New Yoyo Tricks with AES-based Permutations

Dhiman Saha , Mostafizar Rahman , Goutam Paul ,
IACR Transactions on Symmetric Cryptology 2018 102 -127

2
2018
Iterated Truncated Differential for Internal Keyed Permutation of FlexAEAD.

Mostafizar Rahman , Dhiman Saha , Goutam Paul ,
IACR Cryptology ePrint Archive 2019 539

1
2019
A Diagonal Fault Attack on the Advanced Encryption Standard.

Debdeep Mukhopadhyay , Dipanwita Roy Chowdhury , Dhiman Saha
IACR Cryptology ePrint Archive 2009 581

55
2009
Fault Attacks In Symmetric Key Cryptosystems.

Shivam Bhasin , Jakub Breier , Dirmanto Jap , Anubhab Baksi
IACR Cryptology ePrint Archive 2020 1267

1
2020
Sycon: A New Milestone in Designing ASCON-like Permutations.

Sumanta Sarkar , Kalikinkar Mandal , Yosuke Todo , Dhiman Saha
IACR Cryptology ePrint Archive 2021 157

3
2021
On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis

Dhiman Saha , Yu Sasaki , Danping Shi , Ferdinand Sibleyras
IACR Transactions on Symmetric Cryptology 2020 152 -174

20
2020
On the Relationship Between Resilient Boolean Functions and Linear Branch Number of S-Boxes

Sumanta Sarkar , Kalikinkar Mandal , Dhiman Saha
Lecture Notes in Computer Science 361 -374

5
2019
EscApe: Diagonal Fault Analysis of APE

Dhiman Saha , Sukhendu Kuila , Dipanwita Roy Chowdhury
international conference on cryptology in india 197 -216

11
2014
Differential Fault Analysis of NORX

Amit Jana , Dhiman Saha , Goutam Paul
IACR Cryptology ePrint Archive 2019 760

2020
PRINCE under Differential Fault Attack: Now in 3D

Aikata , Banashri Karmakar , Dhiman Saha
Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware Security 81 -91

2020
DESIV: Differential Fault Analysis of SIV-Rijndael256 with a Single Fault

Aikata , Banashri Karmakar , Dhiman Saha
hardware oriented security and trust 241 -251

2020
Internal differential fault analysis of parallelizable ciphers in the counter-mode

Dhiman Saha , Dipanwita Roy Chowdhury
Journal of Cryptographic Engineering 9 ( 1) 53 -67

1
2019
To infect or not to infect: a critical analysis of infective countermeasures in fault attacks

Anubhab Baksi , Dhiman Saha , Sumanta Sarkar
Journal of Cryptographic Engineering 10 ( 4) 355 -374

2
2020
EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis with a Case-Study on PAEQ

Dhiman Saha , Dipanwita Roy Chowdhury
cryptographic hardware and embedded systems 2016 581 -601

5
2016
On the Practical Implementation of Impossible Differential Cryptanalysis on Reduced-Round AES

Sourya Kakarla , Srinath Mandava , Dhiman Saha , Dipanwita Roy Chowdhury
Applications and Techniques in Information Security 58 -72

2
2017
Cryptanalysis of ForkAES

Subhadeep Banik , Jannis Bossert , Amit Jana , Eik List
applied cryptography and network security 11464 43 -63

3
2019
Strengthening NLS Against Crossword Puzzle Attack

Debojyoti Bhattacharya , Debdeep Mukhopadhyay , Dhiman Saha , D. RoyChowdhury
Information Security and Privacy 29 -44

3
2007
New Results on the SymSum Distinguisher on Round-Reduced SHA3

Sahiba Suryawanshi , Dhiman Saha , Satyam Sachan
international conference on cryptology in africa 132 -151

2020
Cryptanalysis of FlexAEAD

Mostafizar Rahman , Dhiman Saha , Goutam Paul ,
international conference on cryptology in africa 152 -171

2020
Dinamite: internal differential match‐in‐the‐end attack on eight‐round PAEQ

Dhiman Saha , Sourya Kakarla , Dipanwita Roy Chowdhury
Iet Information Security 13 ( 4) 378 -388

2019