Follow
Megha Agrawal
Megha Agrawal
Verified email at iiitd.ac.in
Title
Cited by
Cited by
Year
A survey on lightweight authenticated encryption and challenges for securing industrial IoT
M Agrawal, J Zhou, D Chang
Security and privacy trends in the industrial internet of things, 71-94, 2019
372019
CAN-FD-Sec: improving security of CAN-FD protocol
M Agrawal, T Huang, J Zhou, D Chang
Security and Safety Interplay of Intelligent Software Systems: ESORICS 2018 …, 2019
172019
sp-AELM: Sponge based authenticated encryption scheme for memory constrained devices
M Agrawal, D Chang, S Sanadhya
Information Security and Privacy: 20th Australasian Conference, ACISP 2015 …, 2015
132015
RCB: leakage-resilient authenticated encryption via re-keying
M Agrawal, TK Bansal, D Chang, AK Chauhan, S Hong, J Kang, ...
The Journal of Supercomputing 74, 4173-4198, 2018
102018
A new authenticated encryption technique for handling long ciphertexts in memory constrained devices
M Agrawal, D Chang, SK Sanadhya
International Journal of Applied Cryptography 3 (3), 236-261, 2017
102017
Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis Technique
SS Megha Agrawal, Donghoon Chang
Inscrypt-2014 8957 (Lecture Notes in Computer Science), 343--360, 2014
3*2014
Authenticated encryption for memory constrained devices
M Agrawal, D Chang, SK Sanadhya
IIIT-Delhi, 2020
2020
Deterministic Authenticated Encryption Scheme for Memory Constrained Devices
M Agrawal, D Chang, J Kang
Cryptography 2 (4), 37, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–8