Sabyasachi Dutta
Orcid: 0000-0003-3567-5449
According to our database1,
Sabyasachi Dutta
authored at least 38 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
J. Vis. Commun. Image Represent., 2024
2023
Multim. Tools Appl., November, 2023
Eng. Appl. Artif. Intell., 2023
Lower Bounds on the Share Size of Leakage Resilient Cheating Detectable Secret Sharing.
Proceedings of the Cryptology and Network Security - 22nd International Conference, 2023
2022
Quantum Inf. Process., 2022
Practical attacks on a class of secret image sharing schemes based on Chinese Remainder Theorem.
Comput. Electr. Eng., 2022
IEEE Access, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021
Proceedings of the Applied Cryptography and Network Security, 2021
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021
2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Information Security Applications - 21st International Conference, 2020
Proceedings of the Network and System Security - 14th International Conference, 2020
Proceedings of the Information Systems Security - 16th International Conference, 2020
Proceedings of the Information Systems Security - 16th International Conference, 2020
2019
Theory and application of computationally independent one-way functions: Interactive proof of ability - Revisited.
IACR Cryptol. ePrint Arch., 2019
Proceedings of the Information Security Applications - 20th International Conference, 2019
Proceedings of the 2019 International Workshop on Big Data and Information Security, 2019
Proceedings of the Fifth International Conference on Mathematics and Computing, 2019
Evolving Perfect Hash Families: A Combinatorial Viewpoint of Evolving Secret Sharing.
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019
Proceedings of the Advanced Information Networking and Applications, 2019
2018
Secure Computation of Inner Product of Vectors with Distributed Entries and Its Applications to SVM.
Proceedings of the Information Security Practice and Experience, 2018
Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness.
Proceedings of the Information Security Practice and Experience, 2018
Proceedings of the Information Systems Security - 14th International Conference, 2018
2017
Proceedings of the Information Theoretic Security - 10th International Conference, 2017
2016
Efficient Construction of Visual Cryptographic Scheme for Compartmented Access Structures.
IACR Cryptol. ePrint Arch., 2016
Constructions and analysis of some efficient t - (k, n)<sup>∗</sup>-visual cryptographic schemes using linear algebraic techniques.
Des. Codes Cryptogr., 2016
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016
2014
XOR Based Non-monotone t- (k, n)^* -Visual Cryptographic Schemes Using Linear Algebra.
Proceedings of the Information and Communications Security - 16th International Conference, 2014
2013
Indistinguishability against Chosen Ciphertext Verification Attack Revisited: The Complete Picture.
Proceedings of the Provable Security - 7th International Conference, 2013
2007
Proceedings of the 2007 International Conference on Computing: Theory and Applications (ICCTA 2007), 2007