Research

[Author names are alphabetic]

2017

  1. Donghoon Chang, Abhishek Kumar, Somitra Kumar Sanadhya. Distinguishers for 4-branch and 8-branch Generalized Feistel Network. IEEE Access. (Accepted). IF 1.270.
  2. Tarun Bansal, Donghoon Chang, Somitra Kumar Sanadhya. Sponge based CCA2 secure asymmetric encryption for arbitrary length message. International Journal of Applied Cryptography. (Accepted)
  3. Megha Agrawal, Donghoon Chang, Somitra Kumar Sanadhya. A New Authenticated Encryption Technique for Handling Long Ciphertexts in Memory Constrained Devices. International Journal of Applied Cryptography. (Accepted)
  4. Nalla Anandakumar, Mohammad Hashmi, Somitra Kumar Sanadhya. Compact Implementation of FPGA-based PUFs with Enhanced Performance. VLSI Design 2017. January 7-11, 2017, Hyderabad, India.

2016
  1. Donghoon Chang, Mohona Ghosh, Kishan Chand Gupta, Arpan Jati, Abhishek Kumar, Dukjae Moon, Indranil Ghosh Ray, Somitra Kumar Sanadhya. SPF: A New Family of Efficient Format-Preserving Encryption Algorithms. Inscrypt 2016, November 4-6, 2016, Beijing, China.
  2. Donghoon Chang, Amit Kumar Chauhan, Naina Gupta, Arpan Jati and Somitra Kumar Sanadhya. Exploiting the Leakage: Analysis of some Authenticated Encryption schemes. SPACE 2016, December 14-18, 2016, Hyderabad, India.
  3. Megha Agrawal, Tarun Kumar Bansal, Donghoon Chang, Amit Kumar Chauhan, Seokhie Hong, Jinkeon Kang, Somitra Kumar Sanadhya. RCB: leakage-resilient authenticated encryption via re-keying. The Journal of Supercomputing, Springer. 2016. Online version: here.
  4. Monika Singh, Donghoon Chang, Somitra Kumar Sanadhya. Security Analysis of mvHash-B Similarity Hashing. Journal of Digital Forensics, Security and Law, Vol. 11 (2), 2016.


2015

  1. Donghoon Chang, Somitra Kumar Sanadhya, Nishant Sharma. New HMAC Message Patches: Secret Patch and CrOw Patch, ICISS 2015, December  16-20, 2015, Kolkata, India.
  2. Akshima, Donghoon Chang, Mohona Ghosh, Aarushi Goel, Somitra Kumar Sanadhya. Improved Meet-in-the-Middle Attacks on 7 and 8-round ARIA-192 and ARIA-256, Indocrypt 2015, December 6-10, 2015, Bangalore, India.
  3. Nasour Bagheri, Navid Ghaedi Bardeh, Somitra Kumar Sanadhya. Differential fault analysis of SHA-3, Indocrypt 2015, December 6-10, 2015, Bangalore, India.
  4. Akshima, Donghoon Chang, Mohona Ghosh, Aarushi Goel, Somitra Kumar Sanadhya. Single Key Recovery Attacks on 9-round Kalyna-128/256 and Kalyna-256/512. ICISC 2015, November 25-27, Seoul, Korea.
  5. Donghoon Chang, Sumesh Manjunath, Somitra Kumar Sanadhya. PPAE: Practical Parazoa Authenticated Encryption family, ProvSec 2015, November 24-26, Kanazawa, Japan.
  6. Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya. Biclique Cryptanalysis of full round AES-128 based hashing modes, Inscrypt 2015, November 1-3, 2015, Beijing, China.
  7. Donghoon Chang, Somitra Kumar Sanadhya, Monika Singh, Robin Verma. A collision attack on sdHash similarity hashing. SADFE 2015, September 30th – October 2nd, 2015, Málaga, Spain.
  8. Tarun Kumar Bansal, Donghoon Chang, Somitra Kumar Sanadhya. Sponge based CCA2 secure asymetric encryption for arbitrary length message. ACISP 2015, June 29- July 1, 2015, Brisbane, Australia. Preprint (Accept. rate 28/112 = 25 %)
  9. Megha Agrawal, Donghoon Chang, Somitra Kumar Sanadhya. sp-ALEM: Sponge based authenticated encryption scheme for memory constrained devices. ACISP 2015, June 29- July 1, 2015, Brisbane, Australia. Preprint (Accept. rate 28/112 = 25 %)



2014

  1. Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya. Time Memory Tradeoff Analysis of Graphs in Password Hashing Constructions. Passwords 2014, December 8-10, Trondheim, Norway.
  2. Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya. Cryptographic module based approach for password hashing schemes. Passwords 2014, December 8-10, Trondheim, Norway.
  3. Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya. Rig: A simple, secure and flexible design for Password Hashing. Inscrypt 2014, December 13-15, Beijing, China. Preprint (Accept. rate 29/93 = 31.1 %)
  4. Megha Agrawal, Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya. Collision attack on 4-branch Type-2 GFN based hash functions using sliced biclique cryptanalysis technique. Inscrypt 2014, December 13-15, Beijing, China. Preprint (Accept. rate 29/93 = 31.1 %)
  5. Andrey Bogdanov, Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya. Bicliques with Minimal Data and Time Complexity for AES. ICISC 2014, December 3-5, 2014, Seoul, Korea. Preprint. (Accept. rate 26/91 = 28.5 %)
  6. Donghoon Chang, Arnab Kumar, Pawel Morawiecki, Somitra Kumar Sanadhya. 1st and 2nd Preimage Attacks on 7, 8 and 9 Rounds of SHA3-224,256,384,512. SHA-3 2014 Workshop organized by NIST, August 22, 2014, UCSB, Santa Barbara, USA (Co-located with Crypto 2014). Web-link
  7. Abhishek Kumar, Somitra Kumar Sanadhya, Praveen Gauravaram, Nasour Bagheri, Javad Alizadeh, Mohammad Reza Aref, Hoda A. Alkhzaimi and Martin M. Lauridsen. Cryptanalysis of SIMON Variants with Connections, RFIDSec 2014, Oxford, UK, July 21-23, 2014Web-link (Accept. Rate 13/27= 48%)


    2013

    1. Donghoon Chang, Abhishek Kumar, Somitra Kumar Sanadhya, "Security analysis of GFN: 8 round distinguisher for 4-branch type-2 GFN", Indocrypt 2013, Mumbai, December 7-10, 2013. Web-link (Accept. rate 21/76 = 27.6 %)
    2. Madhuri Siddula, Somitra Kumar Sanadhya, Subramanyam Venkata, "Cryptanalysis of a Digital Watermarking scheme based on Support Vector Regression" , IEEE Systems, Man and Cybernetics, Manchester UK, October 13-16, 2013. Web-link
    3. Nasour Bagheri, Praveen Gauravaram, Masoumeh Safkhani, and Somitra Kumar Sanadhya , "Desynchronization and Traceability Attacks on RIPTA-DA Protocol" , RFIDSec 2013, Graz, Austria, July 9-11, 2013. Web-link (Accept. rate 11/23 = 47.8 %)
    4. Seyed Farhad Aghili, Nasour Bagheri, Praveen Gauravaram, Masoumeh Safkhani, and Somitra Kumar Sanadhya,"On the Security of two RFID Mutual Authentication Protocols" , RFIDSec 2013, Graz, Austria , July 9-11, 2013. Web-link (Accept. rate 11/23 = 47.8 %)


    2012

    1. Andrey BogdanovSomitra Kumar Sanadhya (Eds.): Security, Privacy, and Applied Cryptography Engineering - Second International Conference, SPACE 2012, Chennai, India, November 3-4, 2012. Proceedings. Lecture Notes in Computer Science 7644, Springer 2012. Web-Link

    2011

    1. Masoume Safkhani, Nasour Bagheri, Majid Naderi, Somitra Sanadhya, "Security Analysis of LMAP++, an RFID Authentication Protocol", RISC 2011, December 2011 Preprint
    2. Nasour Bagheri, Masoumeh Safkhani, Somitra Sanadhya, Majid Naderi, Hamid Behnam, "On the Security of Mutual Authentication Protocols for RFID Systems: The Case of Wei et al.'s Protocol" DPM 2011, September 2011 Preprint

    2010

    1. Ashish Kumar, Somitra Sanadhya, Praveen Gauravaram, Masoumeh Safkhani and Majid Naderi, "Cryptanalysis of Tav-128 Hash function",Indocrypt 2010, December 2010 Preprint  (Accept. rate 22/72 = 30.5 %)
      An earlier version of this work is available as a technical report at IIITD-TR-2010-001 Preprint

    2009

    1. Somitra Sanadhya and Palash Sarkar, "A New Hash Family Obtained by Modifying the SHA-2 Family", ASIACCS 2009, March 2009. Preprint (Accept. rate 33/147 = 22.4 %)
    2. Somitra Sanadhya and Palash Sarkar, "A Combinatorial Analysis of Recent Attacks on Step Reduced SHA-2 Family", Cryptography and Communications- Discrete Structures, Boolean Functions and Sequences, Vol 1, No. 2, pp 135-173, 2009. Preprint Impact Factor(2015)=0.828

    2008

    1. Somitra Sanadhya and Palash Sarkar, "New Collision attacks Against Up To 24-step SHA-2", Indocrypt 2008, December 2008. Preprint  (Accept. rate 33/111 = 29.7 %)
    2. Somitra Sanadhya and Palash Sarkar, "Deterministic Constructions of 21-Step Collisions for the SHA-2 Hash Family", "Information Security Conference 2008" ISC 2008, September 2008, Taipei, Taiwan. (Accept. rate 33/134 = 20.4 %)
      This paper received one of the best student paper awards at the conference. 
    3. Somitra Sanadhya and Palash Sarkar, "Searching for Low Weight Codewords in Linear Binary Codes", "8th Central European Conference on Cryptography" CECC 2008, July 2008, Graz, Austia. Preprint 
    4. Somitra Sanadhya and Palash Sarkar, "Non-Linear Reduced Round Attacks Against SHA-2 Hash family", "The 13th Australasian Conference on Information Security and Privacy" ACISP 2008 , July 2008, Wollongong, Australia. Preprint (Accept. rate 33/111 = 24.6 %)
    5. Somitra Sanadhya and Palash Sarkar, "Attacking Reduced Round SHA-256", "International Conference on Applied Cryptography and Network Security" ACNS 2008, June 2008, New York, US. Preprint (Accept. rate 30/131 = 22.9 %)
    6. N. R. Pal, Animesh Sharma and Somitra Sanadhya, "Deriving meaningful rules from gene expression data for classification". Journal of Intelligent & Fuzzy Systems, Vol. 19, No. 3, pp 171–180, 2008

    2007

    1. Somitra Sanadhya and Palash Sarkar, "New local collisions in the SHA-2 hash family", International Conference on Information Security and Cryptography ICISC '07, Nov 2007, Seoul, Korea. Preprint (Accept. rate 26/127 = 20.4 %)
    2. Somitra Sanadhya and Palash Sarkar, "On the security of MD4", Technical Report ASD/2007/3, Applied Statistics Unit, ISI Kolkata, 2007 Preprint
    3. NR Pal, Somitra Sanadhya and Animesh Sharma "Computation of consensus hydrophobicity scales with self-organizing maps and fuzzy clustering along with applications to protein fold prediction", Neural, Parallel, and Scientific Computations, 15, 75-90, 2007 Preprint
      Impact Factor(2015)=1.812

    2006

    1. NR Pal, Animesh Sharma, Somitra Sanadhya and Karmeshu, "On identifying marker genes from gene expression data in a neural framework through online feature analysis", International Journal of Intelligent Systems, 21(4), 453-467, 2006 Preprint Impact Factor(2015)=1.886
    2. Prabir Bhattacharyya and Somitra Sanadhya, "Support Vector Regression based tool wear assessment in face milling", IEEE International Conference on Industrial Technology (ICIT) 2006 Preprint
    3. A Krishnamachari, T Srinivas, Somitra K Sanadhya and S Balasundaram, "Perceptron Decision Tree Model for E. coli Promoters", Proceedings of International Conference on Bioinformatics InCoB 2006, New Delhi.

    Book Chapter

    • S. Balasundaram and Somitra Sanadhya, “Computer Applications”, Chapter 7 in Textbook of Biotechnology, 3rd Edition, (ed) H.K. Das, Wiley India, 2007, ISBN : 81-265-1014-5.