- Cryptographic Implementations and Security
- Chaos-based Image/Signal Encryption
- Coding theory and cryptography
- Physical Unclonable Functions (PUFs) and Hardware Security
- Cryptography and Data Security
- Advanced Neural Network Applications
- Video Surveillance and Tracking Methods
- Autonomous Vehicle Technology and Safety
- DNA and Biological Computing
- Privacy-Preserving Technologies in Data
- Cloud Data Security Solutions
- Advanced Authentication Protocols Security
- Advanced Malware Detection Techniques
- Digital Rights Management and Security
- Internet Traffic Analysis and Secure E-voting
National Institute of Standards
2021-2024
National Institute of Standards and Technology
2021-2024
Information Technology Laboratory
2021
Indraprastha Institute of Information Technology Delhi
2016-2020
Indian Institute of Technology Delhi
2020
Korea University
2009-2019
Autonomous driving is becoming one of the leading industrial research areas. Therefore many automobile companies are coming up with semi to fully autonomous solutions. Among these solutions, lane detection vital driver-assist features that play a crucial role in decision-making process vehicle. A variety solutions have been proposed detect lanes on road, which ranges from using hand-crafted state-of-the-art end-to-end trainable deep learning architectures. Most architectures trained traffic...
Ascon family is one of the finalists National Institute Standards and Technology (NIST) lightweight cryptography standardization process. The includes three Authenticated Encryption with Associated Data (AEAD) schemes: Ascon-128 (primary), Ascon-128a, Ascon-80pq. In this paper, we study resistance against conditional cube attacks in nonce-misuse setting, present new state- key-recovery attacks. Our recover full state secret key Ascon-128a when reduced to 7 out 8 rounds Ascon-permutation for...
MD-64 is a 64-bit block cipher with 128-bit secret key and based on data-dependent operations for the fast hardware performance. suitable to applications in resource constrained environments such as wireless sensor networks. In this paper, we propose related-key amplified boomerang attack full-round MD-64. Our requires 2 <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">95</sup> encryptions xmlns:xlink="http://www.w3.org/1999/xlink">43.1</sup>...
At AES’00, a collision attack on 7-round reduced AES was proposed. In this paper, we apply idea to seven SPN block ciphers, AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis. Applying our attacks improve the result based meet-in-the-middle (AES-192) proposed in AES’00 (AES-256), respectively. Our Anubis is superior known cryptanalytic it. cases of Crypton-192/256 are applicable 8-round versions. The results mCrypton-96/128 more practical than them.
64-비트 블록 암호 KT-64는 CSPNs (Controlled Substitution-Permutation Networks)를 사용하여 FPGA와 같은 하드웨어 구현에 적합하도록 설계된 암호이다. 본 논문에서는 KT-64의 전체 라운드에 대한 확장된 연관키 부메랑 공격을 제안한다. 논문에서 소개하는 공격은 KT-64에 최초의 공격이며, <TEX>$2^{45.5}$</TEX>개의 선택 평문을 이용하여 <TEX>$2^{65.17}$</TEX>의 KT-64 암호화 연산을 수행하여 비밀키를 복구한다. is a 64-bit block cipher which use suitable for the efficient FPGA implementation. In this paper, we propose related-key amplified boomerang attack on full-round KT-64. The requires <TEX>$2^{45.5}$</TEX> chosen...
A technique of authenticated encryption for memory constrained devices called sp-AELM was proposed by Agrawal et al. at ACISP 2015. The sp-ALEM construction utilizes a sponge-based primitive to support online and decryption functionalities. Online in the is achieved standard manner processing plaintext blocks as they arrive produce ciphertext blocks. However, storing only one intermediate state releasing it user upon correct verification. This allows legitimate generate herself. scheme...
Autonomous driving is becoming one of the leading industrial research areas. Therefore many automobile companies are coming up with semi to fully autonomous solutions. Among these solutions, lane detection vital driver-assist features that play a crucial role in decision-making process vehicle. A variety solutions have been proposed detect lanes on road, which ranges from using hand-crafted state-of-the-art end-to-end trainable deep learning architectures. Most architectures trained traffic...
In Conference on Cryptographic Hardware and Embedded System 2017, Bernstein et al. proposed GIMLI, a 384-bit permutation with 24 rounds, which aims to provide high performance various platforms. 2019, the full-round (24 rounds) GIMLI was used as an underlying primitive for building AEAD GIMLI-CIPHER hash function GIMLI-HASH, were submitted NIST Lightweight Cryptography Standardisation process selected one of second-round candidates. Transactions Symmetric Cryptology 2021, Liu presented...