default search action
Santanu Sarkar 0001
Person information
- affiliation: Indian Institute of Technology Madras, Chennai, India
- affiliation (former): Indian Statistical Institute, Kolkata, India
Other persons with the same name
- Santanu Sarkar — disambiguation page
- Santanu Sarkar 0002 — Indian Institute of Technology, Kharagpur, India
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [i47]Kyungbae Jang, Vikas Srivastava, Anubhab Baksi, Santanu Sarkar, Hwajeong Seo:
New Quantum Cryptanalysis of Binary Elliptic Curves (Extended Version). IACR Cryptol. ePrint Arch. 2025: 17 (2025) - 2024
- [j65]Chandan Dey, Sabyasachi Dey, Rahul Girme, Santanu Sarkar:
Enhancing the Key Recovery Attack on Round Reduced Salsa. IEEE Access 12: 31736-31744 (2024) - [j64]Chandan Dey, Sumit Kumar Pandey, Tapabrata Roy, Santanu Sarkar:
Differential faultt attack on DEFAULT. Adv. Math. Commun. 18(4): 909-921 (2024) - [j63]Florian Luca, Santanu Sarkar, Pantelimon Stanica:
Representing the inverse map as a composition of quadratics in a finite field of characteristic 2. Cryptogr. Commun. 16(6): 1187-1210 (2024) - [j62]Sandip Kumar Mondal, Mostafizar Rahman, Santanu Sarkar, Avishek Adhikari:
Yoyo cryptanalysis on Future. Int. J. Appl. Cryptogr. 4(3/4): 238-249 (2024) - [j61]Satyam Kumar, Sandip Kumar Mondal, Santanu Sarkar, Takanori Isobe, Anubhab Baksi, Avishek Adhikari:
Restricted near collision attack on Plantlet. J. Cryptogr. Eng. 14(1): 19-34 (2024) - [j60]Andre Esser, Arindam Mukherjee, Santanu Sarkar:
Memory-Efficient Attacks on Small LWE Keys. J. Cryptol. 37(4): 36 (2024) - [j59]Fukang Liu, Abul Kalam, Santanu Sarkar, Willi Meier:
Algebraic Attack on FHE-Friendly Cipher HERA Using Multiple Collisions. IACR Trans. Symmetric Cryptol. 2024(1): 214-233 (2024) - [c43]Nitin Kumar Sharma, Sabyasachi Dey, Santanu Sarkar, Subhamoy Maitra:
On Improved Cryptanalytic Results Against ChaCha for Reduced Rounds $\ge 7$. INDOCRYPT (2) 2024: 29-52 - [i46]Abul Kalam, Santanu Sarkar, Willi Meier:
A Combinatorial Attack on Ternary Sparse Learning with Errors (sLWE). IACR Cryptol. ePrint Arch. 2024: 2007 (2024) - 2023
- [j58]Ravi Anand, Dibyendu Roy, Santanu Sarkar:
Some results on lightweight stream ciphers Fountain v1 & Lizard. Adv. Math. Commun. 17(2): 298-319 (2023) - [j57]Murilo Coutinho, Iago Passos, Juan del Carmen Grados Vasquez, Santanu Sarkar, Fábio L. L. Mendonça, Rafael Timóteo de Sousa Jr., Fábio Borges:
Latin Dances Reloaded: Improved Cryptanalysis Against Salsa and ChaCha, and the Proposal of Forró. J. Cryptol. 36(3): 18 (2023) - [j56]Satyam Kumar, Santanu Sarkar:
Conditional TMDTO as a MILP Instance. IEEE Trans. Inf. Theory 69(5): 3330-3346 (2023) - [j55]Sabyasachi Dey, Hirendra Kumar Garai, Santanu Sarkar, Nitin Kumar Sharma:
Enhanced Differential-Linear Attacks on Reduced Round ChaCha. IEEE Trans. Inf. Theory 69(8): 5318-5336 (2023) - [j54]Jun Xu, Santanu Sarkar, Lei Hu, Huaxiong Wang, Yanbin Pan:
Revisiting Modular Inversion Hidden Number Problem and Its Applications. IEEE Trans. Inf. Theory 69(8): 5337-5356 (2023) - [j53]Sandip Kumar Mondal, Mostafizar Rahman, Santanu Sarkar, Avishek Adhikari:
Revisiting Yoyo Tricks on AES. IACR Trans. Symmetric Cryptol. 2023(4): 28-57 (2023) - [c42]Andre Esser, Rahul Girme, Arindam Mukherjee, Santanu Sarkar:
Memory-Efficient Attacks on Small LWE Keys. ASIACRYPT (4) 2023: 72-105 - [c41]Fukang Liu, Gaoli Wang, Santanu Sarkar, Ravi Anand, Willi Meier, Yingxin Li, Takanori Isobe:
Analysis of RIPEMD-160: New Collision Attacks and Finding Characteristics with MILP. EUROCRYPT (4) 2023: 189-219 - [i45]Florian Luca, Santanu Sarkar, Pantelimon Stanica:
Representing the inverse map as a composition of quadratics in a finite field of characteristic 2. CoRR abs/2309.17424 (2023) - [i44]Andre Esser, Rahul Girme, Arindam Mukherjee, Santanu Sarkar:
Memory-Efficient Attacks on Small LWE Keys. IACR Cryptol. ePrint Arch. 2023: 243 (2023) - [i43]Fukang Liu, Gaoli Wang, Santanu Sarkar, Ravi Anand, Willi Meier, Yingxin Li, Takanori Isobe:
Analysis of RIPEMD-160: New Collision Attacks and Finding Characteristics with MILP. IACR Cryptol. ePrint Arch. 2023: 277 (2023) - [i42]Fukang Liu, Abul Kalam, Santanu Sarkar, Willi Meier:
Algebraic Attack on FHE-Friendly Cipher HERA Using Multiple Collisions. IACR Cryptol. ePrint Arch. 2023: 1800 (2023) - 2022
- [j52]Deepak Kumar Dalai, Santu Pal, Santanu Sarkar:
A state bit recovery algorithm with TMDTO attack on Lizard and Grain-128a. Des. Codes Cryptogr. 90(3): 489-521 (2022) - [j51]Fukang Liu, Santanu Sarkar, Willi Meier, Takanori Isobe:
The Inverse of χ and Its Applications to Rasta-Like Ciphers. J. Cryptol. 35(4): 28 (2022) - [j50]Deepak Kumar Dalai, Santu Pal, Santanu Sarkar:
Some Conditional Cube Testers for Grain-128a of Reduced Rounds. IEEE Trans. Computers 71(6): 1374-1385 (2022) - [j49]Anubhab Baksi, Satyam Kumar, Santanu Sarkar:
A New Approach for Side Channel Analysis on Stream Ciphers and Related Constructions. IEEE Trans. Computers 71(10): 2527-2537 (2022) - [j48]Satyam Kumar, Vishnu Asutosh Dasu, Anubhab Baksi, Santanu Sarkar, Dirmanto Jap, Jakub Breier, Shivam Bhasin:
Side Channel Attack On Stream Ciphers: A Three-Step Approach To State/Key Recovery. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(2): 166-191 (2022) - [j47]Jun Xu, Santanu Sarkar, Lei Hu:
Revisiting orthogonal lattice attacks on approximate common divisor problems. Theor. Comput. Sci. 911: 55-69 (2022) - [j46]Makhan Maji, Sihem Mesnager, Santanu Sarkar, Kalyan Hansda:
On One-Dimensional Linear Minimal Codes Over Finite (Commutative) Rings. IEEE Trans. Inf. Theory 68(5): 2990-2998 (2022) - [j45]Sabyasachi Dey, Chandan Dey, Santanu Sarkar, Willi Meier:
Revisiting Cryptanalysis on ChaCha From Crypto 2020 and Eurocrypt 2021. IEEE Trans. Inf. Theory 68(9): 6114-6133 (2022) - [j44]Fukang Liu, Willi Meier, Santanu Sarkar, Takanori Isobe:
New Low-Memory Algebraic Attacks on LowMC in the Picnic Setting. IACR Trans. Symmetric Cryptol. 2022(3): 102-122 (2022) - [j43]Fukang Liu, Willi Meier, Santanu Sarkar, Gaoli Wang, Ryoma Ito, Takanori Isobe:
New Cryptanalysis of ZUC-256 Initialization Using Modular Differences. IACR Trans. Symmetric Cryptol. 2022(3): 152-190 (2022) - [c40]Raghvendra Rohit, Santanu Sarkar:
Cryptanalysis of Reduced Round SPEEDY. AFRICACRYPT 2022: 133-149 - [c39]Fukang Liu, Santanu Sarkar, Gaoli Wang, Willi Meier, Takanori Isobe:
Algebraic Meet-in-the-Middle Attack on LowMC. ASIACRYPT (1) 2022: 225-255 - [c38]Jun Xu, Santanu Sarkar, Huaxiong Wang, Lei Hu:
Improving Bounds on Elliptic Curve Hidden Number Problem for ECDH Key Exchange. ASIACRYPT (3) 2022: 771-799 - [c37]Sabyasachi Dey, Hirendra Kumar Garai, Santanu Sarkar, Nitin Kumar Sharma:
Revamped Differential-Linear Cryptanalysis on Reduced Round ChaCha. EUROCRYPT (3) 2022: 86-114 - [c36]Alexander May, Julian Nowakowski, Santanu Sarkar:
Approximate Divisor Multiples - Factoring with Only a Third of the Secret CRT-Exponents. EUROCRYPT (3) 2022: 147-167 - [e1]Takanori Isobe, Santanu Sarkar:
Progress in Cryptology - INDOCRYPT 2022 - 23rd International Conference on Cryptology in India, Kolkata, India, December 11-14, 2022, Proceedings. Lecture Notes in Computer Science 13774, Springer 2022, ISBN 978-3-031-22911-4 [contents] - [i41]Fukang Liu, Gaoli Wang, Willi Meier, Santanu Sarkar, Takanori Isobe:
Algebraic Meet-in-the-Middle Attack on LowMC. IACR Cryptol. ePrint Arch. 2022: 19 (2022) - [i40]Alexander May, Julian Nowakowski, Santanu Sarkar:
Approximate Divisor Multiples - Factoring with Only a Third of the Secret CRT-Exponents. IACR Cryptol. ePrint Arch. 2022: 271 (2022) - [i39]Fukang Liu, Santanu Sarkar, Willi Meier, Takanori Isobe:
The Inverse of χ and Its Applications to Rasta-like Ciphers. IACR Cryptol. ePrint Arch. 2022: 399 (2022) - [i38]Sabyasachi Dey, Hirendra Kumar Garai, Santanu Sarkar, Nitin Kumar Sharma:
Revamped Differential-Linear Cryptanalysis on Reduced Round ChaCha. IACR Cryptol. ePrint Arch. 2022: 536 (2022) - [i37]Raghvendra Rohit, Santanu Sarkar:
Cryptanalysis of Reduced Round SPEEDY. IACR Cryptol. ePrint Arch. 2022: 612 (2022) - [i36]Fukang Liu, Willi Meier, Santanu Sarkar, Takanori Isobe:
New Low-Memory Algebraic Attacks on LowMC in the Picnic Setting. IACR Cryptol. ePrint Arch. 2022: 1022 (2022) - [i35]Jun Xu, Santanu Sarkar, Huaxiong Wang, Lei Hu:
Improving Bounds on Elliptic Curve Hidden Number Problem for ECDH Key Exchange. IACR Cryptol. ePrint Arch. 2022: 1239 (2022) - 2021
- [j42]Anubhab Baksi, Santanu Sarkar, Akhilesh Siddhanti, Ravi Anand, Anupam Chattopadhyay:
Differential fault location identification by machine learning. CAAI Trans. Intell. Technol. 6(1): 17-24 (2021) - [j41]Sabyasachi Dey, Santanu Sarkar:
A theoretical investigation on the distinguishers of Salsa and ChaCha. Discret. Appl. Math. 302: 147-162 (2021) - [j40]Abhishek Kesarwani, Sumit Kumar Pandey, Santanu Sarkar, Ayineedi Venkateswarlu:
Recursive MDS matrices over finite commutative rings. Discret. Appl. Math. 304: 384-396 (2021) - [j39]Subhadeep Banik, Andrea Caforio, Takanori Isobe, Fukang Liu, Willi Meier, Kosei Sakamoto, Santanu Sarkar:
Atom: A Stream Cipher with Double Key Filter. IACR Trans. Symmetric Cryptol. 2021(1): 5-36 (2021) - [j38]Raghvendra Rohit, Santanu Sarkar:
Diving Deep into the Weak Keys of Round Reduced Ascon. IACR Trans. Symmetric Cryptol. 2021(4): 74-99 (2021) - [c35]Alexander May, Julian Nowakowski, Santanu Sarkar:
Partial Key Exposure Attack on Short Secret Exponent CRT-RSA. ASIACRYPT (1) 2021: 99-129 - [c34]Fukang Liu, Santanu Sarkar, Willi Meier, Takanori Isobe:
Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations. ASIACRYPT (1) 2021: 214-240 - [i34]Subhadeep Banik, Andrea Caforio, Takanori Isobe, Fukang Liu, Willi Meier, Kosei Sakamoto, Santanu Sarkar:
Atom: A Stream Cipher with Double Key Filter. IACR Cryptol. ePrint Arch. 2021: 403 (2021) - [i33]Alexander May, Julian Nowakowski, Santanu Sarkar:
Partial Key Exposure Attack on Short Secret Exponent CRT-RSA. IACR Cryptol. ePrint Arch. 2021: 972 (2021) - [i32]Sabyasachi Dey, Chandan Dey, Santanu Sarkar, Willi Meier:
Revisiting cryptanalysis on ChaCha from Crypto 2020 and Eurocrypt 2021. IACR Cryptol. ePrint Arch. 2021: 1059 (2021) - [i31]Fukang Liu, Willi Meier, Santanu Sarkar, Gaoli Wang, Ryoma Ito, Takanori Isobe:
Finding Practical Distinguishers for ZUC-256 Using Modular Differences. IACR Cryptol. ePrint Arch. 2021: 1104 (2021) - [i30]Chandan Dey, Sumit Kumar Pandey, Tapabrata Roy, Santanu Sarkar:
Differential fault attack on DEFAULT. IACR Cryptol. ePrint Arch. 2021: 1392 (2021) - [i29]Raghvendra Rohit, Santanu Sarkar:
Diving Deep into the Weak Keys of Round Reduced Ascon. IACR Cryptol. ePrint Arch. 2021: 1556 (2021) - 2020
- [j37]Abhishek Kesarwani, Dibyendu Roy, Santanu Sarkar, Willi Meier:
New cube distinguishers on NFSR-based stream ciphers. Des. Codes Cryptogr. 88(1): 173-199 (2020) - [j36]Jun Xu, Lei Hu, Santanu Sarkar:
Cryptanalysis of elliptic curve hidden number problem from PKC 2017. Des. Codes Cryptogr. 88(2): 341-361 (2020) - [j35]Sabyasachi Dey, Santanu Sarkar:
Proving the biases of Salsa and ChaCha in differential attack. Des. Codes Cryptogr. 88(9): 1827-1856 (2020) - [i28]Anubhab Baksi, Santanu Sarkar, Akhilesh Siddhanti, Ravi Anand, Anupam Chattopadhyay:
Fault Location Identification By Machine Learning. IACR Cryptol. ePrint Arch. 2020: 717 (2020)
2010 – 2019
- 2019
- [j34]Sabyasachi Dey, Tapabrata Roy, Santanu Sarkar:
Revisiting design principles of Salsa and ChaCha. Adv. Math. Commun. 13(4): 689-704 (2019) - [j33]Sabyasachi Dey, Santanu Sarkar:
Settling the mystery of Z r = r in RC4. Cryptogr. Commun. 11(4): 697-715 (2019) - [j32]Sabyasachi Dey, Tapabrata Roy, Santanu Sarkar:
Some results on Fruit. Des. Codes Cryptogr. 87(2-3): 349-364 (2019) - [j31]Abhishek Kesarwani, Santanu Sarkar, Ayineedi Venkateswarlu:
Exhaustive Search for Various Types of MDS Matrices. IACR Trans. Symmetric Cryptol. 2019(3): 231-256 (2019) - [c33]Jun Xu, Santanu Sarkar, Lei Hu, Huaxiong Wang, Yanbin Pan:
New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator. CRYPTO (1) 2019: 297-321 - [c32]Abhishek Kesarwani, Santanu Sarkar, Ayineedi Venkateswarlu:
Some Cryptanalytic Results on TRIAD. INDOCRYPT 2019: 160-174 - [c31]Jun Xu, Santanu Sarkar, Lei Hu:
Revisiting Approximate Polynomial Common Divisor Problem and Noisy Multipolynomial Reconstruction. INDOCRYPT 2019: 398-411 - [i27]Jun Xu, Santanu Sarkar, Lei Hu, Huaxiong Wang, Yanbin Pan:
New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator. IACR Cryptol. ePrint Arch. 2019: 604 (2019) - 2018
- [j30]Jun Xu, Santanu Sarkar, Lei Hu, Zhangjie Huang, Liqiang Peng:
Solving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generator. Des. Codes Cryptogr. 86(9): 1997-2033 (2018) - [j29]Sonu Jha, Subhadeep Banik, Takanori Isobe, Toshihiro Ohigashi, Santanu Sarkar:
Theoretical Understanding of Some Conditional and Joint Biases in RC4 Stream Cipher. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(11): 1869-1879 (2018) - [j28]Sabyasachi Dey, Santanu Sarkar:
Generalization of Roos bias in RC4 and some results on key-keystream relations. J. Math. Cryptol. 12(1): 43-56 (2018) - [i26]Jun Xu, Santanu Sarkar, Lei Hu:
Revisiting Orthogonal Lattice Attacks on Approximate Common Divisor Problems and their Applications. IACR Cryptol. ePrint Arch. 2018: 1208 (2018) - 2017
- [j27]Santanu Sarkar:
Analysis of Hidden Number Problem with Hidden Multiplier. Adv. Math. Commun. 11(4): 805-811 (2017) - [j26]Santanu Sarkar, Prakash Dey, Avishek Adhikari, Subhamoy Maitra:
Probabilistic signature based generalized framework for differential fault analysis of stream ciphers. Cryptogr. Commun. 9(4): 523-543 (2017) - [j25]Sabyasachi Dey, Santanu Sarkar:
Improved analysis for reduced round Salsa and Chacha. Discret. Appl. Math. 227: 58-69 (2017) - [j24]Santanu Sarkar, Ayineedi Venkateswarlu:
Revisiting (nested) Roos bias in RC4 key scheduling algorithm. Des. Codes Cryptogr. 82(1-2): 131-148 (2017) - [j23]Santanu Sarkar, Subhamoy Maitra, Anubhab Baksi:
Observing biases in the state: case studies with Trivium and Trivia-SC. Des. Codes Cryptogr. 82(1-2): 351-375 (2017) - [j22]Ayineedi Venkateswarlu, Santanu Sarkar, Sai Mali Ananthanarayanan:
On acyclic edge-coloring of complete bipartite graphs. Discret. Math. 340(3): 481-493 (2017) - [j21]Santanu Sarkar:
Results on significant anomalies of state values after key scheduling algorithm in RC4. IET Inf. Secur. 11(5): 267-272 (2017) - [j20]Yao Lu, Liqiang Peng, Santanu Sarkar:
Cryptanalysis of an RSA variant with moduli N=prql. J. Math. Cryptol. 11(2): 117 (2017) - [j19]Subhamoy Maitra, Akhilesh Siddhanti, Santanu Sarkar:
A Differential Fault Attack on Plantlet. IEEE Trans. Computers 66(10): 1804-1808 (2017) - [c30]Akhilesh Siddhanti, Santanu Sarkar, Subhamoy Maitra, Anupam Chattopadhyay:
Differential Fault Attack on Grain v1, ACORN v3 and Lizard. SPACE 2017: 247-263 - [i25]Tapabrata Roy, Santanu Sarkar:
$\prod\limits_{i=1}^{n} \mathbb{Z}_{2^i}$-Additive Cyclic Codes. CoRR abs/1708.06913 (2017) - [i24]Sabyasachi Dey, Santanu Sarkar:
Cryptanalysis of full round Fruit. IACR Cryptol. ePrint Arch. 2017: 87 (2017) - [i23]Akhilesh Siddhanti, Santanu Sarkar, Subhamoy Maitra, Anupam Chattopadhyay:
Differential Fault Attack on Grain v1, ACORN v3 and Lizard. IACR Cryptol. ePrint Arch. 2017: 678 (2017) - [i22]Sabyasachi Dey, Santanu Sarkar:
Settling the mystery of Zr=r in RC4. IACR Cryptol. ePrint Arch. 2017: 1072 (2017) - 2016
- [j18]Santanu Sarkar:
Revisiting Prime Power RSA. Discret. Appl. Math. 203: 127-133 (2016) - [j17]Ayineedi Venkateswarlu, Santanu Sarkar:
On acyclic edge-coloring of the complete bipartite graphs K2p-1, 2p-1 for odd prime p. Discret. Math. 339(1): 72-77 (2016) - [c29]Jun Xu, Lei Hu, Santanu Sarkar, Xiaona Zhang, Zhangjie Huang, Liqiang Peng:
Cryptanalysis of Multi-Prime \varPhi -Hiding Assumption. ISC 2016: 440-453 - [c28]Prakash Dey, Raghvendra Singh Rohit, Santanu Sarkar, Avishek Adhikari:
Differential Fault Analysis on Tiaoxin and AEGIS Family of Ciphers. SSCC 2016: 74-86 - [i21]Jun Xu, Lei Hu, Santanu Sarkar, Xiaona Zhang, Zhangjie Huang, Liqiang Peng:
Cryptanalysis of Multi-Prime Φ-Hiding Assumption. IACR Cryptol. ePrint Arch. 2016: 155 (2016) - 2015
- [j16]Santanu Sarkar:
Further non-randomness in RC4, RC4A and VMPC. Cryptogr. Commun. 7(3): 317-330 (2015) - [j15]Santanu Sarkar, Sourav Sen Gupta, Goutam Paul, Subhamoy Maitra:
Proving TLS-attack related open biases of RC4. Des. Codes Cryptogr. 77(1): 231-253 (2015) - [j14]Subhadeep Banik, Subhamoy Maitra, Santanu Sarkar:
Improved differential fault attack on MICKEY 2.0. J. Cryptogr. Eng. 5(1): 13-29 (2015) - [j13]Mrinal Nandi, Amiya Nayak, Bimal K. Roy, Santanu Sarkar:
Hypothesis testing and decision theoretic approach for fault detection in wireless sensor networks. Int. J. Parallel Emergent Distributed Syst. 30(4): 262-285 (2015) - [j12]Santanu Sarkar, Subhadeep Banik, Subhamoy Maitra:
Differential Fault Attack against Grain Family with Very Few Faults and Minimal Assumptions. IEEE Trans. Computers 64(6): 1647-1657 (2015) - [c27]Santanu Sarkar:
A New Distinguisher on Grain v1 for 106 Rounds. ICISS 2015: 334-344 - [c26]Liqiang Peng, Lei Hu, Yao Lu, Santanu Sarkar, Jun Xu, Zhangjie Huang:
Cryptanalysis of Variants of RSA with Multiple Small Secret Exponents. INDOCRYPT 2015: 105-123 - [i20]Ayineedi Venkateswarlu, Santanu Sarkar, A. Sai Mali:
On Acyclic Edge-Coloring of Complete Bipartite Graphs. CoRR abs/1503.03283 (2015) - [i19]Anubhab Baksi, Subhamoy Maitra, Santanu Sarkar:
New Distinguishers for Reduced Round Trivium and Trivia-SC using Cube Testers. IACR Cryptol. ePrint Arch. 2015: 223 (2015) - [i18]Subhamoy Maitra, Santanu Sarkar, Anubhab Baksi, Pramit Dey:
Key Recovery from State Information of Sprout: Application to Cryptanalysis and Fault Attack. IACR Cryptol. ePrint Arch. 2015: 236 (2015) - [i17]Santanu Sarkar:
A New Distinguisher on Grain v1 for 106 rounds. IACR Cryptol. ePrint Arch. 2015: 340 (2015) - [i16]Santanu Sarkar, Prakash Dey, Avishek Adhikari, Subhamoy Maitra:
Probabilistic Signature Based Framework for Differential Fault Analysis of Stream Ciphers. IACR Cryptol. ePrint Arch. 2015: 508 (2015) - [i15]Santanu Sarkar:
Revisiting Prime Power RSA. IACR Cryptol. ePrint Arch. 2015: 774 (2015) - 2014
- [j11]Santanu Sarkar:
Small secret exponent attack on RSA variant with modulus N=prq. Des. Codes Cryptogr. 73(2): 383-392 (2014) - [j10]Mrinal Nandi, Anup Dewanji, Bimal K. Roy, Santanu Sarkar:
Model Selection Approach for Distributed Fault Detection in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 10 (2014) - [j9]Santanu Sarkar:
Proving empirical key-correlations in RC4. Inf. Process. Lett. 114(5): 234-238 (2014) - [j8]Sourav Sen Gupta, Subhamoy Maitra, Goutam Paul, Santanu Sarkar:
(Non-)Random Sequences from (Non-)Random Permutations - Analysis of RC4 Stream Cipher. J. Cryptol. 27(1): 67-108 (2014) - [c25]Sourav Sen Gupta, Subhamoy Maitra, Willi Meier, Goutam Paul, Santanu Sarkar:
Dependence in IV-Related Bytes of RC4 Key Enhances Vulnerabilities in WPA. FSE 2014: 350-369 - [c24]Santanu Sarkar, Ayineedi Venkateswarlu:
Partial Key Exposure Attack on CRT-RSA. INDOCRYPT 2014: 255-264 - 2013
- [j7]Santanu Sarkar, Subhamoy Maitra:
Cryptanalytic results on 'Dual CRT' and 'Common Prime' RSA. Des. Codes Cryptogr. 66(1-3): 157-174 (2013) - [j6]Pantelimon Stanica, Santanu Sarkar, Sourav Sen Gupta, Subhamoy Maitra, Nirupam Kar:
Counting Heron triangles with Constraints. Integers 13: A3 (2013) - [c23]Subhadeep Banik, Subhamoy Maitra, Santanu Sarkar, Meltem Sönmez Turan:
A Chosen IV Related Key Attack on Grain-128a. ACISP 2013: 13-26 - [c22]Subhamoy Maitra, Goutam Paul, Santanu Sarkar, Michael Lehmann, Willi Meier:
New Results on Generalization of Roos-Type Biases and Related Keystreams of RC4. AFRICACRYPT 2013: 222-239 - [c21]Santanu Sarkar, Sourav Sen Gupta, Subhamoy Maitra:
Error Correction of Partially Exposed RSA Private Keys from MSB Side. ICISS 2013: 345-359 - [c20]Subhadeep Banik, Santanu Sarkar, Raghu Kacker:
Security Analysis of the RC4+ Stream Cipher. INDOCRYPT 2013: 297-307 - [i14]Mrinal Nandi, Anup Dewanji, Bimal K. Roy, Santanu Sarkar:
Model Selection Approach for Distributed Fault Detection in Wireless Sensor Networks. CoRR abs/1301.4795 (2013) - [i13]Santanu Sarkar, Subhadeep Banik, Subhamoy Maitra:
Differential Fault Attack against Grain family with very few faults and minimal assumptions. IACR Cryptol. ePrint Arch. 2013: 494 (2013) - [i12]Santanu Sarkar, Sourav Sen Gupta, Goutam Paul, Subhamoy Maitra:
Proving TLS-attack related open biases of RC4. IACR Cryptol. ePrint Arch. 2013: 502 (2013) - 2012
- [c19]Subhadeep Banik, Subhamoy Maitra, Santanu Sarkar:
A Differential Fault Attack on the Grain Family of Stream Ciphers. CHES 2012: 122-139 - [c18]Santanu Sarkar, Subhamoy Maitra:
Side Channel Attack to Actual Cryptanalysis: Breaking CRT-RSA with Low Weight Decryption Exponents. CHES 2012: 476-493 - [c17]Subhadeep Banik, Subhamoy Maitra, Santanu Sarkar:
A Differential Fault Attack on the Grain Family under Reasonable Assumptions. INDOCRYPT 2012: 191-208 - [c16]Sumit Kumar Pandey, Santanu Sarkar, Mahabir Prasad Jhanwar:
Relaxing IND-CCA: Indistinguishability against Chosen Ciphertext Verification Attack. SPACE 2012: 63-76 - [c15]Subhadeep Banik, Subhamoy Maitra, Santanu Sarkar:
Some Results on Related Key-IV Pairs of Grain. SPACE 2012: 94-110 - [c14]Subhadeep Banik, Subhamoy Maitra, Santanu Sarkar:
A Differential Fault Attack on Grain-128a Using MACs. SPACE 2012: 111-125 - [c13]Santanu Sarkar:
Reduction in Lossiness of RSA Trapdoor Permutation. SPACE 2012: 144-152 - [i11]Mrinal Nandi, Amiya Nayak, Bimal K. Roy, Santanu Sarkar:
Hypothesis Testing and Decision Theoretic Approach for Fault Detection in Wireless Sensor Networks. CoRR abs/1203.0541 (2012) - [i10]Santanu Sarkar, Subhamoy Maitra:
More on Correcting Errors in RSA Private Keys: Breaking CRT-RSA with Low Weight Decryption Exponents. IACR Cryptol. ePrint Arch. 2012: 106 (2012) - [i9]Subhadeep Banik, Subhamoy Maitra, Santanu Sarkar:
A Differential Fault Attack on Grain-128a using MACs. IACR Cryptol. ePrint Arch. 2012: 349 (2012) - 2011
- [j5]Santanu Sarkar, Subhamoy Maitra:
Approximate Integer Common Divisor Problem Relates to Implicit Factorization. IEEE Trans. Inf. Theory 57(6): 4002-4013 (2011) - [c12]Apurba Das, Subhamoy Maitra, Goutam Paul, Santanu Sarkar:
Some Combinatorial Results towards State Recovery Attack on RC4. ICISS 2011: 204-214 - [c11]Santanu Sarkar:
Partial Key Exposure: Generalized Framework to Attack RSA. INDOCRYPT 2011: 76-92 - [c10]Subhadeep Banik, Subhamoy Maitra, Santanu Sarkar:
On the Evolution of GGHN Cipher. INDOCRYPT 2011: 181-195 - [c9]Sourav Sen Gupta, Subhamoy Maitra, Goutam Paul, Santanu Sarkar:
Proof of Empirical RC4 Biases and New Key Correlations. Selected Areas in Cryptography 2011: 151-168 - [i8]Sourav Sen Gupta, Subhamoy Maitra, Goutam Paul, Santanu Sarkar:
RC4: (Non-)Random Words from (Non-)Random Permutations. IACR Cryptol. ePrint Arch. 2011: 448 (2011) - 2010
- [j4]Santanu Sarkar, Subhamoy Maitra:
Some applications of lattice based root finding techniques. Adv. Math. Commun. 4(4): 519-531 (2010) - [j3]Santanu Sarkar, Subhamoy Maitra:
Cryptanalysis of RSA with two decryption exponents. Inf. Process. Lett. 110(5): 178-181 (2010) - [j2]Santanu Sarkar, Subhamoy Maitra:
Cryptanalysis of RSA with more than one decryption exponent. Inf. Process. Lett. 110(8-9): 336-340 (2010) - [c8]Subhamoy Maitra, Santanu Sarkar, Sourav Sen Gupta:
Factoring RSA Modulus Using Prime Reconstruction from Random Known Bits. AFRICACRYPT 2010: 82-99 - [c7]Subhamoy Maitra, Santanu Sarkar:
Efficient CRT-RSA Decryption for Small Encryption Exponents. CT-RSA 2010: 26-40 - [c6]Santanu Sarkar, Sourav Sen Gupta, Subhamoy Maitra:
Partial Key Exposure Attack on RSA - Improvements for Limited Lattice Dimensions. INDOCRYPT 2010: 2-16 - [c5]Subhamoy Maitra, Santanu Sarkar, Sourav Sen Gupta:
Publishing Upper Half of RSA Decryption Exponent. IWSEC 2010: 25-39 - [i7]Santanu Sarkar, Subhamoy Maitra:
Some Applications of Lattice Based Root Finding Techniques. IACR Cryptol. ePrint Arch. 2010: 146 (2010) - [i6]Santanu Sarkar, Subhamoy Maitra:
Cryptanalysis of Dual CRT-RSA. IACR Cryptol. ePrint Arch. 2010: 603 (2010)
2000 – 2009
- 2009
- [j1]Santanu Sarkar, Subhamoy Maitra:
Further results on implicit factoring in polynomial time. Adv. Math. Commun. 3(2): 205-217 (2009) - [c4]Santanu Sarkar, Subhamoy Maitra:
Partial Key Exposure Attack on CRT-RSA. ACNS 2009: 473-484 - [i5]Subhamoy Maitra, Santanu Sarkar:
On Deterministic Polynomial-Time Equivalence of Computing the CRT-RSA Secret Keys and Factoring. IACR Cryptol. ePrint Arch. 2009: 62 (2009) - [i4]Santanu Sarkar, Subhamoy Maitra:
Further Results on Implicit Factoring in Polynomial Time. IACR Cryptol. ePrint Arch. 2009: 108 (2009) - [i3]Santanu Sarkar, Subhamoy Maitra:
Approximate Integer Common Divisor Problem relates to Implicit Factorization. IACR Cryptol. ePrint Arch. 2009: 626 (2009) - 2008
- [c3]Santanu Sarkar, Subhamoy Maitra:
Improved Partial Key Exposure Attacks on RSA by Guessing a Few Bits of One of the Prime Factors. ICISC 2008: 37-51 - [c2]Subhamoy Maitra, Santanu Sarkar:
A New Class of Weak Encryption Exponents in RSA. INDOCRYPT 2008: 337-349 - [c1]Subhamoy Maitra, Santanu Sarkar:
Revisiting Wiener's Attack - New Weak Keys in RSA. ISC 2008: 228-243 - [i2]Subhamoy Maitra, Santanu Sarkar:
Revisiting Wiener's Attack - New Weak Keys in RSA. IACR Cryptol. ePrint Arch. 2008: 228 (2008) - [i1]Santanu Sarkar, Subhamoy Maitra, Sumanta Sarkar:
RSA Cryptanalysis with Increased Bounds on the Secret Exponent using Less Lattice Dimension. IACR Cryptol. ePrint Arch. 2008: 315 (2008)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:00 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint