Arnab Roy

Orcid: 0000-0002-3284-7076

Affiliations:
  • University of Innsbruck, Department of Computer Science, Innsbruck, Austria
  • University of Klagenfurt, Austria (former)
  • University of Bristol, UK (former)
  • Technical University of Denmark (DTU), Copenhagen, Denmark (former)
  • University of Luxembourg (former, PhD 2014)


According to our database1, Arnab Roy authored at least 35 papers between 2011 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Groebner Basis Cryptanalysis of Anemoi.
IACR Cryptol. ePrint Arch., 2025

Gröbner Basis Cryptanalysis of Anemoi.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

2024
Quantum cryptanalysis of Farfalle and (generalised) key-alternating Feistel networks.
Des. Codes Cryptogr., February, 2024

On Efficient and Secure Compression Modes for Arithmetization-Oriented Hashing.
IACR Cryptol. ePrint Arch., 2024

Generalized Triangular Dynamical System: An Algebraic System for Constructing Cryptographic Permutations over Finite Fields.
Proceedings of the Selected Areas in Cryptography - SAC 2024, 2024

On Efficient and Secure Compression Functions for Arithmetization-Oriented Hashing.
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024

Leakage Certification Made Simple.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Skye: An Expanding PRF based Fast KDF and its Applications.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

Masked Iterate-Fork-Iterate: A New Design Paradigm for Tweakable Expanding Pseudorandom Function.
Proceedings of the Applied Cryptography and Network Security, 2024

2023
Skye: A Fast KDF based on Expanding PRF and its Application to Signal.
IACR Cryptol. ePrint Arch., 2023

Arion: Arithmetization-Oriented Permutation and Hashing from Generalized Triangular Dynamical Systems.
CoRR, 2023

Not Optimal but Efficient: A Distinguisher Based on the Kruskal-Wallis Test.
Proceedings of the Information Security and Cryptology - ICISC 2023, 2023

PIE: p-adic Encoding for High-Precision Arithmetic in Homomorphic Encryption.
Proceedings of the Applied Cryptography and Network Security, 2023

2022
Consistent, Efficient and Leakage-Model Free Mutual Information Estimation.
IACR Cryptol. ePrint Arch., 2022

An Algebraic System for Constructing Cryptographic Permutations over Finite Fields.
CoRR, 2022

Quantum Cryptanalysis of Farfalle and (Generalised) Feistel Network.
CoRR, 2022

2021
Poseidon: A New Hash Function for Zero-Knowledge Proof Systems.
Proceedings of the 30th USENIX Security Symposium, 2021

Compactness of Hashing Modes and Efficiency Beyond Merkle Tree.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

2020
Interpolation Cryptanalysis of Unbalanced Feistel Networks with Low Degree Round Functions.
Proceedings of the Selected Areas in Cryptography - SAC 2020, 2020

2019
Starkad and Poseidon: New Hash Functions for Zero Knowledge Proof Systems.
IACR Cryptol. ePrint Arch., 2019

Feistel Structures for MPC, and More.
Proceedings of the Computer Security - ESORICS 2019, 2019

Constructing TI-Friendly Substitution Boxes Using Shift-Invariant Permutations.
Proceedings of the Topics in Cryptology - CT-RSA 2019, 2019

Forkcipher: A New Primitive for Authenticated Encryption of Very Short Messages.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
A Systematic Study of the Impact of Graphical Models on Inference-Based Attacks on AES.
Proceedings of the Smart Card Research and Advanced Applications, 2018

2016
A Brief Comparison of Simon and Simeck.
Proceedings of the Lightweight Cryptography for Security and Privacy, 2016

MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2014
Security Aspects of Symmetric-Key Primitives.
PhD thesis, 2014

Error-Tolerant Side-Channel Cube Attack Revisited.
Proceedings of the Selected Areas in Cryptography - SAC 2014, 2014

Differential Analysis of Block Ciphers SIMON and SPECK.
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014

Fast Evaluation of Polynomials over Binary Finite Fields and Application to Side-Channel Countermeasures.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014

2013
Secure Message Authentication Against Related-Key Attack.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013

Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2013, 2013

2012
Cryptanalysis of the "Kindle" Cipher.
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012

Boomerang Attacks on Hash Function Using Auxiliary Differentials.
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012

2011
Boomerang Attacks on BLAKE-32.
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011


  Loading...