Anubhab Baksi

Orcid: 0000-0002-5639-7372

According to our database1, Anubhab Baksi authored at least 53 papers between 2015 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Finding Desirable Substitution Box with SASQUATCH.
IACR Cryptol. ePrint Arch., 2023

An Overview of Hash Based Signatures.
IACR Cryptol. ePrint Arch., 2023

Quantum Implementation of ASCON Linear Layer.
IACR Cryptol. ePrint Arch., 2023

Depth-Optimized Implementation of ASCON Quantum Circuit.
IACR Cryptol. ePrint Arch., 2023

Quantum Artificial Intelligence on Cryptanalysis.
IACR Cryptol. ePrint Arch., 2023

DORCIS: Depth Optimized Quantum Implementation of Substitution Boxes.
IACR Cryptol. ePrint Arch., 2023

From Substitution Box To Threshold.
IACR Cryptol. ePrint Arch., 2023

BAKSHEESH: Similar Yet Different From GIFT.
IACR Cryptol. ePrint Arch., 2023

The Problem of Half Round Key XOR.
IACR Cryptol. ePrint Arch., 2023

A Survey on Fault Attacks on Symmetric Key Cryptosystems.
ACM Comput. Surv., 2023

A Higher Radix Architecture for Quantum Carry-lookahead Adder.
CoRR, 2023

New Results on Machine Learning-Based Distinguishers.
IEEE Access, 2023

Optimized Quantum Circuit Implementation of Payoff Function.
Proceedings of the 31st IFIP/IEEE International Conference on Very Large Scale Integration, 2023

2022
Side Channel Attack On Stream Ciphers: A Three-Step Approach To State/Key Recovery.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

A New Approach for Side Channel Analysis on Stream Ciphers and Related Constructions.
IEEE Trans. Computers, 2022

Hardware Implementation of SpoC-128.
IACR Cryptol. ePrint Arch., 2022

Side-channel and Fault-injection attacks over Lattice-based Post-quantum Schemes (Kyber, Dilithium): Survey and New Results.
IACR Cryptol. ePrint Arch., 2022

Quantum Analysis of AES.
IACR Cryptol. ePrint Arch., 2022

Improved Quantum Analysis of SPECK and LowMC (Full Version).
IACR Cryptol. ePrint Arch., 2022

Quantum Implementation and Analysis of DEFAULT.
IACR Cryptol. ePrint Arch., 2022

Big Brother Is Watching You: A Closer Look At Backdoor Construction.
IACR Cryptol. ePrint Arch., 2022

Improved Quantum Analysis of SPECK and LowMC.
Proceedings of the Progress in Cryptology - INDOCRYPT 2022, 2022

2021
Classical and physical security of symmetric key cryptographic algorithms
PhD thesis, 2021

Quantum Implementation and Resource Estimates for RECTANGLE and KNOT.
IACR Cryptol. ePrint Arch., 2021

Three Input Exclusive-OR Gate Support For Boyar-Peralta's Algorithm (Extended Version).
IACR Cryptol. ePrint Arch., 2021

DEFAULT: Cipher Level Resistance Against Differential Fault Attack.
IACR Cryptol. ePrint Arch., 2021

Differential fault location identification by machine learning.
CAAI Trans. Intell. Technol., 2021

Classical and Physical Security of Symmetric Key Cryptographic Algorithms.
Proceedings of the 29th IFIP/IEEE International Conference on Very Large Scale Integration, 2021

On Threat of Hardware Trojan to Post-Quantum Lattice-Based Schemes: A Key Recovery Attack on SABER and Beyond.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2021

Three Input Exclusive-OR Gate Support for Boyar-Peralta's Algorithm.
Proceedings of the Progress in Cryptology - INDOCRYPT 2021, 2021

Feeding Three Birds With One Scone: A Generic Duplication Based Countermeasure To Fault Attacks.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2021

POSTER: Optimizing Device Implementation of Linear Layers with Automated Tools.
Proceedings of the Applied Cryptography and Network Security Workshops, 2021

POSTER: Another Look at Boyar-Peralta's Algorithm.
Proceedings of the Applied Cryptography and Network Security Workshops, 2021

2020
A Coding Theoretic Approach towards Symmetrization in Reversible Circuit Synthesis.
J. Multiple Valued Log. Soft Comput., 2020

To infect or not to infect: a critical analysis of infective countermeasures in fault attacks.
J. Cryptogr. Eng., 2020

Fault Location Identification By Machine Learning.
IACR Cryptol. ePrint Arch., 2020

A Novel Duplication Based Countermeasure To Statistical Ineffective Fault Analysis.
IACR Cryptol. ePrint Arch., 2020

Machine Learning Assisted Differential Distinguishers For Lightweight Ciphers.
IACR Cryptol. ePrint Arch., 2020

Fault Attacks In Symmetric Key Cryptosystems.
IACR Cryptol. ePrint Arch., 2020

Feeding Three Birds With One Scone: A Generic Duplication Based Countermeasure To Fault Attacks (Extended Version).
IACR Cryptol. ePrint Arch., 2020

New Insights On Differential And Linear Bounds Using Mixed Integer Linear Programming (Full Version).
IACR Cryptol. ePrint Arch., 2020

New Insights on Differential and Linear Bounds Using Mixed Integer Linear Programming.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2020

2019
LIGHTER-R: Optimized Reversible Circuit Implementation For SBoxes.
Proceedings of the 32nd IEEE International System-on-Chip Conference, 2019

2018
Protecting Block Ciphers against Differential Fault Attacks without Re-keying (Extended Version).
IACR Cryptol. ePrint Arch., 2018

Lightweight ASIC Implementation of AEGIS-128.
Proceedings of the 2018 IEEE Computer Society Annual Symposium on VLSI, 2018

Protecting block ciphers against differential fault attacks without re-keying.
Proceedings of the 2018 IEEE International Symposium on Hardware Oriented Security and Trust, 2018

2017
A Practical Fault Attack on ARX-like Ciphers with a Case Study on ChaCha20.
IACR Cryptol. ePrint Arch., 2017

Observing biases in the state: case studies with Trivium and Trivia-SC.
Des. Codes Cryptogr., 2017

2016
Reversible Logic Circuit Complexity Analysis via Functional Decomposition.
CoRR, 2016

FPGA Based Cyber Security Protocol for Automated Traffic Monitoring Systems: Proposal and Implementation.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2016

Low-quantum cost circuit constructions for adder and symmetric Boolean functions.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2016

2015
Key Recovery from State Information of Sprout: Application to Cryptanalysis and Fault Attack.
IACR Cryptol. ePrint Arch., 2015

New Distinguishers for Reduced Round Trivium and Trivia-SC using Cube Testers.
IACR Cryptol. ePrint Arch., 2015


  Loading...