Souradyuti Paul
Orcid: 0000-0001-5404-9975
According to our database1,
Souradyuti Paul
authored at least 29 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Reinforcement Learning for Real-Time Federated Learning for Resource-Constrained Edge Cluster.
J. Netw. Syst. Manag., October, 2024
Towards a Mobility-cum-Battery Aware Dynamic UAV Deployment for Uninterrupted Connectivity.
Proceedings of the NOMS 2024 IEEE Network Operations and Management Symposium, 2024
2023
Proceedings of the 24th International Conference on Distributed Computing and Networking, 2023
2022
Topology Aware Cluster Configuration for Minimizing Communication Delay in Edge Computing.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022
2020
IACR Cryptol. ePrint Arch., 2020
2019
Proceedings of the Progress in Cryptology - LATINCRYPT 2019, 2019
2018
IACR Trans. Symmetric Cryptol., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2016
Indifferentiability security of the fast wide pipe hash: Breaking the birthday barrier.
J. Math. Cryptol., 2016
Des. Codes Cryptogr., 2016
2012
IACR Cryptol. ePrint Arch., 2012
2011
Indifferentiability Security of the Fast Widepipe Hash: Breaking the Birthday Barrier.
IACR Cryptol. ePrint Arch., 2011
2010
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010
2007
New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B.
IACR Cryptol. ePrint Arch., 2007
New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py.
IACR Cryptol. ePrint Arch., 2007
Weaknesses in the Pseudorandom Bit Generation Algorithms of the Stream Ciphers TPypy and TPy.
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses.
Proceedings of the Progress in Cryptology, 2007
2006
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006
Proceedings of the Advances in Cryptology, 2006
2005
On the (In)security of Stream Ciphers Based on Arrays and Modular Addition (Full Version).
IACR Cryptol. ePrint Arch., 2005
Near Optimal Algorithms for Solving Differential Equations of Addition with Batch Queries.
Proceedings of the Progress in Cryptology, 2005
2004
IACR Cryptol. ePrint Arch., 2004
A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher.
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004
2003
Proceedings of the Progress in Cryptology, 2003