Skip links

Author: Gautham Sekar

Dr. Gautham Sekar

Dr. Gautham Sekar

Visiting Professor

Tel :

  • Profile
  • Publications
  • Teaching
  • Current Research
Interests:
Cryptology & Information Security, Data Science & Analytics, Financial Technology, Philosophy. 
Education:
DOCTOR OF ENGINEERING (CRYPTOGRAPHY) – KU LEUVEN – BELGIUM – 2011Advisor: Prof. Dr Bart PreneelMASTER OF SCIENCE (HONOURS) IN PHYSICS – BITS PILANI – INDIA – 2006Thesis Advisor: Prof. Dr Bart PreneelBACHELOR OF ENGINEERING (HONOURS) IN ELECTRONICS & INSTRUMENTATION – BITS PILANI – INDIA – 2006Project Advisors: Prof. Dr R. Balasubramanian (IMSc) and Prof. Dr Srinivas Kotyada (IMSc)
Awards:
Selected to the Indian delegation for ISO/IEC JTC 1/SC 27 “Information security, cybersecurity and privacy protection” meetings in 2022, 2023 & 2024.Recognised as a “valued member of the ISO technical committee” and an “active contributor to ISO work from India”.Co-developed a secure implementation of a 3GPP encryption algorithm, that is included in the LTE wireless standards.Recipient of the Katholieke Universiteit Leuven Scholarship for (pre-)doctoral studies and master’s thesis.Recipient of the Dr. Ranjit Singh Chauhan Undergraduate Research Award from BITS Pilani.Regional Mathematical Olympiad awardee.

Curriculum Vitae




  1. Gautham Sekar, Mabin Joseph, R. Balasubramanian,Fault-Assisted Side Channel Analysis of HMAC-Streebog, Cryptologia, published 14 April 2024.

           DOI: https://www.tandfonline.com/doi/full/10.1080/01611194.2024.2328548.

  1. Mabin Joseph,Gautham Sekar, R. Balasubramanian, Revisiting the Software-Efficient Stream Ciphers RCR-64 and RCR-32, The Computer Journal, vol. 67(4), pp. 1590-1602, 2024.
  1. Mabin Joseph,Gautham Sekar, R. Balasubramanian, G. Venkiteswaran,On the Security of the Stream Ciphers RCR–64 and RCR–32, The Computer Journal, vol. 65(12), pp. 3091–3099, 2022.
  1. Mabin Joseph,Gautham Sekar, R. Balasubramanian,Side Channel Analysis of SPECK, Journal of Computer Security, vol. 28(6), pp. 655–676, 2020.
  1. Gautham Sekar, Soumyadeep Bhattacharya,Practical (Second) Preimage Attacks on the TCS_SHA-3 Family of Cryptographic Hash Functions, Journal of Information Processing Systems, vol. 12(2), pp. 310–321, 2016.
  1. Mabin Joseph,Gautham Sekar, Balasubramanian Ramachandran,Distinguishing Attacks on (Ultra-)lightweight WG Ciphers, LightSec 2016 (A. Bogdanov, ed.), vol. 10098 of LNCS, pp. 45–59. Springer, 2017.
  1. Gautham Sekar,Side Channel Cryptanalysis of Streebog, SSR – Security Standardisation Research 2015 (L. Chen, S. Matsuo, eds.), vol. 9497 of LNCS, pp. 154–162. Springer, 2015. (Preliminary version presented as a short paper at CTCrypt 2015.)
  1. Gautham Sekar, Nicky Mouha, Bart Preneel,Meet-in-the-middle attacks on reduced-round GOST, Mathematical Aspects of Cryptography, vol. 5(2), pp. 117–125, 2014.
  1. Nicky Mouha,Gautham Sekar, Bart PreneelChallenging the increased resistance of regular hash functions against birthday attacks, Journal of Mathematical Cryptology, vol. 6(3–4), pp. 229–248, 2012.
  1. Gautham Sekar,The Stream Cipher Core of the 3GPP Encryption Standard 128-EEA3: Timing Attacks and Countermeasures, Inscrypt 2011 (C. Wu, M. Yung, D. Lin, eds.), vol. 7537 of LNCS, pp. 269–288. Springer, 2012.
  1. Gautham Sekar, Bart Preneel,Practical Attacks on a Cryptosystem Proposed in Patent WO/2009/066313, WISA –Workshop on Information Security Applications 2011 (S. Jung, M. Yung, eds.), vol. 7115 of LNCS, pp. 1–12. Springer, 2012.

          (Received the highest review score.)

  1. Gautham Sekar, Nicky Mouha, Vesselin Velichkov, Bart Preneel,Meet-in-the-Middle Attacks on Reduced-Round XTEA, CT-RSA – The Cryptographers’ Track at the RSA Conference 2011 (A. Kiayias, ed.), vol. 6558 of LNCS, pp. 250–267. Springer, 2011.
  1. Nicky Mouha,Gautham Sekar, Jean-Philippe Aumasson, Thomas Peyrin, Søren S. Thomsen, Meltem Sönmez Turan, Bart Preneel,Cryptanalysis of the ESSENCE Family of Hash Functions, Inscrypt 2009 (F. Bao, M. Yung, D. Lin, J. Jing, eds.), vol. 6151 of LNCS, pp. 15–34. Springer, 2010.
  1. Gautham Sekar, Bart Preneel,Improved Distinguishing Attacks on HC-256, IWSEC – International Workshop on Security 2009 (T. Takagi, M. Mambo, eds.), vol. 5824 of LNCS, pp. 38–52. Springer, 2009.
  1. Jorge Nakahara Jr.,Gautham Sekar, Daniel Santana de Freitas, Chang Chiann, Ramon Hugo de Souza, Bart Preneel,A New Approach to χ2 Cryptanalysis of Block Ciphers, ISC – Information Security Conference 2009 (P. Samarati, M. Yung, F. Martinelli, C. A. Ardagna, eds.), vol. 5735 of LNCS, pp. 1–16. Springer, 2009.
  1. Emilia Käsper, Vincent Rijmen, Tor E. Bjørstad, Christian Rechberger, Matthew J. B. Robshaw,Gautham Sekar,Correlated Keystreams in Moustique, AFRICACRYPT 2008 (S. Vaudenay, ed.), vol. 5023 of LNCS, pp. 246–257. Springer, 2008.
  1. Orr Dunkelman,Gautham Sekar, Bart Preneel,Improved Meet-in-the-Middle Attacks on Reduced-Round DES, INDOCRYPT 2007 (K. Srinathan, C. Pandu Rangan, M. Yung, eds.), vol. 4859 of LNCS, pp. 86–100. Springer, 2007.
  1. Gautham Sekar, Souradyuti Paul, Bart Preneel,Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses, INDOCRYPT 2007 (K. Srinathan, C. Pandu Rangan, M. Yung, eds.), vol. 4859 of LNCS, pp. 58–72. Springer, 2007.
  1. Gautham Sekar, Souradyuti Paul, Bart Preneel,New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py, ISC – Information Security Conference 2007 (J. A. Garay, A. K. Lenstra, M. Mambo, R. Peralta, eds.), vol. 4779 of LNCS, pp. 249–262. Springer, 2007.
  1. Gautham Sekar, Souradyuti Paul, Bart Preneel,New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B, WEWoRC – Western European Workshop on Research in Cryptology 2007 (S. Lucks, A.-R. Sadeghi, C. Wolf, eds.), vol. 4945 of LNCS, pp. 127–141. Springer, 2008.
  1. Souradyuti Paul, Bart Preneel,Gautham Sekar,Distinguishing Attacks on the Stream Cipher Py, FSE – Fast Software Encryption 2006 (M. J. B. Robshaw, ed.), vol. 4047 of LNCS, pp. 405–421. Springer, 2006.
Statistics for Economics (BA)Mathematical Methods for Economics II (BA) Information Theory and Cryptography (PGDM)Advanced Analytical Models for Decision Making (PGDM)Statistical Inference and Modeling (PGDM)Probability (PGDM) Mathematical Statistics (MA)Research and Publication Ethics (PhD)
Cryptology - Analysis of HIGHT and Functional Meet-in-the-Middle AttacksStatistics - Reformulating Chebyshev's Inequality- Understanding the Significance of SignificanceDecision Theory - Regretting Regret: An Alternative Criterion for Decision Making