Raghvendra Rohit

Orcid: 0000-0002-5272-1016

Affiliations:
  • University of Rennes, France


According to our database1, Raghvendra Rohit authored at least 20 papers between 2016 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Twin Column Parity Mixers and Gaston - A New Mixing Layer and Permutation.
IACR Cryptol. ePrint Arch., 2023

2022
Towards Tight Differential Bounds of Ascon A Hybrid Usage of SMT and MILP.
IACR Trans. Symmetric Cryptol., 2022

Cryptanalysis of Reduced Round SPEEDY.
IACR Cryptol. ePrint Arch., 2022

Farasha: A Provable Permutation-based Parallelizable PRF.
IACR Cryptol. ePrint Arch., 2022

2021
Diving Deep into the Weak Keys of Round Reduced Ascon.
IACR Cryptol. ePrint Arch., 2021

Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon.
IACR Cryptol. ePrint Arch., 2021

2020
Design and Cryptanalysis of Lightweight Symmetric Key Primitives.
PhD thesis, 2020

Correlation Power Analysis and Higher-order Masking Implementation of WAGE.
IACR Cryptol. ePrint Arch., 2020

WAGE: An Authenticated Encryption with a Twist.
IACR Cryptol. ePrint Arch., 2020

2019
Practical Forgery Attacks on Limdolen and HERN.
IACR Cryptol. ePrint Arch., 2019

U-EPS: An Ultra-small and Efficient Post-quantum Signature Scheme.
Proceedings of the Foundations and Practice of Security - 12th International Symposium, 2019

2018
SLISCP-light: Towards Hardware Optimized Sponge-specific Cryptographic Permutations.
ACM Trans. Embed. Comput. Syst., 2018

Towards a Cryptographic Minimal Design: The sLiSCP Family of Permutations.
IEEE Trans. Computers, 2018

Single key MITM attack and biclique cryptanalysis of full round Khudra.
J. Inf. Secur. Appl., 2018

Correlated Sequence Attack on Reduced-Round Simon-32/64 and Simeck-32/64.
IACR Cryptol. ePrint Arch., 2018

2017
sLiSCP: Simeck-based Permutations for Lightweight Sponge Cryptographic Primitives.
IACR Cryptol. ePrint Arch., 2017

MILP-Based Cube Attack on the Reduced-Round WG-5 Lightweight Stream Cipher.
Proceedings of the Cryptography and Coding - 16th IMA International Conference, 2017

2016
Full key recovery of ACORN with a single fault.
J. Inf. Secur. Appl., 2016

Constructions and analysis of some efficient t - (k, n)<sup>∗</sup>-visual cryptographic schemes using linear algebraic techniques.
Des. Codes Cryptogr., 2016

Differential Fault Analysis on Tiaoxin and AEGIS Family of Ciphers.
Proceedings of the Security in Computing and Communications - 4th International Symposium, 2016


  Loading...