Dibyendu Roy
Dibyendu Roy
Assistant Professor, IIIT Vadodara
Adresse e-mail validée de - Page d'accueil
Citée par
Citée par
Preparing dicke states on a quantum computer
CS Mukherjee, S Maitra, V Gaurav, D Roy
IEEE Transactions on Quantum Engineering 1, 1-17, 2020
Analysis of the strict avalanche criterion in variants of arbiter-based physically unclonable functions
AA Siddhanti, S Bodapati, A Chattopadhyay, S Maitra, D Roy, P Stănică
Progress in Cryptology–INDOCRYPT 2019: 20th International Conference on …, 2019
New cube distinguishers on NFSR-based stream ciphers
A Kesarwani, D Roy, S Sarkar, W Meier
Designs, Codes and Cryptography 88 (1), 173-199, 2020
Tools in analyzing linear approximation for Boolean functions related to FLIP
S Maitra, B Mandal, T Martinsen, D Roy, P Stănică
Progress in Cryptology–INDOCRYPT 2018: 19th International Conference on …, 2018
Fault analysis and weak key-IV attack on Sprout
D Roy, S Mukhopadhyay
A probabilistic algebraic attack on the grain family of stream ciphers
P Datta, D Roy, S Mukhopadhyay
Network and System Security: 8th International Conference, NSS 2014, Xi’an …, 2014
Analysis on Boolean function in a restricted (biased) domain
S Maitra, B Mandal, T Martinsen, D Roy, P Stănică
IEEE Transactions on Information Theory 66 (2), 1219-1231, 2019
Some results on ACORN
D Roy, S Mukhopadhyay
A state recovery attack on ACORN-v1 and ACORN-v2
DK Dalai, D Roy
Network and System Security: 11th International Conference, NSS 2017 …, 2017
Algebraic cryptanalysis of stream ciphers using decomposition of Boolean function
D Roy, P Datta, S Mukhopadhyay
Journal of Applied Mathematics and Computing 49, 397-417, 2015
Distinguisher and non‐randomness of Grain‐v1 for 112, 114 and 116 initialisation rounds with multiple‐bit difference in IVs
DK Dalai, S Maitra, S Pal, D Roy
IET Information Security 13 (6), 603-613, 2019
Limitation of the BLR testing in estimating nonlinearity
D Bera, S Maitra, D Roy, P Stanica
Differential fault attack on Espresso
B Bathe, S Tiwari, R Anand, D Roy, S Maitra
Progress in Cryptology–INDOCRYPT 2021: 22nd International Conference on …, 2021
An Observation of Non-randomness in NFSR-Based Stream Ciphers with Reduced Initialization Round
D Roy, DK Dalai
Journal of Hardware and Systems Security 5 (2), 89-102, 2021
New Constructions of T-function
D Roy, A Chaturvedi, S Mukhopadhyay
Information Security Practice and Experience: 11th International Conference …, 2015
How Do the Arbiter PUFs Sample the Boolean Function Class?
A Roy, D Roy, S Maitra
Selected Areas in Cryptography: 28th International Conference, Virtual Event …, 2022
Design Specification of ZUC Stream Cipher
CS Mukherjee, D Roy, S Maitra, CS Mukherjee, D Roy, S Maitra
Design and Cryptanalysis of ZUC: A Stream Cipher in Mobile Telephony, 43-62, 2021
Some results on lightweight stream ciphers Fountain v1 & Lizard
R Anand, D Roy, S Sarkar
Advances in Mathematics of Communications, 0-0, 2020
Differential Fault Attack on Kreyvium & FLIP
D Roy, B Bathe, S Maitra
IEEE Transactions on Computers 70 (12), 2161-2167, 2020
An observation of non-randomness in the grain family of stream ciphers with reduced initialization round
DK Dalai, D Roy
Security, Privacy, and Applied Cryptography Engineering: 8th International …, 2018
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20