Sugata Gangopadhyay

Orcid: 0000-0002-7329-7349

According to our database1, Sugata Gangopadhyay authored at least 72 papers between 2002 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
ULTRA: Exploring Team Recommendations in Two Geographies Using Open Data in Response to Call for Proposals.
Proceedings of the 7th Joint International Conference on Data Science & Management of Data (11th ACM IKDD CODS and 29th COMAD), 2024

2023
An approach to occluded face recognition based on dynamic image-to-class warping using structural similarity index.
Appl. Intell., December, 2023

Stability of the Walsh-Hadamard spectrum of cryptographic Boolean functions with biased inputs.
J. Appl. Math. Comput., August, 2023

Evolving bijective S-Boxes using hybrid adaptive genetic algorithm with optimal cryptographic properties.
J. Ambient Intell. Humaniz. Comput., March, 2023

On Learning with LAD.
CoRR, 2023

Lattice attack on group ring NTRU: The case of the dihedral group.
CoRR, 2023

Rayleigh quotients of Dillon's functions.
CoRR, 2023

Results on the Key Space of Group-Ring NTRU: The Case of the Dihedral Group.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2023

Study of Support Set Generation Techniques in LAD for Intrusion Detection.
Proceedings of the Intelligent Systems and Pattern Recognition, 2023

Generating Adversarial Examples Using LAD.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2023, 2023

Computational Results on Gowers U<sub>2</sub> and U<sub>3</sub> Norms of Known S-Boxes.
Proceedings of the Codes, Cryptology and Information Security, 2023

2022
An improved hybrid genetic algorithm to construct balanced Boolean function with optimal cryptographic properties.
Evol. Intell., 2022

C-differential bent functions and perfect nonlinearity.
Discret. Appl. Math., 2022

Intrusion Detection System for IoT Using Logical Analysis of Data and Information Gain Ratio.
Cryptogr., 2022

A quantum algorithm to estimate the closeness to the Strict Avalanche criterion in Boolean functions.
CoRR, 2022

A Comparative Study of LAD, CNN and DNN for Detecting Intrusions.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2022, 2022

Design of Intrusion Detection System Based on Logical Analysis of Data (LAD) Using Information Gain Ratio.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2022

2021
A secure image encryption scheme based on a novel 2D sine-cosine cross-chaotic (SC3) map.
J. Real Time Image Process., 2021

Gowers U<sub>2</sub> norm as a measure of nonlinearity for Boolean functions and their generalizations.
Adv. Math. Commun., 2021

2020
A quantum algorithm to estimate the Gowers U<sub>2</sub> norm and linearity testing of Boolean functions.
Quantum Inf. Process., 2020

Generic constructions of $\mathbb {Z}$-bent functions.
Des. Codes Cryptogr., 2020

Generalized bent Boolean functions and strongly regular Cayley graphs.
Discret. Appl. Math., 2020

2019
Design methods for semi-bent functions.
Inf. Process. Lett., 2019

Construction of resilient Boolean functions in odd variables with strictly almost optimal nonlinearity.
Des. Codes Cryptogr., 2019

New classes of p-ary bent functions.
Cryptogr. Commun., 2019

Generalized Boolean Functions and Quantum Circuits on IBM-Q.
Proceedings of the 10th International Conference on Computing, 2019

2018
A TMDTO Attack Against Lizard.
IEEE Trans. Computers, 2018

Gowers U<sub>3</sub> norm of some classes of bent Boolean functions.
Des. Codes Cryptogr., 2018

On non-existence of bent-negabent rotation symmetric Boolean functions.
Discret. Appl. Math., 2018

Generalized nonlinearity of S-boxes.
Adv. Math. Commun., 2018

Analysis of Cost function using Genetic algorithm to construct balanced Boolean function.
Proceedings of the TENCON 2018, 2018

2017
A note on non-splitting Z-bent functions.
Inf. Process. Lett., 2017

Cubic Maiorana-McFarland bent functions with no affine derivative.
Int. J. Comput. Math. Comput. Syst. Theory, 2017

On derivatives of polynomials over finite fields through integration.
Discret. Appl. Math., 2017

Cryptographic Boolean functions with biased inputs.
Cryptogr. Commun., 2017

Quantum Algorithms Related to \textitHN -Transforms of Boolean Functions.
Proceedings of the Codes, Cryptology and Information Security, 2017

2016
An Analysis of the 풞 Class of Bent Functions.
Fundam. Informaticae, 2016

Investigations on cubic rotation symmetric bent functions.
Electron. Notes Discret. Math., 2016

2015
An analysis of the C class of bent functions.
IACR Cryptol. ePrint Arch., 2015

2014
On generalized bent functions with Dillon's exponents.
Inf. Process. Lett., 2014

The Fourier Entropy-Influence conjecture holds for a log-density 1 class of cryptographic Boolean functions.
IACR Cryptol. ePrint Arch., 2014

2013
A Note on Generalized Bent Criteria for Boolean Functions.
IEEE Trans. Inf. Theory, 2013

Bent and generalized bent Boolean functions.
Des. Codes Cryptogr., 2013

A new construction of bent functions based on $${\mathbb{Z}}$$ -bent functions.
Des. Codes Cryptogr., 2013

Affine inequivalence of cubic Maiorana-McFarland type bent functions.
Discret. Appl. Math., 2013

2012
Investigations on Bent and Negabent Functions via the Nega-Hadamard Transform.
IEEE Trans. Inf. Theory, 2012

Generic cryptographic weakness of <i>k</i>-normal Boolean functions in certain stream ciphers and cryptanalysis of grain-128.
Period. Math. Hung., 2012

Internal state recovery of keystream generator LILI-128 based on a novel weakness of the employed Boolean function.
Inf. Process. Lett., 2012

Internal state recovery of grain-v1 employing normality order of the filter function.
IET Inf. Secur., 2012

On Second-order Nonlinearities of Some D0 Type Bent Functions.
Fundam. Informaticae, 2012

2011
On lower bounds of second-order nonlinearities of cubic bent functions constructed by concatenating Gold functions.
Int. J. Comput. Math., 2011

Some Results Concerning Generalized Bent Functions.
IACR Cryptol. ePrint Arch., 2011

The Good lower bound of Second-order nonlinearity of a class of Boolean function.
IACR Cryptol. ePrint Arch., 2011

On lower bounds on second-order nonliearities of bent functions obtained by using Niho power functions.
IACR Cryptol. ePrint Arch., 2011

A Lower Bound of the Second-order Nonlinearities of Boolean Bent Functions.
Fundam. Informaticae, 2011

Laced Boolean functions and subset sum problems in finite fields.
Discret. Appl. Math., 2011

2010
On the lower bounds of the second order nonlinearities of some Boolean functions.
Inf. Sci., 2010

On second-order nonlinearities of some D<sub>0</sub> type bent functions.
IACR Cryptol. ePrint Arch., 2010

A New Class of Bent-Negabent Boolean Functions.
IACR Cryptol. ePrint Arch., 2010

Third-order nonlinearities of a subclass of Kasami functions.
Cryptogr. Commun., 2010

Nega-Hadamard Transform, Bent and Negabent Functions.
Proceedings of the Sequences and Their Applications - SETA 2010, 2010

A generic weakness of the k-normal Boolean functions exposed to dedicated algebraic attack.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

2009
On second order nonlinearities of cubic monomial Boolean functions.
IACR Cryptol. ePrint Arch., 2009

On the Lower Bounds of the Second Order Nonlinearity of some Boolean Functions.
IACR Cryptol. ePrint Arch., 2009

Nontrivial Solutions to the Cubic Sieve Congruence Problem.
Computación y Sistemas, 2009

On affine (non)equivalence of Boolean functions.
Computing, 2009

2008
On Kasami Bent Functions.
IACR Cryptol. ePrint Arch., 2008

2006
On a new invariant of Boolean functions.
IACR Cryptol. ePrint Arch., 2006

On construction of non-normal Boolean functions.
IACR Cryptol. ePrint Arch., 2006

2004
Crosscorrelation Spectra of Dillon and Patterson-Wiedemann type Boolean Functions.
IACR Cryptol. ePrint Arch., 2004

2003
Patterson-Wiedemann Construction Revisited.
Electron. Notes Discret. Math., 2003

2002
Further Results Related to Generalized Nonlinearity.
Proceedings of the Progress in Cryptology, 2002


  Loading...