Publications

Author naming convention: culture statement

2024

  1. Arpan Jati, Naina Gupta, Anupam Chattopadhyay, Somitra Kumar Sanadhya. EFFLUX-F2: A High performance hardware security evaluation board. 15th International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2024) France, April 2024. LNCS volume 14595.

2023

  1. Amit Kumar Chauhan, Abhishek Kumar, Somitra Kumar Sanadhya. Square Attacks on Reduced-Round FEA-1 and FEA-2. 25th International Symposium on Stabilization, Safety, and Security of Distributed Systems 2023 (SSS 2023).

  2. Naina Gupta, Arpan Jati, Anupam Chattopadhyay, Somitra Kumar Sanadhya. A Configurable CRYSTALS-Kyber Hardware Implementation with Side-Channel Protection. ACM Transactions on Embedded Computing Systems. Accepted. Feb 2023. Link.

2022

  1. Tapas Chatterjee, Ayantika Laha, and Somitra Kumar Sanadhya. On The Structure of Format Preserving Sets in the Diffusion Layer of Block Ciphers. IEEE Transactions on Information Theory. Vol. 68, Issue 12, pp. 8268-8279. DoI: 10.1109/TIT.2022.3187407. Link.

  2. Subodh Bijwe, Amit Kumar Chauhan, and Somitra Kumar Sanadhya. Implementing Grover Oracle for Lightweight Block Ciphers under Depth Constraints. 27th Australasian Conference on Information Security and Privacy (ACISP) 2022, Wollongong, Australia, November 28-30, 2022.

  3. Monika Singh, Anviksha Khunteta, Mohona Ghosh, Donghoon Chang, and Somitra Kumar Sanadhya. FbHash-E: A time and memory efficient version of FbHash similarity hashing algorithm, Forensic Science International: Digital Investigation, Volume 41, 2022, ISSN 2666-2817 Link.

  4. N. Nalla Anandakumar, Mohammad S. Hashmi and Somitra Kumar Sanadhya. Design and Analysis of FPGA-Based PUFs with Enhanced Performance for Hardware-Oriented Security. ACM Journal on Emerging Technologies in Computing Systems (JETC), Vol. 18, issue 4, 2022, ISSN No. 1539-9087, doi.acm.org?doi=3517813.

  5. N. Nalla Anandakumar, Mohammad S. Hashmi and Somitra Kumar Sanadhya. Field Programmable Gate Array based Elliptic Curve Menezes-Qu-Vanstone key agreement protocol realization using Physical Unclonable Function and true random number generator primitives. IET Circuits, Devices & Systems, 2022, Pages 1-17, ISSN No. 751-8598. Link.

2021

  1. Amit Kumar Chauhan, Abhishek Kumar, Somitra Kumar Sanadhya. Quantum Free-Start Collision Attacks on Double Block Length Hashing with Round-Reduced AES-256. IACR Transactions on Symmetric Cryptology (ToSC), Vol. 2021, Issue 1.

2020

  1. Orr Dunkelman, Abhishek Kumar, Eran Lambooij, Somitra Kumar Sanadhya. Counting Active S-Boxes is not Enough. Indocrypt 2020.

  2. Amit Kumar Chauhan, Somitra Kumar Sanadhya. Quantum Resource Estimates of Grover’s Key Search on ARIA. SPACE 2020.

  3. Nalla Anandakumar, Mohammed Hashmi, Somitra Kumar Sanadhya. Efficient and Lightweight FPGA-based Hybrid PUFs with Improved Performance. Microprocessors and Microsystems. Vol. 77. Elsevier.

  4. Nalla Anandakumar, Somitra Kumar Sanadhya, Mohammed Hashmi. Design, Implementation And Analysis of Hardware-based Security Primitives. 2020 IFIP/IEEE 28th International Conference on Very Large Scale Integration (VLSI-SOC), Salt Lake City, UT, USA, 2020. Link

2019

  1. Arpan Jati, Naina Gupta, Anupam Chattopadhyay, Somitra Kumar Sanadhya, Donghoon Chang. Threshold Implementations of GIFT: A Trade-off Analysis. IEEE Trans. Information Forensics and Security. Vol. 15, 2020. Link

  2. Donghoon Chang; Nilanjan Datta; Avijit Dutta; Bart Mennink; Mridul Nandi; Somitra Sanadhya; Ferdinand Sibleyras. Release of Unverified Plaintext: Tight Unified Model and Application to ANYDAE. IACR Transactions on Symmetric Cryptography (ToSC), 2019 Issue 4.

  3. Nalla Anandakumar, Somitra Kumar Sanadhya, Mohammed Hashmi. FPGA-Based True Random Number Generation Using Programmable Delays in Oscillator-Rings. IEEE Transactions on Circuits and Systems-II, Express briefs. Vol. 67-II, No. 3. Link

  4. Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya, Monika Singh, Douglas R. White. A New Similarity Hashing Scheme for Digital Forensics. Digital Investigation, special issue. Elsevier Link

  5. Donghoon Chang, Mohona Ghosh, Arpan Jati, Abhishek Kumar, Somitra Kumar Sanadhya. A Generalized Format Preserving Encryption Framework Using MDS Matrices. Journal of Hardware and Systems Security, Springer. Link

2018

  1. Nalla Anandakumar, Prem Laxman Das, Somitra Kumar Sanadhya, Mohammad Hashmi. Reconfigurable Hardware Architecture for Authenticated Key Agreement Protocol Over Binary Edwards Curve. ACM Transactions on Reconfigurable Technology and Systems. Vol 11, No. 2. Link

  2. Akshima, Donghoon Chang, Aarushi Goel, Sweta Mishra, Somitra Kumar Sanadhya. Generation of Secure and Reliable Honeywords. IEEE Transactions on Dependable and Secure Computing. April 2018. Link

  3. Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya. Cryptanalytic Time-Memory Tradeoff for Password Hashing Schemes. International Journal of Information Security. Springer. April 2018. Link

  4. Donghoon Chang, Amit Kumar Chauhan, Sandeep Kumar, Somitra Kumar Sanadhya. Revocable Identity-based Encryption from Codes with Rank Metric. CT-RSA 2018.

2017

  1. Donghoon Chang, Mohona Ghosh, Arpan Jati, Abhishek Kumar and Somitra Kumar Sanadhya. eSPF: A Family of Format-Preserving Encryption Algorithms using MDS Matrices. SPACE 2017.

  2. Donghoon Chang, Abhishek Kumar, Somitra Kumar Sanadhya. Distinguishers for 4-branch and 8-branch Generalized Feistel Network. IEEE Access. Vol 5, pages 27857-27867 (IF 1.270).

  3. Tarun Bansal, Donghoon Chang, Somitra Kumar Sanadhya. Sponge based CCA2 secure asymmetric encryption for arbitrary length message. International Journal of Applied Cryptography. Vol 3, No 3 pp 262-287, Inderscience publishers.

  4. Megha Agrawal, Donghoon Chang, Somitra Kumar Sanadhya. A New Authenticated Encryption Technique for Handling Long Ciphertexts in Memory Constrained Devices. International Journal of Applied Cryptography. Vol 3, No 3, pp 236-261, Inderscience publishers.

  5. Nalla Anandakumar, Mohammad Hashmi, Somitra Kumar Sanadhya. Compact Implementation of FPGA-based PUFs with Enhanced Performance. VLSI Design 2017. January 7-11, 2017, Hyderabad, India.

2016

  1. Donghoon Chang, Mohona Ghosh, Kishan Chand Gupta, Arpan Jati, Abhishek Kumar, Dukjae Moon, Indranil Ghosh Ray, Somitra Kumar Sanadhya. SPF: A New Family of Efficient Format-Preserving Encryption Algorithms. Inscrypt 2016, November 4-6, 2016, Beijing, China.

  2. Donghoon Chang, Amit Kumar Chauhan, Naina Gupta, Arpan Jati and Somitra Kumar Sanadhya. Exploiting the Leakage: Analysis of some Authenticated Encryption schemes. SPACE 2016, December 14-18, 2016, Hyderabad, India.

  3. Megha Agrawal, Tarun Kumar Bansal, Donghoon Chang, Amit Kumar Chauhan, Seokhie Hong, Jinkeon Kang, Somitra Kumar Sanadhya. RCB: leakage-resilient authenticated encryption via re-keying. The Journal of Supercomputing, Springer. 2016. Online version: here.

  4. Monika Singh, Donghoon Chang, Somitra Kumar Sanadhya. Security Analysis of mvHash-B Similarity Hashing. Journal of Digital Forensics, Security and Law, Vol. 11 (2), 2016.

2015

  1. Donghoon Chang, Somitra Kumar Sanadhya, Nishant Sharma. New HMAC Message Patches: Secret Patch and CrOw Patch, ICISS 2015, December 16-20, 2015, Kolkata, India.

  2. Akshima, Donghoon Chang, Mohona Ghosh, Aarushi Goel, Somitra Kumar Sanadhya. Improved Meet-in-the-Middle Attacks on 7 and 8-round ARIA-192 and ARIA-256, Indocrypt 2015, December 6-10, 2015, Bangalore, India.

  3. Nasour Bagheri, Navid Ghaedi Bardeh, Somitra Kumar Sanadhya. Differential fault analysis of SHA-3, Indocrypt 2015, December 6-10, 2015, Bangalore, India.

  4. Akshima, Donghoon Chang, Mohona Ghosh, Aarushi Goel, Somitra Kumar Sanadhya. Single Key Recovery Attacks on 9-round Kalyna-128/256 and Kalyna-256/512. ICISC 2015, November 25-27, Seoul, Korea.

  5. Donghoon Chang, Sumesh Manjunath, Somitra Kumar Sanadhya. PPAE: Practical Parazoa Authenticated Encryption family, ProvSec 2015, November 24-26, Kanazawa, Japan.

  6. Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya. Biclique Cryptanalysis of full round AES-128 based hashing modes, Inscrypt 2015, November 1-3, 2015, Beijing, China.

  7. Donghoon Chang, Somitra Kumar Sanadhya, Monika Singh, Robin Verma. A collision attack on sdHash similarity hashing. SADFE 2015, September 30th – October 2nd, 2015, Málaga, Spain.

  8. Tarun Kumar Bansal, Donghoon Chang, Somitra Kumar Sanadhya. Sponge based CCA2 secure asymetric encryption for arbitrary length message. ACISP 2015, June 29- July 1, 2015, Brisbane, Australia. Preprint (Accept. rate 28/112 = 25 %)

  9. Megha Agrawal, Donghoon Chang, Somitra Kumar Sanadhya. sp-ALEM: Sponge based authenticated encryption scheme for memory constrained devices. ACISP 2015, June 29- July 1, 2015, Brisbane, Australia. Preprint (Accept. rate 28/112 = 25 %)

2014

  1. Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya. Time Memory Tradeoff Analysis of Graphs in Password Hashing Constructions. Passwords 2014, December 8-10, Trondheim, Norway.

  2. Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya. Cryptographic module based approach for password hashing schemes. Passwords 2014, December 8-10, Trondheim, Norway.

  3. Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya. Rig: A simple, secure and flexible design for Password Hashing. Inscrypt 2014, December 13-15, Beijing, China. Preprint (Accept. rate 29/93 = 31.1 %)

  4. Megha Agrawal, Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya. Collision attack on 4-branch Type-2 GFN based hash functions using sliced biclique cryptanalysis technique. Inscrypt 2014, December 13-15, Beijing, China. Preprint (Accept. rate 29/93 = 31.1 %)

  5. Andrey Bogdanov, Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya. Bicliques with Minimal Data and Time Complexity for AES. ICISC 2014, December 3-5, 2014, Seoul, Korea. Preprint. (Accept. rate 26/91 = 28.5 %)

  6. Donghoon Chang, Arnab Kumar, Pawel Morawiecki, Somitra Kumar Sanadhya. 1st and 2nd Preimage Attacks on 7, 8 and 9 Rounds of SHA3-224,256,384,512. SHA-3 2014 Workshop organized by NIST, August 22, 2014, UCSB, Santa Barbara, USA (Co-located with Crypto 2014). Web-link

  7. Abhishek Kumar, Somitra Kumar Sanadhya, Praveen Gauravaram, Nasour Bagheri, Javad Alizadeh, Mohammad Reza Aref, Hoda A. Alkhzaimi and Martin M. Lauridsen. Cryptanalysis of SIMON Variants with Connections, RFIDSec 2014, Oxford, UK, July 21-23, 2014. Web-link (Accept. Rate 13/27= 48%)

2013

  1. Donghoon Chang, Abhishek Kumar, Somitra Kumar Sanadhya, “Security analysis of GFN: 8 round distinguisher for 4-branch type-2 GFN”, Indocrypt 2013, Mumbai, December 7-10, 2013. Web-link (Accept. rate 21/76 = 27.6 %)

  2. Madhuri Siddula, Somitra Kumar Sanadhya, Subramanyam Venkata, “Cryptanalysis of a Digital Watermarking scheme based on Support Vector Regression” , IEEE Systems, Man and Cybernetics, Manchester UK, October 13-16, 2013. Web-link

  3. Nasour Bagheri, Praveen Gauravaram, Masoumeh Safkhani, and Somitra Kumar Sanadhya , “Desynchronization and Traceability Attacks on RIPTA-DA Protocol” , RFIDSec 2013, Graz, Austria, July 9-11, 2013. Web-link (Accept. rate 11/23 = 47.8 %)

  4. Seyed Farhad Aghili, Nasour Bagheri, Praveen Gauravaram, Masoumeh Safkhani, and Somitra Kumar Sanadhya,”On the Security of two RFID Mutual Authentication Protocols” , RFIDSec 2013, Graz, Austria , July 9-11, 2013. Web-link (Accept. rate 11/23 = 47.8 %)

2012

  1. Andrey Bogdanov, Somitra Kumar Sanadhya (Eds.): Security, Privacy and Applied Cryptography Engineering - Second International Conference, SPACE 2012, Chennai, India, November 3-4, 2012. Proceedings. Lecture Notes in Computer Science 7644, Springer 2012. Web-Link

2011

  1. Masoume Safkhani, Nasour Bagheri, Majid Naderi, Somitra Sanadhya, “Security Analysis of LMAP++, an RFID Authentication Protocol”, RISC 2011, December 2011 Preprint

  2. Nasour Bagheri, Masoumeh Safkhani, Somitra Sanadhya, Majid Naderi, Hamid Behnam, “On the Security of Mutual Authentication Protocols for RFID Systems: The Case of Wei et al.’s Protocol” DPM 2011, September 2011 Preprint

2010

  1. Ashish Kumar, Somitra Sanadhya, Praveen Gauravaram, Masoumeh Safkhani and Majid Naderi, “Cryptanalysis of Tav-128 Hash function”,Indocrypt 2010, December 2010 Preprint (Accept. rate 22/72 = 30.5 %) (Earlier version as a tech. report IIITD-TR-2010-001 Preprint)

2009

  1. Somitra Sanadhya and Palash Sarkar, “A New Hash Family Obtained by Modifying the SHA-2 Family”, ASIACCS 2009, March 2009. Preprint (Accept. rate 33/147 = 22.4 %)

  2. Somitra Sanadhya and Palash Sarkar, “A Combinatorial Analysis of Recent Attacks on Step Reduced SHA-2 Family”, Cryptography and Communications- Discrete Structures, Boolean Functions and Sequences, Vol 1, No. 2, pp 135-173, 2009. Preprint Impact Factor(2015)=0.828

2008

  1. Somitra Sanadhya and Palash Sarkar, “New Collision attacks Against Up To 24-step SHA-2”, Indocrypt 2008, December 2008. Preprint (Accept. rate 33/111 = 29.7 %)

  2. Somitra Sanadhya and Palash Sarkar, “Deterministic Constructions of 21-Step Collisions for the SHA-2 Hash Family”, “Information Security Conference 2008” ISC 2008, September 2008, Taipei, Taiwan. (Accept. rate 33/134 = 20.4 %) This paper received one of the best student paper awards.

  3. Somitra Sanadhya and Palash Sarkar, “Searching for Low Weight Codewords in Linear Binary Codes”, “8th Central European Conference on Cryptography” CECC 2008, July 2008, Graz, Austia. Preprint

  4. Somitra Sanadhya and Palash Sarkar, “Non-Linear Reduced Round Attacks Against SHA-2 Hash family”, “The 13th Australasian Conference on Information Security and Privacy” ACISP 2008 , July 2008, Wollongong, Australia. Preprint (Accept. rate 33/111 = 24.6 %)

  5. Somitra Sanadhya and Palash Sarkar, “Attacking Reduced Round SHA-256”, “International Conference on Applied Cryptography and Network Security” ACNS 2008, June 2008, New York, US. Preprint (Accept. rate 30/131 = 22.9 %)

  6. N. R. Pal, Animesh Sharma and Somitra Sanadhya, “Deriving meaningful rules from gene expression data for classification”. Journal of Intelligent & Fuzzy Systems, Vol. 19, No. 3, pp 171–180, 2008

2007

  1. Somitra Sanadhya and Palash Sarkar, “New local collisions in the SHA-2 hash family”, International Conference on Information Security and Cryptography ICISC ‘07, Nov 2007, Seoul, Korea. Preprint (Accept. rate 26/127 = 20.4 %)

  2. Somitra Sanadhya and Palash Sarkar, “On the security of MD4”, Technical Report ASD/2007/3, Applied Statistics Unit, ISI Kolkata, 2007 Preprint

  3. NR Pal, Somitra Sanadhya and Animesh Sharma “Computation of consensus hydrophobicity scales with self-organizing maps and fuzzy clustering along with applications to protein fold prediction”, Neural, Parallel, and Scientific Computations, 15, 75-90, 2007 Preprint Impact Factor(2015)=1.812

2006

  1. NR Pal, Animesh Sharma, Somitra Sanadhya and Karmeshu, “On identifying marker genes from gene expression data in a neural framework through online feature analysis”, International Journal of Intelligent Systems, 21(4), 453-467, 2006 Preprint Impact Factor(2015)=1.886

  2. Prabir Bhattacharyya and Somitra Sanadhya, “Support Vector Regression based tool wear assessment in face milling”, IEEE International Conference on Industrial Technology (ICIT) 2006 Preprint

  3. A Krishnamachari, T Srinivas, Somitra K Sanadhya and S Balasundaram, “Perceptron Decision Tree Model for E. coli Promoters”, Proceedings of International Conference on Bioinformatics InCoB 2006, New Delhi.

Book Chapter