Our selected publications :



2017-2018

  • Akshima, Donghoon Chang, Aarushi Goel, Sweta Mishra, Somitra Kumar Sanadhya. Generation of Secure and Reliable Honeywords, Preventing False Detection. IEEE Transactions on Dependable and Secure Computing, IEEE, DOI 10.1109/TDSC.2018.2824323.


  • Donghoon Chang, Arpan Jati, Sweta Mishra and Somitra Kumar Sanadhya. Cryptanalytic Time-Memory Tradeoff for Password Hashing Schemes. International Journal of Information Security, Springer Berlin Heidelberg


  • Chang, D., Chauhan, A. K., Kumar, S., & Sanadhya, S. K. (2018, April). Revocable Identity-Based Encryption from Codes with Rank Metric. In Cryptographers’ Track at the RSA Conference (pp. 435-451). Springer, Cham.


  • Donghoon Chang, Mohona Ghosh, Arpan Jati, Abhishek Kumar, Somitra Sanadhya. eSPF: A Family of Format-Preserving Encryption Algorithms using MDS Matrices. SPACE-17.


  • 2015-2016

    • Dr. Donghoon Chang, Dr. Somitra Sanadhya and Nishant Sharma: New HMAC Message Patches: Secret Patch and CrOw Patch. ICISS 2015, December 16 -20, 2015, Kolkata, India.


    • Akshima, Donghoon Chang, Mohona Ghosh, Aarushi Goel and Somitra Kumar Sanadhya: Improved Meet-in-the-Middle Attacks on 7 and 8-round ARIA-192 and ARIA-256. Indocrypt 2015, December 06 -10, 2015, Bangalore, India.


    • Nasour Bagheri, Navid Ghaedi Bardeh and Somitra Kumar Sanadhya: Differential Fault Analysis of SHA-3. Indocrypt 2015, December 06 -10, 2015, Bangalore, India.


    • Donghoon Chang, Somitra Kumar Sanadhya, Monika Singh and Robin Verma: A collision attack on sdHash similarity hashing. SADFE 2015, September 30 – October 2, 2015, Malaga, Spain.


    • Tarun Kumar Bansal, Donghoon Chang, Somitra Kumar Sanadhya: Sponge based CCA2 secure asymetric encryption for arbitrary length message. ACISP 2015, June 29-July 1, 2015, Brisbane, Australia. Preprint


    • Megha Agrawal, Donghoon Chang, Somitra Kumar Sanadhya: sp-ALEM: Sponge based authenticated encryption scheme for memory constrained devices. ACISP 2015, June 29-July 1, 2015, Brisbane, Australia. Preprint


    2014-2015

    • Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya: Time Memory Tradeoff Analysis of Graphs in Password Hashing Constructions. Passwords 2014, December 8-10, Trondheim, Norway.


    • Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya: Cryptographic module based approach for password hashing scheme. Passwords 2014, December 8-10, Trondheim, Norway.


    • Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya: Rig - A simple, secure and flexible design for Password Hashing. Inscrypt 2014, December 13-15, Beijing, China. Preprint (Accept. rate 29/93 = 31.1 %)


    • Megha Agrawal, Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya: Collision attack on 4-branch Type-2 GFN based hash functions using sliced biclique cryptanalysis technique. Inscrypt 2014, December 13-15, Beijing, China. Preprint (Accept. rate 29/93 = 31.1 %)


    • Andrey Bogdanov, Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya: Bicliques with Minimal Data and Time Complexity for AES. ICISC 2014, December 3-5, 2014, Seoul, Korea. Preprint. (Accept. rate 26/91 = 28.5 %)


    • Donghoon Chang, Arnab Kumar, Pawel Morawiecki, Somitra Kumar Sanadhya: 1st and 2nd Preimage Attacks on 7, 8 and 9 Rounds of SHA3-224,256,384,512. SHA-3 2014 Workshop organized by NIST, August 22, 2014, UCSB, Santa Barbara, USA (Co-located with Crypto 2014). Web-link


    • Abhishek Kumar, Somitra Kumar Sanadhya, Praveen Gauravaram, Nasour Bagheri, Javad Alizadeh, Mohammad Reza Aref, Hoda A. Alkhzaimi and Martin M. Lauridsen: Cryptanalysis of SIMON Variants with Connections. RFIDSec 2014, Oxford, UK, July 21-23, 2014. Web-link


    2013-2014

    • Donghoon Chang, Abhishek Kumar, Somitra Kumar Sanadhya: Security analysis of GFN: 8 round distinguisher for 4-branch type-2 GFN. Indocrypt 2013, Mumbai, December 7-10, 2013. Web-link (Accept. rate 21/76 = 27.6 %)


    • Madhuri Siddula, Somitra Kumar Sanadhya, Subramanyam Venkata: Cryptanalysis of a Digital Watermarking scheme based on Support Vector Regression. IEEE Systems, Man and Cybernetics, Manchester UK, October 13-16, 2013. Web-link


     

    Technical Reports:TOP



    • Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya: Biclique Cryptanalysis of AES based Hashing Modes. IIITD-TR--006. February, 2015. Weblink


    • Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya: Biclique Cryptanalysis of Full Round AES with Reduced Data Complexity. IIITD-TR-2013-001. March, 2013. Weblink


    • Ashish Kumar, Somitra Sanadhya, Praveen Gauravaram, Masoumeh Safkhani and Majid Naderi, "Cryptanalysis of Tav-128 Hash function",Indocrypt 2010, December 2010 Preprint (Accept. rate 22/72 = 30.5 %). An earlier version of this work is available as a technical report at IIITD-TR-2010-001 Preprint


     

    Thesis:TOP



    2017-18

    • Tarun Bansal (PhD thesis), Thesis title: "Designing Generic Asymmetric Key Cryptosystem with Message Paddings".


    • Sweta Mishra (PhD thesis), Thesis title: " Design and Analysis of Password-based Authentication Systems ".


    2015-16

    • Mohona Ghosh(PhD thesis), Thesis title: "Analysis of Block Cipher Constructions against Biclique and Multiset Attacks".


    2013-14

    • Akshay Gupta (B.Tech. thesis), Thesis title: " Studies on Keccak hash function".


    • Nishant Sharma (MTech thesis), Thesis title: "New HMAC message patches".


    • Sandipan Biswas (M.Tech. thesis), Thesis title: "Exploiting TLS to disrupt traffic privacy in web-applications".


    2012-13

    • R. Sumesh Manjunath (MTech thesis), Thesis title: "Provably secure authenticated encryption modes". Receipient of the best thesis award of the institute.


    • Nishant Sharma (MTech thesis), Thesis title: "New HMAC message patches".


    • Tarun Bansal (M.Tech. thesis), Thesis title: "Secure Design and Instantiation of Trapdoor-less Truncated Hash Functions".


    • Abhishek Kumar (M.Tech. thesis), Thesis title: " Security Analysis of General-Feistel Network".


    • Arpan Jati (M.Tech. thesis), Thesis title: "A Fast and Secure Peer to Peer File Sharing Protocol".


    2011-12

    • Gaurav Saluja (BTech thesis), Thesis title: "Development of a new mobile banking authentication scheme".


    • Pratyush Tripathi and Siddharth (Joint BTech thesis), Thesis title: "Java application to perform and analyze machine learning techniques on gene expression dataset to identify cancer".


    • Madhuri Siddula (MTech thesis), Thesis title: "Cryptanalysis of a digital watermarking scheme based on Support Vector Regression".