Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Mohona Ghosh is active.

Publication


Featured researches published by Mohona Ghosh.


international conference on progress in cryptology | 2015

Improved Meet-in-the-Middle Attacks on 7 and 8-Round ARIA-192 and ARIA-256

Akshima; Donghoon Chang; Mohona Ghosh; Aarushi Goel; Somitra Kumar Sanadhya

The ARIA block cipher has been established as a Korean encryption standard by Korean government since 2004. In this work, we re-evaluate the security bound of reduced round ARIA-192 and ARIA-256 against meet-in-the-middle MITM key recovery attacks in the single key model. We present a new 4-round distinguisher to demonstrate the best 7 & 8 round MITM attacks on ARIA-192/256. Our 7-round attack on ARIA-192 has data, time and memory complexity of


international conference on information security and cryptology | 2014

Bicliques with Minimal Data and Time Complexity for AES

Andrey Bogdanov; Donghoon Chang; Mohona Ghosh; Somitra Kumar Sanadhya


human computer interaction with mobile devices and services | 2013

The paper slip should be there!: perceptions of transaction receipts in branchless banking

Saurabh Panjwani; Mohona Ghosh; Ponnurangam Kumaraguru; Soumya Vardhan Singh

2^{113}


IACR Cryptology ePrint Archive | 2017

Security Analysis of SKINNY under Related-Tweakey Settings

Guozhen Liu; Mohona Ghosh; Ling Song


international conference on information security and cryptology | 2016

SPF: A New Family of Efficient Format-Preserving Encryption Algorithms

Donghoon Chang; Mohona Ghosh; Kishan Chand Gupta; Arpan Jati; Abhishek Kumar; Dukjae Moon; Indranil Ghosh Ray; Somitra Kumar Sanadhya

,


Space | 2017

eSPF : A Family of Format-Preserving Encryption Algorithms Using MDS Matrices

Donghoon Chang; Mohona Ghosh; Arpan Jati; Abhishek Kumar; Somitra Kumar Sanadhya


international conference on information security and cryptology | 2015

Single Key Recovery Attacks on 9-Round Kalyna-128/256 and Kalyna-256/512

Akshima; Donghoon Chang; Mohona Ghosh; Aarushi Goel; Somitra Kumar Sanadhya

2^{135.1}


international conference on information security and cryptology | 2014

Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis Technique

Megha Agrawal; Donghoon Chang; Mohona Ghosh; Somitra Kumar Sanadhya


Archive | 2013

Biclique cryptanalysis of full round AES with reduced data complexity

Donghoon Chang; Mohona Ghosh; Somitra Kumar Sanadhya

and


IACR Cryptology ePrint Archive | 2014

Bicliques with Minimal Data and Time Complexity for AES (Extended Version

Andrey Bogdanov; Donghoon Chang; Mohona Ghosh; Somitra Kumar Sanadhya

Collaboration


Dive into the Mohona Ghosh's collaboration.

Top Co-Authors

Avatar

Donghoon Chang

Indraprastha Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Somitra Kumar Sanadhya

Indraprastha Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Aarushi Goel

Indraprastha Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Akshima

Indraprastha Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Andrey Bogdanov

Technical University of Denmark

View shared research outputs
Top Co-Authors

Avatar

Abhishek Kumar

Indraprastha Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Arpan Jati

Indraprastha Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Ponnurangam Kumaraguru

Indraprastha Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Soumya Vardhan Singh

Indraprastha Institute of Information Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge