Goutam Paul
According to our database^{1},
Goutam Paul
authored at least 107 papers
between 2003 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis OtherLinks
Online presence:

on twitter.com

on orcid.org

on dl.acm.org
On csauthors.net:
Bibliography
2021
Quantum Inf. Comput., 2021
Twopoint FFTbased high capacity image steganography using calendar based message encoding.
Inf. Sci., 2021
Entropy, 2021
Quantum Secure Direct Communication with Mutual Authentication using a Single Basis.
CoRR, 2021
2020
A PVD based high capacity steganography algorithm with embedding in nonsequential position.
Multim. Tools Appl., 2020
IACR Cryptol. ePrint Arch., 2020
Entropy, 2020
Cryptanalysis of Quantum Secure Direct Communication Protocol with Mutual Authentication Based on Single Photons and Bell States.
CoRR, 2020
Improving the Security of "MeasurementDeviceIndependent Quantum Communication without Encryption".
CoRR, 2020
CoRR, 2020
Proceedings of the Progress in Cryptology  AFRICACRYPT 2020, 2020
2019
Quantum Inf. Process., 2019
Quantum Inf. Process., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
2018
IACR Trans. Symmetric Cryptol., 2018
Quantum to classical oneway function and its applications in quantum money authentication.
Quantum Inf. Process., 2018
Quantum Inf. Comput., 2018
An efficient multibit steganography algorithm in spatial domain with twolayer security.
Multim. Tools Appl., 2018
IACR Cryptol. ePrint Arch., 2018
On data complexity of distinguishing attacks versus message recovery attacks on stream ciphers.
Des. Codes Cryptogr., 2018
CoRR, 2018
Cryptogr. Commun., 2018
Revisiting RC4 key collision: Faster search algorithm and new 22byte colliding key pairs.
Cryptogr. Commun., 2018
Adv. Math. Commun., 2018
2017
IEEE Trans. Very Large Scale Integr. Syst., 2017
Multim. Tools Appl., 2017
IACR Cryptol. ePrint Arch., 2017
Efficient Compilers for AftertheFact Leakage: from CPA to CCA2 secure PKE to AKE.
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Reversible Computation  9th International Conference, 2017
2016
ACM Trans. Embed. Comput. Syst., 2016
Three Snakes in One Hole: The First Systematic Hardware Accelerator Design for SOSEMANUK with Optional Serpent and SNOW 2.0 Modes.
IEEE Trans. Computers, 2016
J. Cryptogr. Eng., 2016
IACR Cryptol. ePrint Arch., 2016
Revisiting Optimal Eavesdropping in Quantum Cryptography: Choice of Interaction Is Unique up to Rotation of the Underlying Basis.
CoRR, 2016
Proceedings of the Information Systems Security  12th International Conference, 2016
Revisiting the Security Proof of QUAD Stream Cipher: Some Corrections and Tighter Bounds.
Proceedings of the Information Security and Cryptology  12th International Conference, 2016
Proceedings of the Information Security and Privacy  21st Australasian Conference, 2016
2015
Quantum Inf. Process., 2015
Quantum Inf. Comput., 2015
On Data Complexity of Distinguishing Attacks vs. Message Recovery Attacks on Stream Ciphers.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Des. Codes Cryptogr., 2015
CoRR, 2015
Millionaires' Problem with Rational Players: a Unified Approach in Classical and Quantum Paradigms.
CoRR, 2015
CoRR, 2015
CoRR, 2015
ForwardSecure Authenticated Symmetric Key Exchange Protocol: New Security Model and Secure Construction.
Proceedings of the Provable Security, 2015
Proceedings of the Information Systems Security  11th International Conference, 2015
2014
(Non)Random Sequences from (Non)Random Permutations  Analysis of RC4 Stream Cipher.
J. Cryptol., 2014
J. Cryptogr. Eng., 2014
Proceedings of the Advances in Information and Computer Security, 2014
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2014
Proceedings of the Progress in Cryptology  INDOCRYPT 2014, 2014
Proceedings of the Information Systems Security  10th International Conference, 2014
Proceedings of the Information Systems Security  10th International Conference, 2014
Proceedings of the Fast Software Encryption  21st International Workshop, 2014
2013
Inf. Process. Lett., 2013
IACR Cryptol. ePrint Arch., 2013
Three Snakes in One Hole: A 67 Gbps Flexible Hardware for SOSEMANUK with Optional Serpent and SNOW 2.0 Modes.
IACR Cryptol. ePrint Arch., 2013
Optimized GPU Implementation and Performance Analysis of HC Series of Stream Ciphers.
IACR Cryptol. ePrint Arch., 2013
Maximum lifetime broadcast communications in cooperative multihop wireless ad hoc networks: Centralized and distributed approaches.
Ad Hoc Networks, 2013
Proceedings of the Information Systems Security  9th International Conference, 2013
RAPIDFeinSPN: A Rapid Prototyping Framework for Feistel and SPNBased Block Ciphers.
Proceedings of the Information Systems Security  9th International Conference, 2013
Proceedings of the 50th Annual Design Automation Conference 2013, 2013
Proceedings of the 11th Asia Pacific Conference on Computer Human Interaction, 2013
Proceedings of the 11th Asia Pacific Conference on Computer Human Interaction, 2013
Proceedings of the Progress in Cryptology, 2013
New Speed Records for Salsa20 Stream Cipher Using an Autotuning Framework on GPUs.
Proceedings of the Progress in Cryptology, 2013
2012
Generic cryptographic weakness of <i>k</i>normal Boolean functions in certain stream ciphers and cryptanalysis of grain128.
Period. Math. Hung., 2012
Internal state recovery of keystream generator LILI128 based on a novel weakness of the employed Boolean function.
Inf. Process. Lett., 2012
Internal state recovery of grainv1 employing normality order of the filter function.
IET Inf. Secur., 2012
Eavesdropping in Semiquantum Key Distribution Protocol: Classical vs. Hadamard Bob
CoRR, 2012
Exploring securityperformance tradeoffs during hardware accelerator design of stream cipher RC4.
Proceedings of the 20th IEEE/IFIP International Conference on VLSI and SystemonChip, 2012
Impact of Extending Side Channel Attack on Cipher Variants: A Case Study with the HC Series of Stream Ciphers.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2012
Proceedings of the Progress in Cryptology, 2012
Proceedings of the Information Systems Security, 8th International Conference, 2012
2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
Des. Codes Cryptogr., 2011
Proceedings of the Selected Areas in Cryptography  18th International Workshop, 2011
Proceedings of the Advances in Information and Computer Security, 2011
Proceedings of the Information Systems Security  7th International Conference, 2011
Proceedings of the Fast Software Encryption  18th International Workshop, 2011
2010
IACR Cryptol. ePrint Arch., 2010
Discret. Appl. Math., 2010
CoRR, 2010
A generic weakness of the knormal Boolean functions exposed to dedicated algebraic attack.
Proceedings of the International Symposium on Information Theory and its Applications, 2010
2009
CoRR, 2009
On Necessary and Sufficient Number of Cops in the Game of Cops and Robber in Multidimensional Grids
CoRR, 2009
Cryptogr. Commun., 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
Proceedings of the Applied Algebra, 2009
2008
A complete characterization of the evolution of RC4 pseudo random generation algorithm.
J. Math. Cryptol., 2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
On nonnegligible bias of the first output byte of RC4 towards the first three bytes of the secret key.
Des. Codes Cryptogr., 2008
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008
2007
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Selected Areas in Cryptography, 14th International Workshop, 2007
2004
Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2004
Proceedings of the Nineteenth National Conference on Artificial Intelligence, 2004
2003
Proceedings of the Fifteenth Conference on Innovative Applications of Artificial Intelligence, 2003