default search action
Gautham Sekar
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j5]Mabin Joseph, Gautham Sekar, R. Balasubramanian:
Revisiting the Software-Efficient Stream Ciphers RCR-64 and RCR-32. Comput. J. 67(4): 1590-1602 (2024) - 2022
- [j4]Mabin Joseph, Gautham Sekar, R. Balasubramanian, G. Venkiteswaran:
On the Security of the Stream Ciphers RCR-64 and RCR-32. Comput. J. 65(12): 3091-3099 (2022) - 2020
- [j3]Mabin Joseph, Gautham Sekar, R. Balasubramanian:
Side channel analysis of SPECK. J. Comput. Secur. 28(6): 655-676 (2020)
2010 – 2019
- 2016
- [j2]Gautham Sekar, Soumyadeep Bhattacharya:
Practical (Second) Preimage Attacks on the TCS_SHA-3 Family of Cryptographic Hash Functions. J. Inf. Process. Syst. 12(2): 310-312 (2016) - [c14]Mabin Joseph, Gautham Sekar, R. Balasubramanian:
Distinguishing Attacks on (Ultra-)Lightweight WG Ciphers. LightSec 2016: 45-59 - 2015
- [c13]Gautham Sekar:
Side Channel Cryptanalysis of Streebog. SSR 2015: 154-162 - 2013
- [i5]Gautham Sekar, Soumyadeep Bhattacharya:
Practical (Second) Preimage Attacks on TCS_SHA-3. IACR Cryptol. ePrint Arch. 2013: 150 (2013) - 2012
- [j1]Nicky Mouha, Gautham Sekar, Bart Preneel:
Challenging the increased resistance of regular hash functions against birthday attacks. J. Math. Cryptol. 6(3-4): 229-248 (2012) - [i4]Gautham Sekar:
The Stream Cipher Core of the 3GPP Encryption Standard 128-EEA3: Timing Attacks and Countermeasures. IACR Cryptol. ePrint Arch. 2012: 425 (2012) - 2011
- [b1]Gautham Sekar:
Cryptanalysis and Design of Symmetric Cryptographic Algorithms (Cryptanalyse en ontwerp van symmetrische cryptografische algoritmen). Katholieke Universiteit Leuven, Belgium, 2011 - [c12]Gautham Sekar:
The Stream Cipher Core of the 3GPP Encryption Standard 128-EEA3: Timing Attacks and Countermeasures. Inscrypt 2011: 269-288 - [c11]Gautham Sekar, Nicky Mouha, Vesselin Velichkov, Bart Preneel:
Meet-in-the-Middle Attacks on Reduced-Round XTEA. CT-RSA 2011: 250-267 - [c10]Gautham Sekar, Bart Preneel:
Practical Attacks on a Cryptosystem Proposed in Patent WO/2009/066313. WISA 2011: 1-12
2000 – 2009
- 2009
- [c9]Nicky Mouha, Gautham Sekar, Jean-Philippe Aumasson, Thomas Peyrin, Søren S. Thomsen, Meltem Sönmez Turan, Bart Preneel:
Cryptanalysis of the ESSENCE Family of Hash Functions. Inscrypt 2009: 15-34 - [c8]Jorge Nakahara Jr., Gautham Sekar, Daniel Santana de Freitas, Chang Chiann, Ramon Hugo de Souza, Bart Preneel:
A New Approach to chi2 Cryptanalysis of Block Ciphers. ISC 2009: 1-16 - [c7]Gautham Sekar, Bart Preneel:
Improved Distinguishing Attacks on HC-256. IWSEC 2009: 38-52 - 2008
- [c6]Emilia Käsper, Vincent Rijmen, Tor E. Bjørstad, Christian Rechberger, Matthew J. B. Robshaw, Gautham Sekar:
Correlated Keystreams in Moustique. AFRICACRYPT 2008: 246-257 - 2007
- [c5]Gautham Sekar, Souradyuti Paul, Bart Preneel:
Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses. INDOCRYPT 2007: 58-72 - [c4]Orr Dunkelman, Gautham Sekar, Bart Preneel:
Improved Meet-in-the-Middle Attacks on Reduced-Round DES. INDOCRYPT 2007: 86-100 - [c3]Gautham Sekar, Souradyuti Paul, Bart Preneel:
New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py. ISC 2007: 249-262 - [c2]Gautham Sekar, Souradyuti Paul, Bart Preneel:
New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B. WEWoRC 2007: 127-141 - [i3]Gautham Sekar, Souradyuti Paul, Bart Preneel:
Weaknesses in the Pseudorandom Bit Generation Algorithms of the Stream Ciphers TPypy and TPy. IACR Cryptol. ePrint Arch. 2007: 75 (2007) - [i2]Gautham Sekar, Souradyuti Paul, Bart Preneel:
New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py. IACR Cryptol. ePrint Arch. 2007: 230 (2007) - [i1]Gautham Sekar, Souradyuti Paul, Bart Preneel:
New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B. IACR Cryptol. ePrint Arch. 2007: 436 (2007) - 2006
- [c1]Souradyuti Paul, Bart Preneel, Gautham Sekar:
Distinguishing Attacks on the Stream Cipher Py. FSE 2006: 405-421
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-08 21:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint