Sourav Mukhopadhyay
Orcid: 0000-0002-4015-1386
According to our database1,
Sourav Mukhopadhyay
authored at least 112 papers
between 2005 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Securing data in the cloud using pairing-free inner product functional encryption with unbounded vector size.
Theor. Comput. Sci., 2025
2024
Key-homomorphic and revocable ciphertext-policy attribute based key encapsulation mechanism for multimedia applications.
Multim. Tools Appl., October, 2024
SL-PPCP: Secure and Low-Cost Privacy-Preserving Communication Protocol for Vehicular Ad Hoc Networks.
IEEE Trans. Veh. Technol., June, 2024
Multim. Tools Appl., January, 2024
An Experimentally Validated Feasible Quantum Protocol for Identity-Based Signature with Application to Secure Email Communication.
CoRR, 2024
Quantum-safe identity-based broadcast encryption with provable security from multivariate cryptography.
Adv. Math. Commun., 2024
2023
Comput. Commun., September, 2023
Short attribute-based signatures for arbitrary Turing machines from standard assumptions.
Des. Codes Cryptogr., May, 2023
Communication-friendly threshold trapdoor function from weaker assumption for distributed cryptography.
Ann. des Télécommunications, April, 2023
Hierarchical Identity-Based Inner Product Functional Encryption for Unbounded Hierarchical Depth.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2023
2022
IACR Cryptol. ePrint Arch., 2022
Key Encapsulation Mechanism in Ciphertext-policy Attribute based Setting Featuring Revocation and Key-homomorphic Property.
Proceedings of the 19th International Conference on Security and Cryptography, 2022
Constructing Pairing Free Unbounded Inner Product Functional Encryption Schemes with Unbounded Inner Product Policy.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2022
Hierarchical Identity Based Inner Product Functional Encryption for Privacy Preserving Statistical Analysis Without q-type Assumption.
Proceedings of the Emerging Information Security and Applications, 2022
2021
Computational Efficient Authenticated Digital Content Distribution Frameworks for DRM Systems: Review and Outlook.
IEEE Syst. J., 2021
Blockchain-based multimedia content distribution with the assured system update mechanism.
Multim. Tools Appl., 2021
IET Inf. Secur., 2021
Quantum Resource Estimation for FSR Based Symmetric Ciphers and Related Grover's Attacks.
Proceedings of the Progress in Cryptology - INDOCRYPT 2021, 2021
2020
Resource Estimation of Grovers-kind Quantum Cryptanalysis against FSR based Symmetric Ciphers.
IACR Cryptol. ePrint Arch., 2020
Adv. Math. Commun., 2020
Proceedings of the Progress in Cryptology - INDOCRYPT 2020, 2020
2019
Inf. Technol. Control., 2019
Succinct Predicate and Online-Offline Multi-Input Inner Product Encryptions under Standard Static Assumptions.
J. Inf. Secur. Appl., 2019
Efficient Construction of Nominative Signature Secure under Symmetric Key Primitives and Standard Assumptions on Lattice.
IACR Cryptol. ePrint Arch., 2019
Constrained Pseudorandom Functions for Turing Machines Revisited: How to Achieve Verifiability and Key Delegation.
Algorithmica, 2019
Proceedings of the Codes, Cryptology and Information Security, 2019
2018
Provably secure biometric based authentication and key agreement protocol for wireless sensor networks.
J. Ambient Intell. Humaniz. Comput., 2018
Proceedings of the Progress in Cryptology - INDOCRYPT 2018, 2018
2017
A Self-Verifiable Password Based Authentication Scheme for Multi-Server Architecture Using Smart Card.
Wirel. Pers. Commun., 2017
A Multi-server Environment with Secure and Efficient Remote User Authentication Scheme Based on Dynamic ID Using Smart Cards.
Wirel. Pers. Commun., 2017
J. Medical Syst., 2017
An enhanced dynamic ID-based authentication scheme for telecare medical information systems.
J. King Saud Univ. Comput. Inf. Sci., 2017
A privacy preserving biometric-based three-factor remote user authenticated key agreement scheme.
J. Inf. Secur. Appl., 2017
An anonymous biometric-based remote user-authenticated key agreement scheme for multimedia systems.
Int. J. Commun. Syst., 2017
IACR Cryptol. ePrint Arch., 2017
Secure and efficient user authentication scheme for multi-gateway wireless sensor networks.
Ad Hoc Networks, 2017
Constrained Pseudorandom Functions for Unconstrained Inputs Revisited: Achieving Verifiability and Key Delegation.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017
2016
A Secure and Robust Smartcard-Based Authentication Scheme for Session Initiation Protocol Using Elliptic Curve Cryptography.
Wirel. Pers. Commun., 2016
An anonymous and secure biometric-based enterprise digital rights management system for mobile environment.
Secur. Commun. Networks, 2016
A secure and efficient ECC-based user anonymity-preserving session initiation authentication protocol using smart card.
Peer-to-Peer Netw. Appl., 2016
J. Inf. Secur. Appl., 2016
Verifiable and Delegatable Constrained Pseudorandom Functions for Unconstrained Inputs.
IACR Cryptol. ePrint Arch., 2016
Secure Lightweight User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for the Internet of Things Environment.
Proceedings of the Information Systems Security - 12th International Conference, 2016
Adaptively Secure Unrestricted Attribute-Based Encryption with Subset Difference Revocation in Bilinear Groups of Prime Order.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2016, 2016
2015
J. Inf. Secur. Appl., 2015
J. Inf. Secur. Appl., 2015
An improved biometric-based remote user authentication scheme for connected healthcare.
Int. J. Ad Hoc Ubiquitous Comput., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Compact Attribute-Based Encryption and Signcryption for General Circuits from Multilinear Maps.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
General Circuit Realizing Compact Revocable Attribute-Based Encryption from Multilinear Maps.
IACR Cryptol. ePrint Arch., 2015
Fully Secure Unbounded Revocable Attribute-Based Encryption in Prime Order Bilinear Groups via Subset Difference Method.
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Information Security Practice and Experience, 2015
Proceedings of the Information Security Practice and Experience, 2015
2014
A Secure and Efficient Chaotic Map-Based Authenticated Key Agreement Scheme for Telecare Medicine Information Systems.
J. Medical Syst., 2014
Security Enhancement of a Biometric based Authentication Scheme for Telecare Medicine Information Systems with Nonce.
J. Medical Syst., 2014
Cryptanalysis and Improvement of Yan et al.'s Biometric-Based Authentication Scheme for Telecare Medicine Information Systems.
J. Medical Syst., 2014
Int. J. Wirel. Mob. Comput., 2014
A deterministic key pre-distribution scheme for WSN using projective planes and their complements.
Int. J. Trust. Manag. Comput. Commun., 2014
Int. J. Trust. Manag. Comput. Commun., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Universally Composable Efficient Priced Oblivious Transfer from a Flexible Membership Encryption.
IACR Cryptol. ePrint Arch., 2014
A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards.
Expert Syst. Appl., 2014
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2014
Cryptanalysis of Yang et al.'s Digital Rights Management Authentication Scheme Based on Smart Card.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2014
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2014
Proceedings of the Network and System Security - 8th International Conference, 2014
2013
Cryptanalysis of Wu and Xu's authentication scheme for Telecare Medicine Information Systems.
CoRR, 2013
Cryptanalysis and Improvement of Jiang et al.'s Smart Card Based Remote User Authentication Scheme.
CoRR, 2013
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2013
A Certificateless Authenticated Key Agreement Protocol for Digital Rights Management System.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the Information Security Practice and Experience, 2013
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013
Proceedings of the Information Systems Security - 9th International Conference, 2013
Improved Biometric-Based Three-factor Remote User Authentication Scheme with Key Agreement Using Smart Card.
Proceedings of the Information Systems Security - 9th International Conference, 2013
2012
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012
Proceedings of the 2012 International Conference on Advances in Computing, 2012
Proceedings of the Ad Hoc Networks - 4th International ICST Conference, 2012
2011
Towards a Deterministic Hierarchical Key Predistribution for WSN Using Complementary Fano Plane.
Proceedings of the Security and Privacy in Communication Networks, 2011
Access Policy Based Key Management in Multi-level Multi-distributor DRM Architecture.
Proceedings of the Security Aspects in Information Technology, 2011
Proceedings of the Ad Hoc Networks - Third International ICST Conference, 2011
Proceedings of the Advances in Computing and Communications, 2011
2010
Int. J. Grid High Perform. Comput., 2010
Computationally secure self-healing key distribution with revocation in wireless ad hoc networks.
Ad Hoc Networks, 2010
Proceedings of the Seventh International Conference on Information Technology: New Generations, 2010
2009
Hardware Architecture and Cost/time/data Trade-off for Generic Inversion of One-Way Function.
Computación y Sistemas, 2009
Proceedings of the Security in Emerging Wireless Communication and Networking Systems, 2009
Generalized self-healing key distribution in wireless adhoc networks with trade-offs in user's pre-arranged life cycle and collusion resistance.
Proceedings of the Q2SWinet'09, Proceedings of the Fifth ACM International Symposium on QoS and Security for Wireless and Mobile Networks, Tenerife, Canary Islands, Spain, 2009
Proceedings of the First International Conference on Computational Intelligence, 2009
2008
Proceedings of the NETWORKING 2008, Ad Hoc and Sensor Networks, Wireless Networks, 2008
Proceedings of the Second Asia International Conference on Modelling and Simulation, 2008
2007
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007
Proceedings of the Parallel and Distributed Processing and Applications, 2007
Constant Storage Self-Healing Key Distribution with Revocation in Wireless Sensor Network.
Proceedings of IEEE International Conference on Communications, 2007
Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007
2006
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Advances in Information and Computer Security, 2006
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2006), 2006
2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the Information Security Applications, 6th International Workshop, 2005
Proceedings of the Selected Areas in Cryptography, 12th International Workshop, 2005