Subhamoy Maitra

From MaRDI portal


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
How do the arbiter PUFs sample the Boolean function class?
 
2024-10-14Paper
Plateaued rotation symmetric Boolean functions on odd number of variables
 
2024-09-18Paper
Efficient search for symmetric Boolean functions under constraints on Walsh spectra values
 
2024-09-18Paper
Autocorrelation spectra of balanced Boolean functions on an odd number of input variables with maximum absolute value \(<2^{\frac{n+1}2}\)
 
2024-09-18Paper
Notion of algebraic immunity and its evaluation related to fast algebraic attacks
 
2024-09-18Paper
Results on rotation symmetric bent functions
 
2024-09-18Paper
Construction of resilient functions by the concatenation of Boolean functions having nonintersecting Walsh spectra
 
2024-09-18Paper
On dihedral group invariant Boolean functions (extended abstract)
 
2024-09-18Paper
Balanced Boolean function on 13-variables having nonlinearity greater than the bent concatenation bound
 
2024-09-18Paper
Introducing nega-forrelation: quantum algorithms in analyzing nega-Hadamard and nega-crosscorrelation spectra
Designs, Codes and Cryptography
2024-04-03Paper
Improved and formal proposal for device-independent quantum private query *
Journal of Physics A: Mathematical and Theoretical
2024-03-05Paper
Following forrelation -- quantum algorithms in exploring Boolean functions' spectra
Advances in Mathematics of Communications
2023-12-14Paper
Analysis of Boolean functions related to binary input binary output two-party nonlocal games
Cryptography and Communications
2023-11-09Paper
Modifying bent functions to obtain the balanced ones with high nonlinearity
Lecture Notes in Computer Science
2023-08-14Paper
Revisiting \textit{BoolTest} -- on randomness testing using Boolean functions
Lecture Notes in Computer Science
2023-08-14Paper
A proposal for device independent probabilistic quantum oblivious transfer
Lecture Notes in Computer Science
2023-08-14Paper
Differential fault attack on Espresso
Lecture Notes in Computer Science
2023-05-12Paper
Quantum resource estimation for FSR based symmetric ciphers and related Grover's attacks
Lecture Notes in Computer Science
2023-05-12Paper
Parity decision tree in classical-quantum separations for certain classes of Boolean functions
Quantum Information Processing
2023-03-17Paper
Certain Observations on ACORN v3 and the Implications to TMDTO Attacks
Security, Privacy, and Applied Cryptography Engineering
2022-12-09Paper
Differential Fault Attack on Grain v1, ACORN v3 and Lizard
Security, Privacy, and Applied Cryptography Engineering
2022-12-09Paper
Improved and practical proposal for measurement device independent quantum dialogue
Quantum Information Processing
2022-11-24Paper
More glimpses of the RC4 internal state array
 
2022-07-06Paper
Resolvable block designs in construction of approximate real MUBs that are sparse
Cryptography and Communications
2022-06-13Paper
On the existence and non-existence of some classes of bent-negabent functions
Applicable Algebra in Engineering, Communication and Computing
2022-05-23Paper
Differential Fault Attack on Kreyvium & FLIP
IEEE Transactions on Computers
2022-03-24Paper
Further cryptographic properties of the multiplicative inverse function
Discrete Applied Mathematics
2021-12-07Paper
Construction of balanced vectorial Boolean functions with almost optimal nonlinearity and very low differential-linear uniformity
Finite Fields and their Applications
2021-11-02Paper
Quantum algorithms for cryptographically significant Boolean functions. An IBMQ experience
SpringerBriefs in Computer Science
2021-07-20Paper
On approximate real mutually unbiased bases in square dimension
Cryptography and Communications
2021-07-13Paper
Glimpses are forever in RC4 amidst the spectre of biases
Discrete Applied Mathematics
2021-05-31Paper
Further clarification on Mantin's digraph repetition bias in RC4
Designs, Codes and Cryptography
2021-01-25Paper
Differential fault attack on hardware stream ciphers -- a technical survey
Combinatorics and Finite Fields
2020-07-27Paper
Efficient quantum algorithms related to autocorrelation spectrum
 
2020-05-12Paper
Vectorial Boolean functions with very low differential-linear uniformity using Maiorana-McFarland type construction
 
2020-05-12Paper
RC4: non-randomness in the index \(j\) and some results on its cycles
 
2020-05-12Paper
Device independent quantum key distribution using three-party pseudo-telepathy
 
2020-05-12Paper
Analysis of the strict avalanche criterion in variants of arbiter-based physically unclonable functions
 
2020-05-12Paper
Analysis on Boolean Function in a Restricted (Biased) Domain
IEEE Transactions on Information Theory
2020-01-28Paper
The connection between quadratic bent-negabent functions and the Kerdock code
Applicable Algebra in Engineering, Communication and Computing
2019-12-18Paper
Differential fault attack on SIMON with very few faults
 
2019-03-29Paper
Tools in analyzing linear approximation for Boolean functions related to FLIP
 
2019-03-29Paper
Construction and search of balanced Boolean functions on even number of variables towards excellent autocorrelation profile
Designs, Codes and Cryptography
2019-02-20Paper
On hardware implementation of Tang-maitra Boolean functions
 
2019-02-15Paper
Modifying Maiorana-McFarland type bent functions for good cryptographic properties and efficient implementation
SIAM Journal on Discrete Mathematics
2019-02-01Paper
A TMDTO Attack Against Lizard
IEEE Transactions on Computers
2018-09-14Paper
Clauser-Horne-Shimony-Holt versus three-party pseudo-telepathy: on the optimal number of samples in device-independent quantum private query
Quantum Information Processing
2018-08-07Paper
Construction of \(n\)-variable \((n\equiv 2\bmod 4)\) balanced Boolean functions with maximum absolute value in autocorrelation spectra \(<2^{\frac{n}{2}}\)
IEEE Transactions on Information Theory
2018-06-27Paper
A Differential Fault Attack on Plantlet
IEEE Transactions on Computers
2018-06-27Paper
A Super-Set of Patterson--Wiedemann Functions: Upper Bounds and Possible Nonlinearities
SIAM Journal on Discrete Mathematics
2018-01-12Paper
Cryptanalysis of optimal differential energy watermarking (DEW) and a modified robust scheme
IEEE Transactions on Signal Processing
2017-09-20Paper
High-Performance Hardware Implementation for RC4 Stream Cipher
IEEE Transactions on Computers
2017-07-12Paper
Investigations on Bent and Negabent Functions via the Nega-Hadamard Transform
IEEE Transactions on Information Theory
2017-07-12Paper
Approximate Integer Common Divisor Problem Relates to Implicit Factorization
IEEE Transactions on Information Theory
2017-07-12Paper
A super-set of Patterson-Wiedemann functions -- upper bounds and possible nonlinearities
Arithmetic of Finite Fields
2017-06-13Paper
Quantum algorithms related to \(HN\)-transforms of Boolean functions
Codes, Cryptology and Information Security
2017-06-01Paper
Differential Fault Attack against Grain Family with Very Few Faults and Minimal Assumptions
IEEE Transactions on Computers
2017-05-16Paper
Patterson–Wiedemann Type Functions on 21 Variables With Nonlinearity Greater Than Bent Concatenation Bound
IEEE Transactions on Information Theory
2017-04-28Paper
Probabilistic signature based generalized framework for differential fault analysis of stream ciphers
Cryptography and Communications
2017-03-27Paper
Redefining the transparency order
Designs, Codes and Cryptography
2017-02-10Paper
Observing biases in the state: case studies with Trivium and Trivia-SC
Designs, Codes and Cryptography
2017-02-10Paper
Chosen IV cryptanalysis on reduced round \texttt{ChaCha} and \texttt{Salsa}
Discrete Applied Mathematics
2016-05-18Paper
Application of Grover's algorithm to check non-resiliency of a Boolean function
Cryptography and Communications
2016-05-04Paper
Proving TLS-attack related open biases of RC4
Designs, Codes and Cryptography
2015-09-30Paper
Dependence in IV-related bytes of RC4 key enhances vulnerabilities in WPA
Fast Software Encryption
2015-09-18Paper
Differential power analysis in Hamming weight model: how to choose among (extended) affine equivalent S-boxes
Progress in Cryptology -- INDOCRYPT 2014
2015-09-10Paper
Efficient quantum algorithms to construct arbitrary Dicke states
Quantum Information Processing
2014-12-12Paper
A Differential Fault Attack on the Grain Family under Reasonable Assumptions
Lecture Notes in Computer Science
2014-08-20Paper
(Non-)random sequences from (non-)random permutations -- analysis of RC4 stream cipher
Journal of Cryptology
2014-04-01Paper
Counting Heron triangles with constraints
Integers
2013-10-25Paper
A differential fault attack on MICKEY 2.0
Cryptographic Hardware and Embedded Systems - CHES 2013
2013-10-10Paper
A chosen IV related key attack on Grain-128a
Information Security and Privacy
2013-06-28Paper
New Results on Generalization of Roos-Type Biases and Related Keystreams of RC4
Progress in Cryptology – AFRICACRYPT 2013
2013-06-07Paper
A differential fault attack on Grain-128a using macs
Security, Privacy, and Applied Cryptography Engineering
2013-03-13Paper
Some results on related key-IV pairs of grain
Security, Privacy, and Applied Cryptography Engineering
2013-03-13Paper
Cryptanalytic results on `Dual CRT' and `Common Prime' RSA
Designs, Codes and Cryptography
2013-01-28Paper
Side channel attack to actual cryptanalysis: breaking CRT-RSA with low weight decryption exponents
Cryptographic Hardware and Embedded Systems – CHES 2012
2012-11-13Paper
A differential fault attack on the grain family of stream ciphers
Cryptographic Hardware and Embedded Systems – CHES 2012
2012-11-13Paper
Proof of empirical RC4 biases and new key correlations
Selected Areas in Cryptography
2012-06-08Paper
scientific article; zbMATH DE number 6006600 (Why is no real title available?)
 
2012-02-15Paper
On the evolution of GGHN cipher
Lecture Notes in Computer Science
2011-12-16Paper
A theoretical analysis of the structure of HC-128
Advances in Information and Computer Security
2011-11-10Paper
Laced Boolean functions and subset sum problems in finite fields
Discrete Applied Mathematics
2011-08-10Paper
Attack on broadcast RC4 revisited
Fast Software Encryption
2011-07-07Paper
Some applications of lattice based root finding techniques
Advances in Mathematics of Communications
2011-06-03Paper
Some observations on HC-128
Designs, Codes and Cryptography
2011-04-08Paper
One byte per clock: a novel RC4 hardware
Progress in Cryptology - INDOCRYPT 2010
2010-12-07Paper
Partial key exposure attack on RSA -- improvements for limited lattice dimensions
Progress in Cryptology - INDOCRYPT 2010
2010-12-07Paper
Nega-Hadamard transform, bent and negabent functions
Sequences and Their Applications – SETA 2010
2010-09-08Paper
Cryptanalysis of RSA with two decryption exponents
Information Processing Letters
2010-09-07Paper
Cryptanalysis of RSA with more than one decryption exponent
Information Processing Letters
2010-09-07Paper
Factoring RSA modulus using prime reconstruction from random known bits
Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings
2010-05-04Paper
Efficient CRT-RSA decryption for small encryption exponents
Topics in Cryptology - CT-RSA 2010
2010-03-16Paper
Further results on implicit factoring in polynomial time
Advances in Mathematics of Communications
2010-03-10Paper
On some sequences of the secret pseudo-random index \(j\) in RC4 key scheduling
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
2010-01-14Paper
On biases of permutation and keystream bytes of RC4 towards the secret key
Cryptography and Communications
2009-10-26Paper
On affine (non)equivalence of Boolean functions
Computing
2009-08-10Paper
PARTIAL KEY EXPOSURE ATTACKS ON RSA AND ITS VARIANT BY GUESSING A FEW BITS OF ONE OF THE PRIME FACTORS
Bulletin of the Korean Mathematical Society
2009-08-06Paper
A constructive count of rotation symmetric functions
Information Processing Letters
2009-07-09Paper
Efficient search for symmetric Boolean functions under constraints on Walsh spectrum values
 
2009-07-06Paper
Results on rotation symmetric bent functions
Discrete Mathematics
2009-06-19Paper
On non-negligible bias of the first output byte of RC4 towards the first three bytes of the secret key
Designs, Codes and Cryptography
2009-03-31Paper
Idempotents in the neighbourhood of Patterson-Wiedemann functions having Walsh spectra zeros
Designs, Codes and Cryptography
2009-03-31Paper
Improved Partial Key Exposure Attacks on RSA by Guessing a Few Bits of One of the Prime Factors
Information Security and Cryptology – ICISC 2008
2009-03-24Paper
Boolean functions on odd number of variables having nonlinearity greater than the bent concatenation bound
 
2009-02-09Paper
A New Class of Weak Encryption Exponents in RSA
Progress in Cryptology - INDOCRYPT 2008
2009-01-22Paper
Analysis of RC4 and Proposal of Additional Layers for Better Security Margin
Progress in Cryptology - INDOCRYPT 2008
2009-01-22Paper
Algebraic immunity for cryptographically significant Boolean functions: analysis and construction
IEEE Transactions on Information Theory
2008-12-21Paper
Search for Boolean Functions With Excellent Profiles in the Rotation Symmetric Class
IEEE Transactions on Information Theory
2008-12-21Paper
Construction of Nonlinear Resilient Boolean Functions Using “Small” Affine Functions
IEEE Transactions on Information Theory
2008-12-21Paper
Reducing the Number of Homogeneous Linear Equations in Finding Annihilators
Sequences and Their Applications – SETA 2006
2008-11-27Paper
Revisiting Wiener’s Attack – New Weak Keys in RSA
Lecture Notes in Computer Science
2008-11-20Paper
A complete characterization of the evolution of RC4 pseudo random generation algorithm
Journal of Mathematical Cryptology
2008-11-06Paper
New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4
Fast Software Encryption
2008-09-18Paper
Rotation symmetric Boolean functions-count and cryptographic properties
Discrete Applied Mathematics
2008-09-10Paper
Recovering RC4 Permutation from 2048 Keystream Bytes if j Is Stuck
Information Security and Privacy
2008-07-08Paper
Construction of Rotation Symmetric Boolean Functions on Odd Number of Variables with Maximum Algebraic Immunity
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
2008-04-17Paper
On Non-randomness of the Permutation After RC4 Key Scheduling
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
2008-04-17Paper
Enumeration of 9-Variable Rotation Symmetric Boolean Functions Having Nonlinearity > 240
Progress in Cryptology - INDOCRYPT 2006
2008-04-11Paper
Permutation After RC4 Key Scheduling Reveals the Secret Key
Selected Areas in Cryptography
2008-03-25Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2008-02-19Paper
Balancedness and correlation immunity of symmetric Boolean functions
Discrete Mathematics
2007-09-21Paper
Exact quantum algorithm to distinguish Boolean functions of different weights
Journal of Physics A: Mathematical and Theoretical
2007-08-09Paper
Patterson-Wiedemann Construction Revisited
Electronic Notes in Discrete Mathematics
2007-05-29Paper
Balancedness and Correlation Immunity of Symmetric Boolean Functions
Electronic Notes in Discrete Mathematics
2007-05-29Paper
Rotation Symmetric Boolean Functions –; Count and Cryptographic Properties
Electronic Notes in Discrete Mathematics
2007-05-29Paper
Basic theory in construction of Boolean functions with maximum possible annihilator immunity
Designs, Codes and Cryptography
2006-11-22Paper
Information Security
Lecture Notes in Computer Science
2006-10-20Paper
Distributed Computing – IWDC 2005
Lecture Notes in Computer Science
2006-10-10Paper
Patterson-Wiedemann construction revisited
Discrete Mathematics
2006-08-04Paper
Fast Software Encryption
Lecture Notes in Computer Science
2006-06-22Paper
A Maiorana--McFarland type construction for resilient Boolean functions on \(n\) variables (\(n\) even) with nonlinearity \(>2^{n-1}-2^{n/2}+2^{n/2-2}\)
Discrete Applied Mathematics
2006-04-28Paper
Construction of nonlinear Boolean functions with important cryptographic properties
 
2006-03-01Paper
Fast Software Encryption
Lecture Notes in Computer Science
2005-12-27Paper
Fast Software Encryption
Lecture Notes in Computer Science
2005-12-27Paper
Progress in Cryptology - INDOCRYPT 2004
Lecture Notes in Computer Science
2005-12-22Paper
Results on multiples of primitive polynomials and their products over GF(2)
Theoretical Computer Science
2005-09-22Paper
Maximum nonlinearity of symmetric Boolean functions on odd number of variables
IEEE Transactions on Information Theory
2005-05-11Paper
Further constructions of resilient Boolean functions with very high nonlinearity
IEEE Transactions on Information Theory
2005-05-11Paper
Linear codes in generalized construction of resilient functions with very high nonlinearity
IEEE Transactions on Information Theory
2005-05-11Paper
scientific article; zbMATH DE number 2085195 (Why is no real title available?)
 
2004-08-09Paper
scientific article; zbMATH DE number 2080672 (Why is no real title available?)
 
2004-08-04Paper
scientific article; zbMATH DE number 1980963 (Why is no real title available?)
 
2003-09-15Paper
scientific article; zbMATH DE number 1980959 (Why is no real title available?)
 
2003-09-15Paper
scientific article; zbMATH DE number 1955788 (Why is no real title available?)
 
2003-07-29Paper
scientific article; zbMATH DE number 1955796 (Why is no real title available?)
 
2003-07-29Paper
scientific article; zbMATH DE number 1955797 (Why is no real title available?)
 
2003-07-29Paper
scientific article; zbMATH DE number 1951614 (Why is no real title available?)
 
2003-07-21Paper
scientific article; zbMATH DE number 1857536 (Why is no real title available?)
 
2003-05-19Paper
scientific article; zbMATH DE number 1857523 (Why is no real title available?)
 
2003-05-19Paper
scientific article; zbMATH DE number 1857514 (Why is no real title available?)
 
2003-05-19Paper
scientific article; zbMATH DE number 1857531 (Why is no real title available?)
 
2003-05-19Paper
scientific article; zbMATH DE number 1885950 (Why is no real title available?)
 
2003-03-19Paper
scientific article; zbMATH DE number 1878340 (Why is no real title available?)
 
2003-03-09Paper
Highly nonlinear balanced Boolean functions with good local and global avalanche characteristics.
Information Processing Letters
2003-01-21Paper
scientific article; zbMATH DE number 1759799 (Why is no real title available?)
 
2002-10-07Paper
Modifications of Patterson-Wiedemann functions for cryptographic applications
IEEE Transactions on Information Theory
2002-08-04Paper
Hamming weights of correlation immune Boolean functions
Information Processing Letters
2002-07-25Paper
Cryptographically significant Boolean functions with five valued Walsh spectra
Theoretical Computer Science
2002-07-15Paper
Cross-correlation analysis of cryptographically useful boolean functions and s-boxes
Theory of Computing Systems
2002-05-30Paper
scientific article; zbMATH DE number 1972847 (Why is no real title available?)
 
2002-01-01Paper
Highly nonlinear balanced Boolean functions with very good autocorrelation property
 
2001-10-15Paper
New constructions of resilient and correlation immune Boolean functions achieving upper bound on nonlinearity
 
2001-10-14Paper
Ciphertext Only Attack on LFSR Based Encryption Scheme
Calcutta Statistical Association Bulletin
2000-11-14Paper
scientific article; zbMATH DE number 1303957 (Why is no real title available?)
 
1999-06-17Paper
scientific article; zbMATH DE number 1418296 (Why is no real title available?)
 
1999-01-01Paper
Almost Perfect Mutually Unbiased Bases that are Sparse
 
N/APaper


Research outcomes over time


This page was built for person: Subhamoy Maitra