News
Research Interests
- Cryptography and cryptanalysis
- Secure and private computation
- Information security
Positions
since 09/2023 |
Postdoctoral Fellow (Ass.-Prof. upon signing the qualification agreement), Security and Privacy Lab, University of Innsbruck, Austria |
01/2020 – 09/2023 |
Lecturer, Cybersecurity Research Group, Alpen-Adria-Universität Klagenfurt, Austria |
09/2017 – 12/2019 |
Senior Research Associate, Cryptography Research Group, University of Bristol, UK |
06/2014 – 04/2017 |
Postdoctoral Fellow, Cybersecurity Group, Technical University of Denmark (DTU), Denmark |
2009 – 2010 |
Research Project Assistant, Indian Statistical Institute, Kolkata, India |
2007 – 2008 |
Research Engineer, Guavus Network Systems, Gurgaon, India |
2007 |
Research Intern, Microsoft Research, Bangalore, India |
Education
2010 – 2014 |
Ph.D. in Computer Science, CryptoLUX Research Group, University of Luxembourg, Luxembourg |
2005 – 2007 |
M.Tech. in Computer Science, Indian Statistical Institute, Kolkata, India |
2002 – 2004 |
M.Sc. in Mathematics, Indian Institute of Technology (IIT), Kanpur, India |
1999 – 2002 |
B.Sc.(Hons.) in Mathematics, University of Calcutta, Kolkata, India |
Publications
The publications are listed in reverse chronological order. More bibliographical information on them can be found on my Google scholar and DBLP pages.
- Harmon, L., Delavignette, G., Roy, A., and Silva, D. PIE: p-adic Encoding for High-Precision Arithmetic in Homomorphic Encryption. In Applied Cryptography and Network Security, ACNS 2023, Proceedings, Part I. Lecture Notes in Computer Science 13905, Springer, 2023, pp. 425–450. [Publisher]
- Compactness of Hashing Modes and Efficiency Beyond Merkle Tree. In Advances in Cryptology - EUROCRYPT 2021 - International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings, Part II. Lecture Notes in Computer Science 12697, Springer, 2021, pp. 92–123. [Publisher]
- Grassi, L., Khovratovich, D., Rechberger, C., Roy, A., and Schofnegger, M. Poseidon: A New Hash Function for Zero-Knowledge Proof Systems. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 2021, pp. 519–535. [Publisher]
- Roy, A., Andreeva, E., and Sauer, J.F. Interpolation Cryptanalysis of Unbalanced Feistel Networks with Low Degree Round Functions. In Selected Areas in Cryptography - SAC 2020. Lecture Notes in Computer Science 12804, Springer, 2020, pp. 273–300. [Publisher]
- Andreeva, E., Lallemand, V., Purnal, A., Reyhanitabar, R., Roy, A., and Vizár, D. Forkcipher: A New Primitive for Authenticated Encryption of Very Short Messages. In Advances in Cryptology - ASIACRYPT 2019 - International Conference on the Theory and Application of Cryptology and Information Security, Proceedings, Part II. Lecture Notes in Computer Science 11922, Springer, 2019, pp. 153–182. [Publisher]
- Albrecht, M.R., Grassi, L., Perrin, L., et al. Feistel Structures for MPC, and More. In Computer Security - ESORICS 2019 - European Symposium on Research in Computer Security, 2019, Proceedings, Part II. Lecture Notes in Computer Science 11736, Springer, 2019, pp. 151–171. [Publisher]
- Gao, S., Roy, A., and Oswald, E. Constructing TI-Friendly Substitution Boxes Using Shift-Invariant Permutations. In Topics in Cryptology - CT-RSA 2019 - The Cryptographers’ Track at the RSA Conference 2019, Proceedings. Lecture Notes in Computer Science 11405, Springer, 2019, pp. 433–452. [Publisher]
- Green, J., Roy, A., and Oswald, E. A Systematic Study of the Impact of Graphical Models on Inference-Based Attacks on AES. In Smart Card Research and Advanced Applications. Lecture Notes in Computer Science 11389, Springer, 2018, pp. 18–34. [Publisher]
- Albrecht, M.R., Grassi, L., Rechberger, C., Roy, A., and Tiessen, T. MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity. In Advances in Cryptology - ASIACRYPT 2016 - International Conference on the Theory and Application of Cryptology and Information Security, Proceedings, Part I. Lecture Notes in Computer Science 10031, 2016, pp. 191–219. [Publisher]
- Kölbl, S. and Roy, A. A Brief Comparison of Simon and Simeck. In Lightweight Cryptography for Security and Privacy, LightSec 2016. Lecture Notes in Computer Science 10098, Springer, 2016, pp. 69–88. [Publisher]
- Coron, J.-S., Roy, A., and Vivek, S. Fast Evaluation of Polynomials over Binary Finite Fields and Application to Side-channel Countermeasures. Journal of Cryptographic Engineering, 5, 2 (2015), 73–83. [Publisher]
- Biryukov, A., Roy, A., and Velichkov, V. Differential Analysis of Block Ciphers SIMON and SPECK. In Fast Software Encryption - 21st International Workshop, FSE 2014 Proceedings. Lecture Notes in Computer Science 8540, Springer, 2014, pp. 546–570. [Publisher]
- Coron, J.-S., Roy, A., and Vivek, S. Fast Evaluation of Polynomials over Binary Finite Fields and Application to Side-Channel Countermeasures. In Cryptographic Hardware and Embedded Systems - CHES 2014 Proceedings. Lecture Notes in Computer Science 8731, Springer, 2014, pp. 170–187. [Publisher]
- Roy, A. and Vivek, S. Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012. In Cryptographic Hardware and Embedded Systems - CHES 2013 Proceedings. Lecture Notes in Computer Science 8086, Springer, 2013, pp. 417–434. [Publisher]
- Bhattacharyya, R. and Roy, A. Secure Message Authentication Against Related-Key Attack. In S. Moriai, ed., Fast Software Encryption - FSE 2013. Lecture Notes in Computer Science 8424, Springer, 2013, pp. 305–324. [Publisher]
- Biryukov, A., Leurent, G., and Roy, A. Cryptanalysis of the "Kindle" Cipher. In Selected Areas in Cryptography, SAC 2012. Lecture Notes in Computer Science 7707, Springer, 2012, pp. 86–103. [Publisher]
- Leurent, G. and Roy, A. Boomerang Attacks on Hash Function Using Auxiliary Differentials. In Topics in Cryptology - CT-RSA 2012. Proceedings. Lecture Notes in Computer Science 7178, Springer, 2012, pp. 215–230. [Publisher]
- Biryukov, A., Nikolic, I., and Roy, A. Boomerang Attacks on BLAKE-32. In Fast Software Encryption - 18th International Workshop, FSE 2011. Lecture Notes in Computer Science 6733, Springer, 2011, pp. 218–237. [Publisher]
Professional Activities
Program committees
SCN 2022, CT-RSA 2022, Indocrypt 2020, PKC 2020, FSE (ToSC) 2019
External reviewer
Asiacrypt (2021, 2020, 2018, 2012), FSE (2020, 2016, 2013, 2012), Eurocrypt (2019, 2015), Crypto (2018, 2011), ACNS (2017, 2014), CT-RSA 2015, CHES 2013
Organizer
SILC workshp (co-located with Eurocrypt 2021)