Personal information

No personal information available

Activities

Works (6)

SUPI-Rear: Privacy-Preserving Subscription Permanent Identification Strategy in 5G-AKA

2025 | Book chapter
Contributors: K. Sowjanya; Pabitra Pal; Aman Verma; Bijoy Das; Dhiman Saha; Anand M. Baswade; Brejesh Lall
Source: check_circle
Crossref

A Survey on Fault Attacks on Symmetric Key Cryptosystems

ACM Computing Surveys
2023-04-30 | Journal article
Contributors: Anubhab Baksi; Shivam Bhasin; Jakub Breier; Dirmanto Jap; Dhiman Saha
Source: check_circle
Crossref

Fault analysis of the PRINCE family of lightweight ciphers

Journal of Cryptographic Engineering
2022-11 | Journal article
Contributors: Anup Kumar Kundu; Aikata; Banashri Karmakar; Dhiman Saha
Source: check_circle
Crossref

D inamite : internal differential match‐in‐the‐end attack on eight‐round PAEQ

IET Information Security
2019-07 | Journal article
Contributors: Dhiman Saha; Sourya Kakarla; Dipanwita Roy Chowdhury
Source: check_circle
Crossref

Internal differential fault analysis of parallelizable ciphers in the counter-mode

Journal of Cryptographic Engineering
2019-04-29 | Journal article
Contributors: Dhiman Saha; Dipanwita Roy Chowdhury
Source: check_circle
Crossref

Gain: Practical Key-Recovery Attacks on Round-Reduced PAEQ

Journal of Hardware and Systems Security
2017-09-01 | Journal article
Contributors: Dhiman Saha; Sourya Kakarla; Srinath Mandava; Dipanwita Roy Chowdhury
Source: check_circle
Crossref