Sanadhya, Somitra
34  Ergebnisse:
Personensuche X
?
1

Identifying the Leak Sources of Hard Copy Documents:

, In: IFIP Advances in Information and Communication Technology; Advances in Digital Forensics XVIII,
Garg, Pulkit ; Gupta, Garima ; Kumar, Ranjan.. - p. 155-167 , 2022
 
?
3

EFFLUX-F2: A High Performance Hardware Security Evaluation ..:

, In: Constructive Side-Channel Analysis and Secure Design; Lecture Notes in Computer Science,
 
?
4

A Configurable CRYSTALS-Kyber Hardware Implementation with ..:

Jati, Arpan ; Gupta, Naina ; Chattopadhyay, Anupam.
ACM Transactions on Embedded Computing Systems.  23 (2024)  2 - p. 1-25 , 2024
 
?
5

Square Attacks on Reduced-Round FEA-1 and FEA-2:

, In: Lecture Notes in Computer Science; Stabilization, Safety, and Security of Distributed Systems,
 
?
6

Design and Analysis of FPGA-based PUFs with Enhanced Perfor..:

Anandakumar, N. Nalla ; Hashmi, Mohammad S. ; Sanadhya, Somitra Kumar
ACM Journal on Emerging Technologies in Computing Systems.  18 (2022)  4 - p. 1-26 , 2022
 
?
7

FbHash-E: A time and memory efficient version of FbHash sim..:

Singh, Monika ; Khunteta, Anviksha ; Ghosh, Mohona..
Forensic Science International: Digital Investigation.  41 (2022)  - p. 301375 , 2022
 
?
9

Implementing Grover Oracle for Lightweight Block Ciphers Un..:

, In: Information Security and Privacy; Lecture Notes in Computer Science,
 
?
10

Quantum Resource Estimates of Grover's Key Search on ARIA:

, In: Security, Privacy, and Applied Cryptography Engineering; Lecture Notes in Computer Science,
 
?
11

Design, Implementation and Analysis of Efficient Hardware-B..:

, In: 2020 IFIP/IEEE 28th International Conference on Very Large Scale Integration (VLSI-SOC),
 
?
13

Counting Active S-Boxes is not Enough:

, In: Progress in Cryptology – INDOCRYPT 2020; Lecture Notes in Computer Science,
Dunkelman, Orr ; Kumar, Abhishek ; Lambooij, Eran. - p. 332-344 , 2020
 
?
14

Generation of Secure and Reliable Honeywords, Preventing Fa..:

Akshima ; Chang, Donghoon ; Goel, Aarushi..
IEEE Transactions on Dependable and Secure Computing.  16 (2019)  5 - p. 757-769 , 2019
 
?
15

A Generalized Format Preserving Encryption Framework Using ..:

Chang, Donghoon ; Ghosh, Mohona ; Jati, Arpan..
Journal of Hardware and Systems Security.  3 (2019)  1 - p. 3-11 , 2019
 
1-15