Abhijit Das

Affiliations:
  • Indian Institute of Technology Kharagpur, India


According to our database1, Abhijit Das authored at least 36 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A cluster-based practical key recovery attack on reduced-round AES using impossible-differential cryptanalysis.
J. Supercomput., April, 2023

Deep Learning based Differential Classifier of PRIDE and RC5.
IACR Cryptol. ePrint Arch., 2023

Security Analysis of WG-7 Lightweight Stream Cipher against Cube Attack.
CoRR, 2023

Security Analysis of WAGE Against Division Property Based Cube Attack.
Proceedings of the Information Security Practice and Experience, 2023

2022
A Deep Neural Differential Distinguisher for ARX based Block Cipher.
IACR Cryptol. ePrint Arch., 2022

HARPOCRATES: An Approach Towards Efficient Encryption of Data-at-rest.
IACR Cryptol. ePrint Arch., 2022

Parallel and Distributed Implementations of the Wiedemann and the Block-Wiedemann Methods over GF(2).
Proceedings of the 19th International Conference on Security and Cryptography, 2022

2021
An Attack on Linear Scan Chains for Stream Ciphers and the Impossibility of Simple Countermeasures.
J. Hardw. Syst. Secur., 2021

AVX-512-based Parallelization of Block Sieving and Bucket Sieving for the General Number Field Sieve Method.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

CArrency: An Energy-Efficient Proof-of-Work Scheme for Crypto-Currencies.
Proceedings of the Seventh International Conference on Mathematics and Computing, 2021

2020
A Family of Subfield Hyperelliptic Curves for Use in Cryptography.
Proceedings of the Information and Communications Security - 22nd International Conference, 2020

2019
An Efficient Parallel Implementation of Impossible-Differential Cryptanalysis for Five-Round AES-128.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2019

2017
Use of SIMD-based data parallelism to speed up sieving in integer-factoring algorithms.
Appl. Math. Comput., 2017

2014
New algorithms for batch verification of standard ECDSA signatures.
J. Cryptogr. Eng., 2014

Randomized Batch Verification of Standard ECDSA Signatures.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2014

Batch Verification of EdDSA Signatures.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2014

Faster Batch Verification of Standard ECDSA Signatures Using Summation Polynomials.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
SIMD-Based Implementations of Sieving in Integer-Factoring Algorithms.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2013

GPU-Based Implementation of 128-Bit Secure Eta Pairing over a Binary Field.
Proceedings of the Progress in Cryptology, 2013

2012
Using Randomizers for Batch Verification of ECDSA Signatures.
IACR Cryptol. ePrint Arch., 2012

Improvements of Algebraic Attacks Based on Structured Gaussian Elimination.
IACR Cryptol. ePrint Arch., 2012

Efficient FPGA Implementation of Montgomery Multiplier Using DSP Blocks.
Proceedings of the Progress in VLSI Design and Test - 16th International Symposium, 2012

SIMD-based Implementations of Eta Pairing Over Finite Fields of Small Characteristics.
Proceedings of the SECRYPT 2012, 2012

Autonomous Certification with List-Based Revocation for Secure V2V Communication.
Proceedings of the Information Systems Security, 8th International Conference, 2012

Use of SIMD Features to Speed up Eta Pairing.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2012

Batch Verification of ECDSA Signatures.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012

2011
An audio watermarking scheme using singular value decomposition and dither-modulation quantization.
Multim. Tools Appl., 2011

A New Audio Watermarking Scheme Based on Singular Value Decomposition and Quantization.
Circuits Syst. Signal Process., 2011

An Improvement of Linearization-Based Algebraic Attacks.
Proceedings of the Security Aspects in Information Technology, 2011

High Speed Cryptoprocessor for η T Pairing on 128-bit Secure Supersingular Elliptic Curves over Characteristic Two Fields.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011

2010
An adaptive audio watermarking based on the singular value decomposition in the wavelet domain.
Digit. Signal Process., 2010

Parallelization of the Lanczos Algorithm on Multi-core Platforms.
Proceedings of the Distributed Computing and Networking, 11th International Conference, 2010

2008
Audio Watermarking Based on Quantization in Wavelet Domain.
Proceedings of the Information Systems Security, 4th International Conference, 2008

A New Key-Predistribution Scheme for Highly Mobile Sensor Networks.
Proceedings of the Distributed Computing and Networking, 9th International Conference, 2008

Audio Watermarking Based on BCH Coding Using CT and DWT.
Proceedings of the 2008 International Conference on Information Technology, 2008

2005
Key Forwarding: A Location-Adaptive Key-Establishment Scheme for Wireless Sensor Networks.
Proceedings of the Distributed Computing, 2005


  Loading...