New collision attacks against up to 24-step SHA-2 SK Sanadhya, P Sarkar Progress in Cryptology-INDOCRYPT 2008: 9th International Conference on …, 2008 | 107 | 2008 |
FPGA-based true random number generation using programmable delays in oscillator-rings NN Anandakumar, SK Sanadhya, MS Hashmi IEEE Transactions on Circuits and Systems II: Express Briefs 67 (3), 570-574, 2019 | 101 | 2019 |
Cryptanalysis of SIMON variants with connections J Alizadeh, HA Alkhzaimi, MR Aref, N Bagheri, P Gauravaram, A Kumar, ... International Workshop on Radio Frequency Identification: Security and …, 2014 | 49 | 2014 |
Compact implementations of FPGA-based PUFs with enhanced performance NN Anandakumar, MS Hashmi, SK Sanadhya 2017 30th International Conference on VLSI Design and 2017 16th …, 2017 | 46 | 2017 |
Linear cryptanalysis of round reduced SIMON J Alizadeh, N Bagheri, P Gauravaram, A Kumar, SK Sanadhya Cryptology ePrint Archive, 2013 | 42 | 2013 |
Differential fault analysis of SHA-3 N Bagheri, N Ghaedi, SK Sanadhya Progress in Cryptology--INDOCRYPT 2015: 16th International Conference on …, 2015 | 41 | 2015 |
Security analysis of LMAP++, an RFID authentication protocol M Safkhani, N Bagheri, M Naderi, SK Sanadhya 2011 International Conference for Internet Technology and Secured …, 2011 | 41 | 2011 |
FbHash: A new similarity hashing scheme for digital forensics D Chang, M Ghosh, SK Sanadhya, M Singh, DR White Digital Investigation 29, S113-S123, 2019 | 31 | 2019 |
Generation of secure and reliable honeywords, preventing false detection D Chang, A Goel, S Mishra, SK Sanadhya IEEE Transactions on Dependable and Secure Computing 16 (5), 757-769, 2018 | 31 | 2018 |
Threshold Implementations of : A Trade-Off Analysis A Jati, N Gupta, A Chattopadhyay, SK Sanadhya, D Chang IEEE Transactions on Information Forensics and Security 15, 2110-2120, 2019 | 30 | 2019 |
Bicliques with minimal data and time complexity for AES A Bogdanov, D Chang, M Ghosh, SK Sanadhya Information Security and Cryptology-ICISC 2014: 17th International …, 2015 | 28 | 2015 |
Non-linear reduced round attacks against SHA-2 hash family SK Sanadhya, P Sarkar Information Security and Privacy: 13th Australasian Conference, ACISP 2008 …, 2008 | 24 | 2008 |
A configurable crystals-kyber hardware implementation with side-channel protection A Jati, N Gupta, A Chattopadhyay, SK Sanadhya ACM Transactions on Embedded Computing Systems 23 (2), 1-25, 2024 | 23 | 2024 |
Design and analysis of FPGA-based PUFs with enhanced performance for hardware-oriented security NN Anandakumar, MS Hashmi, SK Sanadhya ACM Journal on Emerging Technologies in Computing Systems (JETC) 18 (4), 1-26, 2022 | 20 | 2022 |
Threshold implementations of GIFT: A trade-off analysis N Gupta, A Jati, SK Sanadhya, A Chattopadhyay, D Chang | 20 | 2021 |
Release of unverified plaintext: Tight unified model and application to ANYDAE D Chang, N Datta, A Dutta, B Mennink, M Nandi, S Sanadhya, F Sibleyras IACR Transactions on Symmetric Cryptology, 119-146, 2019 | 20 | 2019 |
Reconfigurable hardware architecture for authenticated key agreement protocol over binary edwards curve NN Anandakumar, MPL Das, SK Sanadhya, MS Hashmi ACM Transactions on Reconfigurable Technology and Systems (TRETS) 11 (2), 1-19, 2018 | 20 | 2018 |
Rig: A Simple, Secure and Flexible Design for Password Hashing D Chang, A Jati, S Mishra, SK Sanadhya Information Security and Cryptology: 10th International Conference, Inscrypt …, 2015 | 20 | 2015 |
Attacking reduced round SHA-256 SK Sanadhya, P Sarkar Applied Cryptography and Network Security: 6th International Conference …, 2008 | 20 | 2008 |
New local collisions for the SHA-2 hash family SK Sanadhya, P Sarkar International conference on information security and cryptology, 193-205, 2007 | 20 | 2007 |