Somitra Sanadhya
Somitra Sanadhya
Dept. of CSE, IIT Jodhpur
Verified email at - Homepage
Cited by
Cited by
New collision attacks against up to 24-step SHA-2
SK Sanadhya, P Sarkar
Progress in Cryptology-INDOCRYPT 2008: 9th International Conference on …, 2008
FPGA-based true random number generation using programmable delays in oscillator-rings
NN Anandakumar, SK Sanadhya, MS Hashmi
IEEE Transactions on Circuits and Systems II: Express Briefs 67 (3), 570-574, 2019
Cryptanalysis of SIMON variants with connections
J Alizadeh, HA Alkhzaimi, MR Aref, N Bagheri, P Gauravaram, A Kumar, ...
International Workshop on Radio Frequency Identification: Security and …, 2014
Compact implementations of FPGA-based PUFs with enhanced performance
NN Anandakumar, MS Hashmi, SK Sanadhya
2017 30th International Conference on VLSI Design and 2017 16th …, 2017
Linear cryptanalysis of round reduced SIMON
J Alizadeh, N Bagheri, P Gauravaram, A Kumar, SK Sanadhya
Cryptology ePrint Archive, 2013
Differential fault analysis of SHA-3
N Bagheri, N Ghaedi, SK Sanadhya
Progress in Cryptology--INDOCRYPT 2015: 16th International Conference on …, 2015
Security analysis of LMAP++, an RFID authentication protocol
M Safkhani, N Bagheri, M Naderi, SK Sanadhya
2011 International Conference for Internet Technology and Secured …, 2011
FbHash: A new similarity hashing scheme for digital forensics
D Chang, M Ghosh, SK Sanadhya, M Singh, DR White
Digital Investigation 29, S113-S123, 2019
Threshold Implementations of : A Trade-Off Analysis
A Jati, N Gupta, A Chattopadhyay, SK Sanadhya, D Chang
IEEE Transactions on Information Forensics and Security 15, 2110-2120, 2019
Generation of secure and reliable honeywords, preventing false detection
D Chang, A Goel, S Mishra, SK Sanadhya
IEEE Transactions on Dependable and Secure Computing 16 (5), 757-769, 2018
Bicliques with minimal data and time complexity for AES
A Bogdanov, D Chang, M Ghosh, SK Sanadhya
Information Security and Cryptology-ICISC 2014: 17th International …, 2015
Non-linear reduced round attacks against SHA-2 hash family
SK Sanadhya, P Sarkar
Information Security and Privacy: 13th Australasian Conference, ACISP 2008 …, 2008
A configurable crystals-kyber hardware implementation with side-channel protection
A Jati, N Gupta, A Chattopadhyay, SK Sanadhya
ACM Transactions on Embedded Computing Systems 23 (2), 1-25, 2024
Threshold implementations of GIFT: A trade-off analysis
N Gupta, A Jati, SK Sanadhya, A Chattopadhyay, D Chang
Release of unverified plaintext: Tight unified model and application to ANYDAE
D Chang, N Datta, A Dutta, B Mennink, M Nandi, S Sanadhya, F Sibleyras
IACR Transactions on Symmetric Cryptology, 119-146, 2019
Reconfigurable hardware architecture for authenticated key agreement protocol over binary edwards curve
NN Anandakumar, MPL Das, SK Sanadhya, MS Hashmi
ACM Transactions on Reconfigurable Technology and Systems (TRETS) 11 (2), 1-19, 2018
Rig: A Simple, Secure and Flexible Design for Password Hashing
D Chang, A Jati, S Mishra, SK Sanadhya
Information Security and Cryptology: 10th International Conference, Inscrypt …, 2015
Attacking reduced round SHA-256
SK Sanadhya, P Sarkar
Applied Cryptography and Network Security: 6th International Conference …, 2008
New local collisions for the SHA-2 hash family
SK Sanadhya, P Sarkar
International conference on information security and cryptology, 193-205, 2007
Design and analysis of FPGA-based PUFs with enhanced performance for hardware-oriented security
NN Anandakumar, MS Hashmi, SK Sanadhya
ACM Journal on Emerging Technologies in Computing Systems (JETC) 18 (4), 1-26, 2022
The system can't perform the operation now. Try again later.
Articles 1–20