Somitra Kumar Sanadhya
Orcid: 0000-0003-1046-184X
According to our database1,
Somitra Kumar Sanadhya
authored at least 76 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
ACM Trans. Embed. Comput. Syst., March, 2024
IACR Cryptol. ePrint Arch., 2024
2023
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2023
2022
IEEE Trans. Inf. Theory, 2022
Design and Analysis of FPGA-based PUFs with Enhanced Performance for Hardware-oriented Security.
ACM J. Emerg. Technol. Comput. Syst., 2022
Field Programmable Gate Array based elliptic curve Menezes-Qu-Vanstone key agreement protocol realization using Physical Unclonable Function and true random number generator primitives.
IET Circuits Devices Syst., 2022
IACR Cryptol. ePrint Arch., 2022
FbHash-E: A time and memory efficient version of FbHash similarity hashing algorithm.
Digit. Investig., 2022
Proceedings of the Advances in Digital Forensics XVIII, 2022
Proceedings of the Information Security and Privacy - 27th Australasian Conference, 2022
2021
Quantum Free-Start Collision Attacks on Double Block Length Hashing with Round-Reduced AES-256.
IACR Trans. Symmetric Cryptol., 2021
2020
IEEE Trans. Inf. Forensics Secur., 2020
FPGA-Based True Random Number Generation Using Programmable Delays in Oscillator-Rings.
IEEE Trans. Circuits Syst. II Express Briefs, 2020
Microprocess. Microsystems, 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the 28th IFIP/IEEE International Conference on Very Large Scale Integration, 2020
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2020
Proceedings of the Progress in Cryptology - INDOCRYPT 2020, 2020
2019
IACR Trans. Symmetric Cryptol., 2019
IEEE Trans. Dependable Secur. Comput., 2019
J. Hardw. Syst. Secur., 2019
Int. J. Inf. Sec., 2019
IACR Cryptol. ePrint Arch., 2019
Digit. Investig., 2019
2018
Reconfigurable Hardware Architecture for Authenticated Key Agreement Protocol Over Binary Edwards Curve.
ACM Trans. Reconfigurable Technol. Syst., 2018
IACR Cryptol. ePrint Arch., 2018
2017
Sponge-based CCA2 secure asymmetric encryption for arbitrary length message (extended version).
Int. J. Appl. Cryptogr., 2017
A new authenticated encryption technique for handling long ciphertexts in memory constrained devices.
Int. J. Appl. Cryptogr., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
IEEE Access, 2017
Proceedings of the 30th International Conference on VLSI Design and 16th International Conference on Embedded Systems, 2017
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2017
2016
J. Digit. Forensics Secur. Law, 2016
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2016
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016
2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Collision Attack on 4-branch, Type-2 GFN based Hash Functions using Sliced Biclique Cryptanalysis Technique.
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Provable Security, 2015
Proceedings of the Progress in Cryptology - INDOCRYPT 2015, 2015
Proceedings of the Progress in Cryptology - INDOCRYPT 2015, 2015
Proceedings of the Information Systems Security - 11th International Conference, 2015
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015
sp-AELM: Sponge Based Authenticated Encryption Scheme for Memory Constrained Devices.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015
2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2014
Proceedings of the Technology and Practice of Passwords, 2014
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014
2013
Proceedings of the IEEE International Conference on Systems, 2013
Proceedings of the Radio Frequency Identification, 2013
Proceedings of the Radio Frequency Identification, 2013
Proceedings of the Progress in Cryptology - INDOCRYPT 2013, 2013
2011
Cryptanalysis of improved Yeh <i>et al.</i>'s authentication Protocol: An EPC Class-1 Generation-2 standard compliant protocol.
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
On the Security of Mutual Authentication Protocols for RFID Systems: The Case of Wei et al.'s Protocol.
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011
2010
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010
2009
Cryptogr. Commun., 2009
2008
J. Intell. Fuzzy Syst., 2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Information Security, 11th International Conference, 2008
2007
Computation of consensus hydrophobicity scales with self-organizing maps and fuzzy clustering along with applications to protein fold prediction.
Neural Parallel Sci. Comput., 2007
2006
On identifying marker genes from gene expression data in a neural framework through online feature analysis.
Int. J. Intell. Syst., 2006