Tarun Yadav

Orcid: 0000-0002-5462-8253

According to our database1, Tarun Yadav authored at least 15 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
ML based Improved Differential Distinguisher with High Accuracy: Application to GIFT-128 and ASCON.
IACR Cryptol. ePrint Arch., 2024

Differential Cryptanalysis of a Lightweight Block Cipher LELBC.
IACR Cryptol. ePrint Arch., 2024

2023
Full-Round Differential Attack on ULC and LICID Block Ciphers Designed for IoT.
IACR Cryptol. ePrint Arch., 2023

2022
A Practical-Quantum Differential Attack on Block Ciphers.
IACR Cryptol. ePrint Arch., 2022

Modeling Large S-box in MILP and a (Related-Key) Differential Attack on Full Round PIPO-64/128.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2022

2021
MILES: Modeling Large S-box in MILP Based Differential Characteristic Search.
IACR Cryptol. ePrint Arch., 2021

Measuring email sender validation in the wild.
Proceedings of the CoNEXT '21: The 17th International Conference on emerging Networking EXperiments and Technologies, Virtual Event, Munich, Germany, December 7, 2021

2020
Differential-ML Distinguisher: Machine Learning based Generic Extension for Differential Cryptanalysis.
IACR Cryptol. ePrint Arch., 2020

MILP Based Differential Attack on Round Reduced WARP.
IACR Cryptol. ePrint Arch., 2020

2018
Identification of Bugs and Vulnerabilities in TLS Implementation for Windows Operating System Using State Machine Learning.
Proceedings of the Security in Computing and Communications - 6th International Symposium, 2018

2016
Approximation Algorithm for N-distance Minimal Vertex Cover Problem.
CoRR, 2016

Cyber Attack Thread: A Control-flow Based Approach to Deconstruct and Mitigate Cyber Threats.
CoRR, 2016

2L-DWTS - Steganography technique based on second level DWT.
Proceedings of the 2016 International Conference on Advances in Computing, 2016

2015
Technical Aspects of Cyber Kill Chain.
Proceedings of the Security in Computing and Communications, 2015

2009
<i>I-Quest</i> : an <i>i</i>ntelligent <i>que</i>ry <i>st</i>ructuring based on user browsing feedback for semantic retrieval of video data.
Multim. Tools Appl., 2009


  Loading...