Goutam Paul

From MaRDI portal
Person:396614

Available identifiers

zbMath Open paul.goutamWikidataQ102367946 ScholiaQ102367946MaRDI QIDQ396614

List of research outcomes





PublicationDate of PublicationType
Quantum secret sharing protocol using GHZ state: implementation on IBM qiskit2023-11-10Paper
Measurement device-independent quantum secure direct communication with user authentication2022-12-06Paper
Dimensionality distinguishers2022-11-25Paper
Cryptanalysis of \textsc{FlexAEAD}2022-11-09Paper
Two-point FFT-based high capacity image steganography using calendar based message encoding2022-04-14Paper
Non-commutative space engine: a boost to thermodynamic processes2022-04-01Paper
Quantum cycle in relativistic non-commutative space with generalized uncertainty principle correction2022-03-01Paper
Quantum secure direct communication with mutual authentication using a single basis2022-01-03Paper
Two efficient measurement device independent quantum dialogue protocols2021-04-22Paper
Probing uncertainty relations in non-commutative space2019-09-03Paper
Revisiting integer factorization using closed timelike curves2019-03-15Paper
Quantum to classical one-way function and its applications in quantum money authentication2018-11-05Paper
Generalized nonlinearity of \(S\)-boxes2018-09-21Paper
Analysis of burn-in period for RC4 state transition2018-05-28Paper
On data complexity of distinguishing attacks versus message recovery attacks on stream ciphers2018-05-24Paper
Key recovery attack against 2.5-round \(\pi\)-Cipher2018-05-09Paper
Designing parity preserving reversible circuits2018-03-16Paper
Revisiting RC4 key collision: faster search algorithm and new 22-byte colliding key pairs2018-02-19Paper
Revisiting Generalized Bertand's Postulate and Prime Gaps2017-10-26Paper
Efficient compilers for after-the-fact leakage: from CPA to CCA-2 secure PKE to AKE2017-08-25Paper
Three Snakes in One Hole: The First Systematic Hardware Accelerator Design for SOSEMANUK with Optional Serpent and SNOW 2.0 Modes2017-05-16Paper
Revisiting the security proof of QUAD stream cipher: some corrections and tighter bounds2017-05-05Paper
One-key compression function based MAC with security beyond birthday bound2016-08-31Paper
Forward-secure authenticated symmetric key exchange protocol: new security model and secure construction2016-01-27Paper
Three-particle hyper-entanglement: teleportation and quantum key distribution2015-11-11Paper
Proving TLS-attack related open biases of RC42015-09-30Paper
Dependence in IV-related bytes of RC4 key enhances vulnerabilities in WPA2015-09-18Paper
One word/cycle HC-128 accelerator via state-splitting optimization2015-09-10Paper
Deterministic hard fault attack on Trivium2015-05-27Paper
A resilient quantum secret sharing scheme2015-04-29Paper
Another Look at Symmetric Incoherent Optimal Eavesdropping against BB842014-08-20Paper
Eavesdropping in semiquantum key distribution protocol2014-08-13Paper
(Non-)random sequences from (non-)random permutations -- analysis of RC4 stream cipher2014-04-01Paper
Generic cryptographic weakness of \(k\)-normal Boolean functions in certain stream ciphers and cryptanalysis of Grain-1282014-02-17Paper
New Results on Generalization of Roos-Type Biases and Related Keystreams of RC42013-06-07Paper
New speed records for Salsa20 stream cipher using an autotuning framework on GPUs2013-06-07Paper
Optimized GPU implementation and performance analysis of HC series of stream ciphers2013-06-04Paper
Impact of extending side channel attack on cipher variants: a case study with the HC series of stream ciphers2013-03-13Paper
Internal state recovery of keystream generator LILI-128 based on a novel weakness of the employed Boolean function2012-10-23Paper
Proof of empirical RC4 biases and new key correlations2012-06-08Paper
https://portal.mardi4nfdi.de/entity/Q31169742012-02-15Paper
A theoretical analysis of the structure of HC-1282011-11-10Paper
Attack on broadcast RC4 revisited2011-07-07Paper
Some observations on HC-1282011-04-08Paper
A cops and robber game in multidimensional grids2010-11-05Paper
On some sequences of the secret pseudo-random index \(j\) in RC4 key scheduling2010-01-14Paper
On biases of permutation and keystream bytes of RC4 towards the secret key2009-10-26Paper
Some Conjectures on the Number of Primes in Certain Intervals2009-05-30Paper
On non-negligible bias of the first output byte of RC4 towards the first three bytes of the secret key2009-03-31Paper
Analysis of RC4 and Proposal of Additional Layers for Better Security Margin2009-01-22Paper
A complete characterization of the evolution of RC4 pseudo random generation algorithm2008-11-06Paper
New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC42008-09-18Paper
Recovering RC4 Permutation from 2048 Keystream Bytes if j Is Stuck2008-07-08Paper
On Non-randomness of the Permutation After RC4 Key Scheduling2008-04-17Paper
Permutation After RC4 Key Scheduling Reveals the Secret Key2008-03-25Paper

Research outcomes over time

This page was built for person: Goutam Paul