Follow
Shibam Ghosh
Shibam Ghosh
Inria Paris
Verified email at inria.fr - Homepage
Title
Cited by
Cited by
Year
The qarmav2 family of tweakable block ciphers
R Avanzi, S Banik, O Dunkelman, M Eichlseder, S Ghosh, M Nageler, ...
Cryptology ePrint Archive, 2023
30*2023
Automatic search for bit-based division property
S Ghosh, O Dunkelman
Progress in Cryptology–LATINCRYPT 2021: 7th International Conference on …, 2021
92021
Full Round Zero-sum Distinguishers on TinyJAMBU-128 and TinyJAMBU-192 Keyed-permutation in the Known-key setting
O Dunkelman, S Ghosh, E Lambooij
Progress in Cryptology–INDOCRYPT 2022: 23rd International Conference on …, 2023
72023
INT-RUP security of SAEB and tinyjambu
N Datta, A Dutta, S Ghosh
Progress in Cryptology–INDOCRYPT 2022: 23rd International Conference on …, 2023
62023
Practical related-key forgery attacks on full-round tinyjambu-192/256
O Dunkelman, S Ghosh, E Lambooij
IACR Transactions on Symmetric Cryptology 2023 (2), 176-188, 2023
42023
Partial sums meet FFT: Improved attack on 6-round AES
O Dunkelman, S Ghosh, N Keller, G Leurent, A Marmor, V Mollimard
Annual International Conference on the Theory and Applications of …, 2024
32024
Quantum Key Recovery Attacks on 4-Round Iterated Even-Mansour with Two Keys
R Anand, S Ghosh, T Isobe, R Shiba
International Conference on Information Security, 87-103, 2024
22024
Attacking the IETF/ISO Standard for Internal Re-keying CTR-ACPKM
O Dunkelman, S Ghosh, E Lambooij
IACR Transactions on Symmetric Cryptology, 41-66, 2023
22023
AutoDiVer: Automatically Verifying Differential Characteristics and Learning Key Conditions
M Nageler, S Ghosh, M Jüttler, M Eichlseder
Cryptology ePrint Archive, 2025
12025
A Note on ARADI and LLAMA
R Avanzi, O Dunkelman, S Ghosh
Cryptology ePrint Archive, 2024
12024
Divide and Rule: DiFA-Division Property Based Fault Attacks on PRESENT and GIFT
AK Kundu, S Ghosh, D Saha, M Rahman
Applied Cryptography and Network Security: 21st International Conference …, 2023
12023
On the QIC of quadratic APN functions
S Ghosh
Indian Statistical Institute, Kolkata, 2020
12020
Differential Cryptanalysis of the Reduced Pointer Authentication Code Function used in Arm’s FEAT_PACQARMA3 Feature
R Avanzi, O Dunkelman, S Ghosh
Cryptology ePrint Archive, 2025
2025
ChiLow and ChiChi: New Constructions for Code Encryption
Y Belkheyar, P Derbez, S Ghosh, G Leander, S Mella, L Perrin, ...
Cryptology ePrint Archive, 2025
2025
Simple vs. vectorial: exploiting structural symmetry to beat the ZeroSum distinguisher
S Suryawanshi, S Ghosh, D Saha, P Ram
Designs, Codes and Cryptography 93 (1), 133-174, 2025
2025
BIZness: Bit Invariant Zero-Sum Property Based on Division Trail
S Ghosh, AK Kundu, M Rahman, D Saha
International Conference on Cryptology in India, 134-155, 2024
2024
Simple vs. vectorial: exploiting structural symmetry to beat the ZeroSum distinguisher
S Suryawanshi, S Ghosh, D Saha, P Ram
Designs, Codes and Cryptography, 1-42, 2024
2024
Optimally Secure TBC Based Accordion Mode
N Datta, A Dutta, S Ghosh, H Nandi
Cryptology ePrint Archive, 2024
2024
ToFA: Towards Fault Analysis of GIFT and GIFT-like Ciphers Leveraging Truncated Impossible Differentials
AK Kundu, S Ghosh, A Aikata, D Saha
Cryptology ePrint Archive, 2024
2024
Some Experimental Results on Quadratic APN Functions
S Ghosh, L Perrin
The system can't perform the operation now. Try again later.
Articles 1–20