Deepak Kumar Dalai

Orcid: 0000-0002-1015-1983

According to our database1, Deepak Kumar Dalai authored at least 31 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Class of Weightwise Almost Perfectly Balanced Boolean Functions with High Weightwise Nonlinearity.
IACR Cryptol. ePrint Arch., 2024

On linear complementary pairs of algebraic geometry codes over finite fields.
Discret. Math., 2024

Additive Complementary Pairs of Codes.
CoRR, 2024

A class of weightwise almost perfectly balanced Boolean functions.
Adv. Math. Commun., 2024

2022
Some Conditional Cube Testers for Grain-128a of Reduced Rounds.
IEEE Trans. Computers, 2022

A state bit recovery algorithm with TMDTO attack on Lizard and Grain-128a.
Des. Codes Cryptogr., 2022

2021
An Observation of Non-randomness in NFSR-Based Stream Ciphers with Reduced Initialization Round.
J. Hardw. Syst. Secur., 2021

2020
Bidirectional hash chains generically enhances resilience of key predistribution schemes.
IET Wirel. Sens. Syst., 2020

2019
Distinguisher and non-randomness of Grain-v1 for 112, 114 and 116 initialisation rounds with multiple-bit difference in IVs.
IET Inf. Secur., 2019

Recovering Internal States of Grain-v1.
Proceedings of the Information Security Practice and Experience, 2019

Wip: Degree Evaluation of Grain-v1.
Proceedings of the Information Systems Security - 15th International Conference, 2019

A Basic Theory of Lightweight Hierarchical Key Predistribution Scheme.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

2018
An Observation of Non-randomness in the Grain Family of Stream Ciphers with Reduced Initialization Round.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2018

2017
Sensornet - A Key Predistribution Scheme for Distributed Sensors using Nets.
Proceedings of the 6th International Conference on Sensor Networks (SENSORNETS 2017), 2017

Enhancing Resilience of KPS Using Bidirectional Hash Chains and Application on Sensornet.
Proceedings of the Network and System Security - 11th International Conference, 2017

A State Recovery Attack on ACORN-v1 and ACORN-v2.
Proceedings of the Network and System Security - 11th International Conference, 2017

2016
Key Predistribution Schemes Using Bent Functions in Distributed Sensor Networks.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

2015
On the Lower Block Triangular Nature of the Incidence Matrices to Compute the Algebraic Immunity of Boolean Functions.
Proceedings of the Algebraic Informatics - 6th International Conference, 2015

2013
Computing the Rank of Incidence Matrix and Algebraic Immunity of Boolean Functions.
IACR Cryptol. ePrint Arch., 2013

2009
Results on rotation symmetric bent functions.
Discret. Math., 2009

Algebraic Immunity of Boolean Functions Analysis and Construction.
Computación y Sistemas, 2009

2008
On 3-to-1 and Power APN S-Boxes.
Proceedings of the Sequences and Their Applications, 2008

2006
Algebraic Immunity for Cryptographically Significant Boolean Functions: Analysis and Construction.
IEEE Trans. Inf. Theory, 2006

Balanced Boolean Functions with (more than) Maximum Algebraic Immunity.
IACR Cryptol. ePrint Arch., 2006

Reducing the Number of Homogeneous Linear Equations in Finding Annihilators.
IACR Cryptol. ePrint Arch., 2006

Notion of Algebraic Immunity and Its evaluation Related to Fast Algebraic Attacks.
IACR Cryptol. ePrint Arch., 2006

Basic Theory in Construction of Boolean Functions with Maximum Possible Annihilator Immunity.
Des. Codes Cryptogr., 2006

Cryptographic Properties and Structure of Boolean Functions with Full Algebraic Immunity.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

2005
Results on Rotation Symmetric Bent Functions.
IACR Cryptol. ePrint Arch., 2005

Cryptographically Significant Boolean Functions: Construction and Analysis in Terms of Algebraic Immunity.
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005

2004
Results on Algebraic Immunity for Cryptographically Significant Boolean Functions.
Proceedings of the Progress in Cryptology, 2004


  Loading...