Machine learning-assisted differential distinguishers for lightweight ciphers A Baksi Classical and Physical Security of Symmetric Key Cryptographic Algorithms …, 2022 | 105 | 2022 |
A survey on fault attacks on symmetric key cryptosystems A Baksi, S Bhasin, J Breier, D Jap, D Saha ACM Computing Surveys 55 (4), 1-34, 2022 | 73* | 2022 |
Quantum Analysis of AES K Jang, A Baksi, H Kim, G Song, H Seo, A Chattopadhyay Cryptology ePrint Archive, 2022 | 67 | 2022 |
LIGHTER-R: Optimized Reversible Circuit Implementation for SBoxes VA Dasu, A Baksi, S Sarkar, A Chattopadhyay 2019 32nd IEEE International System-on-Chip Conference (SOCC), 260-265, 2019 | 45 | 2019 |
A practical fault attack on arx-like ciphers with a case study on chacha20 SVD Kumar, S Patranabis, J Breier, D Mukhopadhyay, S Bhasin, ... 2017 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 33-40, 2017 | 45 | 2017 |
Key Recovery from State Information of Sprout: Application to Cryptanalysis and Fault Attack S Maitra, S Sarkar, A Baksi, P Dey IACR Cryptology ePrint Archive 2015, 2015 | 42 | 2015 |
Quantum implementation and resource estimates for Rectangle and Knot A Baksi, K Jang, G Song, H Seo, Z Xiang Quantum Information Processing 20, 1-24, 2021 | 37 | 2021 |
Side-channel and fault-injection attacks over lattice-based post-quantum schemes (Kyber, Dilithium): Survey and new results P Ravi, A Chattopadhyay, JP D’Anvers, A Baksi ACM Transactions on Embedded Computing Systems 23 (2), 1-54, 2024 | 35 | 2024 |
DEFAULT: Cipher-Level Resistance Against Differential Fault Attack A Baksi Classical and Physical Security of Symmetric Key Cryptographic Algorithms …, 2022 | 31 | 2022 |
Quantum implementation and analysis of Default K Jang, A Baksi, J Breier, H Seo, A Chattopadhyay Cryptology ePrint Archive, 2022 | 28 | 2022 |
Protecting Block Ciphers against Differential Fault Attacks without Re-keying (Extended Version) A Baksi, S Bhasin, J Breier, M Khairallah, T Peyrin IACR Cryptol. ePrint Arch. 2018, 85, 2018 | 27* | 2018 |
Side Channel Attack on Stream Ciphers: A Three-Step Approach to State/Key Recovery S Kumar, VA Dasu, A Baksi, S Sarkar, D Jap, J Breier, S Bhasin IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022 (2), 166-191, 2022 | 26 | 2022 |
An overview of hash based signatures V Srivastava, A Baksi, SK Debnath Cryptology ePrint Archive, 2023 | 23 | 2023 |
Classical and physical security of symmetric key cryptographic algorithms A Baksi 2021 IFIP/IEEE 29th International Conference on Very Large Scale Integration …, 2021 | 22 | 2021 |
Observing biases in the state: Case studies with Trivium and Trivia-SC S Sarkar, S Maitra, A Baksi Designs, Codes and Cryptography 82 (1-2), 351-375, 2017 | 20 | 2017 |
New results on machine learning-based distinguishers A Baksi, J Breier, VA Dasu, X Hou, H Kim, H Seo IEEE Access 11, 54175-54187, 2023 | 16* | 2023 |
To Infect Or Not To Infect: A Critical Analysis Of Infective Countermeasures In Fault Attacks A Baksi, D Saha, S Sarkar https://eprint.iacr.org/2019/355, 2019 | 16 | 2019 |
New insights on differential and linear bounds using mixed integer linear programming A Baksi Classical and Physical Security of Symmetric Key Cryptographic Algorithms …, 2022 | 15* | 2022 |
Three Input Exclusive-OR Gate Support For Boyar-Peralta's Algorithm (Extended Version) A Baksi, VA Dasu, B Karmakar, A Chattopadhyay, T Isobe Cryptology ePrint Archive, 2021 | 14* | 2021 |
Improved quantum analysis of SPECK and LOWMC (full version) K Jang, A Baksi, H Kim, H Seo, A Chattopadhyay Cryptology ePrint Archive, 2022 | 13* | 2022 |