Login / Signup
Akshima
ORCID
Publication Activity (10 Years)
Years Active: 2015-2024
Publications (10 Years): 13
Top Topics
Order Preserving
Locality Sensitive
Lower Bound
Hash Functions
Top Venues
IACR Cryptol. ePrint Arch.
STOC
TCC (3)
CRYPTO (1)
</>
Publications
</>
Akshima
,
Tyler Besselman
,
Siyao Guo
,
Zhiye Xie
,
Yuping Ye
Tight Time-Space Tradeoffs for the Decisional Diffie-Hellman Problem.
STOC
(2024)
Akshima
,
Siyao Guo
,
Qipeng Liu
Time-Space Lower Bounds for Finding Collisions in Merkle-Damgård Hash Functions.
J. Cryptol.
37 (2) (2024)
Akshima
,
Tyler Besselman
,
Siyao Guo
,
Zhiye Xie
,
Yuping Ye
Tight Time-Space Tradeoffs for the Decisional Diffie-Hellman Problem.
IACR Cryptol. ePrint Arch.
2024 (2024)
Akshima
Time-Space Tradeoffs for Finding Multi-Collisions in Merkle-Damgård Hash Functions.
ITC
(2024)
Akshima
,
Xiaoqi Duan
,
Siyao Guo
,
Qipeng Liu
On Time-Space Lower Bounds for Finding Short Collisions in Sponge Hash Functions.
IACR Cryptol. ePrint Arch.
2023 (2023)
Akshima
,
Xiaoqi Duan
,
Siyao Guo
,
Qipeng Liu
On Time-Space Lower Bounds for Finding Short Collisions in Sponge Hash Functions.
TCC (3)
(2023)
Akshima
,
Siyao Guo
,
Qipeng Liu
Time-Space Lower Bounds for Finding Collisions in Merkle-Damgård Hash Functions.
IACR Cryptol. ePrint Arch.
2022 (2022)
Akshima
,
Siyao Guo
,
Qipeng Liu
Time-Space Lower Bounds for Finding Collisions in Merkle-Damgård Hash Functions.
CRYPTO (3)
(2022)
Akshima
,
David Cash
,
Andrew Drucker
,
Hoeteck Wee
Time-Space Tradeoffs and Short Collisions in Merkle-Damgård Hash Functions.
CRYPTO (1)
(2020)
Akshima
,
David Cash
,
Francesca Falzon
,
Adam Rivkin
,
Jesse Stern
Multidimensional Database Reconstruction from Range Query Access Patterns.
IACR Cryptol. ePrint Arch.
2020 (2020)
Francesca Falzon
,
Evangelia Anna Markatou
,
Akshima
,
David Cash
,
Adam Rivkin
,
Jesse Stern
,
Roberto Tamassia
Full Database Reconstruction in Two Dimensions.
CCS
(2020)
Akshima
,
David Cash
,
Andrew Drucker
,
Hoeteck Wee
Time-Space Tradeoffs and Short Collisions in Merkle-Damgård Hash Functions.
IACR Cryptol. ePrint Arch.
2020 (2020)
Akshima
,
Donghoon Chang
,
Aarushi Goel
,
Sweta Mishra
,
Somitra Kumar Sanadhya
Generation of Secure and Reliable Honeywords, Preventing False Detection.
IEEE Trans. Dependable Secur. Comput.
16 (5) (2019)
Akshima
,
Donghoon Chang
,
Mohona Ghosh
,
Aarushi Goel
,
Somitra Kumar Sanadhya
Improved Meet-in-the-Middle Attacks on 7 and 8-Round ARIA-192 and ARIA-256.
INDOCRYPT
(2015)
Akshima
,
Donghoon Chang
,
Mohona Ghosh
,
Aarushi Goel
,
Somitra Kumar Sanadhya
Single Key Recovery Attacks on 9-Round Kalyna-128/256 and Kalyna-256/512.
ICISC
(2015)
Akshima
,
Donghoon Chang
,
Mohona Ghosh
,
Aarushi Goel
,
Somitra Kumar Sanadhya
Single Key Recovery Attacks on 9-round Kalyna-128/256 and Kalyna-256/512.
IACR Cryptol. ePrint Arch.
2015 (2015)