


Остановите войну!
for scientists:
Dhiman Saha
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [i16]Mostafizar Rahman, Dhiman Saha, Goutam Paul:
Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos. IACR Cryptol. ePrint Arch. 2022: 25 (2022) - 2021
- [j9]Mostafizar Rahman, Dhiman Saha, Goutam Paul:
Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos. IACR Trans. Symmetric Cryptol. 2021(3): 137-169 (2021) - [i15]Ahaan Dabholkar, Sourya Kakarla, Dhiman Saha:
Looney Tunes: Exposing the Lack of DRM Protection in Indian Music Streaming Services. CoRR abs/2103.16360 (2021) - [i14]Kalikinkar Mandal, Dhiman Saha, Sumanta Sarkar, Yosuke Todo:
Sycon: A New Milestone in Designing ASCON-like Permutations. IACR Cryptol. ePrint Arch. 2021: 157 (2021) - 2020
- [j8]Anubhab Baksi, Dhiman Saha, Sumanta Sarkar:
To infect or not to infect: a critical analysis of infective countermeasures in fault attacks. J. Cryptogr. Eng. 10(4): 355-374 (2020) - [j7]Dhiman Saha, Yu Sasaki, Danping Shi, Ferdinand Sibleyras, Siwei Sun, Yingjie Zhang:
On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis. IACR Trans. Symmetric Cryptol. 2020(3): 152-174 (2020) - [c23]Anubhab Baksi, Vinay B. Y. Kumar
, Banashri Karmakar, Shivam Bhasin, Dhiman Saha, Anupam Chattopadhyay:
A Novel Duplication Based Countermeasure to Statistical Ineffective Fault Analysis. ACISP 2020: 525-542 - [c22]Sahiba Suryawanshi, Dhiman Saha, Satyam Sachan:
New Results on the SymSum Distinguisher on Round-Reduced SHA3. AFRICACRYPT 2020: 132-151 - [c21]Mostafizar Rahman, Dhiman Saha, Goutam Paul:
Cryptanalysis of FlexAEAD. AFRICACRYPT 2020: 152-171 - [c20]Amit Jana, Dhiman Saha, Goutam Paul:
Differential Fault Analysis of NORX. ASHES@CCS 2020: 67-79 - [c19]Aikata, Banashri Karmakar, Dhiman Saha:
PRINCE under Differential Fault Attack: Now in 3D. ASHES@CCS 2020: 81-91 - [c18]Aikata, Banashri Karmakar, Dhiman Saha:
DESIV: Differential Fault Analysis of SIV-Rijndael256 with a Single Fault. HOST 2020: 241-251 - [i13]Sahiba Suryawanshi, Dhiman Saha, Satyam Sachan:
New Results on the SymSum Distinguisher on Round-Reduced SHA3. IACR Cryptol. ePrint Arch. 2020: 667 (2020) - [i12]Dhiman Saha, Yu Sasaki, Danping Shi, Ferdinand Sibleyras, Siwei Sun, Yingjie Zhang:
On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis. IACR Cryptol. ePrint Arch. 2020: 1045 (2020) - [i11]Anubhab Baksi, Shivam Bhasin, Jakub Breier, Dirmanto Jap, Dhiman Saha:
Fault Attacks In Symmetric Key Cryptosystems. IACR Cryptol. ePrint Arch. 2020: 1267 (2020) - [i10]Anubhab Baksi, Vinay B. Y. Kumar, Banashri Karmakar, Shivam Bhasin, Dhiman Saha, Anupam Chattopadhyay:
A Novel Duplication Based Countermeasure To Statistical Ineffective Fault Analysis. IACR Cryptol. ePrint Arch. 2020: 1268 (2020)
2010 – 2019
- 2019
- [j6]Dhiman Saha
, Sourya Kakarla
, Dipanwita Roy Chowdhury:
Dinamite: internal differential match-in-the-end attack on eight-round PAEQ. IET Inf. Secur. 13(4): 378-388 (2019) - [j5]Dhiman Saha
, Dipanwita Roy Chowdhury:
Internal differential fault analysis of parallelizable ciphers in the counter-mode. J. Cryptogr. Eng. 9(1): 53-67 (2019) - [c17]Subhadeep Banik
, Jannis Bossert, Amit Jana, Eik List, Stefan Lucks, Willi Meier, Mostafizar Rahman, Dhiman Saha, Yu Sasaki:
Cryptanalysis of ForkAES. ACNS 2019: 43-63 - [c16]Sumanta Sarkar, Kalikinkar Mandal, Dhiman Saha:
On the Relationship Between Resilient Boolean Functions and Linear Branch Number of S-Boxes. INDOCRYPT 2019: 361-374 - [i9]Subhadeep Banik, Jannis Bossert, Amit Jana, Eik List, Stefan Lucks, Willi Meier, Mostafizar Rahman, Dhiman Saha, Yu Sasaki:
Cryptanalysis of ForkAES. IACR Cryptol. ePrint Arch. 2019: 289 (2019) - [i8]Anubhab Baksi, Dhiman Saha, Sumanta Sarkar:
To Infect Or Not To Infect: A Critical Analysis Of Infective Countermeasures In Fault Attacks. IACR Cryptol. ePrint Arch. 2019: 355 (2019) - [i7]Mostafizar Rahman, Dhiman Saha, Goutam Paul:
Iterated Truncated Differential for Internal Keyed Permutation of FlexAEAD. IACR Cryptol. ePrint Arch. 2019: 539 (2019) - [i6]Amit Jana, Dhiman Saha, Goutam Paul:
Differential Fault Analysis of NORX. IACR Cryptol. ePrint Arch. 2019: 760 (2019) - [i5]Sumanta Sarkar, Kalikinkar Mandal, Dhiman Saha:
On the Relationship between Resilient Boolean Functions and Linear Branch Number of S-boxes. IACR Cryptol. ePrint Arch. 2019: 1427 (2019) - 2018
- [j4]Dhiman Saha, Mostafizar Rahman, Goutam Paul:
New Yoyo Tricks with AES-based Permutations. IACR Trans. Symmetric Cryptol. 2018(4): 102-127 (2018) - 2017
- [j3]Shamit Ghosh, Dhiman Saha, Abhrajit Sengupta, Dipanwita Roy Chowdhury:
Preventing fault attacks using fault randomisation with a case study on AES. Int. J. Appl. Cryptogr. 3(3): 225-235 (2017) - [j2]Dhiman Saha
, Sourya Kakarla, Srinath Mandava, Dipanwita Roy Chowdhury:
Gain: Practical Key-Recovery Attacks on Round-Reduced PAEQ. J. Hardw. Syst. Secur. 1(3): 282-296 (2017) - [j1]Dhiman Saha, Sukhendu Kuila, Dipanwita Roy Chowdhury:
SymSum: Symmetric-Sum Distinguishers Against Round Reduced SHA3. IACR Trans. Symmetric Cryptol. 2017(1): 240-258 (2017) - [c15]Sourya Kakarla
, Srinath Mandava, Dhiman Saha, Dipanwita Roy Chowdhury:
On the Practical Implementation of Impossible Differential Cryptanalysis on Reduced-Round AES. ATIS 2017: 58-72 - [i4]Dhiman Saha, Sukhendu Kuila, Dipanwita Roy Chowdhury:
SymSum: Symmetric-Sum Distinguishers Against Round Reduced SHA3. IACR Cryptol. ePrint Arch. 2017: 165 (2017) - 2016
- [c14]Dhiman Saha, Dipanwita Roy Chowdhury:
EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis with a Case-Study on PAEQ. CHES 2016: 581-601 - [c13]Christina Boura, Avik Chakraborti, Gaëtan Leurent
, Goutam Paul, Dhiman Saha, Hadi Soleimany, Valentin Suder:
Key Recovery Attack Against 2.5-Round \pi -Cipher. FSE 2016: 535-553 - [c12]Dhiman Saha, Sourya Kakarla
, Srinath Mandava, Dipanwita Roy Chowdhury:
Gain: Practical Key-Recovery Attacks on Round-reduced PAEQ. SPACE 2016: 194-210 - [i3]Christina Boura, Avik Chakraborti, Gaëtan Leurent, Goutam Paul, Dhiman Saha, Hadi Soleimany, Valentin Suder:
Key Recovery Attack against 2.5-round pi-Cipher. IACR Cryptol. ePrint Arch. 2016: 502 (2016) - [i2]Dhiman Saha, Dipanwita Roy Chowdhury:
EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis with a Case-Study on PAEQ. IACR Cryptol. ePrint Arch. 2016: 623 (2016) - 2015
- [c11]Shamit Ghosh, Dhiman Saha, Abhrajit Sengupta, Dipanwita Roy Chowdhury:
Preventing Fault Attacks Using Fault Randomization with a Case Study on AES. ACISP 2015: 343-355 - [c10]Dhiman Saha, Dipanwita Roy Chowdhury:
Diagonal fault analysis of Gr⊘stl in dedicated MAC mode. HOST 2015: 100-105 - [c9]Dhiman Saha, Dipanwita Roy Chowdhury:
Scope: On the Side Channel Vulnerability of Releasing Unverified Plaintexts. SAC 2015: 417-438 - 2014
- [c8]Shamit Ghosh, Abhrajit Sengupta, Dhiman Saha, Dipanwita Roy Chowdhury:
A Scalable Method for Constructing Non-linear Cellular Automata with Period 2 n - 1. ACRI 2014: 65-74 - [c7]Sukhendu Kuila, Dhiman Saha, Madhumangal Pal, Dipanwita Roy Chowdhury:
Practical Distinguishers against 6-Round Keccak-f Exploiting Self-Symmetry. AFRICACRYPT 2014: 88-108 - [c6]Dhiman Saha, Sukhendu Kuila, Dipanwita Roy Chowdhury:
EscApe: Diagonal Fault Analysis of APE. INDOCRYPT 2014: 197-216 - [c5]Sukhendu Kuila, Dhiman Saha, Madhumangal Pal, Dipanwita Roy Chowdhury:
CASH: Cellular Automata Based Parameterized Hash. SPACE 2014: 59-75 - [c4]Abhrajit Sengupta, Dhiman Saha, Shamit Ghosh, Deval Mehta, Dipanwita Roy Chowdhury:
AEC: A Practical Scheme for Authentication with Error Correction. SPACE 2014: 155-170 - 2011
- [c3]Dhiman Saha, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
PKDPA: An Enhanced Probabilistic Differential Power Attack Methodology. INDOCRYPT 2011: 3-21
2000 – 2009
- 2009
- [i1]Dhiman Saha, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:
A Diagonal Fault Attack on the Advanced Encryption Standard. IACR Cryptol. ePrint Arch. 2009: 581 (2009) - 2008
- [c2]Mukesh Agrawal, Sandip Karmakar, Dhiman Saha, Debdeep Mukhopadhyay:
Scan Based Side Channel Attacks on Stream Ciphers and Their Counter-Measures. INDOCRYPT 2008: 226-238 - 2007
- [c1]Debojyoti Bhattacharya, Debdeep Mukhopadhyay, Dhiman Saha, Dipanwita Roy Chowdhury:
Strengthening NLS Against Crossword Puzzle Attack. ACISP 2007: 29-44
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2022-02-22 01:03 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint