Subhamoy Maitra
Orcid: 0000-0002-8348-7971
According to our database1,
Subhamoy Maitra
authored at least 230 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Introducing nega-Forrelation: quantum algorithms in analyzing nega-Hadamard and nega-crosscorrelation spectra.
Des. Codes Cryptogr., March, 2024
Adv. Math. Commun., 2024
2023
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., November, 2023
An Overview and Concerns Related to Quantum Cryptanalysis: Past, Present, and Future.
Computer, October, 2023
Analysis of boolean functions related to binary input binary output two-party nonlocal games.
Cryptogr. Commun., September, 2023
IACR Trans. Symmetric Cryptol., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
2022
Discret. Appl. Math., 2022
Cryptogr. Commun., 2022
Appl. Algebra Eng. Commun. Comput., 2022
Proceedings of the Progress in Cryptology - INDOCRYPT 2022, 2022
Proceedings of the Progress in Cryptology - INDOCRYPT 2022, 2022
Proceedings of the Progress in Cryptology - INDOCRYPT 2022, 2022
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2022
2021
Quantum Algorithms for Cryptographically Significant Boolean Functions - An IBMQ Experience
Springer Briefs in Computer Science, Springer, ISBN: 978-981-16-3060-6, 2021
Parity decision tree in classical-quantum separations for certain classes of Boolean functions.
Quantum Inf. Process., 2021
Quantum Inf. Process., 2021
IACR Cryptol. ePrint Arch., 2021
Construction of balanced vectorial Boolean functions with almost optimal nonlinearity and very low differential-linear uniformity.
Finite Fields Their Appl., 2021
Des. Codes Cryptogr., 2021
CoRR, 2021
Cryptogr. Commun., 2021
Proceedings of the Progress in Cryptology - INDOCRYPT 2021, 2021
Quantum Resource Estimation for FSR Based Symmetric Ciphers and Related Grover's Attacks.
Proceedings of the Progress in Cryptology - INDOCRYPT 2021, 2021
Springer, ISBN: 978-981-33-4881-3, 2021
2020
IEEE Trans. Inf. Theory, 2020
Resource Estimation of Grovers-kind Quantum Cryptanalysis against FSR based Symmetric Ciphers.
IACR Cryptol. ePrint Arch., 2020
An Exact Quantum Query Algorithm Beyond Parity using Maiorana-McFarland (MM) type Bent functions.
CoRR, 2020
CoRR, 2020
Experimental Results on Higher-Order Differential Spectra of 6 and 8-bit Invertible S-Boxes.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2020
Proceedings of the Progress in Cryptology - INDOCRYPT 2020, 2020
2019
Modifying Maiorana-McFarland Type Bent Functions for Good Cryptographic Properties and Efficient Implementation.
SIAM J. Discret. Math., 2019
J. Hardw. Syst. Secur., 2019
Distinguisher and non-randomness of Grain-v1 for 112, 114 and 116 initialisation rounds with multiple-bit difference in IVs.
IET Inf. Secur., 2019
Construction and search of balanced Boolean functions on even number of variables towards excellent autocorrelation profile.
Des. Codes Cryptogr., 2019
Appl. Algebra Eng. Commun. Comput., 2019
Vectorial Boolean Functions with Very Low Differential-Linear Uniformity Using Maiorana-McFarland Type Construction.
Proceedings of the Progress in Cryptology - INDOCRYPT 2019, 2019
Analysis of the Strict Avalanche Criterion in Variants of Arbiter-Based Physically Unclonable Functions.
Proceedings of the Progress in Cryptology - INDOCRYPT 2019, 2019
Proceedings of the Progress in Cryptology - INDOCRYPT 2019, 2019
Proceedings of the Progress in Cryptology - INDOCRYPT 2019, 2019
Proceedings of the Progress in Cryptology - INDOCRYPT 2019, 2019
2018
Construction of n-Variable (n ≡ 2 mod 4) Balanced Boolean Functions With Maximum Absolute Value in Autocorrelation Spectra < 2<sup>n/2</sup>.
IEEE Trans. Inf. Theory, 2018
A Super-Set of Patterson-Wiedemann Functions: Upper Bounds and Possible Nonlinearities.
SIAM J. Discret. Math., 2018
Clauser-Horne-Shimony-Holt versus three-party pseudo-telepathy: on the optimal number of samples in device-independent quantum private query.
Quantum Inf. Process., 2018
IACR Cryptol. ePrint Arch., 2018
Discret. Appl. Math., 2018
Proceedings of the Progress in Cryptology - INDOCRYPT 2018, 2018
Proceedings of the Progress in Cryptology - INDOCRYPT 2018, 2018
2017
A scheme for conditional access-based systems using index locations of DCT coefficients.
J. Real Time Image Process., 2017
IACR Cryptol. ePrint Arch., 2017
Des. Codes Cryptogr., 2017
Probabilistic signature based generalized framework for differential fault analysis of stream ciphers.
Cryptogr. Commun., 2017
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2017
Proceedings of the Codes, Cryptology and Information Security, 2017
2016
IACR Trans. Symmetric Cryptol., 2016
Patterson-Wiedemann Type Functions on 21 Variables With Nonlinearity Greater Than Bent Concatenation Bound.
IEEE Trans. Inf. Theory, 2016
IACR Cryptol. ePrint Arch., 2016
Discret. Appl. Math., 2016
Cryptogr. Commun., 2016
2015
Differential Fault Attack against Grain Family with Very Few Faults and Minimal Assumptions.
IEEE Trans. Computers, 2015
Probabilistic Signature Based Framework for Differential Fault Analysis of Stream Ciphers.
IACR Cryptol. ePrint Arch., 2015
Key Recovery from State Information of Sprout: Application to Cryptanalysis and Fault Attack.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
2014
Quantum Inf. Process., 2014
(Non-)Random Sequences from (Non-)Random Permutations - Analysis of RC4 Stream Cipher.
J. Cryptol., 2014
Differential Power Analysis in Hamming Weight Model: How to Choose among (Extended) Affine Equivalent S-boxes.
Proceedings of the Progress in Cryptology - INDOCRYPT 2014, 2014
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014
2013
IEEE Trans. Computers, 2013
Quantum Inf. Comput., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Des. Codes Cryptogr., 2013
Proceedings of the 43rd IEEE International Symposium on Multiple-Valued Logic, 2013
Proceedings of the Information Systems Security - 9th International Conference, 2013
Proceedings of the Information Systems Security - 9th International Conference, 2013
Proceedings of the Progress in Cryptology, 2013
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013
2012
IEEE Trans. Inf. Theory, 2012
More on Correcting Errors in RSA Private Keys: Breaking CRT-RSA with Low Weight Decryption Exponents.
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2012
Proceedings of the 2012 IEEE International Symposium on Circuits and Systems, 2012
Proceedings of the Progress in Cryptology, 2012
Side Channel Attack to Actual Cryptanalysis: Breaking CRT-RSA with Low Weight Decryption Exponents.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012
2011
IEEE Trans. Inf. Theory, 2011
IACR Cryptol. ePrint Arch., 2011
Discret. Appl. Math., 2011
Proceedings of the Selected Areas in Cryptography - 18th International Workshop, 2011
An Attack on Privacy Preserving Data Aggregation Protocol for Wireless Sensor Networks.
Proceedings of the Information Security Technology for Applications, 2011
Proceedings of the Advances in Information and Computer Security, 2011
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011
Proceedings of the Information Systems Security - 7th International Conference, 2011
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011
2010
Inf. Process. Lett., 2010
Minimum Distance between Bent and 1-resilient Boolean Functions.
Ars Comb., 2010
Proceedings of the Sequences and Their Applications - SETA 2010, 2010
Proceedings of the Advances in Information and Computer Security, 2010
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010
Proceedings of the Topics in Cryptology, 2010
Proceedings of the Progress in Cryptology, 2010
2009
On the Studies Related to Linear Codes in Generalized Construction of Resilient Functions with Very High Nonlinearity.
Proceedings of the Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, 2009
On Deterministic Polynomial-Time Equivalence of Computing the CRT-RSA Secret Keys and Factoring.
IACR Cryptol. ePrint Arch., 2009
Construction of Rotation Symmetric Boolean Functions with optimal Algebraic Immunity.
Computación y Sistemas, 2009
Computación y Sistemas, 2009
Computación y Sistemas, 2009
Cryptogr. Commun., 2009
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009
Proceedings of the Applied Algebra, 2009
2008
A complete characterization of the evolution of RC4 pseudo random generation algorithm.
J. Math. Cryptol., 2008
RSA Cryptanalysis with Increased Bounds on the Secret Exponent using Less Lattice Dimension.
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
Idempotents in the neighbourhood of Patterson-Wiedemann functions having Walsh spectra zeros.
Des. Codes Cryptogr., 2008
On non-negligible bias of the first output byte of RC4 towards the first three bytes of the secret key.
Des. Codes Cryptogr., 2008
Discret. Appl. Math., 2008
Ad Hoc Sens. Wirel. Networks, 2008
Proceedings of the Progress in Cryptology, 2008
Improved Partial Key Exposure Attacks on RSA by Guessing a Few Bits of One of the Prime Factors.
Proceedings of the Information Security and Cryptology, 2008
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008
2007
Search for Boolean Functions With Excellent Profiles in the Rotation Symmetric Class.
IEEE Trans. Inf. Theory, 2007
Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity on Odd Number of Variables.
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
Balanced Boolean Function on 13-variables having Nonlinearity strictly greater than the Bent Concatenation Bound.
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Selected Areas in Cryptography, 14th International Workshop, 2007
Construction of Rotation Symmetric Boolean Functions on Odd Number of Variables with Maximum Algebraic Immunity.
Proceedings of the Applied Algebra, 2007
2006
Algebraic Immunity for Cryptographically Significant Boolean Functions: Analysis and Construction.
IEEE Trans. Inf. Theory, 2006
Analysis of the "Wavelet Tree Quantization" watermarking strategy and a modified robust scheme.
Multim. Syst., 2006
A key pre-distribution scheme for wireless sensor networks: merging blocks in combinatorial design.
Int. J. Inf. Sec., 2006
There exist Boolean functions on n (odd) variables having nonlinearity > 2<sup>n-1</sup> - 2<sup>(n-1)/2</sup> if and only if n>7.
IACR Cryptol. ePrint Arch., 2006
Enumeration of 9-variable Rotation Symmetric Boolean Functions having Nonlinearity > 240.
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
Basic Theory in Construction of Boolean Functions with Maximum Possible Annihilator Immunity.
Des. Codes Cryptogr., 2006
A Maiorana-McFarland type construction for resilient Boolean functions on <i>n</i> variables (<i>n</i> even) with nonlinearity >2<sup><i>n</i>-1</sup>-2<sup><i>n</i>/2</sup>+2<sup><i>n</i>/2-2</sup>.
Discret. Appl. Math., 2006
Cryptographic Properties and Structure of Boolean Functions with Full Algebraic Immunity.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006
2005
Cryptanalysis of optimal differential energy watermarking (DEW) and a modified robust scheme.
IEEE Trans. Signal Process., 2005
Theor. Comput. Sci., 2005
Clique Size in Sensor Networks with Key Pre-distribution Based on Transversal Design.
Int. J. Distributed Sens. Networks, 2005
Proceedings of the Pattern Recognition and Machine Intelligence, 2005
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005
Proceedings of the Information Systems Security, First International Conference, 2005
Cryptographically Significant Boolean Functions: Construction and Analysis in Terms of Algebraic Immunity.
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005
2004
IEEE Trans. Multim., 2004
Construction of Nonlinear Resilient Boolean Functions Using "Small" Affine Functions.
IEEE Trans. Inf. Theory, 2004
Cryptanalysis of correlation-based watermarking schemes using single watermarked copy.
IEEE Signal Process. Lett., 2004
On Nonlinearity and Autocorrelation Properties of Correlation Immune Boolean Functions.
J. Inf. Sci. Eng., 2004
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
Comput. Intell., 2004
Proceedings of the Digital Watermarking, Third InternationalWorkshop, 2004
Proceedings of the Distributed Computing, 2004
Proceedings of the Progress in Cryptology, 2004
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004
2003
IEEE Trans. Computers, 2003
Electron. Notes Discret. Math., 2003
Proceedings of the 2003 IEEE International Conference on Multimedia and Expo, 2003
Efficient Software Implementation of LFSR and Boolean Function and Its Application in Nonlinear Combiner Model.
Proceedings of the Applied Cryptography and Network Security, 2003
2002
Linear codes in generalized construction of resilient functions with very high nonlinearity.
IEEE Trans. Inf. Theory, 2002
IEEE Trans. Inf. Theory, 2002
IEEE Trans. Inf. Theory, 2002
IEEE Trans. Inf. Theory, 2002
Theor. Comput. Sci., 2002
Cross-Correlation Analysis of Cryptographically Useful Boolean Functions and S-Boxes.
Theory Comput. Syst., 2002
Highly nonlinear balanced Boolean functions with good local and global avalanche characteristics.
Inf. Process. Lett., 2002
Proceedings of the Selected Areas in Cryptography, 2002
Proceedings of the 2002 IEEE Information Theory Workshop, 2002
Proceedings of the Progress in Cryptology, 2002
Cryptanalysis of Optimal Differential Energy Watermarking (DEW) and a Modified Robust Scheme.
Proceedings of the Progress in Cryptology, 2002
Proceedings of the Progress in Cryptology, 2002
Proceedings of the Information and Communications Security, 4th International Conference, 2002
Proceedings of the Information and Communications Security, 4th International Conference, 2002
2001
New Constructions of Resilient and Correlation Immune Boolean Functions Achieving Upper Bound on Nonlinearity.
Electron. Notes Discret. Math., 2001
Electron. Notes Discret. Math., 2001
Proceedings of the Selected Areas in Cryptography, 8th Annual International Workshop, 2001
Proceedings of the Progress in Cryptology, 2001
Proceedings of the Progress in Cryptology, 2001
Proceedings of the Progress in Cryptology, 2001
Proceedings of the Progress in Cryptology, 2001
Proceedings of the Information and Communications Security, Third International Conference, 2001
Proceedings of the Cryptographic Hardware and Embedded Systems, 2001
2000
IACR Cryptol. ePrint Arch., 2000
New Constructions of Resilent and Correlation Immune Boolean Functions achieving Upper Bounds on Nonlinearity.
IACR Cryptol. ePrint Arch., 2000
IACR Cryptol. ePrint Arch., 2000
Proceedings of the Advances in Cryptology, 2000
Proceedings of the Advances in Cryptology, 2000
1999
Proceedings of the Advances in Cryptology, 1999
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999