Goutam Paul

Orcid: 0000-0002-5160-6032

Affiliations:
  • Indian Statistical Institute, Cryptology and Security Research Unit, Kolkata, India
  • Jadavpur University, Department of Computer Science and Engineering, Kolkata, India (former)
  • State University of New York, Albany, NY, USA (former)


According to our database1, Goutam Paul authored at least 121 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
High capacity secure dynamic multi-bit data hiding using Fibonacci Energetic pixels.
Multim. Tools Appl., January, 2024

2023
Quantum secret sharing protocol using GHZ state: implementation on IBM qiskit.
Quantum Inf. Process., November, 2023

An intelligent clustering framework for substitute recommendation and player selection.
J. Supercomput., October, 2023

Switching the Top Slice of the Sandwich with Extra Filling Yields a Stronger Boomerang for NLFSR-based Block Ciphers.
IACR Cryptol. ePrint Arch., 2023

SDFA: Statistical-Differential Fault Attack on Linear Structured SBox-Based Ciphers.
IACR Cryptol. ePrint Arch., 2023

Adoption of a ranking based indexing method for the cricket teams.
Expert Syst. Appl., 2023

Device-Independent Quantum Secure Direct Communication with User Authentication.
CoRR, 2023

2022
Measurement device-independent quantum secure direct communication with user authentication.
Quantum Inf. Process., 2022

Differential fault analysis of NORX using variants of coupon collector problem.
J. Cryptogr. Eng., 2022

Digital image steganography: A literature survey.
Inf. Sci., 2022

Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos.
IACR Cryptol. ePrint Arch., 2022

Differential Fault Attack on PHOTON-Beetle.
Proceedings of the 2022 Workshop on Attacks and Solutions in Hardware Security, 2022

2021
Secure multi-party quantum conference and XOR computation.
Quantum Inf. Comput., 2021

Two-point FFT-based high capacity image steganography using calendar based message encoding.
Inf. Sci., 2021

Grover on Present: Quantum Resource Estimation.
IACR Cryptol. ePrint Arch., 2021

Bound on Efficiency of Heat Engine from Uncertainty Relation Viewpoint.
Entropy, 2021

Quantum Secure Direct Communication with Mutual Authentication using a Single Basis.
CoRR, 2021

Modified Hedonic Based Price Prediction Model for Players in IPL Auction.
Proceedings of the 12th International Conference on Computing Communication and Networking Technologies, 2021

2020
A PVD based high capacity steganography algorithm with embedding in non-sequential position.
Multim. Tools Appl., 2020

Quantum Attacks on HCTR and its Variants.
IACR Cryptol. ePrint Arch., 2020

Binary Black Hole Information Loss Paradox and Future Prospects.
Entropy, 2020

Cryptanalysis of Quantum Secure Direct Communication Protocol with Mutual Authentication Based on Single Photons and Bell States.
CoRR, 2020

Improving the Security of "Measurement-Device-Independent Quantum Communication without Encryption".
CoRR, 2020

Two Efficient Device Independent Quantum Dialogue Protocols.
CoRR, 2020

Cryptanalysis of FlexAEAD.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2020, 2020

2019
Revisiting integer factorization using closed timelike curves.
Quantum Inf. Process., 2019

Dimensionality distinguishers.
Quantum Inf. Process., 2019

Iterated Truncated Differential for Internal Keyed Permutation of FlexAEAD.
IACR Cryptol. ePrint Arch., 2019

Differential Fault Analysis of NORX.
IACR Cryptol. ePrint Arch., 2019

2018
New Yoyo Tricks with AES-based Permutations.
IACR Trans. Symmetric Cryptol., 2018

Quantum to classical one-way function and its applications in quantum money authentication.
Quantum Inf. Process., 2018

Quantum signaling to the past using P-CTCS.
Quantum Inf. Comput., 2018

An efficient multi-bit steganography algorithm in spatial domain with two-layer security.
Multim. Tools Appl., 2018

Double-block Hash-then-Sum: A Paradigm for Constructing BBB Secure PRF.
IACR Cryptol. ePrint Arch., 2018

On data complexity of distinguishing attacks versus message recovery attacks on stream ciphers.
Des. Codes Cryptogr., 2018

Analysis of the Game "2048" and its Generalization in Higher Dimensions.
CoRR, 2018

Analysis of burn-in period for RC4 state transition.
Cryptogr. Commun., 2018

Revisiting RC4 key collision: Faster search algorithm and new 22-byte colliding key pairs.
Cryptogr. Commun., 2018

Generalized nonlinearity of S-boxes.
Adv. Math. Commun., 2018

2017
RC4-AccSuite: A Hardware Acceleration Suite for RC4-Like Stream Ciphers.
IEEE Trans. Very Large Scale Integr. Syst., 2017

Keyless dynamic optimal multi-bit image steganography using energetic pixels.
Multim. Tools Appl., 2017

Single Key Variant of PMAC_Plus.
IACR Cryptol. ePrint Arch., 2017

Efficient Compilers for After-the-Fact Leakage: from CPA to CCA-2 secure PKE to AKE.
IACR Cryptol. ePrint Arch., 2017

Designing Parity Preserving Reversible Circuits.
Proceedings of the Reversible Computation - 9th International Conference, 2017

2016
RunStream: A High-Level Rapid Prototyping Framework for Stream Ciphers.
ACM Trans. Embed. Comput. Syst., 2016

Three Snakes in One Hole: The First Systematic Hardware Accelerator Design for SOSEMANUK with Optional Serpent and SNOW 2.0 Modes.
IEEE Trans. Computers, 2016

RunFein: a rapid prototyping framework for Feistel and SPN-based block ciphers.
J. Cryptogr. Eng., 2016

Key Recovery Attack against 2.5-round pi-Cipher.
IACR Cryptol. ePrint Arch., 2016

Revisiting Optimal Eavesdropping in Quantum Cryptography: Choice of Interaction Is Unique up to Rotation of the Underlying Basis.
CoRR, 2016

Exploiting Block-Chain Data Structure for Auditorless Auditing on Cloud Data.
Proceedings of the Information Systems Security - 12th International Conference, 2016

Revisiting the Security Proof of QUAD Stream Cipher: Some Corrections and Tighter Bounds.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

One-Key Compression Function Based MAC with Security Beyond Birthday Bound.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Three-particle hyper-entanglement: teleportation and quantum key distribution.
Quantum Inf. Process., 2015

Quantum information splitting using a pair of <i>GHZ</i> states.
Quantum Inf. Comput., 2015

On Data Complexity of Distinguishing Attacks vs. Message Recovery Attacks on Stream Ciphers.
IACR Cryptol. ePrint Arch., 2015

Fairness in Secure Two-Party Computation with Rational Players.
IACR Cryptol. ePrint Arch., 2015

Salsa20 Cryptanalysis: New Moves and Revisiting Old Styles.
IACR Cryptol. ePrint Arch., 2015

Lifting the Security of NI-MAC Beyond Birthday Bound.
IACR Cryptol. ePrint Arch., 2015

Proving TLS-attack related open biases of RC4.
Des. Codes Cryptogr., 2015

Quantum Information splitting using a pair of {\it GHZ} states.
CoRR, 2015

Millionaires' Problem with Rational Players: a Unified Approach in Classical and Quantum Paradigms.
CoRR, 2015

A Resilient Quantum Secret Sharing Scheme.
CoRR, 2015

A Proposal for Quantum Rational Secret Sharing.
CoRR, 2015

Forward-Secure Authenticated Symmetric Key Exchange Protocol: New Security Model and Secure Construction.
Proceedings of the Provable Security, 2015

Revisiting Democratic Mining in Bitcoins: Its Weakness and Possible Remedies.
Proceedings of the Information Systems Security - 11th International Conference, 2015

2014
(Non-)Random Sequences from (Non-)Random Permutations - Analysis of RC4 Stream Cipher.
J. Cryptol., 2014

Designing stream ciphers with scalable data-widths: a case study with HC-128.
J. Cryptogr. Eng., 2014

Deterministic Hard Fault Attack on Trivium.
Proceedings of the Advances in Information and Computer Security, 2014

Processor Design with Asymmetric Reliability.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2014

One Word/Cycle HC-128 Accelerator via State-Splitting Optimization.
Proceedings of the Progress in Cryptology - INDOCRYPT 2014, 2014

Towards a More Democratic Mining in Bitcoins.
Proceedings of the Information Systems Security - 10th International Conference, 2014

Preserving Privacy in Location-Based Services Using Sudoku Structures.
Proceedings of the Information Systems Security - 10th International Conference, 2014

Dependence in IV-Related Bytes of RC4 Key Enhances Vulnerabilities in WPA.
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014

2013
Eavesdropping in semiquantum key distribution protocol.
Inf. Process. Lett., 2013

Quad-RC4: Merging Four RC4 States towards a 32-bit Stream Cipher.
IACR Cryptol. ePrint Arch., 2013

Three Snakes in One Hole: A 67 Gbps Flexible Hardware for SOSEMANUK with Optional Serpent and SNOW 2.0 Modes.
IACR Cryptol. ePrint Arch., 2013

Optimized GPU Implementation and Performance Analysis of HC Series of Stream Ciphers.
IACR Cryptol. ePrint Arch., 2013

Maximum lifetime broadcast communications in cooperative multihop wireless ad hoc networks: Centralized and distributed approaches.
Ad Hoc Networks, 2013

Efficient Multi-bit Image Steganography in Spatial Domain.
Proceedings of the Information Systems Security - 9th International Conference, 2013

RAPID-FeinSPN: A Rapid Prototyping Framework for Feistel and SPN-Based Block Ciphers.
Proceedings of the Information Systems Security - 9th International Conference, 2013

CoARX: a coprocessor for ARX-based cryptographic algorithms.
Proceedings of the 50th Annual Design Automation Conference 2013, 2013

On effective sharing of user generated content.
Proceedings of the 11th Asia Pacific Conference on Computer Human Interaction, 2013

Proposal for a novel computerized menu-presentation interface for restaurants.
Proceedings of the 11th Asia Pacific Conference on Computer Human Interaction, 2013

New Results on Generalization of Roos-Type Biases and Related Keystreams of RC4.
Proceedings of the Progress in Cryptology, 2013

New Speed Records for Salsa20 Stream Cipher Using an Autotuning Framework on GPUs.
Proceedings of the Progress in Cryptology, 2013

2012
Generic cryptographic weakness of <i>k</i>-normal Boolean functions in certain stream ciphers and cryptanalysis of grain-128.
Period. Math. Hung., 2012

Internal state recovery of keystream generator LILI-128 based on a novel weakness of the employed Boolean function.
Inf. Process. Lett., 2012

Internal state recovery of grain-v1 employing normality order of the filter function.
IET Inf. Secur., 2012

Eavesdropping in Semiquantum Key Distribution Protocol: Classical vs. Hadamard Bob
CoRR, 2012

Exploring security-performance trade-offs during hardware accelerator design of stream cipher RC4.
Proceedings of the 20th IEEE/IFIP International Conference on VLSI and System-on-Chip, 2012

Impact of Extending Side Channel Attack on Cipher Variants: A Case Study with the HC Series of Stream Ciphers.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2012

Another Look at Symmetric Incoherent Optimal Eavesdropping against BB84.
Proceedings of the Progress in Cryptology, 2012

Keyless Steganography in Spatial Domain Using <i>Energetic</i> Pixels.
Proceedings of the Information Systems Security, 8th International Conference, 2012

2011
RC4: (Non-)Random Words from (Non-)Random Permutations.
IACR Cryptol. ePrint Arch., 2011

A Note on Four-State BB84 Protocol.
IACR Cryptol. ePrint Arch., 2011

Some observations on HC-128.
Des. Codes Cryptogr., 2011

Proof of Empirical RC4 Biases and New Key Correlations.
Proceedings of the Selected Areas in Cryptography - 18th International Workshop, 2011

A Theoretical Analysis of the Structure of HC-128.
Proceedings of the Advances in Information and Computer Security, 2011

Some Combinatorial Results towards State Recovery Attack on RC4.
Proceedings of the Information Systems Security - 7th International Conference, 2011

Attack on Broadcast RC4 Revisited.
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011

2010
A Combinatorial Analysis of HC-128.
IACR Cryptol. ePrint Arch., 2010

A cops and robber game in multidimensional grids.
Discret. Appl. Math., 2010

Image Sterilization to Prevent LSB-based Steganographic Transmission
CoRR, 2010

A generic weakness of the k-normal Boolean functions exposed to dedicated algebraic attack.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

2009
Revisiting Fermat's Factorization for the RSA Modulus
CoRR, 2009

On Necessary and Sufficient Number of Cops in the Game of Cops and Robber in Multidimensional Grids
CoRR, 2009

On biases of permutation and keystream bytes of RC4 towards the secret key.
Cryptogr. Commun., 2009

Nearby-Friend Discovery Protocol for Multiple Users.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

On Some Sequences of the Secret Pseudo-random Index j in RC4 Key Scheduling.
Proceedings of the Applied Algebra, 2009

2008
A complete characterization of the evolution of RC4 pseudo random generation algorithm.
J. Math. Cryptol., 2008

Some Observations on HC-128.
IACR Cryptol. ePrint Arch., 2008

Analysis of RC4 and Proposal of Additional Layers for Better Security Margin.
IACR Cryptol. ePrint Arch., 2008

On non-negligible bias of the first output byte of RC4 towards the first three bytes of the secret key.
Des. Codes Cryptogr., 2008

Recovering RC4 Permutation from 2048 Keystream Bytes if jIs Stuck.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008

2007
On Non-Randomness of the Permutation after RC4 Key Scheduling.
IACR Cryptol. ePrint Arch., 2007

RC4 State Information at Any Stage Reveals the Secret Key.
IACR Cryptol. ePrint Arch., 2007

New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4.
IACR Cryptol. ePrint Arch., 2007

Permutation After RC4 Key Scheduling Reveals the Secret Key.
Proceedings of the Selected Areas in Cryptography, 14th International Workshop, 2007

2004
Locating secret messages in images.
Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2004

Occam's Razor and a Non-Syntactic Measure of Decision Tree Complexity.
Proceedings of the Nineteenth National Conference on Artificial Intelligence, 2004

2003
Searching for Hidden Messages: Automatic Detection of Steganography.
Proceedings of the Fifteenth Conference on Innovative Applications of Artificial Intelligence, 2003


  Loading...