default search action
Anubhab Baksi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Satyam Kumar, Sandip Kumar Mondal, Santanu Sarkar, Takanori Isobe, Anubhab Baksi, Avishek Adhikari:
Restricted near collision attack on Plantlet. J. Cryptogr. Eng. 14(1): 19-34 (2024) - [j10]Prasanna Ravi, Anupam Chattopadhyay, Jan-Pieter D'Anvers, Anubhab Baksi:
Side-channel and Fault-injection attacks over Lattice-based Post-quantum Schemes (Kyber, Dilithium): Survey and New Results. ACM Trans. Embed. Comput. Syst. 23(2): 35:1-35:54 (2024) - [c22]Aneesh Kandi, Anubhab Baksi, Peizhou Gan, Sylvain Guilley, Tomas Gerlich, Jakub Breier, Anupam Chattopadhyay, Ritu Ranjan Shrivastwa, Zdenek Martinasek, Shivam Bhasin:
Side-Channel and Fault Resistant ASCON Implementation: A Detailed Hardware Evaluation. ISVLSI 2024: 307-312 - [c21]Anubhab Baksi, Sumanta Chakraborty, Anupam Chattopadhyay, Matthew Chun, SK Hafizul Islam, Kyungbae Jang, Hyunji Kim, Yujin Oh, Soham Roy, Hwajeong Seo, Siyi Wang:
Quantum Implementation of Linear and Non-Linear Layers. SOCC 2024: 1-6 - [i38]Kyungbae Jang, Sejin Lim, Yujin Oh, Hyunjun Kim, Anubhab Baksi, Sumanta Chakraborty, Hwajeong Seo:
Quantum Implementation and Analysis of SHA-2 and SHA-3. IACR Cryptol. ePrint Arch. 2024: 513 (2024) - [i37]Hyunji Kim, Kyungbae Jang, Hyunjun Kim, Anubhab Baksi, Sumanta Chakraborty, Hwajeong Seo:
Quantum NV Sieve on Grover for Solving Shortest Vector Problem. IACR Cryptol. ePrint Arch. 2024: 712 (2024) - [i36]Aneesh Kandi, Anubhab Baksi, Peizhou Gan, Sylvain Guilley, Tomas Gerlich, Jakub Breier, Anupam Chattopadhyay, Ritu Ranjan Shrivastwa, Zdenek Martinasek, Shivam Bhasin:
Side-Channel and Fault Resistant ASCON Implementation: A Detailed Hardware Evaluation (Extended Version). IACR Cryptol. ePrint Arch. 2024: 984 (2024) - [i35]Anubhab Baksi:
A Study of Partial Non-Linear Layers with DEFAULT and BAKSHEESH. IACR Cryptol. ePrint Arch. 2024: 1072 (2024) - [i34]Tomas Gerlich, Jakub Breier, Pavel Sikora, Zdenek Martinasek, Aron Gohr, Anubhab Baksi, Xiaolu Hou:
DL-SITM: Deep Learning-Based See-in-the-Middle Attack on AES. IACR Cryptol. ePrint Arch. 2024: 1389 (2024) - [i33]Peizhou Gan, Prasanna Ravi, Kamal Raj, Anubhab Baksi, Anupam Chattopadhyay:
Classic McEliece Hardware Implementation with Enhanced Side-Channel and Fault Resistance. IACR Cryptol. ePrint Arch. 2024: 1828 (2024) - 2023
- [j9]Anubhab Baksi, Jakub Breier, Vishnu Asutosh Dasu, Xiaolu Hou, Hyunji Kim, Hwajeong Seo:
New Results on Machine Learning-Based Distinguishers. IEEE Access 11: 54175-54187 (2023) - [j8]Anubhab Baksi, Shivam Bhasin, Jakub Breier, Dirmanto Jap, Dhiman Saha:
A Survey on Fault Attacks on Symmetric Key Cryptosystems. ACM Comput. Surv. 55(4): 86:1-86:34 (2023) - [c20]Anubhab Baksi, Sylvain Guilley, Ritu Ranjan Shrivastwa, Sofiane Takarabt:
From Substitution Box to Threshold. INDOCRYPT (1) 2023: 48-67 - [c19]Sejin Lim, Hyunjun Kim, Kyungbae Jang, Siyi Wang, Anubhab Baksi, Anupam Chattopadhyay, Hwajeong Seo:
Optimized Quantum Circuit Implementation of Payoff Function. VLSI-SoC 2023: 1-6 - [i32]Siyi Wang, Anubhab Baksi, Anupam Chattopadhyay:
A Higher Radix Architecture for Quantum Carry-lookahead Adder. CoRR abs/2304.02921 (2023) - [i31]Hyunji Kim, Sejin Lim, Anubhab Baksi, Dukyoung Kim, Seyoung Yoon, Kyungbae Jang, Hwajeong Seo:
Quantum Artificial Intelligence on Cryptanalysis. IACR Cryptol. ePrint Arch. 2023: 4 (2023) - [i30]Anubhab Baksi, Jakub Breier, Vishnu Asutosh Dasu, Xiaolu Hou, Hyunji Kim, Hwajeong Seo:
New Results on Machine Learning Based Distinguishers. IACR Cryptol. ePrint Arch. 2023: 235 (2023) - [i29]Matthew Chun, Anubhab Baksi, Anupam Chattopadhyay:
DORCIS: Depth Optimized Quantum Implementation of Substitution Boxes. IACR Cryptol. ePrint Arch. 2023: 286 (2023) - [i28]Vikas Srivastava, Anubhab Baksi, Sumit Kumar Debnath:
An Overview of Hash Based Signatures. IACR Cryptol. ePrint Arch. 2023: 411 (2023) - [i27]Soham Roy, Anubhab Baksi, Anupam Chattopadhyay:
Quantum Implementation of ASCON Linear Layer. IACR Cryptol. ePrint Arch. 2023: 617 (2023) - [i26]Anubhab Baksi, Sylvain Guilley, Ritu Ranjan Shrivastwa, Sofiane Takarabt:
From Substitution Box To Threshold. IACR Cryptol. ePrint Arch. 2023: 633 (2023) - [i25]Anubhab Baksi:
The Problem of Half Round Key XOR. IACR Cryptol. ePrint Arch. 2023: 730 (2023) - [i24]Manas Wadhwa, Anubhab Baksi, Kai Hu, Anupam Chattopadhyay, Takanori Isobe, Dhiman Saha:
Finding Desirable Substitution Box with SASQUATCH. IACR Cryptol. ePrint Arch. 2023: 742 (2023) - [i23]Anubhab Baksi, Jakub Breier, Anupam Chattopadhyay, Tomas Gerlich, Sylvain Guilley, Naina Gupta, Kai Hu, Takanori Isobe, Arpan Jati, Petr Jedlicka, Hyunjun Kim, Fukang Liu, Zdenek Martinasek, Kosei Sakamoto, Hwajeong Seo, Rentaro Shiba, Ritu Ranjan Shrivastwa:
BAKSHEESH: Similar Yet Different From GIFT. IACR Cryptol. ePrint Arch. 2023: 750 (2023) - [i22]Yujin Oh, Kyungbae Jang, Anubhab Baksi, Hwajeong Seo:
Depth-Optimized Implementation of ASCON Quantum Circuit. IACR Cryptol. ePrint Arch. 2023: 1030 (2023) - 2022
- [j7]Anubhab Baksi, Satyam Kumar, Santanu Sarkar:
A New Approach for Side Channel Analysis on Stream Ciphers and Related Constructions. IEEE Trans. Computers 71(10): 2527-2537 (2022) - [j6]Satyam Kumar, Vishnu Asutosh Dasu, Anubhab Baksi, Santanu Sarkar, Dirmanto Jap, Jakub Breier, Shivam Bhasin:
Side Channel Attack On Stream Ciphers: A Three-Step Approach To State/Key Recovery. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(2): 166-191 (2022) - [c18]Kyungbae Jang, Anubhab Baksi, Hyunji Kim, Hwajeong Seo, Anupam Chattopadhyay:
Improved Quantum Analysis of SPECK and LowMC. INDOCRYPT 2022: 517-540 - [c17]Anubhab Baksi, Arghya Bhattacharjee, Jakub Breier, Takanori Isobe, Mridul Nandi:
Big Brother Is Watching You: A Closer Look at Backdoor Construction. SPACE 2022: 81-96 - [i21]Ambati Sathvik, Tirunagari Rahul, Anubhab Baksi, Vikramkumar Pudi:
Hardware Implementation of SpoC-128. IACR Cryptol. ePrint Arch. 2022: 119 (2022) - [i20]Kyungbae Jang, Anubhab Baksi, Jakub Breier, Hwajeong Seo, Anupam Chattopadhyay:
Quantum Implementation and Analysis of DEFAULT. IACR Cryptol. ePrint Arch. 2022: 647 (2022) - [i19]Kyungbae Jang, Anubhab Baksi, Hyunji Kim, Gyeongju Song, Hwajeong Seo, Anupam Chattopadhyay:
Quantum Analysis of AES. IACR Cryptol. ePrint Arch. 2022: 683 (2022) - [i18]Prasanna Ravi, Anupam Chattopadhyay, Anubhab Baksi:
Side-channel and Fault-injection attacks over Lattice-based Post-quantum Schemes (Kyber, Dilithium): Survey and New Results. IACR Cryptol. ePrint Arch. 2022: 737 (2022) - [i17]Anubhab Baksi, Arghya Bhattacharjee, Jakub Breier, Takanori Isobe, Mridul Nandi:
Big Brother Is Watching You: A Closer Look At Backdoor Construction. IACR Cryptol. ePrint Arch. 2022: 953 (2022) - [i16]Kyungbae Jang, Anubhab Baksi, Hyunji Kim, Hwajeong Seo, Anupam Chattopadhyay:
Improved Quantum Analysis of SPECK and LowMC (Full Version). IACR Cryptol. ePrint Arch. 2022: 1427 (2022) - 2021
- [b1]Anubhab Baksi:
Classical and physical security of symmetric key cryptographic algorithms. Nanyang Technological University, Singapore, 2021 - [j5]Anubhab Baksi, Santanu Sarkar, Akhilesh Siddhanti, Ravi Anand, Anupam Chattopadhyay:
Differential fault location identification by machine learning. CAAI Trans. Intell. Technol. 6(1): 17-24 (2021) - [j4]Anubhab Baksi, Kyungbae Jang, Gyeongju Song, Hwajeong Seo, Zejun Xiang:
Quantum implementation and resource estimates for Rectangle and Knot. Quantum Inf. Process. 20(12): 395 (2021) - [c16]Anubhab Baksi, Banashri Karmakar, Vishnu Asutosh Dasu:
POSTER: Another Look at Boyar-Peralta's Algorithm. ACNS Workshops 2021: 495-499 - [c15]Anubhab Baksi, Banashri Karmakar, Vishnu Asutosh Dasu:
POSTER: Optimizing Device Implementation of Linear Layers with Automated Tools. ACNS Workshops 2021: 500-504 - [c14]Anubhab Baksi, Shivam Bhasin, Jakub Breier, Mustafa Khairallah, Thomas Peyrin, Sumanta Sarkar, Siang Meng Sim:
DEFAULT: Cipher Level Resistance Against Differential Fault Attack. ASIACRYPT (2) 2021: 124-156 - [c13]Anubhab Baksi, Jakub Breier, Yi Chen, Xiaoyang Dong:
Machine Learning Assisted Differential Distinguishers For Lightweight Ciphers. DATE 2021: 176-181 - [c12]Anubhab Baksi, Shivam Bhasin, Jakub Breier, Anupam Chattopadhyay, Vinay B. Y. Kumar:
Feeding Three Birds With One Scone: A Generic Duplication Based Countermeasure To Fault Attacks. DATE 2021: 561-564 - [c11]Anubhab Baksi, Vishnu Asutosh Dasu, Banashri Karmakar, Anupam Chattopadhyay, Takanori Isobe:
Three Input Exclusive-OR Gate Support for Boyar-Peralta's Algorithm. INDOCRYPT 2021: 141-158 - [c10]Prasanna Ravi, Suman Deb, Anubhab Baksi, Anupam Chattopadhyay, Shivam Bhasin, Avi Mendelson:
On Threat of Hardware Trojan to Post-Quantum Lattice-Based Schemes: A Key Recovery Attack on SABER and Beyond. SPACE 2021: 81-103 - [c9]Anubhab Baksi:
Classical and Physical Security of Symmetric Key Cryptographic Algorithms. VLSI-SoC 2021: 1-2 - [i15]Anubhab Baksi, Shivam Bhasin, Jakub Breier, Mustafa Khairallah, Thomas Peyrin, Sumanta Sarkar, Siang Meng Sim:
DEFAULT: Cipher Level Resistance Against Differential Fault Attack. IACR Cryptol. ePrint Arch. 2021: 712 (2021) - [i14]Anubhab Baksi, Kyungbae Jang, Gyeongju Song, Hwajeong Seo, Zejun Xiang:
Quantum Implementation and Resource Estimates for RECTANGLE and KNOT. IACR Cryptol. ePrint Arch. 2021: 982 (2021) - [i13]Anubhab Baksi, Vishnu Asutosh Dasu, Banashri Karmakar, Anupam Chattopadhyay, Takanori Isobe:
Three Input Exclusive-OR Gate Support For Boyar-Peralta's Algorithm (Extended Version). IACR Cryptol. ePrint Arch. 2021: 1400 (2021) - 2020
- [j3]Anubhab Baksi, Dhiman Saha, Sumanta Sarkar:
To infect or not to infect: a critical analysis of infective countermeasures in fault attacks. J. Cryptogr. Eng. 10(4): 355-374 (2020) - [j2]Anubhab Baksi, Sumanta Sarkar, Anupam Chattopadhyay:
A Coding Theoretic Approach towards Symmetrization in Reversible Circuit Synthesis. J. Multiple Valued Log. Soft Comput. 35(3-4): 239-262 (2020) - [c8]Anubhab Baksi, Vinay B. Y. Kumar, Banashri Karmakar, Shivam Bhasin, Dhiman Saha, Anupam Chattopadhyay:
A Novel Duplication Based Countermeasure to Statistical Ineffective Fault Analysis. ACISP 2020: 525-542 - [c7]Anubhab Baksi:
New Insights on Differential and Linear Bounds Using Mixed Integer Linear Programming. SECITC 2020: 41-54 - [i12]Anubhab Baksi, Jakub Breier, Xiaoyang Dong, Chen Yi:
Machine Learning Assisted Differential Distinguishers For Lightweight Ciphers. IACR Cryptol. ePrint Arch. 2020: 571 (2020) - [i11]Anubhab Baksi, Santanu Sarkar, Akhilesh Siddhanti, Ravi Anand, Anupam Chattopadhyay:
Fault Location Identification By Machine Learning. IACR Cryptol. ePrint Arch. 2020: 717 (2020) - [i10]Anubhab Baksi, Shivam Bhasin, Jakub Breier, Dirmanto Jap, Dhiman Saha:
Fault Attacks In Symmetric Key Cryptosystems. IACR Cryptol. ePrint Arch. 2020: 1267 (2020) - [i9]Anubhab Baksi, Vinay B. Y. Kumar, Banashri Karmakar, Shivam Bhasin, Dhiman Saha, Anupam Chattopadhyay:
A Novel Duplication Based Countermeasure To Statistical Ineffective Fault Analysis. IACR Cryptol. ePrint Arch. 2020: 1268 (2020) - [i8]Anubhab Baksi:
New Insights On Differential And Linear Bounds Using Mixed Integer Linear Programming (Full Version). IACR Cryptol. ePrint Arch. 2020: 1414 (2020) - [i7]Anubhab Baksi, Shivam Bhasin, Jakub Breier, Anupam Chattopadhyay, Vinay B. Y. Kumar:
Feeding Three Birds With One Scone: A Generic Duplication Based Countermeasure To Fault Attacks (Extended Version). IACR Cryptol. ePrint Arch. 2020: 1542 (2020)
2010 – 2019
- 2019
- [c6]Vishnu Asutosh Dasu, Anubhab Baksi, Sumanta Sarkar, Anupam Chattopadhyay:
LIGHTER-R: Optimized Reversible Circuit Implementation For SBoxes. SoCC 2019: 260-265 - [i6]Anubhab Baksi, Dhiman Saha, Sumanta Sarkar:
To Infect Or Not To Infect: A Critical Analysis Of Infective Countermeasures In Fault Attacks. IACR Cryptol. ePrint Arch. 2019: 355 (2019) - 2018
- [c5]Anubhab Baksi, Shivam Bhasin, Jakub Breier, Mustafa Khairallah, Thomas Peyrin:
Protecting block ciphers against differential fault attacks without re-keying. HOST 2018: 191-194 - [c4]Anubhab Baksi, Vikramkumar Pudi, Swagata Mandal, Anupam Chattopadhyay:
Lightweight ASIC Implementation of AEGIS-128. ISVLSI 2018: 251-256 - [i5]Anubhab Baksi, Shivam Bhasin, Jakub Breier, Mustafa Khairallah, Thomas Peyrin:
Protecting Block Ciphers against Differential Fault Attacks without Re-keying (Extended Version). IACR Cryptol. ePrint Arch. 2018: 85 (2018) - 2017
- [j1]Santanu Sarkar, Subhamoy Maitra, Anubhab Baksi:
Observing biases in the state: case studies with Trivium and Trivia-SC. Des. Codes Cryptogr. 82(1-2): 351-375 (2017) - [c3]S. V. Dilip Kumar, Sikhar Patranabis, Jakub Breier, Debdeep Mukhopadhyay, Shivam Bhasin, Anupam Chattopadhyay, Anubhab Baksi:
A Practical Fault Attack on ARX-Like Ciphers with a Case Study on ChaCha20. FDTC 2017: 33-40 - [i4]S. V. Dilip Kumar, Sikhar Patranabis, Jakub Breier, Debdeep Mukhopadhyay, Shivam Bhasin, Anupam Chattopadhyay, Anubhab Baksi:
A Practical Fault Attack on ARX-like Ciphers with a Case Study on ChaCha20. IACR Cryptol. ePrint Arch. 2017: 1074 (2017) - 2016
- [c2]Anupam Chattopadhyay, Anubhab Baksi:
Low-quantum cost circuit constructions for adder and symmetric Boolean functions. ISCAS 2016: 2294-2297 - [c1]Anupam Chattopadhyay, Vikramkumar Pudi, Anubhab Baksi, Thambipillai Srikanthan:
FPGA Based Cyber Security Protocol for Automated Traffic Monitoring Systems: Proposal and Implementation. ISVLSI 2016: 18-23 - [i3]Anupam Chattopadhyay, Anubhab Baksi:
Reversible Logic Circuit Complexity Analysis via Functional Decomposition. CoRR abs/1602.00101 (2016) - 2015
- [i2]Anubhab Baksi, Subhamoy Maitra, Santanu Sarkar:
New Distinguishers for Reduced Round Trivium and Trivia-SC using Cube Testers. IACR Cryptol. ePrint Arch. 2015: 223 (2015) - [i1]Subhamoy Maitra, Santanu Sarkar, Anubhab Baksi, Pramit Dey:
Key Recovery from State Information of Sprout: Application to Cryptanalysis and Fault Attack. IACR Cryptol. ePrint Arch. 2015: 236 (2015)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-12 22:00 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint