Souradyuti Paul

Orcid: 0000-0001-5404-9975

According to our database1, Souradyuti Paul authored at least 30 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Reinforcement Learning for Real-Time Federated Learning for Resource-Constrained Edge Cluster.
J. Netw. Syst. Manag., October, 2024

Towards a Mobility-cum-Battery Aware Dynamic UAV Deployment for Uninterrupted Connectivity.
Proceedings of the NOMS 2024 IEEE Network Operations and Management Symposium, 2024

2023
Minimizing Data Retrieval Delay in Edge Computing.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking and Services, 2023

Topology-Aware Cluster Configuration for Real-time Multi-access Edge Computing.
Proceedings of the 24th International Conference on Distributed Computing and Networking, 2023

2022
Topology Aware Cluster Configuration for Minimizing Communication Delay in Edge Computing.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

2020
Efficient and Fair Multiparty Protocols using Blockchain and Trusted Hardware.
IACR Cryptol. ePrint Arch., 2020

2019
Efficient Fair Multiparty Protocols Using Blockchain and Trusted Hardware.
Proceedings of the Progress in Cryptology - LATINCRYPT 2019, 2019

2018
Key Assignment Scheme with Authenticated Encryption.
IACR Cryptol. ePrint Arch., 2018

Message-Locked Encryption with File Update.
Proceedings of the Applied Cryptography and Network Security, 2018

Robust Multiparty Computation with Faster Verification Time.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
A New Constant-Size Accountable Ring Signature Scheme Without Random Oracles.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

A New Approach to Deanonymization of Unreachable Bitcoin Nodes.
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017

2016
Indifferentiability security of the fast wide pipe hash: Breaking the birthday barrier.
J. Math. Cryptol., 2016

2012
Improved Indifferentiability Security Bound for the JH Mode.
IACR Cryptol. ePrint Arch., 2012

A Novel Permutation-Based Hash Mode of Operation FP and the Hash Function SAMOSA.
Proceedings of the Progress in Cryptology, 2012

2011
Indifferentiability Security of the Fast Widepipe Hash: Breaking the Birthday Barrier.
IACR Cryptol. ePrint Arch., 2011

2010
Speeding Up The Widepipe: Secure and Fast Hashing.
IACR Cryptol. ePrint Arch., 2010

Speeding Up the Wide-Pipe: Secure and Fast Hashing.
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010

2007
Weaknesses in the Pseudorandom Bit Generation Algorithms of the Stream Ciphers TPypy and TPy.
IACR Cryptol. ePrint Arch., 2007

Cryptanalysis of Stream Ciphers Based on Arrays and Modular Addition.
IACR Cryptol. ePrint Arch., 2007

New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B.
Proceedings of the Research in Cryptology, Second Western European Workshop, 2007

New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py.
Proceedings of the Information Security, 10th International Conference, 2007

Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses.
Proceedings of the Progress in Cryptology, 2007

2006
Distinguishing Attacks on the Stream Cipher Py.
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006

On the (In)security of Stream Ciphers Based on Arrays and Modular Addition.
Proceedings of the Advances in Cryptology, 2006

2005
On the (In)security of Stream Ciphers Based on Arrays and Modular Addition (Full Version).
IACR Cryptol. ePrint Arch., 2005

Near Optimal Algorithms for Solving Differential Equations of Addition with Batch Queries.
Proceedings of the Progress in Cryptology, 2005

Solving Systems of Differential Equations of Addition.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

2004
A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher.
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004

2003
Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator.
Proceedings of the Progress in Cryptology, 2003


  Loading...