Cryptanalysis of forkaes S Banik, J Bossert, A Jana, E List, S Lucks, W Meier, M Rahman, D Saha, ... Applied Cryptography and Network Security: 17th International Conference …, 2019 | 15 | 2019 |
Differential Fault Attack on PHOTON-Beetle A Jana, G Paul Proceedings of the 2022 Workshop on Attacks and Solutions in Hardware …, 2022 | 9 | 2022 |
Revisiting RC4 key collision: Faster search algorithm and new 22-byte colliding key pairs A Jana, G Paul Cryptography and Communications 10, 479-508, 2018 | 6 | 2018 |
Differential Fault Attack on Feistel-based Sponge AE Schemes A Jana Journal of Hardware and Systems Security 6 (1), 1-16, 2022 | 2 | 2022 |
DEEPAND: In-Depth Modeling of Correlated AND Gates for NLFSR-based Lightweight Block Ciphers A Jana, M Rahman, D Saha Cryptology ePrint Archive, 2022 | 2 | 2022 |
Differential fault analysis of norx A Jana, D Saha, G Paul Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware …, 2020 | 2 | 2020 |
SDFA: Statistical-Differential Fault Attack on Linear Structured SBox-Based Ciphers A Jana, AK Kundu, G Paul Cryptology ePrint Archive, 2023 | 1 | 2023 |
Switching the Top Slice of the Sandwich with Extra Filling Yields a Stronger Boomerang for NLFSR-based Block Ciphers A Jana, M Rahman, D Saha, G Paul Cryptology ePrint Archive, 2023 | | 2023 |
Differential fault analysis of NORX using variants of coupon collector problem A Jana, A Nath, G Paul, D Saha Journal of Cryptographic Engineering 12 (4), 433-459, 2022 | | 2022 |