Souradyuti Paul

Orcid: 0000-0001-5404-9975

According to our database1, Souradyuti Paul authored at least 29 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Reinforcement Learning for Real-Time Federated Learning for Resource-Constrained Edge Cluster.
J. Netw. Syst. Manag., October, 2024

Towards a Mobility-cum-Battery Aware Dynamic UAV Deployment for Uninterrupted Connectivity.
Proceedings of the NOMS 2024 IEEE Network Operations and Management Symposium, 2024

2023
Topology-Aware Cluster Configuration for Real-time Multi-access Edge Computing.
Proceedings of the 24th International Conference on Distributed Computing and Networking, 2023

2022
Topology Aware Cluster Configuration for Minimizing Communication Delay in Edge Computing.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

2020
Efficient and Fair Multiparty Protocols using Blockchain and Trusted Hardware.
IACR Cryptol. ePrint Arch., 2020

2019
Efficient Fair Multiparty Protocols Using Blockchain and Trusted Hardware.
Proceedings of the Progress in Cryptology - LATINCRYPT 2019, 2019

2018
Key Assignment Scheme with Authenticated Encryption.
IACR Trans. Symmetric Cryptol., 2018

A New Approach to Deanonymization of Unreachable Bitcoin Nodes.
IACR Cryptol. ePrint Arch., 2018

A New Constant-size Accountable Ring Signature Scheme Without Random Oracles.
IACR Cryptol. ePrint Arch., 2018

Message-locked Encryption with File Update.
IACR Cryptol. ePrint Arch., 2018

Robust Multiparty Computation with Faster Verification Time.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2016
Indifferentiability security of the fast wide pipe hash: Breaking the birthday barrier.
J. Math. Cryptol., 2016

Improved indifferentiability security bound for the JH mode.
Des. Codes Cryptogr., 2016

2012
A Novel Permutation-based Hash Mode of Operation FP and the Hash Function SAMOSA.
IACR Cryptol. ePrint Arch., 2012

2011
Indifferentiability Security of the Fast Widepipe Hash: Breaking the Birthday Barrier.
IACR Cryptol. ePrint Arch., 2011

2010
Speeding Up The Widepipe: Secure and Fast Hashing.
IACR Cryptol. ePrint Arch., 2010

Speeding Up the Wide-Pipe: Secure and Fast Hashing.
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010

2007
New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B.
IACR Cryptol. ePrint Arch., 2007

New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py.
IACR Cryptol. ePrint Arch., 2007

Weaknesses in the Pseudorandom Bit Generation Algorithms of the Stream Ciphers TPypy and TPy.
IACR Cryptol. ePrint Arch., 2007

Cryptanalysis of Stream Ciphers Based on Arrays and Modular Addition.
IACR Cryptol. ePrint Arch., 2007

Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses.
Proceedings of the Progress in Cryptology, 2007

2006
Distinguishing Attacks on the Stream Cipher Py.
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006

On the (In)security of Stream Ciphers Based on Arrays and Modular Addition.
Proceedings of the Advances in Cryptology, 2006

2005
On the (In)security of Stream Ciphers Based on Arrays and Modular Addition (Full Version).
IACR Cryptol. ePrint Arch., 2005

Near Optimal Algorithms for Solving Differential Equations of Addition with Batch Queries.
Proceedings of the Progress in Cryptology, 2005

2004
Solving Systems of Differential Equations of Addition.
IACR Cryptol. ePrint Arch., 2004

A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher.
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004

2003
Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator.
Proceedings of the Progress in Cryptology, 2003


  Loading...