate Encryption for Low Min-Entropy Predicates.
IACR Cryptol. ePrint Arch., 2018

New Lower Bounds on Predicate Entropy for Function Private Public-Key Predicate Encryption.
IACR Cryptol. ePrint Arch., 2018

Result Pattern Hiding Searchable Encryption for Conjunctive Queries.
IACR Cryptol. ePrint Arch., 2018

Lightweight and Side-channel Secure 4x4 S-Boxes from Cellular Automata Rules.
IACR Cryptol. ePrint Arch., 2018

Template-based Fault Injection Analysis of Block Ciphers.
IACR Cryptol. ePrint Arch., 2018

Efficient Secure k-Nearest Neighbours over Encrypted Data.
Proceedings of the 21st International Conference on Extending Database Technology, 2018

POSTER: Authenticated Key-Exchange Protocol for Heterogeneous CPS.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Hardware Acceleration of Searchable Encryption.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Fault Space Transformation: A Generic Approach to Counter Differential Fault Analysis and Differential Fault Intensity Analysis on AES-Like Block Ciphers.
IEEE Trans. Inf. Forensics Secur., 2017

Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the Cloud.
IEEE Trans. Computers, 2017

Remote dynamic partial reconfiguration: A threat to Internet-of-Things and embedded security applications.
Microprocess. Microsystems, 2017

An Evaluation of Lightweight Block Ciphers for Resource-Constrained Applications: Area, Performance, and Security.
J. Hardw. Syst. Secur., 2017

Fault Tolerant Infective Countermeasure for AES.
J. Hardw. Syst. Secur., 2017

Lightweight Symmetric-Key Hidden Vector Encryption without Pairings.
IACR Cryptol. ePrint Arch., 2017

Spot the Black Hat in a Dark Room: Parallelized Controlled Access Searchable Encryption on FPGAs.
IACR Cryptol. ePrint Arch., 2017

Encrypt-Augment-Recover: Computationally Function Private Predicate Encryption in the Public-Key Setting.
IACR Cryptol. ePrint Arch., 2017

One Plus One is More than Two: A Practical Combination of Power and Fault Analysis Attacks on PRESENT and PRESENT-like Block Ciphers.
IACR Cryptol. ePrint Arch., 2017

A Practical Fault Attack on ARX-like Ciphers with a Case Study on ChaCha20.
IACR Cryptol. ePrint Arch., 2017

Using Tweaks To Design Fault Resistant Ciphers (Full Version).
Proceedings of the Computing Frontiers Conference, 2017

2016
Simulation study of a constant time hybrid approach for large scale terrain mapping using satellite stereo imagery.
Robotics Auton. Syst., 2016

Fault Tolerant Implementations of Delay-based Physically Unclonable Functions on FPGA.
IACR Cryptol. ePrint Arch., 2016

What Lies Ahead: Extending TVLA Testing Methodology Towards Success Rate.
IACR Cryptol. ePrint Arch., 2016

Shuffling across rounds: A lightweight strategy to counter side-channel attacks.
Proceedings of the 34th IEEE International Conference on Computer Design, 2016

Parsimonious design strategy for linear layers with high diffusion in block ciphers.
Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust, 2016

Remote Dynamic Clock Reconfiguration Based Attacks on Internet of Things Applications.
Proceedings of the 2016 Euromicro Conference on Digital System Design, 2016

2015
Dynamic Key-Aggregate Cryptosystem on Elliptic Curves for Online Data Sharing.
IACR Cryptol. ePrint Arch., 2015

Using Tweaks To Design Fault Resistant Ciphers.
IACR Cryptol. ePrint Arch., 2015

Using State Space Encoding To Counter Biased Fault Attacks on AES Countermeasures.
IACR Cryptol. ePrint Arch., 2015

On the Formation of Circles in Co-authorship Networks.
Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2015

A Biased Fault Attack on the Time Redundancy Countermeasure for AES.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2015


  Loading...