Saibal K. Pal

Orcid: 0000-0003-3297-1605

According to our database1, Saibal K. Pal authored at least 47 papers between 2007 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Leveraging Synergy to Design Neural Differential Distinguishers for Lightweight Block Ciphers.
IEEE Trans. Emerg. Top. Comput. Intell., April, 2025

Automating Government Report Generation: A Generative AI Approach for Efficient Data Extraction, Analysis, and Visualization.
Digit. Gov. Res. Pract., March, 2025

Complete Key Recovery of a DNA-based Encryption and Developing a Novel Stream Cipher for Color Image Encryption: Bio-SNOW.
CoRR, March, 2025

A practical-quantum differential attack on block ciphers.
Cryptogr. Commun., March, 2025

2024
Unsupervised Learning-based Approach for Contextual Understanding of Web Material Around a New Domain of Algorithmic Government.
Digit. Gov. Res. Pract., March, 2024

Bit inclusion test: an enhanced avalanche test for stream ciphers.
Cryptologia, March, 2024

Improving the Security of the LCB Block Cipher Against Deep Learning-Based Attacks.
Cryptogr., 2024

An Approach for Multimodal Biometric Authentication using Genetic Algorithm.
Proceedings of the 15th International Conference on Computing Communication and Networking Technologies, 2024

2023
Mul-IBS: a multivariate identity-based signature scheme compatible with IoT-based NDN architecture.
J. Cryptogr. Eng., June, 2023

A review of the tropical approach in cryptography.
Cryptologia, January, 2023

A multivariate identity-based broadcast encryption with applications to the internet of things.
Adv. Math. Commun., 2023

2022
Blockchain-based Framework for Reducing Fake or Vicious News Spread on Social Media/Messaging Platforms.
ACM Trans. Asian Low Resour. Lang. Inf. Process., 2022

Insights and reflections using data analytics approach of COVID-19 situation among the Indian states and ethical considerations.
Int. J. Syst. Assur. Eng. Manag., 2022

A new S-box design by applying Swarm Intelligence based technique.
Int. J. Syst. Assur. Eng. Manag., 2022

A chaos-based probabilistic block cipher for image encryption.
J. King Saud Univ. Comput. Inf. Sci., 2022

2021
Technological and analytical review of contact tracing apps for COVID-19 management.
J. Locat. Based Serv., 2021

Improving Cryptography Based On Entropoids.
IACR Cryptol. ePrint Arch., 2021

2020
A novel Chaotic Flower Pollination-based intrusion detection framework.
Soft Comput., 2020

Design and analysis of an optimal ECC algorithm with effective access control mechanism for big data.
Multim. Tools Appl., 2020

Machine Learning Models for Government to Predict COVID-19 Outbreak.
Digit. Gov. Res. Pract., 2020

Regional E-governance Development Index for Developing Nations.
Digit. Gov. Res. Pract., 2020

Optimal differential trails in lightweight block ciphers ANU and PICO.
Cryptologia, 2020

Hybridization of Chaos and Flower Pollination Algorithm over K-Means for data clustering.
Appl. Soft Comput., 2020

Tracing the Source of Fake News using a Scalable Blockchain Distributed Network.
Proceedings of the 17th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2020

Effective inclusion of citizens through e-Governance services: case study of direct benefit transfer in India.
Proceedings of the ICEGOV 2020: 13th International Conference on Theory and Practice of Electronic Governance, 2020

2019
Anti-forensic Approach to Remove StegoContent from Images and Videos.
J. Cyber Secur. Mobil., 2019

Meta-Heuristic Algorithms to Improve Fuzzy C-Means and K-Means Clustering for Location Allocation of Telecenters Under E-Governance in Developing Nations.
Int. J. Fuzzy Log. Intell. Syst., 2019

2018
Cryptanalysis of image encryption scheme based on a new 1D chaotic system.
Signal Process., 2018

Hybridization of K-Means and Firefly Algorithm for intrusion detection system.
Int. J. Syst. Assur. Eng. Manag., 2018

New chaotic flower pollination algorithm for unconstrained non-linear optimization functions.
Int. J. Syst. Assur. Eng. Manag., 2018

2017
Corrigendum to "Characterization of polynomially complete quasigroups based on latin squares for cryptographic transformations" [Discrete Appl. Math. 200(2016) 5-17].
Discret. Appl. Math., 2017

Fuzzy C-Means Clustering and Particle Swarm Optimization based scheme for Common Service Center location allocation.
Appl. Intell., 2017

Using Chaos in Grey Wolf Optimizer and Application to Prime Factorization.
Proceedings of the Soft Computing for Problem Solving, 2017

Machine Learning-Based Method and Its Performance Analysis for Occupancy Detection in Indoor Environment.
Proceedings of the Advances in Signal Processing and Intelligent Recognition Systems, 2017

Development of e-Governance in an Emerging Economy Like India: Assessment and Way Ahead for Key Components.
Proceedings of the 10th International Conference on Theory and Practice of Electronic Governance, 2017

Proposed Framework for Information Systems Security for e-Governance in Developing Nations.
Proceedings of the 10th International Conference on Theory and Practice of Electronic Governance, 2017

The Need of a Development Assessment Index for e-Governance in India.
Proceedings of the 10th International Conference on Theory and Practice of Electronic Governance, 2017

2016
Implementation & Analysis of Integrated Utility System in Developing Nation like India.
Int. J. Recent Contributions Eng. Sci. IT, 2016

Characterization of polynomially complete quasigroups based on Latin squares for cryptographic transformations.
Discret. Appl. Math., 2016

ELM variants comparison on applications of time series data forecasting.
Proceedings of the 2016 International Conference on Advances in Computing, 2016

2014
Proposal for integrated system architecture in utilities.
Proceedings of the 2014 International Conference on Advances in Computing, 2014

Hybrid model to improve Bat algorithm performance.
Proceedings of the 2014 International Conference on Advances in Computing, 2014

ICT Integrated Social Media Framework for consumer awareness in society using ICT tools.
Proceedings of the 2014 IEEE/ACIS 13th International Conference on Computer and Information Science, 2014

2013
New Lightweight Conditional Encryption Schemes for Multimedia.
Proceedings of the Third International Conference on Soft Computing for Problem Solving, 2013

2010
Best Hiding Capacity Scheme for Variable Length Messages Using Particle Swarm Optimization.
Proceedings of the Swarm, Evolutionary, and Memetic Computing, 2010

Design of a New Block Cipher Based on Conditional Encryption.
Proceedings of the Seventh International Conference on Information Technology: New Generations, 2010

2007
Fast, Reliable & Secure Digital Communication Using Hadamard Matrices.
Proceedings of the 2007 International Conference on Computing: Theory and Applications (ICCTA 2007), 2007


  Loading...