Arnab Roy
Zitiert von
Zitiert von
Differential Analysis of Block Ciphers SIMON and SPECK
A Biryukov, A Roy, V Velichkov
Fast Software Encryption 2014, 2014
MiMC: Efficient encryption and cryptographic hashing with minimal multiplicative complexity
M Albrecht, L Grassi, C Rechberger, A Roy, T Tiessen
Asiacrypt 2016, 2016
Boomerang attacks on BLAKE-32
A Biryukov, I Nikolić, A Roy
International Workshop on Fast Software Encryption, 218-237, 2011
A Brief Comparison of Simon and Simeck
S Kölbl, A Roy
International Workshop on Lightweight Cryptography for Security and Privacy …, 2016
Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012
A Roy, S Vivek
Cryptographic Hardware and Embedded Systems (CHES) 2013, 2013
Fast evaluation of polynomials over binary finite fields and application to side-channel countermeasures
JS Coron, A Roy, S Vivek
International Workshop on Cryptographic Hardware and Embedded Systems, 170-187, 2014
Poseidon: A New Hash Function for Zero-Knowledge Proof Systems
L Grassi, D Khovratovich, A Roy, C Rechberger, M Schofnegger
USENIX Security 2021, 2021
Starkad and Poseidon: New Hash Functions for Zero Knowledge Proof Systems
L Grassi, D Kales, D Khovratovich, A Roy, C Rechberger, M Schofnegger
IACR eprint, 2019
Feistel Structures for MPC, and More.
MR Albrecht, L Grassi, L Perrin, S Ramacher, C Rechberger, D Rotaru, ...
ESORICS 2019, 2019
Boomerang attacks on hash function using auxiliary differentials
G Leurent, A Roy
Cryptographers’ Track at the RSA Conference, 215-230, 2012
Secure Message Authentication against Related-Key Attack
R Bhattacharyya, A Roy
Fast Software Encryption 2013, 2013
Cryptanalysis of the “kindle” cipher
A Biryukov, G Leurent, A Roy
International Conference on Selected Areas in Cryptography, 86-103, 2012
Forkcipher: a New Primitive for Authenticated Encryption of Very Short Messages
E Andreeva, V Lallemand, A Purnal, R Reyhanitabar, A Roy, D Vizár
Asiacrypt 2019, 2019
A Systematic Study of the Impact of Graphical Models on Inference-based Attacks on AES
J Green, E Oswald, A Roy
CARDIS, 2018, 2018
Constructing TI-Friendly Substitution Boxes using Shift-Invariant Permutations⋆
S Gao, A Roy, E Oswald
CT-RSA 2019: The Cryptographers’ Track at the RSA Conference 2019, San …, 2019
Full key recovery attacks on modular addition: An application to Threefish
PK Vadnala, JF Gallais, A Roy
7-th Workshop on Embedded Systems Security 2012 (WESS 2012), 2012
What the Fork: Implementation Aspects of a Forkcipher
A Purnal, E Andreeva, A Roy, D Vizár
NIST Lightweight Cryptography Workshop 2019, 2019
Security Aspects of Symmetric-Key Primitives
A Roy
University of Luxembourg, Luxembourg, Luxembourg, 2014
Interpolation Cryptanalysis of UFNs with Low Degree Round Functions
A Roy, E Andreeva, F Sauer
Selected Areas in Cryptography (SAC), 2020, 2020
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–19