Subhamoy Maitra

Orcid: 0000-0002-8348-7971

According to our database1, Subhamoy Maitra authored at least 231 papers between 1999 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Improved Fault Analysis on Subterranean 2.0.
IEEE Trans. Computers, June, 2024

Introducing nega-Forrelation: quantum algorithms in analyzing nega-Hadamard and nega-crosscorrelation spectra.
Des. Codes Cryptogr., March, 2024

Skill vs. Chance Quantification for Popular Card & Board Games.
CoRR, 2024

SecureVAX: A Blockchain-Enabled Secure Vaccine Passport System.
CoRR, 2024

Further Constructions of AMUBs for Non-prime power Composite Dimensions.
CoRR, 2024

Almost Perfect Mutually Unbiased Bases that are Sparse.
CoRR, 2024

Following Forrelation - quantum algorithms in exploring Boolean functions' spectra.
Adv. Math. Commun., 2024

2023
Improved Linear Decomposition of Majority and Threshold Boolean Functions.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., November, 2023

An Overview and Concerns Related to Quantum Cryptanalysis: Past, Present, and Future.
Computer, October, 2023

Analysis of boolean functions related to binary input binary output two-party nonlocal games.
Cryptogr. Commun., September, 2023

Cryptanalysis of Reduced Round ChaCha - New Attack & Deeper Analysis.
IACR Trans. Symmetric Cryptol., 2023

Cryptanalysis of Reduced Round ChaCha- New Attack and Deeper Analysis.
IACR Cryptol. ePrint Arch., 2023

Efficient Hardware Implementation for Maiorana-McFarland type Functions.
IACR Cryptol. ePrint Arch., 2023

2022
Further cryptographic properties of the multiplicative inverse function.
Discret. Appl. Math., 2022

Resolvable block designs in construction of approximate real MUBs that are sparse.
Cryptogr. Commun., 2022

On the existence and non-existence of some classes of bent-negabent functions.
Appl. Algebra Eng. Commun. Comput., 2022

Modifying Bent Functions to Obtain the Balanced Ones with High Nonlinearity.
Proceedings of the Progress in Cryptology - INDOCRYPT 2022, 2022

Revisiting BoolTest - On Randomness Testing Using Boolean Functions.
Proceedings of the Progress in Cryptology - INDOCRYPT 2022, 2022

A Proposal for Device Independent Probabilistic Quantum Oblivious Transfer.
Proceedings of the Progress in Cryptology - INDOCRYPT 2022, 2022

A Heuristic Framework to Search for Approximate Mutually Unbiased Bases.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2022

2021
Quantum Algorithms for Cryptographically Significant Boolean Functions - An IBMQ Experience
Springer Briefs in Computer Science, Springer, ISBN: 978-981-16-3060-6, 2021

Differential Fault Attack on Kreyvium & FLIP.
IEEE Trans. Computers, 2021

Parity decision tree in classical-quantum separations for certain classes of Boolean functions.
Quantum Inf. Process., 2021

Improved and practical proposal for measurement device independent quantum dialogue.
Quantum Inf. Process., 2021

How do the Arbiter PUFs Sample the Boolean Function Class?
IACR Cryptol. ePrint Arch., 2021

Construction of balanced vectorial Boolean functions with almost optimal nonlinearity and very low differential-linear uniformity.
Finite Fields Their Appl., 2021

Further clarification on Mantin's Digraph Repetition Bias in RC4.
Des. Codes Cryptogr., 2021

Glimpses are forever in RC4 amidst the spectre of biases.
Discret. Appl. Math., 2021

On Boolean Functions with Low Polynomial Degree and Higher Order Sensitivity.
CoRR, 2021

On approximate real mutually unbiased bases in square dimension.
Cryptogr. Commun., 2021

Differential Fault Attack on Espresso.
Proceedings of the Progress in Cryptology - INDOCRYPT 2021, 2021

Quantum Resource Estimation for FSR Based Symmetric Ciphers and Related Grover's Attacks.
Proceedings of the Progress in Cryptology - INDOCRYPT 2021, 2021

Design and Cryptanalysis of ZUC - A Stream Cipher in Mobile Telephony
Springer, ISBN: 978-981-33-4881-3, 2021

2020
Analysis on Boolean Function in a Restricted (Biased) Domain.
IEEE Trans. Inf. Theory, 2020

Resource Estimation of Grovers-kind Quantum Cryptanalysis against FSR based Symmetric Ciphers.
IACR Cryptol. ePrint Arch., 2020

An Exact Quantum Query Algorithm Beyond Parity using Maiorana-McFarland (MM) type Bent functions.
CoRR, 2020

Classical-Quantum Separations in Minimal Query Complexity of Boolean Functions.
CoRR, 2020

Experimental Results on Higher-Order Differential Spectra of 6 and 8-bit Invertible S-Boxes.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2020

More Glimpses of the RC4 Internal State Array.
Proceedings of the Progress in Cryptology - INDOCRYPT 2020, 2020

2019
Modifying Maiorana-McFarland Type Bent Functions for Good Cryptographic Properties and Efficient Implementation.
SIAM J. Discret. Math., 2019

Certain Observations on ACORN v3 and Grain v1 - Implications Towards TMDTO Attacks.
J. Hardw. Syst. Secur., 2019

Distinguisher and non-randomness of Grain-v1 for 112, 114 and 116 initialisation rounds with multiple-bit difference in IVs.
IET Inf. Secur., 2019

Construction and search of balanced Boolean functions on even number of variables towards excellent autocorrelation profile.
Des. Codes Cryptogr., 2019

The connection between quadratic bent-negabent functions and the Kerdock code.
Appl. Algebra Eng. Commun. Comput., 2019

Vectorial Boolean Functions with Very Low Differential-Linear Uniformity Using Maiorana-McFarland Type Construction.
Proceedings of the Progress in Cryptology - INDOCRYPT 2019, 2019

Analysis of the Strict Avalanche Criterion in Variants of Arbiter-Based Physically Unclonable Functions.
Proceedings of the Progress in Cryptology - INDOCRYPT 2019, 2019

RC4: Non-randomness in the Index j and Some Results on Its Cycles.
Proceedings of the Progress in Cryptology - INDOCRYPT 2019, 2019

Efficient Quantum Algorithms Related to Autocorrelation Spectrum.
Proceedings of the Progress in Cryptology - INDOCRYPT 2019, 2019

Device Independent Quantum Key Distribution Using Three-Party Pseudo-Telepathy.
Proceedings of the Progress in Cryptology - INDOCRYPT 2019, 2019

2018
Construction of n-Variable (n ≡ 2 mod 4) Balanced Boolean Functions With Maximum Absolute Value in Autocorrelation Spectra < 2<sup>n/2</sup>.
IEEE Trans. Inf. Theory, 2018

A TMDTO Attack Against Lizard.
IEEE Trans. Computers, 2018

A Super-Set of Patterson-Wiedemann Functions: Upper Bounds and Possible Nonlinearities.
SIAM J. Discret. Math., 2018

Clauser-Horne-Shimony-Holt versus three-party pseudo-telepathy: on the optimal number of samples in device-independent quantum private query.
Quantum Inf. Process., 2018

On Hardware Implementation of Tang-Maitra Boolean Functions.
IACR Cryptol. ePrint Arch., 2018

On non-existence of bent-negabent rotation symmetric Boolean functions.
Discret. Appl. Math., 2018

Quantum Algorithms for Autocorrelation Spectrum.
CoRR, 2018

Guest editorial.
Cryptogr. Commun., 2018

Tools in Analyzing Linear Approximation for Boolean Functions Related to FLIP.
Proceedings of the Progress in Cryptology - INDOCRYPT 2018, 2018

Differential Fault Attack on SIMON with Very Few Faults.
Proceedings of the Progress in Cryptology - INDOCRYPT 2018, 2018

2017
A Differential Fault Attack on Plantlet.
IEEE Trans. Computers, 2017

A scheme for conditional access-based systems using index locations of DCT coefficients.
J. Real Time Image Process., 2017

Differential Fault Attack on Grain v1, ACORN v3 and Lizard.
IACR Cryptol. ePrint Arch., 2017

A Differential Fault Attack on Plantlet.
IACR Cryptol. ePrint Arch., 2017

Observing biases in the state: case studies with Trivium and Trivia-SC.
Des. Codes Cryptogr., 2017

Redefining the transparency order.
Des. Codes Cryptogr., 2017

Probabilistic signature based generalized framework for differential fault analysis of stream ciphers.
Cryptogr. Commun., 2017

Certain Observations on ACORN v3 and the Implications to TMDTO Attacks.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2017

Quantum Algorithms Related to \textitHN -Transforms of Boolean Functions.
Proceedings of the Codes, Cryptology and Information Security, 2017

2016
Significantly Improved Multi-bit Differentials for Reduced Round Salsa and ChaCha.
IACR Trans. Symmetric Cryptol., 2016

Patterson-Wiedemann Type Functions on 21 Variables With Nonlinearity Greater Than Bent Concatenation Bound.
IEEE Trans. Inf. Theory, 2016

Differential Cryptanalysis of Salsa and ChaCha - An Evaluation with a Hybrid Model.
IACR Cryptol. ePrint Arch., 2016

Chosen IV cryptanalysis on reduced round ChaCha and Salsa.
Discret. Appl. Math., 2016

Application of Grover's algorithm to check non-resiliency of a Boolean function.
Cryptogr. Commun., 2016

2015
Differential Fault Attack against Grain Family with Very Few Faults and Minimal Assumptions.
IEEE Trans. Computers, 2015

Improved differential fault attack on MICKEY 2.0.
J. Cryptogr. Eng., 2015

Probabilistic Signature Based Framework for Differential Fault Analysis of Stream Ciphers.
IACR Cryptol. ePrint Arch., 2015

Key Recovery from State Information of Sprout: Application to Cryptanalysis and Fault Attack.
IACR Cryptol. ePrint Arch., 2015

Salsa20 Cryptanalysis: New Moves and Revisiting Old Styles.
IACR Cryptol. ePrint Arch., 2015

The Index j in RC4 is not Pseudo-random due to Non-existence of Finney Cycle.
IACR Cryptol. ePrint Arch., 2015

Higher Order Differential Analysis of NORX.
IACR Cryptol. ePrint Arch., 2015

New Distinguishers for Reduced Round Trivium and Trivia-SC using Cube Testers.
IACR Cryptol. ePrint Arch., 2015

Proving TLS-attack related open biases of RC4.
Des. Codes Cryptogr., 2015

2014
Efficient quantum algorithms to construct arbitrary Dicke states.
Quantum Inf. Process., 2014

(Non-)Random Sequences from (Non-)Random Permutations - Analysis of RC4 Stream Cipher.
J. Cryptol., 2014

Redefining the Transparency Order.
IACR Cryptol. ePrint Arch., 2014

Differential Power Analysis in Hamming Weight Model: How to Choose among (Extended) Affine Equivalent S-boxes.
Proceedings of the Progress in Cryptology - INDOCRYPT 2014, 2014

Dependence in IV-Related Bytes of RC4 Key Enhances Vulnerabilities in WPA.
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014

2013
High-Performance Hardware Implementation for RC4 Stream Cipher.
IEEE Trans. Computers, 2013

Cryptanalysis of a secret sharing scheme that uses quantum resources.
Quantum Inf. Comput., 2013

Counting Heron triangles with Constraints.
Integers, 2013

Quad-RC4: Merging Four RC4 States towards a 32-bit Stream Cipher.
IACR Cryptol. ePrint Arch., 2013

Distinguishing WPA.
IACR Cryptol. ePrint Arch., 2013

Quantum algorithm to check Resiliency of a Boolean function.
IACR Cryptol. ePrint Arch., 2013

A Differential Fault Attack on MICKEY 2.0.
IACR Cryptol. ePrint Arch., 2013

Cryptanalytic results on 'Dual CRT' and 'Common Prime' RSA.
Des. Codes Cryptogr., 2013

Analysis and Improvement of Transformation-Based Reversible Logic Synthesis.
Proceedings of the 43rd IEEE International Symposium on Multiple-Valued Logic, 2013

Error Correction of Partially Exposed RSA Private Keys from MSB Side.
Proceedings of the Information Systems Security - 9th International Conference, 2013

New Long-Term Glimpse of RC4 Stream Cipher.
Proceedings of the Information Systems Security - 9th International Conference, 2013

New Results on Generalization of Roos-Type Biases and Related Keystreams of RC4.
Proceedings of the Progress in Cryptology, 2013

A Chosen IV Related Key Attack on Grain-128a.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013

2012
Investigations on Bent and Negabent Functions via the Nega-Hadamard Transform.
IEEE Trans. Inf. Theory, 2012

More on Correcting Errors in RSA Private Keys: Breaking CRT-RSA with Low Weight Decryption Exponents.
IACR Cryptol. ePrint Arch., 2012

A Differential Fault Attack on Grain-128a using MACs.
IACR Cryptol. ePrint Arch., 2012

Efficient quantum algorithm to construct arbitrary Dicke states
CoRR, 2012

Guest editorial.
Cryptogr. Commun., 2012

Some Results on Related Key-IV Pairs of Grain.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2012

Designing high-throughput hardware accelerator for stream cipher HC-128.
Proceedings of the 2012 IEEE International Symposium on Circuits and Systems, 2012

A Differential Fault Attack on the Grain Family under Reasonable Assumptions.
Proceedings of the Progress in Cryptology, 2012

Side Channel Attack to Actual Cryptanalysis: Breaking CRT-RSA with Low Weight Decryption Exponents.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

A Differential Fault Attack on the Grain Family of Stream Ciphers.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

2011
Approximate Integer Common Divisor Problem Relates to Implicit Factorization.
IEEE Trans. Inf. Theory, 2011

RC4: (Non-)Random Words from (Non-)Random Permutations.
IACR Cryptol. ePrint Arch., 2011

Some observations on HC-128.
Des. Codes Cryptogr., 2011

Laced Boolean functions and subset sum problems in finite fields.
Discret. Appl. Math., 2011

Proof of Empirical RC4 Biases and New Key Correlations.
Proceedings of the Selected Areas in Cryptography - 18th International Workshop, 2011

An Attack on Privacy Preserving Data Aggregation Protocol for Wireless Sensor Networks.
Proceedings of the Information Security Technology for Applications, 2011

A Theoretical Analysis of the Structure of HC-128.
Proceedings of the Advances in Information and Computer Security, 2011

On the Evolution of GGHN Cipher.
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011

Some Combinatorial Results towards State Recovery Attack on RC4.
Proceedings of the Information Systems Security - 7th International Conference, 2011

Attack on Broadcast RC4 Revisited.
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011

2010
Cryptanalysis of RSA with more than one decryption exponent.
Inf. Process. Lett., 2010

Cryptanalysis of RSA with two decryption exponents.
Inf. Process. Lett., 2010

Cryptanalysis of Dual CRT-RSA.
IACR Cryptol. ePrint Arch., 2010

A Combinatorial Analysis of HC-128.
IACR Cryptol. ePrint Arch., 2010

Minimum Distance between Bent and 1-resilient Boolean Functions.
Ars Comb., 2010

Some applications of lattice based root finding techniques.
Adv. Math. Commun., 2010

Nega-Hadamard Transform, Bent and Negabent Functions.
Proceedings of the Sequences and Their Applications - SETA 2010, 2010

Publishing Upper Half of RSA Decryption Exponent.
Proceedings of the Advances in Information and Computer Security, 2010

One Byte per Clock: A Novel RC4 Hardware.
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010

Partial Key Exposure Attack on RSA - Improvements for Limited Lattice Dimensions.
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010

Efficient CRT-RSA Decryption for Small Encryption Exponents.
Proceedings of the Topics in Cryptology, 2010

Factoring RSA Modulus Using Prime Reconstruction from Random Known Bits.
Proceedings of the Progress in Cryptology, 2010

2009
On the Studies Related to Linear Codes in Generalized Construction of Resilient Functions with Very High Nonlinearity.
Proceedings of the Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, 2009

On Deterministic Polynomial-Time Equivalence of Computing the CRT-RSA Secret Keys and Factoring.
IACR Cryptol. ePrint Arch., 2009

Results on rotation symmetric bent functions.
Discret. Math., 2009

Construction of Rotation Symmetric Boolean Functions with optimal Algebraic Immunity.
Computación y Sistemas, 2009

Nontrivial Solutions to the Cubic Sieve Congruence Problem.
Computación y Sistemas, 2009

Algebraic Immunity of Boolean Functions Analysis and Construction.
Computación y Sistemas, 2009

On affine (non)equivalence of Boolean functions.
Computing, 2009

On biases of permutation and keystream bytes of RC4 towards the secret key.
Cryptogr. Commun., 2009

Further results on implicit factoring in polynomial time.
Adv. Math. Commun., 2009

Partial Key Exposure Attack on CRT-RSA.
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009

On Some Sequences of the Secret Pseudo-random Index j in RC4 Key Scheduling.
Proceedings of the Applied Algebra, 2009

2008
A complete characterization of the evolution of RC4 pseudo random generation algorithm.
J. Math. Cryptol., 2008

RSA Cryptanalysis with Increased Bounds on the Secret Exponent using Less Lattice Dimension.
IACR Cryptol. ePrint Arch., 2008

Revisiting Wiener's Attack - New Weak Keys in RSA.
IACR Cryptol. ePrint Arch., 2008

Some Observations on HC-128.
IACR Cryptol. ePrint Arch., 2008

Analysis of RC4 and Proposal of Additional Layers for Better Security Margin.
IACR Cryptol. ePrint Arch., 2008

Idempotents in the neighbourhood of Patterson-Wiedemann functions having Walsh spectra zeros.
Des. Codes Cryptogr., 2008

On non-negligible bias of the first output byte of RC4 towards the first three bytes of the secret key.
Des. Codes Cryptogr., 2008

Rotation symmetric Boolean functions - Count and cryptographic properties.
Discret. Appl. Math., 2008

Key Predistribution Using Transversal Design on a Grid of Wireless Sensor Network.
Ad Hoc Sens. Wirel. Networks, 2008

A New Class of Weak Encryption Exponents in RSA.
Proceedings of the Progress in Cryptology, 2008

Improved Partial Key Exposure Attacks on RSA by Guessing a Few Bits of One of the Prime Factors.
Proceedings of the Information Security and Cryptology, 2008

Recovering RC4 Permutation from 2048 Keystream Bytes if jIs Stuck.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008

2007
Search for Boolean Functions With Excellent Profiles in the Rotation Symmetric Class.
IEEE Trans. Inf. Theory, 2007

Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity on Odd Number of Variables.
IACR Cryptol. ePrint Arch., 2007

On Non-Randomness of the Permutation after RC4 Key Scheduling.
IACR Cryptol. ePrint Arch., 2007

RC4 State Information at Any Stage Reveals the Secret Key.
IACR Cryptol. ePrint Arch., 2007

New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4.
IACR Cryptol. ePrint Arch., 2007

Balanced Boolean Function on 13-variables having Nonlinearity strictly greater than the Bent Concatenation Bound.
IACR Cryptol. ePrint Arch., 2007

Permutation After RC4 Key Scheduling Reveals the Secret Key.
Proceedings of the Selected Areas in Cryptography, 14th International Workshop, 2007

Construction of Rotation Symmetric Boolean Functions on Odd Number of Variables with Maximum Algebraic Immunity.
Proceedings of the Applied Algebra, 2007

2006
Cryptanalysis of Chu's DCT based watermarking scheme.
IEEE Trans. Multim., 2006

Algebraic Immunity for Cryptographically Significant Boolean Functions: Analysis and Construction.
IEEE Trans. Inf. Theory, 2006

Analysis of the "Wavelet Tree Quantization" watermarking strategy and a modified robust scheme.
Multim. Syst., 2006

A key pre-distribution scheme for wireless sensor networks: merging blocks in combinatorial design.
Int. J. Inf. Sec., 2006

There exist Boolean functions on n (odd) variables having nonlinearity > 2<sup>n-1</sup> - 2<sup>(n-1)/2</sup> if and only if n>7.
IACR Cryptol. ePrint Arch., 2006

Enumeration of 9-variable Rotation Symmetric Boolean Functions having Nonlinearity > 240.
IACR Cryptol. ePrint Arch., 2006

Balanced Boolean Functions with (more than) Maximum Algebraic Immunity.
IACR Cryptol. ePrint Arch., 2006

Reducing the Number of Homogeneous Linear Equations in Finding Annihilators.
IACR Cryptol. ePrint Arch., 2006

Notion of Algebraic Immunity and Its evaluation Related to Fast Algebraic Attacks.
IACR Cryptol. ePrint Arch., 2006

Basic Theory in Construction of Boolean Functions with Maximum Possible Annihilator Immunity.
Des. Codes Cryptogr., 2006

A Maiorana-McFarland type construction for resilient Boolean functions on <i>n</i> variables (<i>n</i> even) with nonlinearity >2<sup><i>n</i>-1</sup>-2<sup><i>n</i>/2</sup>+2<sup><i>n</i>/2-2</sup>.
Discret. Appl. Math., 2006

Cryptographic Properties and Structure of Boolean Functions with Full Algebraic Immunity.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

2005
Cryptanalysis of optimal differential energy watermarking (DEW) and a modified robust scheme.
IEEE Trans. Signal Process., 2005

Results on multiples of primitive polynomials and their products over GF(2).
Theor. Comput. Sci., 2005

Clique Size in Sensor Networks with Key Pre-distribution Based on Transversal Design.
Int. J. Distributed Sens. Networks, 2005

Results on Rotation Symmetric Bent Functions.
IACR Cryptol. ePrint Arch., 2005

An Information Hiding Framework for Lightweight Mobile Devices with Digital Camera.
Proceedings of the Pattern Recognition and Machine Intelligence, 2005

Security Evaluation of Generalized Patchwork Algorithm from Cryptanalytic Viewpoint.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

A Hybrid Design of Key Pre-distribution Scheme for Wireless Sensor Networks.
Proceedings of the Information Systems Security, First International Conference, 2005

Cryptographically Significant Boolean Functions: Construction and Analysis in Terms of Algebraic Immunity.
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005

2004
Spatial domain digital watermarking of multimedia objects for buyer authentication.
IEEE Trans. Multim., 2004

Construction of Nonlinear Resilient Boolean Functions Using "Small" Affine Functions.
IEEE Trans. Inf. Theory, 2004

Cryptanalysis of correlation-based watermarking schemes using single watermarked copy.
IEEE Signal Process. Lett., 2004

On Nonlinearity and Autocorrelation Properties of Correlation Immune Boolean Functions.
J. Inf. Sci. Eng., 2004

Plateaued Rotation Symmetric Boolean Functions on Odd Number of Variables.
IACR Cryptol. ePrint Arch., 2004

Crosscorrelation Spectra of Dillon and Patterson-Wiedemann type Boolean Functions.
IACR Cryptol. ePrint Arch., 2004

Almost Boolean Functions: The Design of Boolean Functions by Spectral Inversion.
Comput. Intell., 2004

Cryptanalysis of a Wavelet Based Watermarking Scheme.
Proceedings of the Digital Watermarking, Third InternationalWorkshop, 2004

Cryptanalysis of "Wavelet Tree Quantization" Watermarking Scheme.
Proceedings of the Distributed Computing, 2004

Results on Algebraic Immunity for Cryptographically Significant Boolean Functions.
Proceedings of the Progress in Cryptology, 2004

Results on Rotation Symmetric Bent and Correlation Immune Boolean Functions.
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004

2003
Efficient Implementation of Cryptographically Useful 'Large' Boolean Functions.
IEEE Trans. Computers, 2003

A constructive count of rotation symmetric functions.
Inf. Process. Lett., 2003

Balancedness and Correlation Immunity of Symmetric Boolean Functions.
Electron. Notes Discret. Math., 2003

Patterson-Wiedemann Construction Revisited.
Electron. Notes Discret. Math., 2003

Robust buyer authentication scheme for multimedia object.
Proceedings of the 2003 IEEE International Conference on Multimedia and Expo, 2003

Efficient Software Implementation of LFSR and Boolean Function and Its Application in Nonlinear Combiner Model.
Proceedings of the Applied Cryptography and Network Security, 2003

2002
Linear codes in generalized construction of resilient functions with very high nonlinearity.
IEEE Trans. Inf. Theory, 2002

Maximum nonlinearity of symmetric Boolean functions on odd number of variables.
IEEE Trans. Inf. Theory, 2002

Modifications of Patterson-Wiedemann functions for cryptographic applications.
IEEE Trans. Inf. Theory, 2002

Further constructions of resilient Boolean functions with very high nonlinearity.
IEEE Trans. Inf. Theory, 2002

Cryptographically significant Boolean functions with five valued Walsh spectra.
Theor. Comput. Sci., 2002

Cross-Correlation Analysis of Cryptographically Useful Boolean Functions and S-Boxes.
Theory Comput. Syst., 2002

Highly nonlinear balanced Boolean functions with good local and global avalanche characteristics.
Inf. Process. Lett., 2002

Multiples of Primitive Polynomials and Their Products over GF(2).
Proceedings of the Selected Areas in Cryptography, 2002

Cryptanalysis of correlation based watermark using single copy.
Proceedings of the 2002 IEEE Information Theory Workshop, 2002

Further Results Related to Generalized Nonlinearity.
Proceedings of the Progress in Cryptology, 2002

Cryptanalysis of Optimal Differential Energy Watermarking (DEW) and a Modified Robust Scheme.
Proceedings of the Progress in Cryptology, 2002

Evolving Boolean Functions Satisfying Multiple Criteria.
Proceedings of the Progress in Cryptology, 2002

Further Results on Multiples of Primitive Polynomials and Their Products over GF(2).
Proceedings of the Information and Communications Security, 4th International Conference, 2002

A Robust Block Oriented Watermarking Scheme in Spatial Domain.
Proceedings of the Information and Communications Security, 4th International Conference, 2002

2001
New Constructions of Resilient and Correlation Immune Boolean Functions Achieving Upper Bound on Nonlinearity.
Electron. Notes Discret. Math., 2001

Highly Nonlinear Balanced Boolean Functions with Very Good Autocorrelation Property.
Electron. Notes Discret. Math., 2001

Linear Codes in Constructing Resilient Functions with High Nonlinearity.
Proceedings of the Selected Areas in Cryptography, 8th Annual International Workshop, 2001

Spatial Domain Digital Watermarking with Buyer Authentication.
Proceedings of the Progress in Cryptology, 2001

Autocorrelation Properties of Correlation Immune Boolean Functions.
Proceedings of the Progress in Cryptology, 2001

Multiples of Primitive Polynomials over GF(2).
Proceedings of the Progress in Cryptology, 2001

Efficient Software Implementation of Linear Feedback Shift Registers.
Proceedings of the Progress in Cryptology, 2001

Primitive Polynomials over GF(2) - A Cryptologic Approach.
Proceedings of the Information and Communications Security, Third International Conference, 2001

Efficient Implementation of "Large" Stream Cipher Systems.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2001

2000
New Directions in Design of Resilient Boolean Functions.
IACR Cryptol. ePrint Arch., 2000

New Constructions of Resilent and Correlation Immune Boolean Functions achieving Upper Bounds on Nonlinearity.
IACR Cryptol. ePrint Arch., 2000

Correlation Immune Boolean Functions with Very High Nonlinearity.
IACR Cryptol. ePrint Arch., 2000

Construction of Nonlinear Boolean Functions with Important Cryptographic Properties.
Proceedings of the Advances in Cryptology, 2000

Nonlinearity Bounds and Constructions of Resilient Boolean Functions.
Proceedings of the Advances in Cryptology, 2000

1999
Hamming Weights of Correlation Immune Boolean Functions.
Inf. Process. Lett., 1999

Highly Nonlinear Resilient Functions Optimizing Siegenthaler's Inequality.
Proceedings of the Advances in Cryptology, 1999

Enumeration of Correlation Immune Boolean Functions.
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999


  Loading...