Card image cap

Awards/Recognition


  • Young Scientist in Cryptography 2019 (Venus International Research Awards)
  • Adjuct Faculty - Bharti School Of Telecom Technology And Management - IIT Delhi
  • Best PhD Thesis Award (Runners Up) 2018 (CICT PhD Symposium)
  • Gold Medalist - CSE 2006 (NIT Agartala)


Areas of Interest


  • Cryptography, Theoretical Cryptanalysis, Hash functions, Authenticated / Block Ciphers, Fault Analysis Attacks, Higher Order Boolean Derivatives, Memory Hard Functions, Proof-of-Work

Qualification


  • BE (CSE - Gold Medalist) - NIT Agartala
  • MS (CSE) - IIT Kharagpur
  • PhD (CSE) - IIT Kharagpur

Teaching


2019 Monsoon
  • CS553 Cryptography (Piazza Link)
  • CS100 Software Tools and Techniques Lab II
2019 Winter
  • CS250 Operating Systems
  • CS100 Software Tools and Techniques Lab I
2018 Monsoon
  • CS553 Cryptography (Piazza Link)
  • CS100 Software Tools and Techniques Lab I

Publications


  • Sourya Kakarla, Srinath Mandava, Dhiman Saha, and Dipanwita Roy Chowdhury. On the practical implementation of impossible differential cryptanalysis on reduced-round AES. In Lynn Batten, Dong Seong Kim, Xuyun Zhang, and Gang Li, editors, Applications and Techniques in Information Security - 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings, volume 719 of Communications in Computer and Information Science, pages 58--72. Springer, 2017.
    [ DOI | http ]
  • Dhiman Saha, Sukhendu Kuila, and Dipanwita Roy Chowdhury. Symsum: Symmetric-sum distinguishers against round reduced SHA3. IACR Cryptology ePrint Archive, 2017:165, 2017.
    [ http ]
  • Dhiman Saha and Dipanwita Roy Chowdhury. Encounter: On breaking the nonce barrier in differential fault analysis with a case-study on PAEQ. In Benedikt Gierlichs and Axel Y. Poschmann, editors, Cryptographic Hardware and Embedded Systems - CHES 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings, volume 9813 of Lecture Notes in Computer Science, pages 581--601. Springer, 2016.
    [ DOI | http ]
  • Dhiman Saha and Dipanwita Roy Chowdhury. Encounter: On breaking the nonce barrier in differential fault analysis with a case-study on PAEQ. In Benedikt Gierlichs and Axel Y. Poschmann, editors, Cryptographic Hardware and Embedded Systems - CHES 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings, volume 9813 of Lecture Notes in Computer Science, pages 581--601. Springer, 2016.
    [ DOI | http ]
  • Christina Boura, Avik Chakraborti, Gaëtan Leurent, Goutam Paul, Dhiman Saha, Hadi Soleimany, and Valentin Suder. Key recovery attack against 2.5-round pi -cipher. In Thomas Peyrin, editor, Fast Software Encryption - 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers, volume 9783 of Lecture Notes in Computer Science, pages 535--553. Springer, 2016.
    [ DOI | http ]
  • Dhiman Saha, Sourya Kakarla, Srinath Mandava, and Dipanwita Roy Chowdhury. Gain: Practical key-recovery attacks on round-reduced PAEQ. In Claude Carlet, M. Anwar Hasan, and Vishal Saraswat, editors, Security, Privacy, and Applied Cryptography Engineering - 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings, volume 10076 of Lecture Notes in Computer Science, pages 194--210. Springer, 2016.
    [ DOI | http ]
  • Christina Boura, Avik Chakraborti, Gaëtan Leurent, Goutam Paul, Dhiman Saha, Hadi Soleimany, and Valentin Suder. Key recovery attack against 2.5-round pi-cipher. IACR Cryptology ePrint Archive, 2016:502, 2016.
    [ http ]
  • Dhiman Saha and Dipanwita Roy Chowdhury. Encounter: On breaking the nonce barrier in differential fault analysis with a case-study on PAEQ. IACR Cryptology ePrint Archive, 2016:623, 2016.
    [ http ]
  • Shamit Ghosh, Dhiman Saha, Abhrajit Sengupta, and Dipanwita Roy Chowdhury. Preventing fault attacks using fault randomization with a case study on AES. In Ernest Foo and Douglas Stebila, editors, Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings, volume 9144 of Lecture Notes in Computer Science, pages 343--355. Springer, 2015.
    [ DOI | http ]
  • Dhiman Saha and Dipanwita Roy Chowdhury. Diagonal fault analysis of grstl in dedicated MAC mode. In IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2015, Washington, DC, USA, 5-7 May, 2015, pages 100--105. IEEE Computer Society, 2015.
    [ DOI | http ]
  • Dhiman Saha and Dipanwita Roy Chowdhury. Scope: On the side channel vulnerability of releasing unverified plaintexts. In Orr Dunkelman and Liam Keliher, editors, Selected Areas in Cryptography - SAC 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers, volume 9566 of Lecture Notes in Computer Science, pages 417--438. Springer, 2015.
    [ DOI | http ]
  • Shamit Ghosh, Abhrajit Sengupta, Dhiman Saha, and Dipanwita Roy Chowdhury. A scalable method for constructing non-linear cellular automata with period 2 n - 1. In Jaroslaw Was, Georgios Ch. Sirakoulis, and Stefania Bandini, editors, Cellular Automata - 11th International Conference on Cellular Automata for Research and Industry, ACRI 2014, Krakow, Poland, September 22-25, 2014. Proceedings, volume 8751 of Lecture Notes in Computer Science, pages 65--74. Springer, 2014.
    [ DOI | http ]
  • Sukhendu Kuila, Dhiman Saha, Madhumangal Pal, and Dipanwita Roy Chowdhury. Practical distinguishers against 6-round keccak-f exploiting self-symmetry. In David Pointcheval and Damien Vergnaud, editors, Progress in Cryptology - AFRICACRYPT 2014 - 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings, volume 8469 of Lecture Notes in Computer Science, pages 88--108. Springer, 2014.
    [ DOI | http ]
  • Dhiman Saha, Sukhendu Kuila, and Dipanwita Roy Chowdhury. Escape: Diagonal fault analysis of APE. In Willi Meier and Debdeep Mukhopadhyay, editors, Progress in Cryptology - INDOCRYPT 2014 - 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings, volume 8885 of Lecture Notes in Computer Science, pages 197--216. Springer, 2014.
    [ DOI | http ]
  • Sukhendu Kuila, Dhiman Saha, Madhumangal Pal, and Dipanwita Roy Chowdhury. CASH: cellular automata based parameterized hash. In Rajat Subhra Chakraborty, Vashek Matyas, and Patrick Schaumont, editors, Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings, volume 8804 of Lecture Notes in Computer Science, pages 59--75. Springer, 2014.
    [ DOI | http ]
  • Abhrajit Sengupta, Dhiman Saha, Shamit Ghosh, Deval Mehta, and Dipanwita Roy Chowdhury. AEC: A practical scheme for authentication with error correction. In Rajat Subhra Chakraborty, Vashek Matyas, and Patrick Schaumont, editors, Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings, volume 8804 of Lecture Notes in Computer Science, pages 155--170. Springer, 2014.
    [ DOI | http ]
  • Dhiman Saha, Debdeep Mukhopadhyay, and Dipanwita Roy Chowdhury. PKDPA: an enhanced probabilistic differential power attack methodology. In Daniel J. Bernstein and Sanjit Chatterjee, editors, Progress in Cryptology - INDOCRYPT 2011 - 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings, volume 7107 of Lecture Notes in Computer Science, pages 3--21. Springer, 2011.
    [ DOI | http ]
  • Dhiman Saha, Debdeep Mukhopadhyay, and Dipanwita Roy Chowdhury. A diagonal fault attack on the advanced encryption standard. IACR Cryptology ePrint Archive, 2009:581, 2009.
    [ http ]
  • Mukesh Agrawal, Sandip Karmakar, Dhiman Saha, and Debdeep Mukhopadhyay. Scan based side channel attacks on stream ciphers and their counter-measures. In Dipanwita Roy Chowdhury, Vincent Rijmen, and Abhijit Das, editors, Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings, volume 5365 of Lecture Notes in Computer Science, pages 226--238. Springer, 2008.
    [ DOI | http ]
  • Debojyoti Bhattacharya, Debdeep Mukhopadhyay, Dhiman Saha, and Dipanwita Roy Chowdhury. Strengthening NLS against crossword puzzle attack. In Josef Pieprzyk, Hossein Ghodosi, and Ed Dawson, editors, Information Security and Privacy, 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings, volume 4586 of Lecture Notes in Computer Science, pages 29--44. Springer, 2007.
    [ DOI | http ]

Message From Director

IIT Bhilai is striving for research-driven undergraduate and postgraduate education. Our objective is to create an education system with multifacet outcomes including research, entrepreneurship, technical leadership, and above all, responsible citizenship. Read More

Newsletter

Subscribe to our Newsletter and stay tuned.