


default search action
Dibyendu Roy 0001
Person information
- affiliation: Indian Institute of Information Technology Vadodara, India
- affiliation: ERTL(E), STQC, Kolkata, India
- affiliation (former): School of Mathematical Sciences, NISER, Bhubaneswar, India
Other persons with the same name
- Dibyendu Roy 0002
— TCS Innovation Lab, Kolkata, India
- Dibyendu Roy 0003
— Hewlett Packard Enterprises, Bangalore, India
- Dibyendu Roy 0004 — A*STAR, Singapore
Other persons with a similar name
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Pierrick Méaux, Dibyendu Roy:
Theoretical differential fault attacks on FLIP and FiLIP. Cryptogr. Commun. 16(4): 721-744 (2024) - [j8]Meenakshi Kansal, Animesh Roy, Dibyendu Roy
, Srinivasu Bodapati, Anupam Chattopadhyay:
Priority Arbiter PUF: Analysis. Discret. Appl. Math. 356: 71-95 (2024) - [i7]Pierrick Méaux, Dibyendu Roy:
Theoretical differential fault attacks on FLIP and FiLIP. IACR Cryptol. ePrint Arch. 2024: 98 (2024) - 2023
- [j7]Ravi Anand
, Dibyendu Roy, Santanu Sarkar:
Some results on lightweight stream ciphers Fountain v1 & Lizard. Adv. Math. Commun. 17(2): 298-319 (2023) - [j6]R. Radheshwar
, Meenakshi Kansal
, Pierrick Méaux
, Dibyendu Roy
:
Differential Fault Attack on Rasta and $\text{FiLIP}_{\text{DSM}}$. IEEE Trans. Computers 72(8): 2418-2425 (2023) - [i6]R. Radheshwar, Meenakshi Kansal, Pierrick Méaux, Dibyendu Roy:
Differential Fault Attack on Rasta and FiLIP DSM. IACR Cryptol. ePrint Arch. 2023: 322 (2023) - 2021
- [b1]Chandra Sekhar Mukherjee, Dibyendu Roy, Subhamoy Maitra:
Design and Cryptanalysis of ZUC - A Stream Cipher in Mobile Telephony. Springer 2021, ISBN 978-981-33-4881-3, pp. 1-92 - [j5]Dibyendu Roy, Deepak Kumar Dalai
:
An Observation of Non-randomness in NFSR-Based Stream Ciphers with Reduced Initialization Round. J. Hardw. Syst. Secur. 5(2): 89-102 (2021) - [j4]Dibyendu Roy
, Bhagwan N. Bathe, Subhamoy Maitra
:
Differential Fault Attack on Kreyvium & FLIP. IEEE Trans. Computers 70(12): 2161-2167 (2021) - [c9]Bhagwan N. Bathe, Siddhartha Tiwari, Ravi Anand
, Dibyendu Roy, Subhamoy Maitra:
Differential Fault Attack on Espresso. INDOCRYPT 2021: 271-286 - [c8]Animesh Roy, Dibyendu Roy, Subhamoy Maitra:
How Do the Arbiter PUFs Sample the Boolean Function Class? SAC 2021: 111-130 - [i5]Animesh Roy
, Dibyendu Roy, Subhamoy Maitra:
How do the Arbiter PUFs Sample the Boolean Function Class? IACR Cryptol. ePrint Arch. 2021: 1086 (2021) - 2020
- [j3]Abhishek Kesarwani
, Dibyendu Roy, Santanu Sarkar
, Willi Meier:
New cube distinguishers on NFSR-based stream ciphers. Des. Codes Cryptogr. 88(1): 173-199 (2020) - [j2]Subhamoy Maitra
, Bimal Mandal
, Thor Martinsen, Dibyendu Roy
, Pantelimon Stanica
:
Analysis on Boolean Function in a Restricted (Biased) Domain. IEEE Trans. Inf. Theory 66(2): 1219-1231 (2020)
2010 – 2019
- 2019
- [j1]Deepak Kumar Dalai
, Subhamoy Maitra, Santu Pal
, Dibyendu Roy:
Distinguisher and non-randomness of Grain-v1 for 112, 114 and 116 initialisation rounds with multiple-bit difference in IVs. IET Inf. Secur. 13(6): 603-613 (2019) - [c7]Akhilesh Anilkumar Siddhanti, Srinivasu Bodapati, Anupam Chattopadhyay, Subhamoy Maitra, Dibyendu Roy, Pantelimon Stanica:
Analysis of the Strict Avalanche Criterion in Variants of Arbiter-Based Physically Unclonable Functions. INDOCRYPT 2019: 556-577 - 2018
- [c6]Subhamoy Maitra, Bimal Mandal, Thor Martinsen, Dibyendu Roy, Pantelimon Stanica:
Tools in Analyzing Linear Approximation for Boolean Functions Related to FLIP. INDOCRYPT 2018: 282-303 - [c5]Deepak Kumar Dalai
, Dibyendu Roy:
An Observation of Non-randomness in the Grain Family of Stream Ciphers with Reduced Initialization Round. SPACE 2018: 1-20 - 2017
- [c4]Deepak Kumar Dalai
, Dibyendu Roy:
A State Recovery Attack on ACORN-v1 and ACORN-v2. NSS 2017: 332-345 - 2016
- [i4]Dibyendu Roy, Sourav Mukhopadhyay:
Fault analysis and weak key-IV attack on Sprout. IACR Cryptol. ePrint Arch. 2016: 207 (2016) - [i3]Dibyendu Roy, Sourav Mukhopadhyay:
Some results on ACORN. IACR Cryptol. ePrint Arch. 2016: 1132 (2016) - 2015
- [c3]Dibyendu Roy, Ankita Chaturvedi, Sourav Mukhopadhyay:
New Constructions of T-function. ISPEC 2015: 395-405 - [i2]Dibyendu Roy, Sourav Mukhopadhyay:
Fault Analysis on the Stream Ciphers LILI-128 and Achterbahn. IACR Cryptol. ePrint Arch. 2015: 1077 (2015) - 2014
- [c2]Pratish Datta, Dibyendu Roy, Sourav Mukhopadhyay:
A Probabilistic Algebraic Attack on the Grain Family of Stream Ciphers. NSS 2014: 558-565 - [c1]Dibyendu Roy, Pratish Datta, Sourav Mukhopadhyay:
A New Variant of Algebraic Attack. SNDS 2014: 211-222 - [i1]Pratish Datta, Dibyendu Roy, Sourav Mukhopadhyay:
A Probabilistic Algebraic Attack on the Grain Family of Stream Cipher. IACR Cryptol. ePrint Arch. 2014: 510 (2014)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:50 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint