Our selected publications :



2015

  • Dr. Donghoon Chang, Dr. Somitra Sanadhya and Nishant Sharma: New HMAC Message Patches: Secret Patch and CrOw Patch. ICISS 2015, December 16 -20, 2015, Kolkata, India.


  • Akshima, Donghoon Chang, Mohona Ghosh, Aarushi Goel and Somitra Kumar Sanadhya: Improved Meet-in-the-Middle Attacks on 7 and 8-round ARIA-192 and ARIA-256. Indocrypt 2015, December 06 -10, 2015, Bangalore, India.


  • Nasour Bagheri, Navid Ghaedi Bardeh and Somitra Kumar Sanadhya: Differential Fault Analysis of SHA-3. Indocrypt 2015, December 06 -10, 2015, Bangalore, India.


  • Donghoon Chang, Somitra Kumar Sanadhya, Monika Singh and Robin Verma: A collision attack on sdHash similarity hashing. SADFE 2015, September 30 – October 2, 2015, Malaga, Spain.


  • Tarun Kumar Bansal, Donghoon Chang, Somitra Kumar Sanadhya: Sponge based CCA2 secure asymetric encryption for arbitrary length message. ACISP 2015, June 29-July 1, 2015, Brisbane, Australia. Preprint


  • Megha Agrawal, Donghoon Chang, Somitra Kumar Sanadhya: sp-ALEM: Sponge based authenticated encryption scheme for memory constrained devices. ACISP 2015, June 29-July 1, 2015, Brisbane, Australia. Preprint


2014

  • Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya: Time Memory Tradeoff Analysis of Graphs in Password Hashing Constructions. Passwords 2014, December 8-10, Trondheim, Norway.


  • Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya: Cryptographic module based approach for password hashing scheme. Passwords 2014, December 8-10, Trondheim, Norway.


  • Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya: Rig - A simple, secure and flexible design for Password Hashing. Inscrypt 2014, December 13-15, Beijing, China. Preprint (Accept. rate 29/93 = 31.1 %)


  • Megha Agrawal, Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya: Collision attack on 4-branch Type-2 GFN based hash functions using sliced biclique cryptanalysis technique. Inscrypt 2014, December 13-15, Beijing, China. Preprint (Accept. rate 29/93 = 31.1 %)


  • Andrey Bogdanov, Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya: Bicliques with Minimal Data and Time Complexity for AES. ICISC 2014, December 3-5, 2014, Seoul, Korea. Preprint. (Accept. rate 26/91 = 28.5 %)


  • Donghoon Chang, Arnab Kumar, Pawel Morawiecki, Somitra Kumar Sanadhya: 1st and 2nd Preimage Attacks on 7, 8 and 9 Rounds of SHA3-224,256,384,512. SHA-3 2014 Workshop organized by NIST, August 22, 2014, UCSB, Santa Barbara, USA (Co-located with Crypto 2014). Web-link


  • Abhishek Kumar, Somitra Kumar Sanadhya, Praveen Gauravaram, Nasour Bagheri, Javad Alizadeh, Mohammad Reza Aref, Hoda A. Alkhzaimi and Martin M. Lauridsen: Cryptanalysis of SIMON Variants with Connections. RFIDSec 2014, Oxford, UK, July 21-23, 2014. Web-link


2013

  • Donghoon Chang, Abhishek Kumar, Somitra Kumar Sanadhya: Security analysis of GFN: 8 round distinguisher for 4-branch type-2 GFN. Indocrypt 2013, Mumbai, December 7-10, 2013. Web-link (Accept. rate 21/76 = 27.6 %)


  • Madhuri Siddula, Somitra Kumar Sanadhya, Subramanyam Venkata: Cryptanalysis of a Digital Watermarking scheme based on Support Vector Regression. IEEE Systems, Man and Cybernetics, Manchester UK, October 13-16, 2013. Web-link


 

Technical Reports:TOP



  • Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya: Biclique Cryptanalysis of AES based Hashing Modes. IIITD-TR-2015-006. February, 2015. Weblink


  • Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya: Biclique Cryptanalysis of Full Round AES with Reduced Data Complexity. IIITD-TR-2013-001. March, 2013. Weblink


  • Ashish Kumar, Somitra Sanadhya, Praveen Gauravaram, Masoumeh Safkhani and Majid Naderi, "Cryptanalysis of Tav-128 Hash function",Indocrypt 2010, December 2010 Preprint (Accept. rate 22/72 = 30.5 %). An earlier version of this work is available as a technical report at IIITD-TR-2010-001 Preprint


 

Thesis:TOP



2013-14

  • Akshay Gupta (B.Tech. thesis), Thesis title: " Studies on Keccak hash function".


  • Nishant Sharma (MTech thesis), Thesis title: "New HMAC message patches".


  • Sandipan Biswas (M.Tech. thesis), Thesis title: "Exploiting TLS to disrupt traffic privacy in web-applications".


2012-13

  • R. Sumesh Manjunath (MTech thesis), Thesis title: "Provably secure authenticated encryption modes". Receipient of the best thesis award of the institute.


  • Nishant Sharma (MTech thesis), Thesis title: "New HMAC message patches".


  • Tarun Bansal (M.Tech. thesis), Thesis title: "Secure Design and Instantiation of Trapdoor-less Truncated Hash Functions".


  • Abhishek Kumar (M.Tech. thesis), Thesis title: " Security Analysis of General-Feistel Network".


  • Arpan Jati (M.Tech. thesis), Thesis title: "A Fast and Secure Peer to Peer File Sharing Protocol".


2011-12

  • Gaurav Saluja (BTech thesis), Thesis title: "Development of a new mobile banking authentication scheme".


  • Pratyush Tripathi and Siddharth (Joint BTech thesis), Thesis title: "Java application to perform and analyze machine learning techniques on gene expression dataset to identify cancer".


  • Madhuri Siddula (MTech thesis), Thesis title: "Cryptanalysis of a digital watermarking scheme based on Support Vector Regression".