Sourav Mukhopadhyay

Orcid: 0000-0002-4015-1386

According to our database1, Sourav Mukhopadhyay authored at least 108 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Post-quantum secure recipient revocable broadcast encryption supporting anonymity.
Multim. Tools Appl., January, 2024

An Experimentally Validated Feasible Quantum Protocol for Identity-Based Signature with Application to Secure Email Communication.
CoRR, 2024

2023
Constructions of broadcast encryption with personalized messages from bilinear map.
Comput. Commun., September, 2023

Short attribute-based signatures for arbitrary Turing machines from standard assumptions.
Des. Codes Cryptogr., May, 2023

Communication-friendly threshold trapdoor function from weaker assumption for distributed cryptography.
Ann. des Télécommunications, April, 2023

Hierarchical Identity-Based Inner Product Functional Encryption for Unbounded Hierarchical Depth.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2023

2022
Embedded Identity Traceable Identity-Based IPFE from Pairings and Lattices.
IACR Cryptol. ePrint Arch., 2022

Key Encapsulation Mechanism in Ciphertext-policy Attribute based Setting Featuring Revocation and Key-homomorphic Property.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

Constructing Pairing Free Unbounded Inner Product Functional Encryption Schemes with Unbounded Inner Product Policy.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2022

Hierarchical Identity Based Inner Product Functional Encryption for Privacy Preserving Statistical Analysis Without q-type Assumption.
Proceedings of the Emerging Information Security and Applications, 2022

2021
Computational Efficient Authenticated Digital Content Distribution Frameworks for DRM Systems: Review and Outlook.
IEEE Syst. J., 2021

Blockchain-based multimedia content distribution with the assured system update mechanism.
Multim. Tools Appl., 2021

Lattice-based nominative signature using pseudorandom function.
IET Inf. Secur., 2021

Quantum Resource Estimation for FSR Based Symmetric Ciphers and Related Grover's Attacks.
Proceedings of the Progress in Cryptology - INDOCRYPT 2021, 2021

2020
Grover on $\, SIMON\, $.
Quantum Inf. Process., 2020

(t, n) Threshold d-level QSS based on QFT.
Quantum Inf. Comput., 2020

Resource Estimation of Grovers-kind Quantum Cryptanalysis against FSR based Symmetric Ciphers.
IACR Cryptol. ePrint Arch., 2020

Group signature from lattices preserving forward security in dynamic setting.
Adv. Math. Commun., 2020

Evaluation of Quantum Cryptanalysis on SPECK.
Proceedings of the Progress in Cryptology - INDOCRYPT 2020, 2020

2019
An Authentication Framework for Roaming Service in Global Mobility Networks.
Inf. Technol. Control., 2019

Succinct Predicate and Online-Offline Multi-Input Inner Product Encryptions under Standard Static Assumptions.
J. Inf. Secur. Appl., 2019

Efficient Construction of Nominative Signature Secure under Symmetric Key Primitives and Standard Assumptions on Lattice.
IACR Cryptol. ePrint Arch., 2019

Constrained Pseudorandom Functions for Turing Machines Revisited: How to Achieve Verifiability and Key Delegation.
Algorithmica, 2019

Construction for a Nominative Signature Scheme from Lattice with Enhanced Security.
Proceedings of the Codes, Cryptology and Information Security, 2019

2018
Provably secure biometric based authentication and key agreement protocol for wireless sensor networks.
J. Ambient Intell. Humaniz. Comput., 2018

Functional Signcryption.
J. Inf. Secur. Appl., 2018

Differential Fault Attack on SIMON with Very Few Faults.
Proceedings of the Progress in Cryptology - INDOCRYPT 2018, 2018

2017
A Self-Verifiable Password Based Authentication Scheme for Multi-Server Architecture Using Smart Card.
Wirel. Pers. Commun., 2017

A Multi-server Environment with Secure and Efficient Remote User Authentication Scheme Based on Dynamic ID Using Smart Cards.
Wirel. Pers. Commun., 2017

Strongly full-hiding inner product encryption.
Theor. Comput. Sci., 2017

A Mutual Authentication Framework for Wireless Medical Sensor Networks.
J. Medical Syst., 2017

An enhanced dynamic ID-based authentication scheme for telecare medical information systems.
J. King Saud Univ. Comput. Inf. Sci., 2017

A privacy preserving biometric-based three-factor remote user authenticated key agreement scheme.
J. Inf. Secur. Appl., 2017

An anonymous biometric-based remote user-authenticated key agreement scheme for multimedia systems.
Int. J. Commun. Syst., 2017

Forward Secure Efficient Group Signature in Dynamic Setting using Lattices.
IACR Cryptol. ePrint Arch., 2017

Attribute-Based Signatures for Turing Machines.
IACR Cryptol. ePrint Arch., 2017

Secure and efficient user authentication scheme for multi-gateway wireless sensor networks.
Ad Hoc Networks, 2017

Constrained Pseudorandom Functions for Unconstrained Inputs Revisited: Achieving Verifiability and Key Delegation.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017

2016
A Secure and Robust Smartcard-Based Authentication Scheme for Session Initiation Protocol Using Elliptic Curve Cryptography.
Wirel. Pers. Commun., 2016

A secure and efficient ECC-based user anonymity-preserving session initiation authentication protocol using smart card.
Peer-to-Peer Netw. Appl., 2016

Design of a secure smart card-based multi-server authentication scheme.
J. Inf. Secur. Appl., 2016

Some results on ACORN.
IACR Cryptol. ePrint Arch., 2016

Fault analysis and weak key-IV attack on Sprout.
IACR Cryptol. ePrint Arch., 2016

Verifiable and Delegatable Constrained Pseudorandom Functions for Unconstrained Inputs.
IACR Cryptol. ePrint Arch., 2016

Secure Lightweight User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for the Internet of Things Environment.
Proceedings of the Information Systems Security - 12th International Conference, 2016

Adaptively Secure Unrestricted Attribute-Based Encryption with Subset Difference Revocation in Bilinear Groups of Prime Order.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2016, 2016

2015
An anonymous and secure biometric-based enterprise digital rights management system for mobile environment.
Secur. Commun. Networks, 2015

A secure password-based authentication and key agreement scheme using smart cards.
J. Inf. Secur. Appl., 2015

Design of a lightweight two-factor authentication scheme with smart card revocation.
J. Inf. Secur. Appl., 2015

An improved biometric-based remote user authentication scheme for connected healthcare.
Int. J. Ad Hoc Ubiquitous Comput., 2015

Fault Analysis on the Stream Ciphers LILI-128 and Achterbahn.
IACR Cryptol. ePrint Arch., 2015

Functional Encryption for Inner Product with Full Function Privacy.
IACR Cryptol. ePrint Arch., 2015

Compact Attribute-Based Encryption and Signcryption for General Circuits from Multilinear Maps.
IACR Cryptol. ePrint Arch., 2015

Functional Signcryption: Notion, Construction, and Applications.
IACR Cryptol. ePrint Arch., 2015

General Circuit Realizing Compact Revocable Attribute-Based Encryption from Multilinear Maps.
IACR Cryptol. ePrint Arch., 2015

Fully Secure Unbounded Revocable Attribute-Based Encryption in Prime Order Bilinear Groups via Subset Difference Method.
IACR Cryptol. ePrint Arch., 2015

New Constructions of T-function.
Proceedings of the Information Security Practice and Experience, 2015

Fully Secure Online/Offline Predicate and Attribute-Based Encryption.
Proceedings of the Information Security Practice and Experience, 2015

2014
A Secure and Efficient Chaotic Map-Based Authenticated Key Agreement Scheme for Telecare Medicine Information Systems.
J. Medical Syst., 2014

Security Enhancement of a Biometric based Authentication Scheme for Telecare Medicine Information Systems with Nonce.
J. Medical Syst., 2014

Cryptanalysis and Improvement of Yan et al.'s Biometric-Based Authentication Scheme for Telecare Medicine Information Systems.
J. Medical Syst., 2014

A group-based deterministic key pre-distribution scheme for wireless sensor network.
Int. J. Wirel. Mob. Comput., 2014

A deterministic key pre-distribution scheme for WSN using projective planes and their complements.
Int. J. Trust. Manag. Comput. Commun., 2014

A privacy enabling content distribution framework for digital rights management.
Int. J. Trust. Manag. Comput. Commun., 2014

A Probabilistic Algebraic Attack on the Grain Family of Stream Cipher.
IACR Cryptol. ePrint Arch., 2014

Fully Secure Self-Updatable Encryption in Prime Order Bilinear Groups.
IACR Cryptol. ePrint Arch., 2014

Universally Composable Efficient Priced Oblivious Transfer from a Flexible Membership Encryption.
IACR Cryptol. ePrint Arch., 2014

A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards.
Expert Syst. Appl., 2014

A New Variant of Algebraic Attack.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2014

Cryptanalysis of Yang et al.'s Digital Rights Management Authentication Scheme Based on Smart Card.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2014

Cryptanalysis of Two Authentication Scheme for DRM System.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2014

A Probabilistic Algebraic Attack on the Grain Family of Stream Ciphers.
Proceedings of the Network and System Security - 8th International Conference, 2014

2013
Cryptanalysis of Wu and Xu's authentication scheme for Telecare Medicine Information Systems.
CoRR, 2013

Cryptanalysis and Improvement of Jiang et al.'s Smart Card Based Remote User Authentication Scheme.
CoRR, 2013

Key Pre-distribution in a Non-uniform Network Using Combinatorial Design.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2013

A Certificateless Authenticated Key Agreement Protocol for Digital Rights Management System.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2013

A Pairing-Free Identity Based Authentication Framework for Cloud Computing.
Proceedings of the Network and System Security - 7th International Conference, 2013

Secure Content Delivery in DRM System with Consumer Privacy.
Proceedings of the Information Security Practice and Experience, 2013

Unconditionally Secure Fully Connected Key Establishment Using Deployment Knowledge.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Cryptanalysis of Pairing-Free Identity-Based Authenticated Key Agreement Protocols.
Proceedings of the Information Systems Security - 9th International Conference, 2013

Improved Biometric-Based Three-factor Remote User Authentication Scheme with Key Agreement Using Smart Card.
Proceedings of the Information Systems Security - 9th International Conference, 2013

2012
Towards a Secure, Transparent and Privacy-Preserving DRM System.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012

Privacy rights management in multiparty multilevel DRM system.
Proceedings of the 2012 International Conference on Advances in Computing, 2012

A Flexible Deterministic Approach to Key Pre-distribution in Grid Based WSNs.
Proceedings of the Ad Hoc Networks - 4th International ICST Conference, 2012

2011
Towards a Deterministic Hierarchical Key Predistribution for WSN Using Complementary Fano Plane.
Proceedings of the Security and Privacy in Communication Networks, 2011

Access Policy Based Key Management in Multi-level Multi-distributor DRM Architecture.
Proceedings of the Security Aspects in Information Technology, 2011

A Hierarchical Deterministic Key Pre-distribution for WSN Using Projective Planes.
Proceedings of the Ad Hoc Networks - Third International ICST Conference, 2011

Vector Space Access Structure and ID Based Distributed DRM Key Management.
Proceedings of the Advances in Computing and Communications, 2011

2010
Adaptive Routing Strategy for Large Scale Rearrangeable Symmetric Networks.
Int. J. Grid High Perform. Comput., 2010

Computationally secure self-healing key distribution with revocation in wireless ad hoc networks.
Ad Hoc Networks, 2010

Symmetric Rearrangeable Networks: Algorithms and Rearrangement Limits.
Proceedings of the Seventh International Conference on Information Technology: New Generations, 2010

2009
Hardware Architecture and Cost/time/data Trade-off for Generic Inversion of One-Way Function.
Computación y Sistemas, 2009

Enhanced Access Polynomial Based Self-healing Key Distribution.
Proceedings of the Security in Emerging Wireless Communication and Networking Systems, 2009

Generalized self-healing key distribution in wireless adhoc networks with trade-offs in user's pre-arranged life cycle and collusion resistance.
Proceedings of the Q2SWinet'09, Proceedings of the Fifth ACM International Symposium on QoS and Security for Wireless and Mobile Networks, Tenerife, Canary Islands, Spain, 2009

Dynamic Path Selection Algorithm for Bene-Networks.
Proceedings of the First International Conference on Computational Intelligence, 2009

2008
Generalized Self-healing Key Distribution Using Vector Space Access Structure.
Proceedings of the NETWORKING 2008, Ad Hoc and Sensor Networks, Wireless Networks, 2008

Low Bandwidth Self-Healing Key Distribution for Broadcast Encryption.
Proceedings of the Second Asia International Conference on Modelling and Simulation, 2008

2007
Improved Self-Healing Key Distribution with Revocation in Wireless Sensor Network.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Designing Scalable Self-healing Key Distribution Schemes with Revocation Capability.
Proceedings of the Parallel and Distributed Processing and Applications, 2007

Constant Storage Self-Healing Key Distribution with Revocation in Wireless Sensor Network.
Proceedings of IEEE International Conference on Communications, 2007

Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

2006
A New Cryptanalytic Time/Memory/Data Trade-off Algorithm.
IACR Cryptol. ePrint Arch., 2006

Application of LFSRs for Parallel Sequence Generation in Cryptologic Algorithms.
IACR Cryptol. ePrint Arch., 2006

On the Effectiveness of TMTO and Exhaustive Search Attacks.
Proceedings of the Advances in Information and Computer Security, 2006

Hardware architecture and trade-offs for generic inversion of one-way functions.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2006), 2006

2005
TMTO With Multiple Data: Analysis and New Single Table Trade-offs.
IACR Cryptol. ePrint Arch., 2005

Application of LFSRs in Time/Memory Trade-Off Cryptanalysis.
Proceedings of the Information Security Applications, 6th International Workshop, 2005

Improved Time-Memory Trade-Offs with Multiple Data.
Proceedings of the Selected Areas in Cryptography, 12th International Workshop, 2005


  Loading...