Somitra Kumar Sanadhya

993 total citations
35 papers, 332 citations indexed

About

Somitra Kumar Sanadhya is a scholar working on Artificial Intelligence, Computer Vision and Pattern Recognition and Hardware and Architecture. According to data from OpenAlex, Somitra Kumar Sanadhya has authored 35 papers receiving a total of 332 indexed citations (citations by other indexed papers that have themselves been cited), including 23 papers in Artificial Intelligence, 14 papers in Computer Vision and Pattern Recognition and 10 papers in Hardware and Architecture. Recurrent topics in Somitra Kumar Sanadhya's work include Cryptographic Implementations and Security (19 papers), Chaos-based Image/Signal Encryption (13 papers) and Physical Unclonable Functions (PUFs) and Hardware Security (10 papers). Somitra Kumar Sanadhya is often cited by papers focused on Cryptographic Implementations and Security (19 papers), Chaos-based Image/Signal Encryption (13 papers) and Physical Unclonable Functions (PUFs) and Hardware Security (10 papers). Somitra Kumar Sanadhya collaborates with scholars based in India, United States and Kazakhstan. Somitra Kumar Sanadhya's co-authors include Mohammad Hashmi, N. Nalla Anandakumar, Donghoon Chang, Mohona Ghosh, Anupam Chattopadhyay, Prantik Bhattacharyya, Dougľas R. White, Animesh Sharma, Palash Sarkar and Masoumeh Safkhani and has published in prestigious journals such as SHILAP Revista de lepidopterología, IEEE Transactions on Information Theory and IEEE Access.

In The Last Decade

Somitra Kumar Sanadhya

33 papers receiving 315 citations

Peers

Somitra Kumar Sanadhya
Somitra Kumar Sanadhya
Citations per year, relative to Somitra Kumar Sanadhya Somitra Kumar Sanadhya (= 1×) peers Nathalie Bochard

Countries citing papers authored by Somitra Kumar Sanadhya

Since Specialization
Citations

This map shows the geographic impact of Somitra Kumar Sanadhya's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Somitra Kumar Sanadhya with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Somitra Kumar Sanadhya more than expected).

Fields of papers citing papers by Somitra Kumar Sanadhya

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Somitra Kumar Sanadhya. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Somitra Kumar Sanadhya. The network helps show where Somitra Kumar Sanadhya may publish in the future.

Co-authorship network of co-authors of Somitra Kumar Sanadhya

This figure shows the co-authorship network connecting the top 25 collaborators of Somitra Kumar Sanadhya. A scholar is included among the top collaborators of Somitra Kumar Sanadhya based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Somitra Kumar Sanadhya. Somitra Kumar Sanadhya is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Chattopadhyay, Anupam, et al.. (2023). A Configurable CRYSTALS-Kyber Hardware Implementation with Side-Channel Protection. ACM Transactions on Embedded Computing Systems. 23(2). 1–25. 17 indexed citations
2.
Anandakumar, N. Nalla, Mohammad Hashmi, & Somitra Kumar Sanadhya. (2022). Field Programmable Gate Array based elliptic curve Menezes‐Qu‐Vanstone key agreement protocol realization using Physical Unclonable Function and true random number generator primitives. IET Circuits Devices & Systems. 16(5). 382–398. 9 indexed citations
3.
Ghosh, Mohona, et al.. (2022). FbHash-E: A time and memory efficient version of FbHash similarity hashing algorithm. Forensic Science International Digital Investigation. 41. 301375–301375. 4 indexed citations
4.
Sanadhya, Somitra Kumar, et al.. (2022). On the Structure of Format Preserving Sets in the Diffusion Layer of Block Ciphers. IEEE Transactions on Information Theory. 68(12). 8268–8279. 1 indexed citations
5.
Kumar, Abhishek, et al.. (2021). Quantum Free-Start Collision Attacks on Double Block Length Hashing with Round-Reduced AES-256. IACR Transactions on Symmetric Cryptology. 316–336. 6 indexed citations
6.
Chang, Donghoon, Nilanjan Datta, Avijit Dutta, et al.. (2020). Release of Unverified Plaintext: Tight Unified Model and Application to ANYDAE. SHILAP Revista de lepidopterología. 1 indexed citations
7.
Anandakumar, N. Nalla, Somitra Kumar Sanadhya, & Mohammad Hashmi. (2020). Design, Implementation and Analysis of Efficient Hardware-Based Security Primitives. 198–199. 5 indexed citations
8.
Chattopadhyay, Anupam, et al.. (2019). Threshold Implementations of $\mathtt{GIFT}$ : A Trade-Off Analysis. IEEE Transactions on Information Forensics and Security. 15. 2110–2120. 11 indexed citations
9.
Anandakumar, N. Nalla, Somitra Kumar Sanadhya, & Mohammad Hashmi. (2019). FPGA-Based True Random Number Generation Using Programmable Delays in Oscillator-Rings. IEEE Transactions on Circuits & Systems II Express Briefs. 67(3). 570–574. 87 indexed citations
10.
Chang, Donghoon, et al.. (2019). A Generalized Format Preserving Encryption Framework Using MDS Matrices. 3(1). 3–11.
11.
Anandakumar, N. Nalla, et al.. (2018). Reconfigurable Hardware Architecture for Authenticated Key Agreement Protocol Over Binary Edwards Curve. ACM Transactions on Reconfigurable Technology and Systems. 11(2). 1–19. 11 indexed citations
12.
Chang, Donghoon, et al.. (2018). Generation of Secure and Reliable Honeywords, Preventing False Detection. IEEE Transactions on Dependable and Secure Computing. 16(5). 757–769. 13 indexed citations
13.
Chang, Donghoon, et al.. (2017). Sponge-based CCA2 secure asymmetric encryption for arbitrary length message (extended version). 3(3). 262–262. 1 indexed citations
14.
Chang, Donghoon, et al.. (2016). RCB: leakage-resilient authenticated encryption via re-keying. The Journal of Supercomputing. 74(9). 4173–4198. 2 indexed citations
15.
Sanadhya, Somitra Kumar & Orr Dunkelman. (2016). Progress in Cryptology – INDOCRYPT 2016. Lecture notes in computer science. 4 indexed citations
16.
Safkhani, Masoumeh, et al.. (2011). Security analysis of LMAP ++ , an RFID authentication protocol. International Conference for Internet Technology and Secured Transactions. 689–694. 8 indexed citations
17.
Sanadhya, Somitra Kumar & Palash Sarkar. (2009). A combinatorial analysis of recent attacks on step reduced SHA-2 family. Cryptography and Communications. 1(2). 135–173. 2 indexed citations
18.
Pal, Nikhil R., Animesh Sharma, Somitra Kumar Sanadhya, & Karmeshu. (2006). On identifying marker genes from gene expression data in a neural framework through online feature analysis: Research Articles. Journal of Intelligent Systems. 21(4). 453–467. 1 indexed citations
19.
Pal, Nikhil R., Animesh Sharma, Somitra Kumar Sanadhya, & Karmeshu. (2006). On identifying marker genes from gene expression data in a neural framework through online feature analysis. International Journal of Intelligent Systems. 21(4). 453–467. 4 indexed citations
20.
Sanadhya, Somitra Kumar, et al.. (1978). Essential oil of garlic on blood lipids and fibrinolytic activity in patients of coronary artery disease. Part I.. PubMed. 26(5). 327–31. 15 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026