Goutam Paul
Orcid: 0000-0002-5160-6032Affiliations:
- Indian Statistical Institute, Cryptology and Security Research Unit, Kolkata, India
- Jadavpur University, Department of Computer Science and Engineering, Kolkata, India (former)
- State University of New York, Albany, NY, USA (former)
According to our database1,
Goutam Paul
authored at least 124 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on twitter.com
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
J. Cryptogr. Eng., June, 2024
Multim. Tools Appl., January, 2024
A complex network analysis approach to compare the performance of batsmen across different formats.
Knowl. Based Syst., 2024
Proceedings of the 37th IEEE International System-on-Chip Conference, 2024
2023
Quantum Inf. Process., November, 2023
An intelligent clustering framework for substitute recommendation and player selection.
J. Supercomput., October, 2023
Switching the Top Slice of the Sandwich with Extra Filling Yields a Stronger Boomerang for NLFSR-based Block Ciphers.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Expert Syst. Appl., 2023
2022
Measurement device-independent quantum secure direct communication with user authentication.
Quantum Inf. Process., 2022
J. Cryptogr. Eng., 2022
Proceedings of the 2022 Workshop on Attacks and Solutions in Hardware Security, 2022
2021
Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos.
IACR Trans. Symmetric Cryptol., 2021
Quantum Inf. Comput., 2021
Two-point FFT-based high capacity image steganography using calendar based message encoding.
Inf. Sci., 2021
Entropy, 2021
CoRR, 2021
Proceedings of the 12th International Conference on Computing Communication and Networking Technologies, 2021
2020
A PVD based high capacity steganography algorithm with embedding in non-sequential position.
Multim. Tools Appl., 2020
Cryptanalysis of Quantum Secure Direct Communication Protocol with Mutual Authentication Based on Single Photons and Bell States.
CoRR, 2020
Improving the Security of "Measurement-Device-Independent Quantum Communication without Encryption".
CoRR, 2020
Proceedings of the Progress in Cryptology - AFRICACRYPT 2020, 2020
2019
Quantum Inf. Process., 2019
IACR Cryptol. ePrint Arch., 2019
2018
IACR Trans. Symmetric Cryptol., 2018
Quantum to classical one-way function and its applications in quantum money authentication.
Quantum Inf. Process., 2018
An efficient multi-bit steganography algorithm in spatial domain with two-layer security.
Multim. Tools Appl., 2018
On data complexity of distinguishing attacks versus message recovery attacks on stream ciphers.
Des. Codes Cryptogr., 2018
Revisiting RC4 key collision: Faster search algorithm and new 22-byte colliding key pairs.
Cryptogr. Commun., 2018
2017
IEEE Trans. Very Large Scale Integr. Syst., 2017
Multim. Tools Appl., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Reversible Computation - 9th International Conference, 2017
2016
ACM Trans. Embed. Comput. Syst., 2016
Three Snakes in One Hole: The First Systematic Hardware Accelerator Design for SOSEMANUK with Optional Serpent and SNOW 2.0 Modes.
IEEE Trans. Computers, 2016
J. Cryptogr. Eng., 2016
Revisiting Optimal Eavesdropping in Quantum Cryptography: Choice of Interaction Is Unique up to Rotation of the Underlying Basis.
CoRR, 2016
Proceedings of the Information Systems Security - 12th International Conference, 2016
Revisiting the Security Proof of QUAD Stream Cipher: Some Corrections and Tighter Bounds.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
Quantum Inf. Process., 2015
Quantum Inf. Comput., 2015
On Data Complexity of Distinguishing Attacks vs. Message Recovery Attacks on Stream Ciphers.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Millionaires' Problem with Rational Players: a Unified Approach in Classical and Quantum Paradigms.
CoRR, 2015
Forward-Secure Authenticated Symmetric Key Exchange Protocol: New Security Model and Secure Construction.
Proceedings of the Provable Security, 2015
Proceedings of the Information Systems Security - 11th International Conference, 2015
2014
(Non-)Random Sequences from (Non-)Random Permutations - Analysis of RC4 Stream Cipher.
J. Cryptol., 2014
J. Cryptogr. Eng., 2014
Proceedings of the Advances in Information and Computer Security, 2014
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2014
Proceedings of the Progress in Cryptology - INDOCRYPT 2014, 2014
Proceedings of the Information Systems Security - 10th International Conference, 2014
Proceedings of the Information Systems Security - 10th International Conference, 2014
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014
2013
IACR Cryptol. ePrint Arch., 2013
Three Snakes in One Hole: A 67 Gbps Flexible Hardware for SOSEMANUK with Optional Serpent and SNOW 2.0 Modes.
IACR Cryptol. ePrint Arch., 2013
Optimized GPU Implementation and Performance Analysis of HC Series of Stream Ciphers.
IACR Cryptol. ePrint Arch., 2013
Maximum lifetime broadcast communications in cooperative multihop wireless ad hoc networks: Centralized and distributed approaches.
Ad Hoc Networks, 2013
Proceedings of the Information Systems Security - 9th International Conference, 2013
RAPID-FeinSPN: A Rapid Prototyping Framework for Feistel and SPN-Based Block Ciphers.
Proceedings of the Information Systems Security - 9th International Conference, 2013
Proceedings of the 50th Annual Design Automation Conference 2013, 2013
Proceedings of the 11th Asia Pacific Conference on Computer Human Interaction, 2013
Proceedings of the 11th Asia Pacific Conference on Computer Human Interaction, 2013
Proceedings of the Progress in Cryptology, 2013
Proceedings of the Progress in Cryptology, 2013
2012
Generic cryptographic weakness of <i>k</i>-normal Boolean functions in certain stream ciphers and cryptanalysis of grain-128.
Period. Math. Hung., 2012
Internal state recovery of keystream generator LILI-128 based on a novel weakness of the employed Boolean function.
Inf. Process. Lett., 2012
Internal state recovery of grain-v1 employing normality order of the filter function.
IET Inf. Secur., 2012
CoRR, 2012
Exploring security-performance trade-offs during hardware accelerator design of stream cipher RC4.
Proceedings of the 20th IEEE/IFIP International Conference on VLSI and System-on-Chip, 2012
Impact of Extending Side Channel Attack on Cipher Variants: A Case Study with the HC Series of Stream Ciphers.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2012
Proceedings of the Progress in Cryptology, 2012
Proceedings of the Information Systems Security, 8th International Conference, 2012
2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Selected Areas in Cryptography - 18th International Workshop, 2011
Proceedings of the Advances in Information and Computer Security, 2011
Proceedings of the Information Systems Security - 7th International Conference, 2011
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011
2010
A generic weakness of the k-normal Boolean functions exposed to dedicated algebraic attack.
Proceedings of the International Symposium on Information Theory and its Applications, 2010
2009
On Necessary and Sufficient Number of Cops in the Game of Cops and Robber in Multidimensional Grids
CoRR, 2009
Cryptogr. Commun., 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
Proceedings of the Applied Algebra, 2009
2008
A complete characterization of the evolution of RC4 pseudo random generation algorithm.
J. Math. Cryptol., 2008
IACR Cryptol. ePrint Arch., 2008
On non-negligible bias of the first output byte of RC4 towards the first three bytes of the secret key.
Des. Codes Cryptogr., 2008
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008
2007
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Selected Areas in Cryptography, 14th International Workshop, 2007
2004
Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2004
Proceedings of the Nineteenth National Conference on Artificial Intelligence, 2004
2003
Proceedings of the Fifteenth Conference on Innovative Applications of Artificial Intelligence, 2003