Aditi Kar Gangopadhyay

According to our database1, Aditi Kar Gangopadhyay authored at least 20 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
GR-NTRU: Dihedral group over ring of Eisenstein integers.
J. Inf. Secur. Appl., 2024

Giant Does NOT Mean Strong: Cryptanalysis of BQTRU.
IACR Cryptol. ePrint Arch., 2024

An Efficient Noncommutative NTRU from Semidirect Product.
IACR Cryptol. ePrint Arch., 2024

An efficient key generation algorithm for GR-NTRU over dihedral group.
IACR Cryptol. ePrint Arch., 2024

An Undeniable Signature Scheme Utilizing Module Lattices.
CoRR, 2024

2023
On the Gowers U2 and U3 norms of Boolean functions and their restriction to hyperplanes.
Discret. Appl. Math., December, 2023

Stability of the Walsh-Hadamard spectrum of cryptographic Boolean functions with biased inputs.
J. Appl. Math. Comput., August, 2023

Lattice attack on group ring NTRU: The case of the dihedral group.
CoRR, 2023

Rayleigh quotients of Dillon's functions.
CoRR, 2023

Results on the Key Space of Group-Ring NTRU: The Case of the Dihedral Group.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2023

Study of Support Set Generation Techniques in LAD for Intrusion Detection.
Proceedings of the Intelligent Systems and Pattern Recognition, 2023

Generating Adversarial Examples Using LAD.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2023, 2023

Computational Results on Gowers U<sub>2</sub> and U<sub>3</sub> Norms of Known S-Boxes.
Proceedings of the Codes, Cryptology and Information Security, 2023

2022
Intrusion Detection System for IoT Using Logical Analysis of Data and Information Gain Ratio.
Cryptogr., 2022

A Comparative Study of LAD, CNN and DNN for Detecting Intrusions.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2022, 2022

2021
A note on generalization of bent boolean functions.
Adv. Math. Commun., 2021

2017
Cryptographic Boolean functions with biased inputs.
Cryptogr. Commun., 2017

2013
On Generalized Nega-Hadamard Transform.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2013

2012
Investigations on Bent and Negabent Functions via the Nega-Hadamard Transform.
IEEE Trans. Inf. Theory, 2012

2010
Nega-Hadamard Transform, Bent and Negabent Functions.
Proceedings of the Sequences and Their Applications - SETA 2010, 2010


  Loading...