Santanu Sarkar

Orcid: 0000-0001-6821-920X

Affiliations:
  • Indian Institute of Technology Madras, Chennai, India
  • Indian Statistical Institute, Kolkata, India (former)


According to our database1, Santanu Sarkar authored at least 118 papers between 2008 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Revisiting Modular Inversion Hidden Number Problem and Its Applications.
IEEE Trans. Inf. Theory, August, 2023

Enhanced Differential-Linear Attacks on Reduced Round ChaCha.
IEEE Trans. Inf. Theory, August, 2023

Latin Dances Reloaded: Improved Cryptanalysis Against Salsa and ChaCha, and the Proposal of Forró.
J. Cryptol., July, 2023

Conditional TMDTO as a MILP Instance.
IEEE Trans. Inf. Theory, May, 2023

Revisiting Yoyo Tricks on AES.
IACR Trans. Symmetric Cryptol., 2023

Analysis of RIPEMD-160: New Collision Attacks and Finding Characteristics with MILP.
IACR Cryptol. ePrint Arch., 2023

Algebraic Attack on FHE-Friendly Cipher HERA Using Multiple Collisions.
IACR Cryptol. ePrint Arch., 2023

Memory-Efficient Attacks on Small LWE Keys.
IACR Cryptol. ePrint Arch., 2023

Representing the inverse map as a composition of quadratics in a finite field of characteristic 2.
CoRR, 2023

Some results on lightweight stream ciphers Fountain v1 & Lizard.
Adv. Math. Commun., 2023

2022
New Cryptanalysis of ZUC-256 Initialization Using Modular Differences.
IACR Trans. Symmetric Cryptol., 2022

On One-Dimensional Linear Minimal Codes Over Finite (Commutative) Rings.
IEEE Trans. Inf. Theory, 2022

Revisiting Cryptanalysis on ChaCha From Crypto 2020 and Eurocrypt 2021.
IEEE Trans. Inf. Theory, 2022

Revisiting orthogonal lattice attacks on approximate common divisor problems.
Theor. Comput. Sci., 2022

Side Channel Attack On Stream Ciphers: A Three-Step Approach To State/Key Recovery.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

Some Conditional Cube Testers for Grain-128a of Reduced Rounds.
IEEE Trans. Computers, 2022

A New Approach for Side Channel Analysis on Stream Ciphers and Related Constructions.
IEEE Trans. Computers, 2022

The Inverse of χ and Its Applications to Rasta-Like Ciphers.
J. Cryptol., 2022

Cryptanalysis of Reduced Round SPEEDY.
IACR Cryptol. ePrint Arch., 2022

Approximate Divisor Multiples - Factoring with Only a Third of the Secret CRT-Exponents.
IACR Cryptol. ePrint Arch., 2022

Algebraic Meet-in-the-Middle Attack on LowMC.
IACR Cryptol. ePrint Arch., 2022

New Low-Memory Algebraic Attacks on LowMC in the Picnic Setting.
IACR Cryptol. ePrint Arch., 2022

Revamped Differential-Linear Cryptanalysis on Reduced Round ChaCha.
IACR Cryptol. ePrint Arch., 2022

Improving Bounds on Elliptic Curve Hidden Number Problem for ECDH Key Exchange.
IACR Cryptol. ePrint Arch., 2022

A state bit recovery algorithm with TMDTO attack on Lizard and Grain-128a.
Des. Codes Cryptogr., 2022

2021
Diving Deep into the Weak Keys of Round Reduced Ascon.
IACR Cryptol. ePrint Arch., 2021

Partial Key Exposure Attack on Short Secret Exponent CRT-RSA.
IACR Cryptol. ePrint Arch., 2021

Finding Practical Distinguishers for ZUC-256 Using Modular Differences.
IACR Cryptol. ePrint Arch., 2021

Differential fault attack on DEFAULT.
IACR Cryptol. ePrint Arch., 2021

Atom: A Stream Cipher with Double Key Filter.
IACR Cryptol. ePrint Arch., 2021

Recursive MDS matrices over finite commutative rings.
Discret. Appl. Math., 2021

A theoretical investigation on the distinguishers of Salsa and ChaCha.
Discret. Appl. Math., 2021

Differential fault location identification by machine learning.
CAAI Trans. Intell. Technol., 2021

Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
Fault Location Identification By Machine Learning.
IACR Cryptol. ePrint Arch., 2020

Cryptanalysis of elliptic curve hidden number problem from PKC 2017.
Des. Codes Cryptogr., 2020

New cube distinguishers on NFSR-based stream ciphers.
Des. Codes Cryptogr., 2020

Proving the biases of Salsa and ChaCha in differential attack.
Des. Codes Cryptogr., 2020

2019
Exhaustive Search for Various Types of MDS Matrices.
IACR Trans. Symmetric Cryptol., 2019

New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator.
IACR Cryptol. ePrint Arch., 2019

Some results on Fruit.
Des. Codes Cryptogr., 2019

Settling the mystery of Z r = r in RC4.
Cryptogr. Commun., 2019

Revisiting design principles of Salsa and ChaCha.
Adv. Math. Commun., 2019

Some Cryptanalytic Results on TRIAD.
Proceedings of the Progress in Cryptology - INDOCRYPT 2019, 2019

Revisiting Approximate Polynomial Common Divisor Problem and Noisy Multipolynomial Reconstruction.
Proceedings of the Progress in Cryptology - INDOCRYPT 2019, 2019

2018
Generalization of Roos bias in RC4 and some results on key-keystream relations.
J. Math. Cryptol., 2018

Theoretical Understanding of Some Conditional and Joint Biases in RC4 Stream Cipher.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Revisiting Orthogonal Lattice Attacks on Approximate Common Divisor Problems and their Applications.
IACR Cryptol. ePrint Arch., 2018

Solving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generator.
Des. Codes Cryptogr., 2018

2017
A Differential Fault Attack on Plantlet.
IEEE Trans. Computers, 2017

Cryptanalysis of an RSA variant with moduli N=prql.
J. Math. Cryptol., 2017

Results on significant anomalies of state values after key scheduling algorithm in RC4.
IET Inf. Secur., 2017

Differential Fault Attack on Grain v1, ACORN v3 and Lizard.
IACR Cryptol. ePrint Arch., 2017

Cryptanalysis of full round Fruit.
IACR Cryptol. ePrint Arch., 2017

Settling the mystery of Z<sub>r=r</sub> in RC4.
IACR Cryptol. ePrint Arch., 2017

On acyclic edge-coloring of complete bipartite graphs.
Discret. Math., 2017

Revisiting (nested) Roos bias in RC4 key scheduling algorithm.
Des. Codes Cryptogr., 2017

Observing biases in the state: case studies with Trivium and Trivia-SC.
Des. Codes Cryptogr., 2017

Improved analysis for reduced round Salsa and Chacha.
Discret. Appl. Math., 2017

$\prod\limits_{i=1}^{n} \mathbb{Z}_{2^i}$-Additive Cyclic Codes.
CoRR, 2017

Probabilistic signature based generalized framework for differential fault analysis of stream ciphers.
Cryptogr. Commun., 2017

Analysis of Hidden Number Problem with Hidden Multiplier.
Adv. Math. Commun., 2017

2016
Cryptanalysis of Multi-Prime Φ-Hiding Assumption.
IACR Cryptol. ePrint Arch., 2016

On acyclic edge-coloring of the complete bipartite graphs K<sub>2p-1, 2p-1</sub> for odd prime p.
Discret. Math., 2016

Revisiting Prime Power RSA.
Discret. Appl. Math., 2016

Differential Fault Analysis on Tiaoxin and AEGIS Family of Ciphers.
Proceedings of the Security in Computing and Communications - 4th International Symposium, 2016

Cryptanalysis of Multi-Prime \varPhi -Hiding Assumption.
Proceedings of the Information Security - 19th International Conference, 2016

2015
Differential Fault Attack against Grain Family with Very Few Faults and Minimal Assumptions.
IEEE Trans. Computers, 2015

Hypothesis testing and decision theoretic approach for fault detection in wireless sensor networks.
Int. J. Parallel Emergent Distributed Syst., 2015

Improved differential fault attack on MICKEY 2.0.
J. Cryptogr. Eng., 2015

Probabilistic Signature Based Framework for Differential Fault Analysis of Stream Ciphers.
IACR Cryptol. ePrint Arch., 2015

A New Distinguisher on Grain v1 for 106 rounds.
IACR Cryptol. ePrint Arch., 2015

Key Recovery from State Information of Sprout: Application to Cryptanalysis and Fault Attack.
IACR Cryptol. ePrint Arch., 2015

New Distinguishers for Reduced Round Trivium and Trivia-SC using Cube Testers.
IACR Cryptol. ePrint Arch., 2015

Proving TLS-attack related open biases of RC4.
Des. Codes Cryptogr., 2015

Further non-randomness in RC4, RC4A and VMPC.
Cryptogr. Commun., 2015

Cryptanalysis of Variants of RSA with Multiple Small Secret Exponents.
Proceedings of the Progress in Cryptology - INDOCRYPT 2015, 2015

2014
(Non-)Random Sequences from (Non-)Random Permutations - Analysis of RC4 Stream Cipher.
J. Cryptol., 2014

Proving empirical key-correlations in RC4.
Inf. Process. Lett., 2014

Model Selection Approach for Distributed Fault Detection in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

Small secret exponent attack on RSA variant with modulus N=p<sup>r</sup>q.
Des. Codes Cryptogr., 2014

Partial Key Exposure Attack on CRT-RSA.
Proceedings of the Progress in Cryptology - INDOCRYPT 2014, 2014

Dependence in IV-Related Bytes of RC4 Key Enhances Vulnerabilities in WPA.
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014

2013
Counting Heron triangles with Constraints.
Integers, 2013

Cryptanalytic results on 'Dual CRT' and 'Common Prime' RSA.
Des. Codes Cryptogr., 2013

Security Analysis of the RC4+ Stream Cipher.
Proceedings of the Progress in Cryptology - INDOCRYPT 2013, 2013

Error Correction of Partially Exposed RSA Private Keys from MSB Side.
Proceedings of the Information Systems Security - 9th International Conference, 2013

New Results on Generalization of Roos-Type Biases and Related Keystreams of RC4.
Proceedings of the Progress in Cryptology, 2013

A Chosen IV Related Key Attack on Grain-128a.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013

2012
More on Correcting Errors in RSA Private Keys: Breaking CRT-RSA with Low Weight Decryption Exponents.
IACR Cryptol. ePrint Arch., 2012

A Differential Fault Attack on Grain-128a using MACs.
IACR Cryptol. ePrint Arch., 2012

Reduction in Lossiness of RSA Trapdoor Permutation.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2012

Relaxing IND-CCA: Indistinguishability against Chosen Ciphertext Verification Attack.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2012

Some Results on Related Key-IV Pairs of Grain.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2012

A Differential Fault Attack on the Grain Family under Reasonable Assumptions.
Proceedings of the Progress in Cryptology, 2012

Side Channel Attack to Actual Cryptanalysis: Breaking CRT-RSA with Low Weight Decryption Exponents.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

A Differential Fault Attack on the Grain Family of Stream Ciphers.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

2011
Approximate Integer Common Divisor Problem Relates to Implicit Factorization.
IEEE Trans. Inf. Theory, 2011

RC4: (Non-)Random Words from (Non-)Random Permutations.
IACR Cryptol. ePrint Arch., 2011

Proof of Empirical RC4 Biases and New Key Correlations.
Proceedings of the Selected Areas in Cryptography - 18th International Workshop, 2011

Partial Key Exposure: Generalized Framework to Attack RSA.
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011

On the Evolution of GGHN Cipher.
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011

Some Combinatorial Results towards State Recovery Attack on RC4.
Proceedings of the Information Systems Security - 7th International Conference, 2011

2010
Cryptanalysis of RSA with more than one decryption exponent.
Inf. Process. Lett., 2010

Cryptanalysis of RSA with two decryption exponents.
Inf. Process. Lett., 2010

Cryptanalysis of Dual CRT-RSA.
IACR Cryptol. ePrint Arch., 2010

Some applications of lattice based root finding techniques.
Adv. Math. Commun., 2010

Publishing Upper Half of RSA Decryption Exponent.
Proceedings of the Advances in Information and Computer Security, 2010

Partial Key Exposure Attack on RSA - Improvements for Limited Lattice Dimensions.
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010

Efficient CRT-RSA Decryption for Small Encryption Exponents.
Proceedings of the Topics in Cryptology, 2010

Factoring RSA Modulus Using Prime Reconstruction from Random Known Bits.
Proceedings of the Progress in Cryptology, 2010

2009
On Deterministic Polynomial-Time Equivalence of Computing the CRT-RSA Secret Keys and Factoring.
IACR Cryptol. ePrint Arch., 2009

Further results on implicit factoring in polynomial time.
Adv. Math. Commun., 2009

Partial Key Exposure Attack on CRT-RSA.
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009

2008
RSA Cryptanalysis with Increased Bounds on the Secret Exponent using Less Lattice Dimension.
IACR Cryptol. ePrint Arch., 2008

Revisiting Wiener's Attack - New Weak Keys in RSA.
IACR Cryptol. ePrint Arch., 2008

A New Class of Weak Encryption Exponents in RSA.
Proceedings of the Progress in Cryptology, 2008

Improved Partial Key Exposure Attacks on RSA by Guessing a Few Bits of One of the Prime Factors.
Proceedings of the Information Security and Cryptology, 2008


  Loading...