default search action
Dhiman Saha
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i25]Aikata, Dhiman Saha, Sujoy Sinha Roy:
SASTA: Ambushing Hybrid Homomorphic Encryption Schemes with a Single Fault. IACR Cryptol. ePrint Arch. 2024: 41 (2024) - [i24]Sahiba Suryawanshi, Shibam Ghosh, Dhiman Saha, Prathamesh Ram:
Simple Vs Vectorial: Exploiting Structural Symmetry to Beat the ZeroSum Distinguisher Applications to SHA3, Xoodyak and Bash. IACR Cryptol. ePrint Arch. 2024: 52 (2024) - [i23]Christina Boura, Shahram Rasoolzadeh, Dhiman Saha, Yosuke Todo:
Multiple-Tweak Differential Attack Against SCARF. IACR Cryptol. ePrint Arch. 2024: 1408 (2024) - 2023
- [j13]Anubhab Baksi, Shivam Bhasin, Jakub Breier, Dirmanto Jap, Dhiman Saha:
A Survey on Fault Attacks on Symmetric Key Cryptosystems. ACM Comput. Surv. 55(4): 86:1-86:34 (2023) - [c28]Anup Kumar Kundu, Shibam Ghosh, Dhiman Saha, Mostafizar Rahman:
Divide and Rule: DiFA - Division Property Based Fault Attacks on PRESENT and GIFT. ACNS (1) 2023: 89-116 - [c27]Sahiba Suryawanshi, Dhiman Saha, Shashwat Jaiswal:
TIDAL: Practical Collisions on State-Reduced Keccak Variants. ACNS (1) 2023: 208-233 - [c26]Souvik Pan, Dhiman Saha, Rajat Moona:
Radian: Paperless Academic Testimonials Enabled for Long-Term Validation. COMSNETS 2023: 189-191 - [c25]Sahiba Suryawanshi, Dhiman Saha:
Where Are the Constants? New Insights on the Role of Round Constant Addition in the SymSum Distinguisher. SSS 2023: 223-239 - [i22]Sahiba Suryawanshi, Dhiman Saha, Shashwat Jaiswal:
TIDAL: Practical Collisions on State-Reduced Keccak Variants. IACR Cryptol. ePrint Arch. 2023: 389 (2023) - [i21]Anup Kumar Kundu, Shibam Ghosh, Dhiman Saha, Mostafizar Rahman:
Divide and Rule: DiFA - Division Property Based Fault Attacks on PRESENT and GIFT. IACR Cryptol. ePrint Arch. 2023: 682 (2023) - [i20]Manas Wadhwa, Anubhab Baksi, Kai Hu, Anupam Chattopadhyay, Takanori Isobe, Dhiman Saha:
Finding Desirable Substitution Box with SASQUATCH. IACR Cryptol. ePrint Arch. 2023: 742 (2023) - [i19]Sahiba Suryawanshi, Dhiman Saha:
Where are the constants? New Insights On The Role of Round Constant Addition in The SymSum Distinguisher. IACR Cryptol. ePrint Arch. 2023: 789 (2023) - [i18]Amit Jana, Mostafizar Rahman, Dhiman Saha, Goutam Paul:
Switching the Top Slice of the Sandwich with Extra Filling Yields a Stronger Boomerang for NLFSR-based Block Ciphers. IACR Cryptol. ePrint Arch. 2023: 1543 (2023) - 2022
- [j12]Kalikinkar Mandal, Dhiman Saha, Sumanta Sarkar, Yosuke Todo:
Sycon: a new milestone in designing ASCON-like permutations. J. Cryptogr. Eng. 12(3): 305-327 (2022) - [j11]Amit Jana, Anirban Nath, Goutam Paul, Dhiman Saha:
Differential fault analysis of NORX using variants of coupon collector problem. J. Cryptogr. Eng. 12(4): 433-459 (2022) - [j10]Anup Kumar Kundu, Aikata, Banashri Karmakar, Dhiman Saha:
Fault analysis of the PRINCE family of lightweight ciphers. J. Cryptogr. Eng. 12(4): 475-494 (2022) - [c24]Souvik Pan, Dhiman Saha, Rajat Moona:
Radian: Leveraging PKI for Long-Term Validation Enabled Digital Academic Testimonials - A Case-Study. PKIA 2022: 1-8 - [i17]Mostafizar Rahman, Dhiman Saha, Goutam Paul:
Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos. IACR Cryptol. ePrint Arch. 2022: 25 (2022) - [i16]Amit Jana, Mostafizar Rahman, Dhiman Saha:
DEEPAND: In-Depth Modeling of Correlated AND Gates for NLFSR-based Lightweight Block Ciphers. IACR Cryptol. ePrint Arch. 2022: 1123 (2022) - 2021
- [j9]Mostafizar Rahman, Dhiman Saha, Goutam Paul:
Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos. IACR Trans. Symmetric Cryptol. 2021(3): 137-169 (2021) - [i15]Ahaan Dabholkar, Sourya Kakarla, Dhiman Saha:
Looney Tunes: Exposing the Lack of DRM Protection in Indian Music Streaming Services. CoRR abs/2103.16360 (2021) - [i14]Kalikinkar Mandal, Dhiman Saha, Sumanta Sarkar, Yosuke Todo:
Sycon: A New Milestone in Designing ASCON-like Permutations. IACR Cryptol. ePrint Arch. 2021: 157 (2021) - 2020
- [j8]Anubhab Baksi, Dhiman Saha, Sumanta Sarkar:
To infect or not to infect: a critical analysis of infective countermeasures in fault attacks. J. Cryptogr. Eng. 10(4): 355-374 (2020) - [j7]Dhiman Saha, Yu Sasaki, Danping Shi, Ferdinand Sibleyras, Siwei Sun, Yingjie Zhang:
On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis. IACR Trans. Symmetric Cryptol. 2020(3): 152-174 (2020) - [c23]Anubhab Baksi, Vinay B. Y. Kumar, Banashri Karmakar, Shivam Bhasin, Dhiman Saha, Anupam Chattopadhyay:
A Novel Duplication Based Countermeasure to Statistical Ineffective Fault Analysis. ACISP 2020: 525-542 - [c22]Sahiba Suryawanshi, Dhiman Saha, Satyam Sachan:
New Results on the SymSum Distinguisher on Round-Reduced SHA3. AFRICACRYPT 2020: 132-151 - [c21]Mostafizar Rahman, Dhiman Saha, Goutam Paul:
Cryptanalysis of FlexAEAD. AFRICACRYPT 2020: 152-171 - [c20]Amit Jana, Dhiman Saha, Goutam Paul:
Differential Fault Analysis of NORX. ASHES@CCS 2020: 67-79 - [c19]Aikata, Banashri Karmakar, Dhiman Saha:
PRINCE under Differential Fault Attack: Now in 3D. ASHES@CCS 2020: 81-91 - [c18]Aikata, Banashri Karmakar, Dhiman Saha:
DESIV: Differential Fault Analysis of SIV-Rijndael256 with a Single Fault. HOST 2020: 241-251 - [i13]Sahiba Suryawanshi, Dhiman Saha, Satyam Sachan:
New Results on the SymSum Distinguisher on Round-Reduced SHA3. IACR Cryptol. ePrint Arch. 2020: 667 (2020) - [i12]Dhiman Saha, Yu Sasaki, Danping Shi, Ferdinand Sibleyras, Siwei Sun, Yingjie Zhang:
On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis. IACR Cryptol. ePrint Arch. 2020: 1045 (2020) - [i11]Anubhab Baksi, Shivam Bhasin, Jakub Breier, Dirmanto Jap, Dhiman Saha:
Fault Attacks In Symmetric Key Cryptosystems. IACR Cryptol. ePrint Arch. 2020: 1267 (2020) - [i10]Anubhab Baksi, Vinay B. Y. Kumar, Banashri Karmakar, Shivam Bhasin, Dhiman Saha, Anupam Chattopadhyay:
A Novel Duplication Based Countermeasure To Statistical Ineffective Fault Analysis. IACR Cryptol. ePrint Arch. 2020: 1268 (2020)
2010 – 2019
- 2019
- [j6]Dhiman Saha, Sourya Kakarla, Dipanwita Roy Chowdhury:
Dinamite: internal differential match-in-the-end attack on eight-round PAEQ. IET Inf. Secur. 13(4): 378-388 (2019) - [j5]Dhiman Saha, Dipanwita Roy Chowdhury:
Internal differential fault analysis of parallelizable ciphers in the counter-mode. J. Cryptogr. Eng. 9(1): 53-67 (2019) - [c17]Subhadeep Banik, Jannis Bossert, Amit Jana, Eik List, Stefan Lucks, Willi Meier, Mostafizar Rahman, Dhiman Saha, Yu Sasaki:
Cryptanalysis of ForkAES. ACNS 2019: 43-63 - [c16]Sumanta Sarkar, Kalikinkar Mandal, Dhiman Saha:
On the Relationship Between Resilient Boolean Functions and Linear Branch Number of S-Boxes. INDOCRYPT 2019: 361-374 - [i9]Subhadeep Banik, Jannis Bossert, Amit Jana, Eik List, Stefan Lucks, Willi Meier, Mostafizar Rahman, Dhiman Saha, Yu Sasaki:
Cryptanalysis of ForkAES. IACR Cryptol. ePrint Arch. 2019: 289 (2019) - [i8]Anubhab Baksi, Dhiman Saha, Sumanta Sarkar:
To Infect Or Not To Infect: A Critical Analysis Of Infective Countermeasures In Fault Attacks. IACR Cryptol. ePrint Arch. 2019: 355 (2019) - [i7]Mostafizar Rahman, Dhiman Saha, Goutam Paul:
Iterated Truncated Differential for Internal Keyed Permutation of FlexAEAD. IACR Cryptol. ePrint Arch. 2019: 539 (2019) - [i6]Amit Jana, Dhiman Saha, Goutam Paul:
Differential Fault Analysis of NORX. IACR Cryptol. ePrint Arch. 2019: 760 (2019) - [i5]Sumanta Sarkar, Kalikinkar Mandal, Dhiman Saha:
On the Relationship between Resilient Boolean Functions and Linear Branch Number of S-boxes. IACR Cryptol. ePrint Arch. 2019: 1427 (2019) - 2018
- [j4]Dhiman Saha, Mostafizar Rahman, Goutam Paul:
New Yoyo Tricks with AES-based Permutations. IACR Trans. Symmetric Cryptol. 2018(4): 102-127 (2018) - 2017
- [j3]Shamit Ghosh, Dhiman Saha, Abhrajit Sengupta, Dipanwita Roy Chowdhury:
Preventing fault attacks using fault randomisation with a case study on AES. Int. J. Appl. Cryptogr. 3(3): 225-235 (2017) - [j2]Dhiman Saha, Sourya Kakarla, Srinath Mandava, Dipanwita Roy Chowdhury:
Gain: Practical Key-Recovery Attacks on Round-Reduced PAEQ. J. Hardw. Syst. Secur. 1(3): 282-296 (2017) - [j1]Dhiman Saha, Sukhendu Kuila, Dipanwita Roy Chowdhury:
SymSum: Symmetric-Sum Distinguishers Against Round Reduced SHA3. IACR Trans. Symmetric Cryptol. 2017(1): 240-258 (2017) - [c15]Sourya Kakarla, Srinath Mandava, Dhiman Saha, Dipanwita Roy Chowdhury:
On the Practical Implementation of Impossible Differential Cryptanalysis on Reduced-Round AES. ATIS 2017: 58-72 - [i4]Dhiman Saha, Sukhendu Kuila, Dipanwita Roy Chowdhury:
SymSum: Symmetric-Sum Distinguishers Against Round Reduced SHA3. IACR Cryptol. ePrint Arch. 2017: 165 (2017) - 2016
- [c14]Dhiman Saha, Dipanwita Roy Chowdhury:
EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis with a Case-Study on PAEQ. CHES 2016: 581-601 - [c13]Christina Boura, Avik Chakraborti, Gaëtan Leurent, Goutam Paul, Dhiman Saha, Hadi Soleimany, Valentin Suder:
Key Recovery Attack Against 2.5-Round \pi -Cipher. FSE 2016: 535-553 - [c12]Dhiman Saha, Sourya Kakarla, Srinath Mandava, Dipanwita Roy Chowdhury:
Gain: Practical Key-Recovery Attacks on Round-reduced PAEQ. SPACE 2016: 194-210 - [i3]Christina Boura, Avik Chakraborti, Gaëtan Leurent, Goutam Paul, Dhiman Saha, Hadi Soleimany, Valentin Suder:
Key Recovery Attack against 2.5-round pi-Cipher. IACR Cryptol. ePrint Arch. 2016: 502 (2016) - [i2]Dhiman Saha, Dipanwita Roy Chowdhury:
EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis with a Case-Study on PAEQ. IACR Cryptol. ePrint Arch. 2016: 623 (2016) - 2015
- [c11]Shamit Ghosh, Dhiman Saha, Abhrajit Sengupta, Dipanwita Roy Chowdhury:
Preventing Fault Attacks Using Fault Randomization with a Case Study on AES. ACISP 2015: 343-355 - [c10]Dhiman Saha, Dipanwita Roy Chowdhury:
Diagonal fault analysis of Gr⊘stl in dedicated MAC mode. HOST 2015: 100-105 - [c9]Dhiman Saha, Dipanwita Roy Chowdhury:
Scope: On the Side Channel Vulnerability of Releasing Unverified Plaintexts. SAC 2015: 417-438 - 2014
- [c8]Shamit Ghosh, Abhrajit Sengupta, Dhiman Saha, Dipanwita Roy Chowdhury:
A Scalable Method for Constructing Non-linear Cellular Automata with Period 2 n - 1. ACRI 2014: 65-74 - [c7]Sukhendu Kuila, Dhiman Saha, Madhumangal Pal, Dipanwita Roy Chowdhury:
Practical Distinguishers against 6-Round Keccak-f Exploiting Self-Symmetry. AFRICACRYPT 2014: 88-108 - [c6]Dhiman Saha, Sukhendu Kuila, Dipanwita Roy Chowdhury:
EscApe: Diagonal Fault Analysis of APE. INDOCRYPT 2014: 197-216 - [c5]Sukhendu Kuila, Dhiman Saha, Madhumangal Pal, Dipanwita Roy Chowdhury:
CASH: Cellular Automata Based Parameterized Hash. SPACE 2014: 59-75 - [c4]Abhrajit Sengupta, Dhiman Saha, Shamit Ghosh, Deval Mehta, Dipanwita Roy Chowdhury:
AEC: A Practical Scheme for Authentication with Error Correction. SPACE 2014: 155-170 - 2011
- [c3]Dhiman Saha, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
PKDPA: An Enhanced Probabilistic Differential Power Attack Methodology. INDOCRYPT 2011: 3-21
2000 – 2009
- 2009
- [i1]Dhiman Saha, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
A Diagonal Fault Attack on the Advanced Encryption Standard. IACR Cryptol. ePrint Arch. 2009: 581 (2009) - 2008
- [c2]Mukesh Agrawal, Sandip Karmakar, Dhiman Saha, Debdeep Mukhopadhyay:
Scan Based Side Channel Attacks on Stream Ciphers and Their Counter-Measures. INDOCRYPT 2008: 226-238 - 2007
- [c1]Debojyoti Bhattacharya, Debdeep Mukhopadhyay, Dhiman Saha, Dipanwita Roy Chowdhury:
Strengthening NLS Against Crossword Puzzle Attack. ACISP 2007: 29-44
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint