Follow
Anubhab Baksi
Anubhab Baksi
Verified email at e.ntu.edu.sg
Title
Cited by
Cited by
Year
Machine learning-assisted differential distinguishers for lightweight ciphers
A Baksi
Classical and Physical Security of Symmetric Key Cryptographic Algorithms …, 2022
1052022
A survey on fault attacks on symmetric key cryptosystems
A Baksi, S Bhasin, J Breier, D Jap, D Saha
ACM Computing Surveys 55 (4), 1-34, 2022
73*2022
Quantum Analysis of AES
K Jang, A Baksi, H Kim, G Song, H Seo, A Chattopadhyay
Cryptology ePrint Archive, 2022
672022
LIGHTER-R: Optimized Reversible Circuit Implementation for SBoxes
VA Dasu, A Baksi, S Sarkar, A Chattopadhyay
2019 32nd IEEE International System-on-Chip Conference (SOCC), 260-265, 2019
452019
A practical fault attack on arx-like ciphers with a case study on chacha20
SVD Kumar, S Patranabis, J Breier, D Mukhopadhyay, S Bhasin, ...
2017 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 33-40, 2017
452017
Key Recovery from State Information of Sprout: Application to Cryptanalysis and Fault Attack
S Maitra, S Sarkar, A Baksi, P Dey
IACR Cryptology ePrint Archive 2015, 2015
422015
Quantum implementation and resource estimates for Rectangle and Knot
A Baksi, K Jang, G Song, H Seo, Z Xiang
Quantum Information Processing 20, 1-24, 2021
372021
Side-channel and fault-injection attacks over lattice-based post-quantum schemes (Kyber, Dilithium): Survey and new results
P Ravi, A Chattopadhyay, JP D’Anvers, A Baksi
ACM Transactions on Embedded Computing Systems 23 (2), 1-54, 2024
352024
DEFAULT: Cipher-Level Resistance Against Differential Fault Attack
A Baksi
Classical and Physical Security of Symmetric Key Cryptographic Algorithms …, 2022
312022
Quantum implementation and analysis of Default
K Jang, A Baksi, J Breier, H Seo, A Chattopadhyay
Cryptology ePrint Archive, 2022
282022
Protecting Block Ciphers against Differential Fault Attacks without Re-keying (Extended Version)
A Baksi, S Bhasin, J Breier, M Khairallah, T Peyrin
IACR Cryptol. ePrint Arch. 2018, 85, 2018
27*2018
Side Channel Attack on Stream Ciphers: A Three-Step Approach to State/Key Recovery
S Kumar, VA Dasu, A Baksi, S Sarkar, D Jap, J Breier, S Bhasin
IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022 (2), 166-191, 2022
262022
An overview of hash based signatures
V Srivastava, A Baksi, SK Debnath
Cryptology ePrint Archive, 2023
232023
Classical and physical security of symmetric key cryptographic algorithms
A Baksi
2021 IFIP/IEEE 29th International Conference on Very Large Scale Integration …, 2021
222021
Observing biases in the state: Case studies with Trivium and Trivia-SC
S Sarkar, S Maitra, A Baksi
Designs, Codes and Cryptography 82 (1-2), 351-375, 2017
202017
New results on machine learning-based distinguishers
A Baksi, J Breier, VA Dasu, X Hou, H Kim, H Seo
IEEE Access 11, 54175-54187, 2023
16*2023
To Infect Or Not To Infect: A Critical Analysis Of Infective Countermeasures In Fault Attacks
A Baksi, D Saha, S Sarkar
https://eprint.iacr.org/2019/355, 2019
162019
New insights on differential and linear bounds using mixed integer linear programming
A Baksi
Classical and Physical Security of Symmetric Key Cryptographic Algorithms …, 2022
15*2022
Three Input Exclusive-OR Gate Support For Boyar-Peralta's Algorithm (Extended Version)
A Baksi, VA Dasu, B Karmakar, A Chattopadhyay, T Isobe
Cryptology ePrint Archive, 2021
14*2021
Improved quantum analysis of SPECK and LOWMC (full version)
K Jang, A Baksi, H Kim, H Seo, A Chattopadhyay
Cryptology ePrint Archive, 2022
13*2022
The system can't perform the operation now. Try again later.
Articles 1–20