Suparna Kundu

Orcid: 0000-0003-4354-852X

According to our database1, Suparna Kundu authored at least 19 papers between 2021 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Full Key Extraction of SNOW-V Using ML-Assisted Power SCA.
IEEE Des. Test, April, 2025

Scabbard: An Exploratory Study on Hardware Aware Design Choices of Learning with Rounding-based Key Encapsulation Mechanisms.
ACM Trans. Embed. Comput. Syst., January, 2025

Fault to Forge: Fault Assisted Forging Attacks on LESS Signature Scheme.
IACR Cryptol. ePrint Arch., 2025

Revisiting Lattice-based Non-interactive Blind Signature.
IACR Cryptol. ePrint Arch., 2025

Masking Gaussian Elimination at Arbitrary Order with Application to Multivariate-and Code-Based PQC.
Proceedings of the Topics in Cryptology - CT-RSA 2025, 2025

mUOV: Masking the Unbalanced Oil and Vinegar Digital Signature Scheme at First- and Higher-Order.
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025

Towards Solving Real-world Problems of Post-quantum Cryptography.
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025

X2X: Low-Randomness and High-Throughput A2B and B2A Conversions for d+1 Shares in Hardware.
Proceedings of the Constructive Approaches for Security Analysis and Design of Embedded Systems, 2025

2024
Mask Conversions for d+1 shares in Hardware, with Application to Lattice-based PQC.
IACR Cryptol. ePrint Arch., 2024

LightCROSS: A Secure and Memory Optimized Post-Quantum Digital Signature CROSS.
IACR Cryptol. ePrint Arch., 2024

mUOV: Masking the Unbalanced Oil and Vinegar Digital Sigital Signature Scheme at First- and Higher-Order.
IACR Cryptol. ePrint Arch., 2024

Rudraksh: A compact and lightweight post-quantum key-encapsulation mechanism.
IACR Cryptol. ePrint Arch., 2024

SNOW-SCA: ML-Assisted Side-Channel Attack on SNOW-V.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2024

ZKFault: Fault Attack Analysis on Zero-Knowledge Based Post-quantum Digital Signature Schemes.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

A Practical Key-Recovery Attack on LWE-Based Key-Encapsulation Mechanism Schemes Using Rowhammer.
Proceedings of the Applied Cryptography and Network Security, 2024

2023
Carry Your Fault: A Fault Propagation Attack on Side-Channel Protected LWE-based KEM.
IACR Cryptol. ePrint Arch., 2023

On the Masking-Friendly Designs for Post-quantum Cryptography.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2023

2022
Higher-Order Masked Saber.
Proceedings of the Security and Cryptography for Networks - 13th International Conference, 2022

2021
Scabbard: a suite of efficient learning with rounding key-encapsulation mechanisms.
IACR Cryptol. ePrint Arch., 2021


  Loading...