Goutam Paul

From MaRDI portal
Person:396614

Available identifiers

zbMath Open paul.goutamWikidataQ102367946 ScholiaQ102367946MaRDI QIDQ396614

List of research outcomes

PublicationDate of PublicationType
Quantum secret sharing protocol using GHZ state: implementation on IBM qiskit2023-11-10Paper
Measurement device-independent quantum secure direct communication with user authentication2022-12-06Paper
Dimensionality distinguishers2022-11-25Paper
Cryptanalysis of FlexAEAD2022-11-09Paper
Two-point FFT-based high capacity image steganography using calendar based message encoding2022-04-14Paper
Non-commutative space engine: A boost to thermodynamic processes2022-04-01Paper
Quantum cycle in relativistic non-commutative space with generalized uncertainty principle correction2022-03-01Paper
Quantum secure direct communication with mutual authentication using a single basis2022-01-03Paper
Two efficient measurement device independent quantum dialogue protocols2021-04-22Paper
Probing uncertainty relations in non-commutative space2019-09-03Paper
Revisiting integer factorization using closed timelike curves2019-03-15Paper
Quantum to classical one-way function and its applications in quantum money authentication2018-11-05Paper
Generalized nonlinearity of \(S\)-boxes2018-09-21Paper
Analysis of burn-in period for RC4 state transition2018-05-28Paper
On data complexity of distinguishing attacks versus message recovery attacks on stream ciphers2018-05-24Paper
Key Recovery Attack Against 2.5-Round $$\pi $$ -Cipher2018-05-09Paper
Designing parity preserving reversible circuits2018-03-16Paper
Revisiting RC4 key collision: faster search algorithm and new 22-byte colliding key pairs2018-02-19Paper
Revisiting Generalized Bertand's Postulate and Prime Gaps2017-10-26Paper
Efficient compilers for after-the-fact leakage: from CPA to CCA-2 secure PKE to AKE2017-08-25Paper
Three Snakes in One Hole: The First Systematic Hardware Accelerator Design for SOSEMANUK with Optional Serpent and SNOW 2.0 Modes2017-05-16Paper
Revisiting the Security Proof of QUAD Stream Cipher: Some Corrections and Tighter Bounds2017-05-05Paper
One-Key Compression Function Based MAC with Security Beyond Birthday Bound2016-08-31Paper
Forward-Secure Authenticated Symmetric Key Exchange Protocol: New Security Model and Secure Construction2016-01-27Paper
Three-particle hyper-entanglement: teleportation and quantum key distribution2015-11-11Paper
Proving TLS-attack related open biases of RC42015-09-30Paper
Dependence in IV-Related Bytes of RC4 Key Enhances Vulnerabilities in WPA2015-09-18Paper
One Word/Cycle HC-128 Accelerator via State-Splitting Optimization2015-09-10Paper
Deterministic Hard Fault Attack on Trivium2015-05-27Paper
A resilient quantum secret sharing scheme2015-04-29Paper
Another Look at Symmetric Incoherent Optimal Eavesdropping against BB842014-08-20Paper
Eavesdropping in semiquantum key distribution protocol2014-08-13Paper
(Non-)random sequences from (non-)random permutations -- analysis of RC4 stream cipher2014-04-01Paper
Generic cryptographic weakness of \(k\)-normal Boolean functions in certain stream ciphers and cryptanalysis of Grain-1282014-02-17Paper
New Speed Records for Salsa20 Stream Cipher Using an Autotuning Framework on GPUs2013-06-07Paper
New Results on Generalization of Roos-Type Biases and Related Keystreams of RC42013-06-07Paper
Optimized GPU Implementation and Performance Analysis of HC Series of Stream Ciphers2013-06-04Paper
Impact of Extending Side Channel Attack on Cipher Variants: A Case Study with the HC Series of Stream Ciphers2013-03-13Paper
Internal state recovery of keystream generator LILI-128 based on a novel weakness of the employed Boolean function2012-10-23Paper
Proof of Empirical RC4 Biases and New Key Correlations2012-06-08Paper
https://portal.mardi4nfdi.de/entity/Q31169742012-02-15Paper
A Theoretical Analysis of the Structure of HC-1282011-11-10Paper
Attack on Broadcast RC4 Revisited2011-07-07Paper
Some observations on HC-1282011-04-08Paper
A cops and robber game in multidimensional grids2010-11-05Paper
On Some Sequences of the Secret Pseudo-random Index j in RC4 Key Scheduling2010-01-14Paper
On biases of permutation and keystream bytes of RC4 towards the secret key2009-10-26Paper
Some Conjectures on the Number of Primes in Certain Intervals2009-05-30Paper
On non-negligible bias of the first output byte of RC4 towards the first three bytes of the secret key2009-03-31Paper
Analysis of RC4 and Proposal of Additional Layers for Better Security Margin2009-01-22Paper
A complete characterization of the evolution of RC4 pseudo random generation algorithm2008-11-06Paper
New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC42008-09-18Paper
Recovering RC4 Permutation from 2048 Keystream Bytes if j Is Stuck2008-07-08Paper
On Non-randomness of the Permutation After RC4 Key Scheduling2008-04-17Paper
Permutation After RC4 Key Scheduling Reveals the Secret Key2008-03-25Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Goutam Paul