default search action
Raghvendra Rohit 0001
Person information
- affiliation: University of Rennes, France
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Raghvendra Rohit, Sumanta Sarkar:
Reconstructing S-Boxes from Cryptographic Tables with Milp. IACR Trans. Symmetric Cryptol. 2024(3): 200-237 (2024) - [j10]Hao Lei, Raghvendra Rohit, Guoxiao Liu, Jiahui He, Mohamed Rachidi, Keting Jia, Kai Hu, Meiqin Wang:
Symmetric Twin Column Parity Mixers and Their Applications. IACR Trans. Symmetric Cryptol. 2024(4): 1-37 (2024) - [c9]Emanuele Bellini, Mattia Formenti, David Gérault, Juan Grados, Anna Hambitzer, Yun Ju Huang, Paul Huynh, Mohamed Rachidi, Raghvendra Rohit, Sharwan K. Tiwari:
CLAASPing ARADI: Automated Analysis of the ARADI Block Cipher. INDOCRYPT (2) 2024: 90-113 - [i13]Emanuele Bellini, Mattia Formenti, David Gérault, Juan Grados, Anna Hambitzer, Yun Ju Huang, Paul Huynh, Mohamed Rachidi, Raghvendra Rohit, Sharwan K. Tiwari:
CLAASPing ARADI: Automated Analysis of the ARADI Block Cipher. IACR Cryptol. ePrint Arch. 2024: 1324 (2024) - [i12]Emanuele Bellini, Mohamed Rachidi, Raghvendra Rohit, Sharwan K. Tiwari:
Mind the Composition of Toffoli Gates: Structural Algebraic Distinguishers of ARADI. IACR Cryptol. ePrint Arch. 2024: 1559 (2024) - [i11]Hao Lei, Raghvendra Rohit, Guoxiao Liu, Jiahui He, Mohamed Rachidi, Keting Jia, Kai Hu, Meiqin Wang:
Symmetric Twin Column Parity Mixers and their Applications. IACR Cryptol. ePrint Arch. 2024: 1867 (2024) - 2023
- [c8]Solane El Hirch, Joan Daemen, Raghvendra Rohit, Rusydi H. Makarim:
Twin Column Parity Mixers and Gaston - A New Mixing Layer and Permutation. CRYPTO (3) 2023: 475-506 - [i10]Solane El Hirch, Joan Daemen, Raghvendra Rohit, Rusydi H. Makarim:
Twin Column Parity Mixers and Gaston - A New Mixing Layer and Permutation. IACR Cryptol. ePrint Arch. 2023: 799 (2023) - 2022
- [j9]Rusydi H. Makarim, Raghvendra Rohit:
Towards Tight Differential Bounds of Ascon A Hybrid Usage of SMT and MILP. IACR Trans. Symmetric Cryptol. 2022(3): 303-340 (2022) - [c7]Raghvendra Rohit, Santanu Sarkar:
Cryptanalysis of Reduced Round SPEEDY. AFRICACRYPT 2022: 133-149 - [c6]Najwa Aaraj, Emanuele Bellini, Ravindra Jejurikar, Marc Manzano, Raghvendra Rohit, Eugenio Salazar:
Farasha: A Provable Permutation-Based Parallelizable PRF. SAC 2022: 437-458 - [i9]Raghvendra Rohit, Santanu Sarkar:
Cryptanalysis of Reduced Round SPEEDY. IACR Cryptol. ePrint Arch. 2022: 612 (2022) - [i8]Najwa Aaraj, Emanuele Bellini, Ravindra Jejurikar, Marc Manzano, Raghvendra Rohit, Eugenio Salazar:
Farasha: A Provable Permutation-based Parallelizable PRF. IACR Cryptol. ePrint Arch. 2022: 1150 (2022) - 2021
- [j8]Raghvendra Rohit, Kai Hu, Sumanta Sarkar, Siwei Sun:
Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon. IACR Trans. Symmetric Cryptol. 2021(1): 130-155 (2021) - [j7]Raghvendra Rohit, Santanu Sarkar:
Diving Deep into the Weak Keys of Round Reduced Ascon. IACR Trans. Symmetric Cryptol. 2021(4): 74-99 (2021) - [i7]Raghvendra Rohit, Kai Hu, Sumanta Sarkar, Siwei Sun:
Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon. IACR Cryptol. ePrint Arch. 2021: 194 (2021) - [i6]Raghvendra Rohit, Santanu Sarkar:
Diving Deep into the Weak Keys of Round Reduced Ascon. IACR Cryptol. ePrint Arch. 2021: 1556 (2021) - 2020
- [b1]Raghvendra Rohit:
Design and Cryptanalysis of Lightweight Symmetric Key Primitives. University of Waterloo, Ontario, Canada, 2020 - [j6]Riham AlTawy, Guang Gong, Kalikinkar Mandal, Raghvendra Rohit:
WAGE: An Authenticated Encryption with a Twist. IACR Trans. Symmetric Cryptol. 2020(S1): 132-159 (2020) - [c5]Yunsi Fei, Guang Gong, Cheng Gongye, Kalikinkar Mandal, Raghvendra Rohit, Tianhong Xu, Yunjie Yi, Nusa Zidaric:
Correlation Power Analysis and Higher-Order Masking Implementation of WAGE. SAC 2020: 593-614 - [i5]Riham AlTawy, Guang Gong, Kalikinkar Mandal, Raghvendra Rohit:
WAGE: An Authenticated Encryption with a Twist. IACR Cryptol. ePrint Arch. 2020: 435 (2020) - [i4]Yunsi Fei, Guang Gong, Cheng Gongye, Kalikinkar Mandal, Raghvendra Rohit, Tianhong Xu, Yunjie Yi, Nusa Zidaric:
Correlation Power Analysis and Higher-order Masking Implementation of WAGE. IACR Cryptol. ePrint Arch. 2020: 1202 (2020)
2010 – 2019
- 2019
- [c4]Guang Gong, Morgan He, Raghvendra Rohit, Yunjie Yi:
U-EPS: An Ultra-small and Efficient Post-quantum Signature Scheme. FPS 2019: 261-272 - [i3]Raghvendra Rohit, Guang Gong:
Practical Forgery Attacks on Limdolen and HERN. IACR Cryptol. ePrint Arch. 2019: 907 (2019) - 2018
- [j5]Prakash Dey, Raghvendra Singh Rohit, Avishek Adhikari:
Single key MITM attack and biclique cryptanalysis of full round Khudra. J. Inf. Secur. Appl. 41: 117-123 (2018) - [j4]Riham AlTawy, Raghvendra Rohit, Morgan He, Kalikinkar Mandal, Gangqiang Yang, Guang Gong:
Towards a Cryptographic Minimal Design: The sLiSCP Family of Permutations. IEEE Trans. Computers 67(9): 1341-1358 (2018) - [j3]Riham AlTawy, Raghvendra Rohit, Morgan He, Kalikinkar Mandal, Gangqiang Yang, Guang Gong:
SLISCP-light: Towards Hardware Optimized Sponge-specific Cryptographic Permutations. ACM Trans. Embed. Comput. Syst. 17(4): 81:1-81:26 (2018) - [i2]Raghvendra Rohit, Guang Gong:
Correlated Sequence Attack on Reduced-Round Simon-32/64 and Simeck-32/64. IACR Cryptol. ePrint Arch. 2018: 699 (2018) - 2017
- [c3]Raghvendra Rohit, Riham AlTawy, Guang Gong:
MILP-Based Cube Attack on the Reduced-Round WG-5 Lightweight Stream Cipher. IMACC 2017: 333-351 - [c2]Riham AlTawy, Raghvendra Rohit, Morgan He, Kalikinkar Mandal, Gangqiang Yang, Guang Gong:
sLiSCP: Simeck-Based Permutations for Lightweight Sponge Cryptographic Primitives. SAC 2017: 129-150 - [i1]Riham AlTawy, Raghvendra Rohit, Morgan He, Kalikinkar Mandal, Gangqiang Yang, Guang Gong:
sLiSCP: Simeck-based Permutations for Lightweight Sponge Cryptographic Primitives. IACR Cryptol. ePrint Arch. 2017: 747 (2017) - 2016
- [j2]Sabyasachi Dutta, Raghvendra Singh Rohit, Avishek Adhikari:
Constructions and analysis of some efficient t - (k, n)∗-visual cryptographic schemes using linear algebraic techniques. Des. Codes Cryptogr. 80(1): 165-196 (2016) - [j1]Prakash Dey, Raghvendra Singh Rohit, Avishek Adhikari:
Full key recovery of ACORN with a single fault. J. Inf. Secur. Appl. 29: 57-64 (2016) - [c1]Prakash Dey, Raghvendra Singh Rohit, Santanu Sarkar, Avishek Adhikari:
Differential Fault Analysis on Tiaoxin and AEGIS Family of Ciphers. SSCC 2016: 74-86
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:00 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint