Notice: Unexpected clearActionName after getActionName already called in /var/www/html/w/includes/context/RequestContext.php on line 333
Subhamoy Maitra - MaRDI portal

Subhamoy Maitra

From MaRDI portal
(Redirected from Person:1597760)
Person:276562

Available identifiers

zbMath Open maitra.subhamoyMaRDI QIDQ276562

List of research outcomes





PublicationDate of PublicationType
How do the arbiter PUFs sample the Boolean function class?2024-10-14Paper
Plateaued rotation symmetric Boolean functions on odd number of variables2024-09-18Paper
Efficient search for symmetric Boolean functions under constraints on Walsh spectra values2024-09-18Paper
Autocorrelation spectra of balanced Boolean functions on an odd number of input variables with maximum absolute value \(<2^{\frac{n+1}2}\)2024-09-18Paper
Notion of algebraic immunity and its evaluation related to fast algebraic attacks2024-09-18Paper
Results on rotation symmetric bent functions2024-09-18Paper
Construction of resilient functions by the concatenation of Boolean functions having nonintersecting Walsh spectra2024-09-18Paper
On dihedral group invariant Boolean functions (extended abstract)2024-09-18Paper
Balanced Boolean function on 13-variables having nonlinearity greater than the bent concatenation bound2024-09-18Paper
Introducing nega-forrelation: quantum algorithms in analyzing nega-Hadamard and nega-crosscorrelation spectra2024-04-03Paper
Improved and formal proposal for device-independent quantum private query *2024-03-05Paper
Following forrelation -- quantum algorithms in exploring Boolean functions' spectra2023-12-14Paper
Analysis of Boolean functions related to binary input binary output two-party nonlocal games2023-11-09Paper
Modifying bent functions to obtain the balanced ones with high nonlinearity2023-08-14Paper
Revisiting \textit{BoolTest} -- on randomness testing using Boolean functions2023-08-14Paper
A proposal for device independent probabilistic quantum oblivious transfer2023-08-14Paper
Quantum resource estimation for FSR based symmetric ciphers and related Grover's attacks2023-05-12Paper
Differential fault attack on Espresso2023-05-12Paper
Parity decision tree in classical-quantum separations for certain classes of Boolean functions2023-03-17Paper
Differential Fault Attack on Grain v1, ACORN v3 and Lizard2022-12-09Paper
Certain Observations on ACORN v3 and the Implications to TMDTO Attacks2022-12-09Paper
Improved and practical proposal for measurement device independent quantum dialogue2022-11-24Paper
More glimpses of the RC4 internal state array2022-07-06Paper
Resolvable block designs in construction of approximate real MUBs that are sparse2022-06-13Paper
On the existence and non-existence of some classes of bent-negabent functions2022-05-23Paper
Differential Fault Attack on Kreyvium & FLIP2022-03-24Paper
Further cryptographic properties of the multiplicative inverse function2021-12-07Paper
Construction of balanced vectorial Boolean functions with almost optimal nonlinearity and very low differential-linear uniformity2021-11-02Paper
Quantum Algorithms for Cryptographically Significant Boolean Functions2021-07-20Paper
On approximate real mutually unbiased bases in square dimension2021-07-13Paper
Glimpses are forever in RC4 amidst the spectre of biases2021-05-31Paper
Further clarification on Mantin's digraph repetition bias in RC42021-01-25Paper
14. Differential fault attack on hardware stream ciphers—a technical survey2020-07-27Paper
RC4: non-randomness in the index \(j\) and some results on its cycles2020-05-12Paper
Vectorial Boolean functions with very low differential-linear uniformity using Maiorana-McFarland type construction2020-05-12Paper
Efficient quantum algorithms related to autocorrelation spectrum2020-05-12Paper
Device independent quantum key distribution using three-party pseudo-telepathy2020-05-12Paper
Analysis of the strict avalanche criterion in variants of arbiter-based physically unclonable functions2020-05-12Paper
Analysis on Boolean Function in a Restricted (Biased) Domain2020-01-28Paper
The connection between quadratic bent-negabent functions and the Kerdock code2019-12-18Paper
Differential fault attack on SIMON with very few faults2019-03-29Paper
Tools in analyzing linear approximation for Boolean functions related to FLIP2019-03-29Paper
Construction and search of balanced Boolean functions on even number of variables towards excellent autocorrelation profile2019-02-20Paper
On hardware implementation of Tang-maitra Boolean functions2019-02-15Paper
Modifying Maiorana--McFarland Type Bent Functions for Good Cryptographic Properties and Efficient Implementation2019-02-01Paper
A TMDTO Attack Against Lizard2018-09-14Paper
Clauser-Horne-Shimony-Holt versus three-party pseudo-telepathy: on the optimal number of samples in device-independent quantum private query2018-08-07Paper
Construction of $n$ -Variable ( $n\equiv 2 \bmod 4$ ) Balanced Boolean Functions With Maximum Absolute Value in Autocorrelation Spectra $2018-06-27Paper
A Differential Fault Attack on Plantlet2018-06-27Paper
A Super-Set of Patterson--Wiedemann Functions: Upper Bounds and Possible Nonlinearities2018-01-12Paper
Cryptanalysis of optimal differential energy watermarking (DEW) and a modified robust scheme2017-09-20Paper
Investigations on Bent and Negabent Functions via the Nega-Hadamard Transform2017-07-12Paper
Approximate Integer Common Divisor Problem Relates to Implicit Factorization2017-07-12Paper
High-Performance Hardware Implementation for RC4 Stream Cipher2017-07-12Paper
A Super-Set of Patterson-Wiedemann Functions – Upper Bounds and Possible Nonlinearities2017-06-13Paper
Quantum Algorithms Related to $$\textit{HN}$$ -Transforms of Boolean Functions2017-06-01Paper
Differential Fault Attack against Grain Family with Very Few Faults and Minimal Assumptions2017-05-16Paper
Patterson–Wiedemann Type Functions on 21 Variables With Nonlinearity Greater Than Bent Concatenation Bound2017-04-28Paper
Probabilistic signature based generalized framework for differential fault analysis of stream ciphers2017-03-27Paper
Redefining the transparency order2017-02-10Paper
Observing biases in the state: case studies with Trivium and Trivia-SC2017-02-10Paper
Chosen IV cryptanalysis on reduced round \texttt{ChaCha} and \texttt{Salsa}2016-05-18Paper
Application of Grover's algorithm to check non-resiliency of a Boolean function2016-05-04Paper
Proving TLS-attack related open biases of RC42015-09-30Paper
Dependence in IV-Related Bytes of RC4 Key Enhances Vulnerabilities in WPA2015-09-18Paper
Differential Power Analysis in Hamming Weight Model: How to Choose among (Extended) Affine Equivalent S-boxes2015-09-10Paper
Efficient quantum algorithms to construct arbitrary Dicke states2014-12-12Paper
A Differential Fault Attack on the Grain Family under Reasonable Assumptions2014-08-20Paper
(Non-)random sequences from (non-)random permutations -- analysis of RC4 stream cipher2014-04-01Paper
https://portal.mardi4nfdi.de/entity/Q28555752013-10-25Paper
A Differential Fault Attack on MICKEY 2.02013-10-10Paper
A Chosen IV Related Key Attack on Grain-128a2013-06-28Paper
New Results on Generalization of Roos-Type Biases and Related Keystreams of RC42013-06-07Paper
Some Results on Related Key-IV Pairs of Grain2013-03-13Paper
A Differential Fault Attack on Grain-128a Using MACs2013-03-13Paper
Cryptanalytic results on `Dual CRT' and `Common Prime' RSA2013-01-28Paper
A Differential Fault Attack on the Grain Family of Stream Ciphers2012-11-13Paper
Side Channel Attack to Actual Cryptanalysis: Breaking CRT-RSA with Low Weight Decryption Exponents2012-11-13Paper
Proof of Empirical RC4 Biases and New Key Correlations2012-06-08Paper
https://portal.mardi4nfdi.de/entity/Q31169742012-02-15Paper
On the Evolution of GGHN Cipher2011-12-16Paper
A Theoretical Analysis of the Structure of HC-1282011-11-10Paper
Laced Boolean functions and subset sum problems in finite fields2011-08-10Paper
Attack on Broadcast RC4 Revisited2011-07-07Paper
Some applications of lattice based root finding techniques2011-06-03Paper
Some observations on HC-1282011-04-08Paper
Partial Key Exposure Attack on RSA – Improvements for Limited Lattice Dimensions2010-12-07Paper
One Byte per Clock: A Novel RC4 Hardware2010-12-07Paper
Nega–Hadamard Transform, Bent and Negabent Functions2010-09-08Paper
Cryptanalysis of RSA with two decryption exponents2010-09-07Paper
Cryptanalysis of RSA with more than one decryption exponent2010-09-07Paper
Factoring RSA Modulus Using Prime Reconstruction from Random Known Bits2010-05-04Paper
Efficient CRT-RSA Decryption for Small Encryption Exponents2010-03-16Paper
Further results on implicit factoring in polynomial time2010-03-10Paper
On Some Sequences of the Secret Pseudo-random Index j in RC4 Key Scheduling2010-01-14Paper
On biases of permutation and keystream bytes of RC4 towards the secret key2009-10-26Paper
On affine (non)equivalence of Boolean functions2009-08-10Paper
PARTIAL KEY EXPOSURE ATTACKS ON RSA AND ITS VARIANT BY GUESSING A FEW BITS OF ONE OF THE PRIME FACTORS2009-08-06Paper
A constructive count of rotation symmetric functions2009-07-09Paper
https://portal.mardi4nfdi.de/entity/Q36355702009-07-06Paper
Results on rotation symmetric bent functions2009-06-19Paper
On non-negligible bias of the first output byte of RC4 towards the first three bytes of the secret key2009-03-31Paper
Idempotents in the neighbourhood of Patterson-Wiedemann functions having Walsh spectra zeros2009-03-31Paper
Improved Partial Key Exposure Attacks on RSA by Guessing a Few Bits of One of the Prime Factors2009-03-24Paper
https://portal.mardi4nfdi.de/entity/Q35975232009-02-09Paper
Analysis of RC4 and Proposal of Additional Layers for Better Security Margin2009-01-22Paper
A New Class of Weak Encryption Exponents in RSA2009-01-22Paper
Algebraic immunity for cryptographically significant Boolean functions: analysis and construction2008-12-21Paper
Construction of Nonlinear Resilient Boolean Functions Using “Small” Affine Functions2008-12-21Paper
Search for Boolean Functions With Excellent Profiles in the Rotation Symmetric Class2008-12-21Paper
Reducing the Number of Homogeneous Linear Equations in Finding Annihilators2008-11-27Paper
Revisiting Wiener’s Attack – New Weak Keys in RSA2008-11-20Paper
A complete characterization of the evolution of RC4 pseudo random generation algorithm2008-11-06Paper
New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC42008-09-18Paper
Rotation symmetric Boolean functions-count and cryptographic properties2008-09-10Paper
Recovering RC4 Permutation from 2048 Keystream Bytes if j Is Stuck2008-07-08Paper
On Non-randomness of the Permutation After RC4 Key Scheduling2008-04-17Paper
Construction of Rotation Symmetric Boolean Functions on Odd Number of Variables with Maximum Algebraic Immunity2008-04-17Paper
Enumeration of 9-Variable Rotation Symmetric Boolean Functions Having Nonlinearity > 2402008-04-11Paper
Permutation After RC4 Key Scheduling Reveals the Secret Key2008-03-25Paper
Applied Cryptography and Network Security2008-02-19Paper
Balancedness and correlation immunity of symmetric Boolean functions2007-09-21Paper
Exact quantum algorithm to distinguish Boolean functions of different weights2007-08-09Paper
Patterson-Wiedemann Construction Revisited2007-05-29Paper
Rotation Symmetric Boolean Functions –; Count and Cryptographic Properties2007-05-29Paper
Balancedness and Correlation Immunity of Symmetric Boolean Functions2007-05-29Paper
Basic theory in construction of Boolean functions with maximum possible annihilator immunity2006-11-22Paper
Information Security2006-10-20Paper
Distributed Computing – IWDC 20052006-10-10Paper
Patterson-Wiedemann construction revisited2006-08-04Paper
Fast Software Encryption2006-06-22Paper
A Maiorana--McFarland type construction for resilient Boolean functions on \(n\) variables (\(n\) even) with nonlinearity \(>2^{n-1}-2^{n/2}+2^{n/2-2}\)2006-04-28Paper
https://portal.mardi4nfdi.de/entity/Q33749312006-03-01Paper
Fast Software Encryption2005-12-27Paper
Fast Software Encryption2005-12-27Paper
Progress in Cryptology - INDOCRYPT 20042005-12-22Paper
Results on multiples of primitive polynomials and their products over GF(2)2005-09-22Paper
Further constructions of resilient Boolean functions with very high nonlinearity2005-05-11Paper
Linear codes in generalized construction of resilient functions with very high nonlinearity2005-05-11Paper
Maximum nonlinearity of symmetric Boolean functions on odd number of variables2005-05-11Paper
https://portal.mardi4nfdi.de/entity/Q47364222004-08-09Paper
https://portal.mardi4nfdi.de/entity/Q44735682004-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44283442003-09-15Paper
https://portal.mardi4nfdi.de/entity/Q44283482003-09-15Paper
https://portal.mardi4nfdi.de/entity/Q44174002003-07-29Paper
https://portal.mardi4nfdi.de/entity/Q44174102003-07-29Paper
https://portal.mardi4nfdi.de/entity/Q44174112003-07-29Paper
https://portal.mardi4nfdi.de/entity/Q44138642003-07-21Paper
https://portal.mardi4nfdi.de/entity/Q47885632003-05-19Paper
https://portal.mardi4nfdi.de/entity/Q47885722003-05-19Paper
https://portal.mardi4nfdi.de/entity/Q47885802003-05-19Paper
https://portal.mardi4nfdi.de/entity/Q47885872003-05-19Paper
https://portal.mardi4nfdi.de/entity/Q47985332003-03-19Paper
https://portal.mardi4nfdi.de/entity/Q47978072003-03-09Paper
Highly nonlinear balanced Boolean functions with good local and global avalanche characteristics.2003-01-21Paper
https://portal.mardi4nfdi.de/entity/Q45368222002-10-07Paper
Modifications of Patterson-Wiedemann functions for cryptographic applications2002-08-04Paper
Hamming weights of correlation immune Boolean functions2002-07-25Paper
Cryptographically significant Boolean functions with five valued Walsh spectra2002-07-15Paper
Cross-correlation analysis of cryptographically useful boolean functions and s-boxes2002-05-30Paper
https://portal.mardi4nfdi.de/entity/Q44216392002-01-01Paper
https://portal.mardi4nfdi.de/entity/Q27414432001-10-15Paper
https://portal.mardi4nfdi.de/entity/Q27414052001-10-14Paper
Ciphertext Only Attack on LFSR Based Encryption Scheme2000-11-14Paper
https://portal.mardi4nfdi.de/entity/Q42506251999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q49418561999-01-01Paper
Almost Perfect Mutually Unbiased Bases that are SparseN/APaper

Research outcomes over time

This page was built for person: Subhamoy Maitra