Avishek Adhikari
Orcid: 0000-0002-7768-4629
According to our database1,
Avishek Adhikari
authored at least 65 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Peer Peer Netw. Appl., July, 2024
Peer Peer Netw. Appl., January, 2024
J. Vis. Commun. Image Represent., 2024
On the Design of a Searchable Encryption Protocol for Keyword Search using Proactive Secret Sharing.
Proceedings of the 20th IEEE International Conference on e-Science, 2024
2023
Multim. Tools Appl., November, 2023
2022
Practical attacks on a class of secret image sharing schemes based on Chinese Remainder Theorem.
Comput. Electr. Eng., 2022
Connectivity invariant lightweight resiliency improvement strategies for CRT-subset scheme.
Ad Hoc Networks, 2022
2021
IACR Cryptol. ePrint Arch., 2021
2020
Signal Process. Image Commun., 2020
IACR Cryptol. ePrint Arch., 2020
AKCE Int. J. Graphs Comb., 2020
Proceedings of the Information Systems Security - 16th International Conference, 2020
Proceedings of the Information Systems Security - 16th International Conference, 2020
2019
Groups Complex. Cryptol., 2019
Proceedings of the Fifth International Conference on Mathematics and Computing, 2019
2018
J. Inf. Secur. Appl., 2018
Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness.
Proceedings of the Information Security Practice and Experience, 2018
Proceedings of the Information Systems Security - 14th International Conference, 2018
2017
A new graph parameter and a construction of larger graph without increasing radio k-chromatic number.
J. Comb. Optim., 2017
Efficient Constructions for t- (k, n)<sup>*</sup>-Random Grid Visual Cryptographic Schemes.
IACR Cryptol. ePrint Arch., 2017
Discret. Appl. Math., 2017
Probabilistic signature based generalized framework for differential fault analysis of stream ciphers.
Cryptogr. Commun., 2017
Proceedings of the Information Theoretic Security - 10th International Conference, 2017
2016
Efficient Construction of Visual Cryptographic Scheme for Compartmented Access Structures.
IACR Cryptol. ePrint Arch., 2016
Constructions and analysis of some efficient t - (k, n)<sup>∗</sup>-visual cryptographic schemes using linear algebraic techniques.
Des. Codes Cryptogr., 2016
Proceedings of the Security in Computing and Communications - 4th International Symposium, 2016
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016
2015
Probabilistic Signature Based Framework for Differential Fault Analysis of Stream Ciphers.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Discret. Math., 2015
Structural Form of a Minimal Critical Set for a Latin Square Representing the Elementary Abelian 2-group of Order 8.
Ars Comb., 2015
Proceedings of the Information Systems Security - 11th International Conference, 2015
Computationally Secure Cheating Identifiable Multi-Secret Sharing for General Access Structure.
Proceedings of the Distributed Computing and Internet Technology, 2015
Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, 2015
2014
J. Inf. Secur. Appl., 2014
An Efficient t-Cheater Identifiable Secret Sharing Scheme with Optimal Cheater Resiliency.
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Linear algebraic techniques to construct monochrome visual cryptographic schemes for general access structure and its applications to color images.
Des. Codes Cryptogr., 2014
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2014
Proceedings of the Progress in Cryptology - INDOCRYPT 2014, 2014
XOR Based Non-monotone t- (k, n)^* -Visual Cryptographic Schemes Using Linear Algebra.
Proceedings of the Information and Communications Security - 16th International Conference, 2014
2013
Indistinguishability against Chosen Ciphertext Verification Attack Revisited: The Complete Picture.
Proceedings of the Provable Security - 7th International Conference, 2013
Proceedings of the Information Systems Security - 9th International Conference, 2013
2012
A repeated game approach for analyzing the collusion on selective forwarding in multihop wireless networks.
Comput. Commun., 2012
2011
Proceedings of the Trusted Systems - Third International Conference, 2011
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011
2010
Appl. Math. Lett., 2010
Proceedings of the Digital Watermarking - 9th International Workshop, 2010
A New Scrambling Evaluation Scheme Based on Spatial Distribution Entropy and Centroid Difference of Bit-Plane.
Proceedings of the Digital Watermarking - 9th International Workshop, 2010
2007
Applications of Partially Balanced Incomplete Block Designs in Developing (2, <i>n</i>) Visual Cryptographic Schemes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
2006
Proceedings of the IEEE International Conference on Evolutionary Computation, 2006
2005
2004
Proceedings of the Progress in Cryptology, 2004
2003
Proceedings of the Progress in Cryptology, 2003