Suivre
Arnab Roy
Titre
Citée par
Citée par
Année
MiMC: Efficient encryption and cryptographic hashing with minimal multiplicative complexity
M Albrecht, L Grassi, C Rechberger, A Roy, T Tiessen
Asiacrypt 2016, 2016
3392016
Poseidon: A New Hash Function for Zero-Knowledge Proof Systems
L Grassi, D Khovratovich, A Roy, C Rechberger, M Schofnegger
USENIX Security 2021, 2020
3102020
Differential Analysis of Block Ciphers SIMON and SPECK
A Biryukov, A Roy, V Velichkov
Fast Software Encryption 2014, 2014
2042014
Feistel Structures for MPC, and More.
MR Albrecht, L Grassi, L Perrin, S Ramacher, C Rechberger, D Rotaru, ...
ESORICS 2019, 2019
1152019
Boomerang attacks on BLAKE-32
A Biryukov, I Nikolić, A Roy
Fast Software Encryption: 18th International Workshop, FSE 2011, Lyngby …, 2011
602011
A Brief Comparison of Simon and Simeck
S Kölbl, A Roy
Lightweight Cryptography for Security and Privacy: 5th International …, 2017
592017
Fast evaluation of polynomials over binary finite fields and application to side-channel countermeasures
JS Coron, A Roy, S Vivek
International Workshop on Cryptographic Hardware and Embedded Systems, 170-187, 2014
592014
Forkcipher: a new primitive for authenticated encryption of very short messages
E Andreeva, V Lallemand, A Purnal, R Reyhanitabar, A Roy, D Vizár
International Conference on the Theory and Application of Cryptology and …, 2019
562019
Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012
A Roy, S Vivek
Cryptographic Hardware and Embedded Systems (CHES) 2013, 2013
522013
ForkAE v.
E Andreeva, V Lallemand, A Purnal, R Reyhanitabar, A Roy, D Vizár
Submission to NIST Lightweight Cryptography Project, 2019
322019
Secure Message Authentication against Related-Key Attack
R Bhattacharyya, A Roy
Fast Software Encryption 2013, 2013
262013
Boomerang attacks on hash function using auxiliary differentials
G Leurent, A Roy
Topics in Cryptology–CT-RSA 2012: The Cryptographers’ Track at the RSA …, 2012
262012
Cryptanalysis of the “kindle” cipher
A Biryukov, G Leurent, A Roy
Selected Areas in Cryptography: 19th International Conference, SAC 2012 …, 2013
192013
A Systematic Study of the Impact of Graphical Models on Inference-based Attacks on AES
J Green, E Oswald, A Roy
CARDIS, 2018, 2018
172018
Interpolation cryptanalysis of unbalanced feistel networks with low degree round functions
A Roy, E Andreeva, JF Sauer
Selected Areas in Cryptography: 27th International Conference, Halifax, NS …, 2021
82021
What the fork: implementation aspects of a forkcipher
A Purnal, E Andreeva, A Roy, D Vizár
NIST Lightweight Cryptography Workshop 2019, 2019
82019
Compactness of hashing modes and efficiency beyond Merkle tree
E Andreeva, R Bhattacharyya, A Roy
Annual International Conference on the Theory and Applications of …, 2021
62021
Constructing TI-Friendly Substitution Boxes using Shift-Invariant Permutations⋆
S Gao, A Roy, E Oswald
CT-RSA 2019: The Cryptographers’ Track at the RSA Conference 2019, San …, 2019
62019
Masked iterate-fork-iterate: a new design paradigm for tweakable expanding pseudorandom function
E Andreeva, B Cogliati, V Lallemand, M Minier, A Purnal, A Roy
International Conference on Applied Cryptography and Network Security, 433-459, 2024
42024
Arion: Arithmetization-oriented permutation and hashing from generalized triangular dynamical systems
A Roy, MJ Steiner, S Trevisani
arXiv preprint arXiv:2303.04639, 2023
42023
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20