Gautham Sekar

According to our database1, Gautham Sekar authored at least 21 papers between 2006 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
On the Security of the Stream Ciphers RCR-64 and RCR-32.
Comput. J., 2022

2020
Side channel analysis of SPECK.
J. Comput. Secur., 2020

2016
Practical (Second) Preimage Attacks on the TCS_SHA-3 Family of Cryptographic Hash Functions.
J. Inf. Process. Syst., 2016

Distinguishing Attacks on (Ultra-)Lightweight WG Ciphers.
Proceedings of the Lightweight Cryptography for Security and Privacy, 2016

2015
Side Channel Cryptanalysis of Streebog.
Proceedings of the Security Standardisation Research - Second International Conference, 2015

2013
Practical (Second) Preimage Attacks on TCS_SHA-3.
IACR Cryptol. ePrint Arch., 2013

2012
Challenging the increased resistance of regular hash functions against birthday attacks.
J. Math. Cryptol., 2012

The Stream Cipher Core of the 3GPP Encryption Standard 128-EEA3: Timing Attacks and Countermeasures.
IACR Cryptol. ePrint Arch., 2012

2011
Cryptanalysis and Design of Symmetric Cryptographic Algorithms (Cryptanalyse en ontwerp van symmetrische cryptografische algoritmen).
PhD thesis, 2011

Practical Attacks on a Cryptosystem Proposed in Patent WO/2009/066313.
Proceedings of the Information Security Applications - 12th International Workshop, 2011

Meet-in-the-Middle Attacks on Reduced-Round XTEA.
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011

2009
Improved Distinguishing Attacks on HC-256.
Proceedings of the Advances in Information and Computer Security, 2009

A New Approach to <i>chi</i><sup>2</sup> Cryptanalysis of Block Ciphers.
Proceedings of the Information Security, 12th International Conference, 2009

Cryptanalysis of the ESSENCE Family of Hash Functions.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009

2008
Correlated Keystreams in Moustique.
Proceedings of the Progress in Cryptology, 2008

2007
New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B.
IACR Cryptol. ePrint Arch., 2007

New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py.
IACR Cryptol. ePrint Arch., 2007

Weaknesses in the Pseudorandom Bit Generation Algorithms of the Stream Ciphers TPypy and TPy.
IACR Cryptol. ePrint Arch., 2007

Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses.
Proceedings of the Progress in Cryptology, 2007

Improved Meet-in-the-Middle Attacks on Reduced-Round DES.
Proceedings of the Progress in Cryptology, 2007

2006
Distinguishing Attacks on the Stream Cipher Py.
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006


  Loading...