Sabyasachi Dutta

From MaRDI portal
Person:300397



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Tree parity machine-based symmetric encryption: a hybrid approach2024-10-29Paper
A lower bound on the share size of leakage-resilient secret-sharing schemes2024-10-02Paper
Lower bounds on the share size of leakage resilient cheating detectable secret sharing2024-06-05Paper
Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness
Information Security Practice and Experience
2023-06-30Paper
Secure Computation of Inner Product of Vectors with Distributed Entries and Its Applications to SVM
Information Security Practice and Experience
2023-06-30Paper
Leakage Resilient Cheating Detectable Secret Sharing Schemes2023-04-13Paper
Quantum multi-secret sharing via trap codes and discrete quantum walks
Quantum Information Processing
2022-12-09Paper
Password protected secret sharing from lattices2022-03-21Paper
Theory and application of computationally-independent one-way functions: interactive proof of ability -- revisited2021-08-31Paper
Visual secret sharing scheme with distributed levels of importance of shadows2021-08-31Paper
Evolving perfect hash families: a combinatorial viewpoint of evolving secret sharing
Cryptology and Network Security
2020-07-20Paper
Maximal contrast color visual secret sharing schemes
Designs, Codes and Cryptography
2019-06-06Paper
Contrast optimal XOR based visual cryptographic schemes2018-03-16Paper
XOR based non-monotone \(t\)-\((k,n)^*\)-visual cryptographic schemes using linear algebra
Information and Communications Security
2016-12-19Paper
Constructions and analysis of some efficient \(t\)-\((k,n)^\ast\)-visual cryptographic schemes using linear algebraic techniques
Designs, Codes and Cryptography
2016-06-27Paper
Indistinguishability against chosen ciphertext verification attack revisited: the complete picture
Provable Security
2013-10-23Paper


Research outcomes over time


This page was built for person: Sabyasachi Dutta