Subhamoy Maitra

From MaRDI portal
Person:276562

Available identifiers

zbMath Open maitra.subhamoyMaRDI QIDQ276562

List of research outcomes

PublicationDate of PublicationType
Introducing nega-forrelation: quantum algorithms in analyzing nega-Hadamard and nega-crosscorrelation spectra2024-04-03Paper
Improved and formal proposal for device-independent quantum private query *2024-03-05Paper
Following forrelation -- quantum algorithms in exploring Boolean functions' spectra2023-12-14Paper
Analysis of Boolean functions related to binary input binary output two-party nonlocal games2023-11-09Paper
Modifying bent functions to obtain the balanced ones with high nonlinearity2023-08-14Paper
Revisiting \textit{BoolTest} -- on randomness testing using Boolean functions2023-08-14Paper
A proposal for device independent probabilistic quantum oblivious transfer2023-08-14Paper
Quantum resource estimation for FSR based symmetric ciphers and related Grover's attacks2023-05-12Paper
Differential fault attack on Espresso2023-05-12Paper
Parity decision tree in classical-quantum separations for certain classes of Boolean functions2023-03-17Paper
Differential Fault Attack on Grain v1, ACORN v3 and Lizard2022-12-09Paper
Certain Observations on ACORN v3 and the Implications to TMDTO Attacks2022-12-09Paper
Improved and practical proposal for measurement device independent quantum dialogue2022-11-24Paper
More glimpses of the RC4 internal state array2022-07-06Paper
Resolvable block designs in construction of approximate real MUBs that are sparse2022-06-13Paper
On the existence and non-existence of some classes of bent-negabent functions2022-05-23Paper
Differential Fault Attack on Kreyvium & FLIP2022-03-24Paper
Further cryptographic properties of the multiplicative inverse function2021-12-07Paper
Construction of balanced vectorial Boolean functions with almost optimal nonlinearity and very low differential-linear uniformity2021-11-02Paper
Quantum Algorithms for Cryptographically Significant Boolean Functions2021-07-20Paper
On approximate real mutually unbiased bases in square dimension2021-07-13Paper
Glimpses are forever in RC4 amidst the spectre of biases2021-05-31Paper
Further clarification on Mantin's digraph repetition bias in RC42021-01-25Paper
14. Differential fault attack on hardware stream ciphers—a technical survey2020-07-27Paper
RC4: non-randomness in the index \(j\) and some results on its cycles2020-05-12Paper
Vectorial Boolean functions with very low differential-linear uniformity using Maiorana-McFarland type construction2020-05-12Paper
Efficient quantum algorithms related to autocorrelation spectrum2020-05-12Paper
Device independent quantum key distribution using three-party pseudo-telepathy2020-05-12Paper
Analysis of the strict avalanche criterion in variants of arbiter-based physically unclonable functions2020-05-12Paper
Analysis on Boolean Function in a Restricted (Biased) Domain2020-01-28Paper
The connection between quadratic bent-negabent functions and the Kerdock code2019-12-18Paper
Differential fault attack on SIMON with very few faults2019-03-29Paper
Tools in analyzing linear approximation for Boolean functions related to FLIP2019-03-29Paper
Construction and search of balanced Boolean functions on even number of variables towards excellent autocorrelation profile2019-02-20Paper
On hardware implementation of Tang-maitra Boolean functions2019-02-15Paper
Modifying Maiorana--McFarland Type Bent Functions for Good Cryptographic Properties and Efficient Implementation2019-02-01Paper
A TMDTO Attack Against Lizard2018-09-14Paper
Clauser-Horne-Shimony-Holt versus three-party pseudo-telepathy: on the optimal number of samples in device-independent quantum private query2018-08-07Paper
Construction of $n$ -Variable ( $n\equiv 2 \bmod 4$ ) Balanced Boolean Functions With Maximum Absolute Value in Autocorrelation Spectra $2018-06-27Paper
A Differential Fault Attack on Plantlet2018-06-27Paper
A Super-Set of Patterson--Wiedemann Functions: Upper Bounds and Possible Nonlinearities2018-01-12Paper
Cryptanalysis of optimal differential energy watermarking (DEW) and a modified robust scheme2017-09-20Paper
Investigations on Bent and Negabent Functions via the Nega-Hadamard Transform2017-07-12Paper
Approximate Integer Common Divisor Problem Relates to Implicit Factorization2017-07-12Paper
High-Performance Hardware Implementation for RC4 Stream Cipher2017-07-12Paper
A Super-Set of Patterson-Wiedemann Functions – Upper Bounds and Possible Nonlinearities2017-06-13Paper
Quantum Algorithms Related to $$\textit{HN}$$ -Transforms of Boolean Functions2017-06-01Paper
Differential Fault Attack against Grain Family with Very Few Faults and Minimal Assumptions2017-05-16Paper
Patterson–Wiedemann Type Functions on 21 Variables With Nonlinearity Greater Than Bent Concatenation Bound2017-04-28Paper
Probabilistic signature based generalized framework for differential fault analysis of stream ciphers2017-03-27Paper
Redefining the transparency order2017-02-10Paper
Observing biases in the state: case studies with Trivium and Trivia-SC2017-02-10Paper
Chosen IV cryptanalysis on reduced round \texttt{ChaCha} and \texttt{Salsa}2016-05-18Paper
Application of Grover's algorithm to check non-resiliency of a Boolean function2016-05-04Paper
Proving TLS-attack related open biases of RC42015-09-30Paper
Dependence in IV-Related Bytes of RC4 Key Enhances Vulnerabilities in WPA2015-09-18Paper
Differential Power Analysis in Hamming Weight Model: How to Choose among (Extended) Affine Equivalent S-boxes2015-09-10Paper
Efficient quantum algorithms to construct arbitrary Dicke states2014-12-12Paper
A Differential Fault Attack on the Grain Family under Reasonable Assumptions2014-08-20Paper
(Non-)random sequences from (non-)random permutations -- analysis of RC4 stream cipher2014-04-01Paper
https://portal.mardi4nfdi.de/entity/Q28555752013-10-25Paper
A Differential Fault Attack on MICKEY 2.02013-10-10Paper
A Chosen IV Related Key Attack on Grain-128a2013-06-28Paper
New Results on Generalization of Roos-Type Biases and Related Keystreams of RC42013-06-07Paper
Some Results on Related Key-IV Pairs of Grain2013-03-13Paper
A Differential Fault Attack on Grain-128a Using MACs2013-03-13Paper
Cryptanalytic results on `Dual CRT' and `Common Prime' RSA2013-01-28Paper
A Differential Fault Attack on the Grain Family of Stream Ciphers2012-11-13Paper
Side Channel Attack to Actual Cryptanalysis: Breaking CRT-RSA with Low Weight Decryption Exponents2012-11-13Paper
Proof of Empirical RC4 Biases and New Key Correlations2012-06-08Paper
https://portal.mardi4nfdi.de/entity/Q31169742012-02-15Paper
On the Evolution of GGHN Cipher2011-12-16Paper
A Theoretical Analysis of the Structure of HC-1282011-11-10Paper
Laced Boolean functions and subset sum problems in finite fields2011-08-10Paper
Attack on Broadcast RC4 Revisited2011-07-07Paper
Some applications of lattice based root finding techniques2011-06-03Paper
Some observations on HC-1282011-04-08Paper
Partial Key Exposure Attack on RSA – Improvements for Limited Lattice Dimensions2010-12-07Paper
One Byte per Clock: A Novel RC4 Hardware2010-12-07Paper
Nega–Hadamard Transform, Bent and Negabent Functions2010-09-08Paper
Cryptanalysis of RSA with two decryption exponents2010-09-07Paper
Cryptanalysis of RSA with more than one decryption exponent2010-09-07Paper
Factoring RSA Modulus Using Prime Reconstruction from Random Known Bits2010-05-04Paper
Efficient CRT-RSA Decryption for Small Encryption Exponents2010-03-16Paper
Further results on implicit factoring in polynomial time2010-03-10Paper
On Some Sequences of the Secret Pseudo-random Index j in RC4 Key Scheduling2010-01-14Paper
On biases of permutation and keystream bytes of RC4 towards the secret key2009-10-26Paper
On affine (non)equivalence of Boolean functions2009-08-10Paper
PARTIAL KEY EXPOSURE ATTACKS ON RSA AND ITS VARIANT BY GUESSING A FEW BITS OF ONE OF THE PRIME FACTORS2009-08-06Paper
A constructive count of rotation symmetric functions2009-07-09Paper
https://portal.mardi4nfdi.de/entity/Q36355702009-07-06Paper
Results on rotation symmetric bent functions2009-06-19Paper
On non-negligible bias of the first output byte of RC4 towards the first three bytes of the secret key2009-03-31Paper
Idempotents in the neighbourhood of Patterson-Wiedemann functions having Walsh spectra zeros2009-03-31Paper
Improved Partial Key Exposure Attacks on RSA by Guessing a Few Bits of One of the Prime Factors2009-03-24Paper
https://portal.mardi4nfdi.de/entity/Q35975232009-02-09Paper
Analysis of RC4 and Proposal of Additional Layers for Better Security Margin2009-01-22Paper
A New Class of Weak Encryption Exponents in RSA2009-01-22Paper
Algebraic immunity for cryptographically significant Boolean functions: analysis and construction2008-12-21Paper
Construction of Nonlinear Resilient Boolean Functions Using “Small” Affine Functions2008-12-21Paper
Search for Boolean Functions With Excellent Profiles in the Rotation Symmetric Class2008-12-21Paper
Reducing the Number of Homogeneous Linear Equations in Finding Annihilators2008-11-27Paper
Revisiting Wiener’s Attack – New Weak Keys in RSA2008-11-20Paper
A complete characterization of the evolution of RC4 pseudo random generation algorithm2008-11-06Paper
New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC42008-09-18Paper
Rotation symmetric Boolean functions-count and cryptographic properties2008-09-10Paper
Recovering RC4 Permutation from 2048 Keystream Bytes if j Is Stuck2008-07-08Paper
On Non-randomness of the Permutation After RC4 Key Scheduling2008-04-17Paper
Construction of Rotation Symmetric Boolean Functions on Odd Number of Variables with Maximum Algebraic Immunity2008-04-17Paper
Enumeration of 9-Variable Rotation Symmetric Boolean Functions Having Nonlinearity > 2402008-04-11Paper
Permutation After RC4 Key Scheduling Reveals the Secret Key2008-03-25Paper
Applied Cryptography and Network Security2008-02-19Paper
Balancedness and correlation immunity of symmetric Boolean functions2007-09-21Paper
Exact quantum algorithm to distinguish Boolean functions of different weights2007-08-09Paper
Patterson-Wiedemann Construction Revisited2007-05-29Paper
Rotation Symmetric Boolean Functions –; Count and Cryptographic Properties2007-05-29Paper
Balancedness and Correlation Immunity of Symmetric Boolean Functions2007-05-29Paper
Basic theory in construction of Boolean functions with maximum possible annihilator immunity2006-11-22Paper
Information Security2006-10-20Paper
Distributed Computing – IWDC 20052006-10-10Paper
Patterson-Wiedemann construction revisited2006-08-04Paper
Fast Software Encryption2006-06-22Paper
A Maiorana--McFarland type construction for resilient Boolean functions on \(n\) variables (\(n\) even) with nonlinearity \(>2^{n-1}-2^{n/2}+2^{n/2-2}\)2006-04-28Paper
https://portal.mardi4nfdi.de/entity/Q33749312006-03-01Paper
Fast Software Encryption2005-12-27Paper
Fast Software Encryption2005-12-27Paper
Progress in Cryptology - INDOCRYPT 20042005-12-22Paper
Results on multiples of primitive polynomials and their products over GF(2)2005-09-22Paper
Further constructions of resilient Boolean functions with very high nonlinearity2005-05-11Paper
Linear codes in generalized construction of resilient functions with very high nonlinearity2005-05-11Paper
Maximum nonlinearity of symmetric Boolean functions on odd number of variables2005-05-11Paper
https://portal.mardi4nfdi.de/entity/Q47364222004-08-09Paper
https://portal.mardi4nfdi.de/entity/Q44735682004-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44283442003-09-15Paper
https://portal.mardi4nfdi.de/entity/Q44283482003-09-15Paper
https://portal.mardi4nfdi.de/entity/Q44174002003-07-29Paper
https://portal.mardi4nfdi.de/entity/Q44174102003-07-29Paper
https://portal.mardi4nfdi.de/entity/Q44174112003-07-29Paper
https://portal.mardi4nfdi.de/entity/Q44138642003-07-21Paper
https://portal.mardi4nfdi.de/entity/Q47885632003-05-19Paper
https://portal.mardi4nfdi.de/entity/Q47885722003-05-19Paper
https://portal.mardi4nfdi.de/entity/Q47885802003-05-19Paper
https://portal.mardi4nfdi.de/entity/Q47885872003-05-19Paper
https://portal.mardi4nfdi.de/entity/Q47985332003-03-19Paper
https://portal.mardi4nfdi.de/entity/Q47978072003-03-09Paper
Highly nonlinear balanced Boolean functions with good local and global avalanche characteristics.2003-01-21Paper
https://portal.mardi4nfdi.de/entity/Q45368222002-10-07Paper
Modifications of Patterson-Wiedemann functions for cryptographic applications2002-08-04Paper
Hamming weights of correlation immune Boolean functions2002-07-25Paper
Cryptographically significant Boolean functions with five valued Walsh spectra2002-07-15Paper
Cross-correlation analysis of cryptographically useful boolean functions and s-boxes2002-05-30Paper
https://portal.mardi4nfdi.de/entity/Q44216392002-01-01Paper
https://portal.mardi4nfdi.de/entity/Q27414432001-10-15Paper
https://portal.mardi4nfdi.de/entity/Q27414052001-10-14Paper
Ciphertext Only Attack on LFSR Based Encryption Scheme2000-11-14Paper
https://portal.mardi4nfdi.de/entity/Q42506251999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q49418561999-01-01Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Subhamoy Maitra