Dhiman Saha

Orcid: 0000-0002-4668-073X

According to our database1, Dhiman Saha authored at least 49 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Simple Vs Vectorial: Exploiting Structural Symmetry to Beat the ZeroSum Distinguisher Applications to SHA3, Xoodyak and Bash.
IACR Cryptol. ePrint Arch., 2024

SASTA: Ambushing Hybrid Homomorphic Encryption Schemes with a Single Fault.
IACR Cryptol. ePrint Arch., 2024

2023
Finding Desirable Substitution Box with SASQUATCH.
IACR Cryptol. ePrint Arch., 2023

TIDAL: Practical Collisions on State-Reduced Keccak Variants.
IACR Cryptol. ePrint Arch., 2023

Where are the constants? New Insights On The Role of Round Constant Addition in The SymSum Distinguisher.
IACR Cryptol. ePrint Arch., 2023

Divide and Rule: DiFA - Division Property Based Fault Attacks on PRESENT and GIFT.
IACR Cryptol. ePrint Arch., 2023

Switching the Top Slice of the Sandwich with Extra Filling Yields a Stronger Boomerang for NLFSR-based Block Ciphers.
IACR Cryptol. ePrint Arch., 2023

A Survey on Fault Attacks on Symmetric Key Cryptosystems.
ACM Comput. Surv., 2023

Radian: Paperless Academic Testimonials Enabled for Long-Term Validation.
Proceedings of the 15th International Conference on COMmunication Systems & NETworkS, 2023

2022
Sycon: a new milestone in designing ASCON-like permutations.
J. Cryptogr. Eng., 2022

Fault analysis of the PRINCE family of lightweight ciphers.
J. Cryptogr. Eng., 2022

Differential fault analysis of NORX using variants of coupon collector problem.
J. Cryptogr. Eng., 2022

Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos.
IACR Cryptol. ePrint Arch., 2022

DEEPAND: In-Depth Modeling of Correlated AND Gates for NLFSR-based Lightweight Block Ciphers.
IACR Cryptol. ePrint Arch., 2022

Radian: Leveraging PKI for Long-Term Validation Enabled Digital Academic Testimonials - A Case-Study.
Proceedings of the IEEE International Conference on Public Key Infrastructure and its Applications, 2022

2021
Looney Tunes: Exposing the Lack of DRM Protection in Indian Music Streaming Services.
CoRR, 2021

2020
To infect or not to infect: a critical analysis of infective countermeasures in fault attacks.
J. Cryptogr. Eng., 2020

New Results on the SymSum Distinguisher on Round-Reduced SHA3.
IACR Cryptol. ePrint Arch., 2020

On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis.
IACR Cryptol. ePrint Arch., 2020

A Novel Duplication Based Countermeasure To Statistical Ineffective Fault Analysis.
IACR Cryptol. ePrint Arch., 2020

Fault Attacks In Symmetric Key Cryptosystems.
IACR Cryptol. ePrint Arch., 2020

DESIV: Differential Fault Analysis of SIV-Rijndael256 with a Single Fault.
Proceedings of the 2020 IEEE International Symposium on Hardware Oriented Security and Trust, 2020

PRINCE under Differential Fault Attack: Now in 3D.
Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware Security Workshop, 2020

Cryptanalysis of FlexAEAD.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2020, 2020

2019
Internal differential fault analysis of parallelizable ciphers in the counter-mode.
J. Cryptogr. Eng., 2019

Dinamite: internal differential match-in-the-end attack on eight-round PAEQ.
IET Inf. Secur., 2019

On the Relationship between Resilient Boolean Functions and Linear Branch Number of S-boxes.
IACR Cryptol. ePrint Arch., 2019

Iterated Truncated Differential for Internal Keyed Permutation of FlexAEAD.
IACR Cryptol. ePrint Arch., 2019

Differential Fault Analysis of NORX.
IACR Cryptol. ePrint Arch., 2019

Cryptanalysis of ForkAES.
IACR Cryptol. ePrint Arch., 2019

2018
New Yoyo Tricks with AES-based Permutations.
IACR Trans. Symmetric Cryptol., 2018

2017
Gain: Practical Key-Recovery Attacks on Round-Reduced PAEQ.
J. Hardw. Syst. Secur., 2017

Preventing fault attacks using fault randomisation with a case study on AES.
Int. J. Appl. Cryptogr., 2017

SymSum: Symmetric-Sum Distinguishers Against Round Reduced SHA3.
IACR Cryptol. ePrint Arch., 2017

On the Practical Implementation of Impossible Differential Cryptanalysis on Reduced-Round AES.
Proceedings of the Applications and Techniques in Information Security, 2017

2016
EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis with a Case-Study on PAEQ.
IACR Cryptol. ePrint Arch., 2016

Key Recovery Attack against 2.5-round pi-Cipher.
IACR Cryptol. ePrint Arch., 2016

2015
Scope: On the Side Channel Vulnerability of Releasing Unverified Plaintexts.
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015

Diagonal fault analysis of Gr⊘stl in dedicated MAC mode.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2015

Preventing Fault Attacks Using Fault Randomization with a Case Study on AES.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

2014
AEC: A Practical Scheme for Authentication with Error Correction.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2014

CASH: Cellular Automata Based Parameterized Hash.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2014

EscApe: Diagonal Fault Analysis of APE.
Proceedings of the Progress in Cryptology - INDOCRYPT 2014, 2014

Practical Distinguishers against 6-Round Keccak-f Exploiting Self-Symmetry.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014

A Scalable Method for Constructing Non-linear Cellular Automata with Period 2 n - 1.
Proceedings of the Cellular Automata, 2014

2011
PKDPA: An Enhanced Probabilistic Differential Power Attack Methodology.
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011

2009
A Diagonal Fault Attack on the Advanced Encryption Standard.
IACR Cryptol. ePrint Arch., 2009

2008
Scan Based Side Channel Attacks on Stream Ciphers and Their Counter-Measures.
Proceedings of the Progress in Cryptology, 2008

2007
Strengthening NLS Against Crossword Puzzle Attack.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007


  Loading...