Sabyasachi Dutta

Orcid: 0000-0003-3567-5449

According to our database1, Sabyasachi Dutta authored at least 37 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Password Protected Universal Thresholdizer.
IACR Cryptol. ePrint Arch., 2024

2023
Proactive visual cryptographic schemes for general access structures.
Multim. Tools Appl., November, 2023

Learning asymmetric encryption using adversarial neural networks.
Eng. Appl. Artif. Intell., 2023

Flexible polar encoding for information reconciliation in QKD.
CoRR, 2023

Lower Bounds on the Share Size of Leakage Resilient Cheating Detectable Secret Sharing.
Proceedings of the Cryptology and Network Security - 22nd International Conference, 2023

2022
Quantum multi-secret sharing via trap codes and discrete quantum walks.
Quantum Inf. Process., 2022

Practical attacks on a class of secret image sharing schemes based on Chinese Remainder Theorem.
Comput. Electr. Eng., 2022

Learning Multi-Party Adversarial Encryption and Its Application to Secret Sharing.
IEEE Access, 2022

A Systematic Study of Bulletin Board and Its Application.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Neural Networks-Based Cryptography: A Survey.
IEEE Access, 2021

A Distributed Ledger Management Mechanism for Storing and Selling Private Data.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

Perpetual Secret Sharing from Dynamic Data Structures.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

Password Protected Secret Sharing from Lattices.
Proceedings of the Applied Cryptography and Network Security, 2021

Leakage Resilient Cheating Detectable Secret Sharing Schemes.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021

2020
Hypercube and Cascading-based Algorithms for Secret Sharing Schemes.
IACR Cryptol. ePrint Arch., 2020

3-Party Adversarial Steganography.
Proceedings of the Information Security Applications - 21st International Conference, 2020

AC<sup>0</sup> Constructions of Secret Sharing Schemes - Accommodating New Parties.
Proceedings of the Network and System Security - 14th International Conference, 2020

Cheating Detectable Ramp Secret Sharing with Optimal Cheating Resiliency.
Proceedings of the Information Systems Security - 16th International Conference, 2020

Color Visual Cryptography Schemes Using Linear Algebraic Techniques over Rings.
Proceedings of the Information Systems Security - 16th International Conference, 2020

3-Party Adversarial Cryptography.
Proceedings of the Advances in Internet, 2020

2019
Theory and application of computationally independent one-way functions: Interactive proof of ability - Revisited.
IACR Cryptol. ePrint Arch., 2019

Maximal contrast color visual secret sharing schemes.
Des. Codes Cryptogr., 2019

Secret Sharing on Evolving Multi-level Access Structure.
Proceedings of the Information Security Applications - 20th International Conference, 2019

Verifiable E-Voting with Resistance against Physical Forced Abstention Attack.
Proceedings of the 2019 International Workshop on Big Data and Information Security, 2019

Visual Secret Sharing Scheme with Distributed Levels of Importance of Shadows.
Proceedings of the Fifth International Conference on Mathematics and Computing, 2019

Evolving Perfect Hash Families: A Combinatorial Viewpoint of Evolving Secret Sharing.
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019

Deniable Secret Handshake Protocol - Revisited.
Proceedings of the Advanced Information Networking and Applications, 2019

2018
Secure Computation of Inner Product of Vectors with Distributed Entries and Its Applications to SVM.
Proceedings of the Information Security Practice and Experience, 2018

Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness.
Proceedings of the Information Security Practice and Experience, 2018

Secret Sharing Schemes on Compartmental Access Structure in Presence of Cheaters.
Proceedings of the Information Systems Security - 14th International Conference, 2018

2017
Contrast Optimal XOR Based Visual Cryptographic Schemes.
Proceedings of the Information Theoretic Security - 10th International Conference, 2017

2016
Efficient Construction of Visual Cryptographic Scheme for Compartmented Access Structures.
IACR Cryptol. ePrint Arch., 2016

Constructions and analysis of some efficient t - (k, n)<sup>∗</sup>-visual cryptographic schemes using linear algebraic techniques.
Des. Codes Cryptogr., 2016

On the Robustness of Visual Cryptographic Schemes.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

2014
XOR Based Non-monotone t- (k, n)^* -Visual Cryptographic Schemes Using Linear Algebra.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

2013
Indistinguishability against Chosen Ciphertext Verification Attack Revisited: The Complete Picture.
Proceedings of the Provable Security - 7th International Conference, 2013

2007
A Low-Cost Pipelineed Multi-Lingual E-Dictionary Using a Pipelined CTAM.
Proceedings of the 2007 International Conference on Computing: Theory and Applications (ICCTA 2007), 2007


  Loading...