关注
Amit Kumar Chauhan
Amit Kumar Chauhan
在 iitj.ac.in 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Pqc acceleration using gpus: Frodokem, newhope, and kyber
N Gupta, A Jati, AK Chauhan, A Chattopadhyay
IEEE Transactions on Parallel and Distributed Systems 32 (3), 575-586, 2020
552020
Quantum free-start collision attacks on double block length hashing with round-reduced AES-256
AK Chauhan, A Kumar, SK Sanadhya
IACR Transactions on Symmetric Cryptology, 316-336, 2021
192021
Quantum resource estimates of grover’s key search on aria
AK Chauhan, SK Sanadhya
Security, Privacy, and Applied Cryptography Engineering: 10th International …, 2020
162020
Revocable identity-based encryption from codes with rank metric
D Chang, AK Chauhan, S Kumar, SK Sanadhya
Cryptographers’ Track at the RSA Conference, 435-451, 2018
132018
RCB: leakage-resilient authenticated encryption via re-keying
M Agrawal, TK Bansal, D Chang, AK Chauhan, S Hong, J Kang, ...
The Journal of Supercomputing 74, 4173-4198, 2018
112018
Apollo: End-to-end verifiable voting protocol using mixnet and hidden tweaks
D Chang, AK Chauhan, MN K, J Kang
International Conference on Information Security and Cryptology, 194-209, 2015
82015
Quantum search for lightweight block ciphers: GIFT, SKINNY, SATURNIN
S Bijwe, AK Chauhan, SK Sanadhya
Cryptology ePrint Archive, 2020
22020
Exploiting the leakage: analysis of some authenticated encryption schemes
D Chang, AK Chauhan, N Gupta, A Jati, SK Sanadhya
International Conference on Security, Privacy, and Applied Cryptography …, 2016
22016
Quantum Security of FOX Construction based on Lai-Massey Scheme
AK Chauhan, S Sanadhya
Cryptology ePrint Archive, 2022
12022
Revocable identity-based encryption from codes with rank metric
S Kumar, SK Sanadhya, AK Chauhan, D Chang
2018
GIFT, SKINNY, SATURNIN
S Bijwe, AK Chauhan, SK Sanadhya
系统目前无法执行此操作,请稍后再试。
文章 1–11