What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Dhiman Saha
Google Scholar
22
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tches
ToFA: Towards Fault Analysis of GIFT and GIFT-like Ciphers Leveraging Truncated Impossible Differentials.
Anup Kumar Kundu
Shibam Ghosh
Aikata Aikata
Dhiman Saha
2024
conf/asiacrypt
Multiple-Tweak Differential Attack Against SCARF.
Christina Boura
Shahram Rasoolzadeh
Dhiman Saha
Yosuke Todo
2023
conf/acns
TIDAL: Practical Collisions on State-Reduced Keccak Variants.
Sahiba Suryawanshi
Dhiman Saha
Shashwat Jaiswal
2023
conf/acns
Divide and Rule: DiFA - Division Property Based Fault Attacks on PRESENT and GIFT.
Anup Kumar Kundu
Shibam Ghosh
Dhiman Saha
Mostafizar Rahman
2021
journals/tosc
Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos.
Mostafizar Rahman
Dhiman Saha
Goutam Paul
2020
journals/tosc
On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis.
Dhiman Saha
Yu Sasaki
Danping Shi
Ferdinand Sibleyras
Siwei Sun
Yingjie Zhang
2020
conf/ccs
Differential Fault Analysis of NORX.
Amit Jana
Dhiman Saha
Goutam Paul
2020
conf/ccs
PRINCE under Differential Fault Attack: Now in 3D.
Aikata
Banashri Karmakar
Dhiman Saha
2020
conf/acisp
A Novel Duplication Based Countermeasure to Statistical Ineffective Fault Analysis.
Anubhab Baksi
Vinay B. Y. Kumar
Banashri Karmakar
Shivam Bhasin
Dhiman Saha
Anupam Chattopadhyay
2020
conf/host
DESIV: Differential Fault Analysis of SIV-Rijndael256 with a Single Fault.
Aikata
Banashri Karmakar
Dhiman Saha
2020
conf/africacrypt
New Results on the SymSum Distinguisher on Round-Reduced SHA3.
Sahiba Suryawanshi
Dhiman Saha
Satyam Sachan
2020
conf/africacrypt
Cryptanalysis of FlexAEAD.
Mostafizar Rahman
Dhiman Saha
Goutam Paul
2019
conf/acns
Cryptanalysis of ForkAES.
Subhadeep Banik
Jannis Bossert
Amit Jana
Eik List
Stefan Lucks
Willi Meier
Mostafizar Rahman
Dhiman Saha
Yu Sasaki
2018
journals/tosc
New Yoyo Tricks with AES-based Permutations.
Dhiman Saha
Mostafizar Rahman
Goutam Paul
2017
journals/tosc
SymSum: Symmetric-Sum Distinguishers Against Round Reduced SHA3.
Dhiman Saha
Sukhendu Kuila
Dipanwita Roy Chowdhury
2016
conf/fse
Key Recovery Attack Against 2.5-Round \pi -Cipher.
Christina Boura
Avik Chakraborti
Gaëtan Leurent
Goutam Paul
Dhiman Saha
Hadi Soleimany
Valentin Suder
2016
conf/ches
EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis with a Case-Study on PAEQ.
Dhiman Saha
Dipanwita Roy Chowdhury
2015
conf/acisp
Preventing Fault Attacks Using Fault Randomization with a Case Study on AES.
Shamit Ghosh
Dhiman Saha
Abhrajit Sengupta
Dipanwita Roy Chowdhury
2015
conf/host
Diagonal fault analysis of Gr⊘stl in dedicated MAC mode.
Dhiman Saha
Dipanwita Roy Chowdhury
2015
conf/sacrypt
Scope: On the Side Channel Vulnerability of Releasing Unverified Plaintexts.
Dhiman Saha
Dipanwita Roy Chowdhury
2014
conf/africacrypt
Practical Distinguishers against 6-Round Keccak-f Exploiting Self-Symmetry.
Sukhendu Kuila
Dhiman Saha
Madhumangal Pal
Dipanwita Roy Chowdhury
2007
conf/acisp
Strengthening NLS Against Crossword Puzzle Attack.
Debojyoti Bhattacharya
Debdeep Mukhopadhyay
Dhiman Saha
Dipanwita Roy Chowdhury
Coauthors
Abhrajit Sengupta
(1)
Aikata
(2)
Aikata Aikata
(1)
Amit Jana
(2)
Anubhab Baksi
(1)
Anup Kumar Kundu
(2)
Anupam Chattopadhyay
(1)
Avik Chakraborti
(1)
Banashri Karmakar
(3)
Christina Boura
(2)
Danping Shi
(1)
Debdeep Mukhopadhyay
(1)
Debojyoti Bhattacharya
(1)
Dhiman Saha
(22)
Dipanwita Roy Chowdhury
(7)
Eik List
(1)
Ferdinand Sibleyras
(1)
Gaëtan Leurent
(1)
Goutam Paul
(5)
Hadi Soleimany
(1)
Jannis Bossert
(1)
Madhumangal Pal
(1)
Mostafizar Rahman
(5)
Sahiba Suryawanshi
(2)
Satyam Sachan
(1)
Shahram Rasoolzadeh
(1)
Shamit Ghosh
(1)
Shashwat Jaiswal
(1)
Shibam Ghosh
(2)
Shivam Bhasin
(1)
Siwei Sun
(1)
Stefan Lucks
(1)
Subhadeep Banik
(1)
Sukhendu Kuila
(2)
Valentin Suder
(1)
Vinay B. Y. Kumar
(1)
Willi Meier
(1)
Yingjie Zhang
(1)
Yosuke Todo
(1)
Yu Sasaki
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to