The following pages link to Goutam Paul (Q396614):
Displaying 50 items.
- Eavesdropping in semiquantum key distribution protocol (Q396615) (← links)
- Internal state recovery of keystream generator LILI-128 based on a novel weakness of the employed Boolean function (Q456133) (← links)
- Proving TLS-attack related open biases of RC4 (Q499670) (← links)
- A cops and robber game in multidimensional grids (Q602750) (← links)
- Revisiting integer factorization using closed timelike curves (Q669871) (← links)
- Three-particle hyper-entanglement: teleportation and quantum key distribution (Q892645) (← links)
- On non-negligible bias of the first output byte of RC4 towards the first three bytes of the secret key (Q1009063) (← links)
- On biases of permutation and keystream bytes of RC4 towards the secret key (Q1032499) (← links)
- Revisiting RC4 key collision: faster search algorithm and new 22-byte colliding key pairs (Q1699264) (← links)
- Designing parity preserving reversible circuits (Q1705583) (← links)
- Analysis of burn-in period for RC4 state transition (Q1749797) (← links)
- On data complexity of distinguishing attacks versus message recovery attacks on stream ciphers (Q1752540) (← links)
- Generalized nonlinearity of \(S\)-boxes (Q1783710) (← links)
- Quantum to classical one-way function and its applications in quantum money authentication (Q1993848) (← links)
- Quantum secure direct communication with mutual authentication using a single basis (Q2063910) (← links)
- Dimensionality distinguishers (Q2100813) (← links)
- Measurement device-independent quantum secure direct communication with user authentication (Q2101540) (← links)
- Two-point FFT-based high capacity image steganography using calendar based message encoding (Q2123497) (← links)
- Probing uncertainty relations in non-commutative space (Q2322171) (← links)
- A resilient quantum secret sharing scheme (Q2342809) (← links)
- Efficient compilers for after-the-fact leakage: from CPA to CCA-2 secure PKE to AKE (Q2399972) (← links)
- Some observations on HC-128 (Q2430696) (← links)
- Generic cryptographic weakness of \(k\)-normal Boolean functions in certain stream ciphers and cryptanalysis of Grain-128 (Q2434149) (← links)
- (Non-)random sequences from (non-)random permutations -- analysis of RC4 stream cipher (Q2442647) (← links)
- Quantum cycle in relativistic non-commutative space with generalized uncertainty principle correction (Q2667679) (← links)
- One-Key Compression Function Based MAC with Security Beyond Birthday Bound (Q2817474) (← links)
- Another Look at Symmetric Incoherent Optimal Eavesdropping against BB84 (Q2876924) (← links)
- Proof of Empirical RC4 Biases and New Key Correlations (Q2889868) (← links)
- One Word/Cycle HC-128 Accelerator via State-Splitting Optimization (Q2945390) (← links)
- Dependence in IV-Related Bytes of RC4 Key Enhances Vulnerabilities in WPA (Q2946918) (← links)
- Revisiting the Security Proof of QUAD Stream Cipher: Some Corrections and Tighter Bounds (Q2980848) (← links)
- Three Snakes in One Hole: The First Systematic Hardware Accelerator Design for SOSEMANUK with Optional Serpent and SNOW 2.0 Modes (Q2985647) (← links)
- Attack on Broadcast RC4 Revisited (Q3013085) (← links)
- A Theoretical Analysis of the Structure of HC-128 (Q3098002) (← links)
- (Q3116974) (← links)
- Forward-Secure Authenticated Symmetric Key Exchange Protocol: New Security Model and Secure Construction (Q3467160) (← links)
- Recovering RC4 Permutation from 2048 Keystream Bytes if j Is Stuck (Q3511172) (← links)
- New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4 (Q3525678) (← links)
- A complete characterization of the evolution of RC4 pseudo random generation algorithm (Q3537424) (← links)
- On Some Sequences of the Secret Pseudo-random Index j in RC4 Key Scheduling (Q3656821) (← links)
- Key Recovery Attack Against 2.5-Round $$\pi $$ -Cipher (Q4639497) (← links)
- Impact of Extending Side Channel Attack on Cipher Variants: A Case Study with the HC Series of Stream Ciphers (Q4910845) (← links)
- Optimized GPU Implementation and Performance Analysis of HC Series of Stream Ciphers (Q4922876) (← links)
- New Speed Records for Salsa20 Stream Cipher Using an Autotuning Framework on GPUs (Q4924681) (← links)
- New Results on Generalization of Roos-Type Biases and Related Keystreams of RC4 (Q4924684) (← links)
- Two efficient measurement device independent quantum dialogue protocols (Q4985076) (← links)
- Cryptanalysis of FlexAEAD (Q5048968) (← links)
- Non-commutative space engine: A boost to thermodynamic processes (Q5067274) (← links)
- Deterministic Hard Fault Attack on Trivium (Q5253633) (← links)
- On Non-randomness of the Permutation After RC4 Key Scheduling (Q5386083) (← links)