Goutam Paul

From MaRDI portal
(Redirected from Person:396614)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Quantum secret sharing protocol using GHZ state: implementation on IBM qiskit
Quantum Information Processing
2023-11-10Paper
Measurement device-independent quantum secure direct communication with user authentication
Quantum Information Processing
2022-12-06Paper
Dimensionality distinguishers
Quantum Information Processing
2022-11-25Paper
Cryptanalysis of \textsc{FlexAEAD}
Progress in Cryptology - AFRICACRYPT 2020
2022-11-09Paper
Two-point FFT-based high capacity image steganography using calendar based message encoding
Information Sciences
2022-04-14Paper
Non-commutative space engine: a boost to thermodynamic processes
Modern Physics Letters A
2022-04-01Paper
Quantum cycle in relativistic non-commutative space with generalized uncertainty principle correction
Physica A
2022-03-01Paper
Quantum secure direct communication with mutual authentication using a single basis
International Journal of Theoretical Physics
2022-01-03Paper
Two efficient measurement device independent quantum dialogue protocols
International Journal of Quantum Information
2021-04-22Paper
Probing uncertainty relations in non-commutative space
International Journal of Theoretical Physics
2019-09-03Paper
Revisiting integer factorization using closed timelike curves
Quantum Information Processing
2019-03-15Paper
Quantum to classical one-way function and its applications in quantum money authentication
Quantum Information Processing
2018-11-05Paper
Generalized nonlinearity of \(S\)-boxes
Advances in Mathematics of Communications
2018-09-21Paper
Analysis of burn-in period for RC4 state transition
Cryptography and Communications
2018-05-28Paper
On data complexity of distinguishing attacks versus message recovery attacks on stream ciphers
Designs, Codes and Cryptography
2018-05-24Paper
Key recovery attack against 2.5-round \(\pi\)-Cipher
Fast Software Encryption
2018-05-09Paper
Designing parity preserving reversible circuits
(available as arXiv preprint)
2018-03-16Paper
Revisiting RC4 key collision: faster search algorithm and new 22-byte colliding key pairs
Cryptography and Communications
2018-02-19Paper
Revisiting Generalized Bertand's Postulate and Prime Gaps2017-10-26Paper
Efficient compilers for after-the-fact leakage: from CPA to CCA-2 secure PKE to AKE2017-08-25Paper
Three Snakes in One Hole: The First Systematic Hardware Accelerator Design for SOSEMANUK with Optional Serpent and SNOW 2.0 Modes
IEEE Transactions on Computers
2017-05-16Paper
Revisiting the security proof of QUAD stream cipher: some corrections and tighter bounds
Information Security and Cryptology
2017-05-05Paper
One-key compression function based MAC with security beyond birthday bound
Information Security and Privacy
2016-08-31Paper
Forward-secure authenticated symmetric key exchange protocol: new security model and secure construction
Provable Security
2016-01-27Paper
Three-particle hyper-entanglement: teleportation and quantum key distribution
Quantum Information Processing
2015-11-11Paper
Proving TLS-attack related open biases of RC4
Designs, Codes and Cryptography
2015-09-30Paper
Dependence in IV-related bytes of RC4 key enhances vulnerabilities in WPA
Fast Software Encryption
2015-09-18Paper
One word/cycle HC-128 accelerator via state-splitting optimization
Progress in Cryptology -- INDOCRYPT 2014
2015-09-10Paper
Deterministic hard fault attack on Trivium
Advances in Information and Computer Security
2015-05-27Paper
A resilient quantum secret sharing scheme
International Journal of Theoretical Physics
2015-04-29Paper
Another Look at Symmetric Incoherent Optimal Eavesdropping against BB84
Lecture Notes in Computer Science
2014-08-20Paper
Eavesdropping in semiquantum key distribution protocol
Information Processing Letters
2014-08-13Paper
(Non-)random sequences from (non-)random permutations -- analysis of RC4 stream cipher
Journal of Cryptology
2014-04-01Paper
Generic cryptographic weakness of \(k\)-normal Boolean functions in certain stream ciphers and cryptanalysis of Grain-128
Periodica Mathematica Hungarica
2014-02-17Paper
New Results on Generalization of Roos-Type Biases and Related Keystreams of RC4
Progress in Cryptology – AFRICACRYPT 2013
2013-06-07Paper
New speed records for Salsa20 stream cipher using an autotuning framework on GPUs
Progress in Cryptology – AFRICACRYPT 2013
2013-06-07Paper
Optimized GPU implementation and performance analysis of HC series of stream ciphers
Lecture Notes in Computer Science
2013-06-04Paper
Impact of extending side channel attack on cipher variants: a case study with the HC series of stream ciphers
Security, Privacy, and Applied Cryptography Engineering
2013-03-13Paper
Internal state recovery of keystream generator LILI-128 based on a novel weakness of the employed Boolean function
Information Processing Letters
2012-10-23Paper
Proof of empirical RC4 biases and new key correlations
Selected Areas in Cryptography
2012-06-08Paper
scientific article; zbMATH DE number 6006600 (Why is no real title available?)2012-02-15Paper
A theoretical analysis of the structure of HC-128
Advances in Information and Computer Security
2011-11-10Paper
Attack on broadcast RC4 revisited
Fast Software Encryption
2011-07-07Paper
Some observations on HC-128
Designs, Codes and Cryptography
2011-04-08Paper
A cops and robber game in multidimensional grids
Discrete Applied Mathematics
2010-11-05Paper
On some sequences of the secret pseudo-random index \(j\) in RC4 key scheduling
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
2010-01-14Paper
On biases of permutation and keystream bytes of RC4 towards the secret key
Cryptography and Communications
2009-10-26Paper
Some Conjectures on the Number of Primes in Certain Intervals2009-05-30Paper
On non-negligible bias of the first output byte of RC4 towards the first three bytes of the secret key
Designs, Codes and Cryptography
2009-03-31Paper
Analysis of RC4 and Proposal of Additional Layers for Better Security Margin
Progress in Cryptology - INDOCRYPT 2008
2009-01-22Paper
A complete characterization of the evolution of RC4 pseudo random generation algorithm
Journal of Mathematical Cryptology
2008-11-06Paper
New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4
Fast Software Encryption
2008-09-18Paper
Recovering RC4 Permutation from 2048 Keystream Bytes if j Is Stuck
Information Security and Privacy
2008-07-08Paper
On Non-randomness of the Permutation After RC4 Key Scheduling
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
2008-04-17Paper
Permutation After RC4 Key Scheduling Reveals the Secret Key
Selected Areas in Cryptography
2008-03-25Paper


Research outcomes over time


This page was built for person: Goutam Paul