Author of the publication

Release of Unverified Plaintext: Tight Unified Model and Application to ANYDAE.

, , , , , , and . IACR Trans. Symmetric Cryptol., 2019 (4): 119-146 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Sanadhya, Somitra
add a person with the name Sanadhya, Somitra
 

Other publications of authors with the same name

Release of Unverified Plaintext: Tight Unified Model and Application to ANYDAE., , , , , , and . IACR Trans. Symmetric Cryptol., 2019 (4): 119-146 (2019)Quantum Security of FOX Construction based on Lai-Massey Scheme., and . IACR Cryptol. ePrint Arch., (2022)Identifying the Leak Sources of Hard Copy Documents., , , , and . IFIP Int. Conf. Digital Forensics, volume 653 of IFIP Advances in Information and Communication Technology, page 155-167. Springer, (2022)Cryptanalysis of a Digital Watermarking Scheme Based on Support Vector Regression., , and . SMC, page 1554-1559. IEEE, (2013)sp-AELM: Sponge Based Authenticated Encryption Scheme for Memory Constrained Devices., , and . ACISP, volume 9144 of Lecture Notes in Computer Science, page 451-468. Springer, (2015)On identifying marker genes from gene expression data in a neural framework through online feature analysis., , , and . Int. J. Intell. Syst., 21 (4): 453-467 (2006)A new authenticated encryption technique for handling long ciphertexts in memory constrained devices., , and . Int. J. Appl. Cryptogr., 3 (3): 236-261 (2017)Threshold Implementations of <tt>GIFT</tt>: A Trade-Off Analysis., , , , and . IEEE Trans. Inf. Forensics Secur., (2020)Linear Cryptanalysis of Round Reduced SIMON., , , , and . IACR Cryptology ePrint Archive, (2013)Exploiting the Leakage: Analysis of Some Authenticated Encryption Schemes., , , , and . SPACE, volume 10076 of Lecture Notes in Computer Science, page 383-401. Springer, (2016)