Sugata Gangopadhyay
Orcid: 0000-0002-7329-7349
According to our database1,
Sugata Gangopadhyay
authored at least 75 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
ULTRA: Exploring Team Recommendations in Two Geographies Using Open Data in Response to Call for Proposals.
Proceedings of the 7th Joint International Conference on Data Science & Management of Data (11th ACM IKDD CODS and 29th COMAD), 2024
2023
An approach to occluded face recognition based on dynamic image-to-class warping using structural similarity index.
Appl. Intell., December, 2023
Stability of the Walsh-Hadamard spectrum of cryptographic Boolean functions with biased inputs.
J. Appl. Math. Comput., August, 2023
Evolving bijective S-Boxes using hybrid adaptive genetic algorithm with optimal cryptographic properties.
J. Ambient Intell. Humaniz. Comput., March, 2023
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2023
Proceedings of the Intelligent Systems and Pattern Recognition, 2023
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2023, 2023
Computational Results on Gowers U<sub>2</sub> and U<sub>3</sub> Norms of Known S-Boxes.
Proceedings of the Codes, Cryptology and Information Security, 2023
2022
An improved hybrid genetic algorithm to construct balanced Boolean function with optimal cryptographic properties.
Evol. Intell., 2022
Intrusion Detection System for IoT Using Logical Analysis of Data and Information Gain Ratio.
Cryptogr., 2022
A quantum algorithm to estimate the closeness to the Strict Avalanche criterion in Boolean functions.
CoRR, 2022
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2022, 2022
Design of Intrusion Detection System Based on Logical Analysis of Data (LAD) Using Information Gain Ratio.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2022
2021
A secure image encryption scheme based on a novel 2D sine-cosine cross-chaotic (SC3) map.
J. Real Time Image Process., 2021
Gowers U<sub>2</sub> norm as a measure of nonlinearity for Boolean functions and their generalizations.
Adv. Math. Commun., 2021
2020
A quantum algorithm to estimate the Gowers U<sub>2</sub> norm and linearity testing of Boolean functions.
Quantum Inf. Process., 2020
Discret. Appl. Math., 2020
2019
Construction of resilient Boolean functions in odd variables with strictly almost optimal nonlinearity.
Des. Codes Cryptogr., 2019
Proceedings of the 10th International Conference on Computing, 2019
2018
Des. Codes Cryptogr., 2018
Discret. Appl. Math., 2018
Analysis of Cost function using Genetic algorithm to construct balanced Boolean function.
Proceedings of the TENCON 2018, 2018
2017
Int. J. Comput. Math. Comput. Syst. Theory, 2017
Discret. Appl. Math., 2017
Proceedings of the Codes, Cryptology and Information Security, 2017
2016
Electron. Notes Discret. Math., 2016
2015
2014
The Fourier Entropy-Influence conjecture holds for a log-density 1 class of cryptographic Boolean functions.
IACR Cryptol. ePrint Arch., 2014
2013
IEEE Trans. Inf. Theory, 2013
Des. Codes Cryptogr., 2013
Discret. Appl. Math., 2013
2012
IEEE Trans. Inf. Theory, 2012
Generic cryptographic weakness of <i>k</i>-normal Boolean functions in certain stream ciphers and cryptanalysis of grain-128.
Period. Math. Hung., 2012
Internal state recovery of keystream generator LILI-128 based on a novel weakness of the employed Boolean function.
Inf. Process. Lett., 2012
Internal state recovery of grain-v1 employing normality order of the filter function.
IET Inf. Secur., 2012
Fundam. Informaticae, 2012
2011
On lower bounds of second-order nonlinearities of cubic bent functions constructed by concatenating Gold functions.
Int. J. Comput. Math., 2011
IACR Cryptol. ePrint Arch., 2011
On lower bounds on second-order nonliearities of bent functions obtained by using Niho power functions.
IACR Cryptol. ePrint Arch., 2011
Fundam. Informaticae, 2011
Discret. Appl. Math., 2011
2010
Inf. Sci., 2010
IACR Cryptol. ePrint Arch., 2010
Cryptogr. Commun., 2010
Proceedings of the Sequences and Their Applications - SETA 2010, 2010
A generic weakness of the k-normal Boolean functions exposed to dedicated algebraic attack.
Proceedings of the International Symposium on Information Theory and its Applications, 2010
2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
Computación y Sistemas, 2009
2008
2007
2006
2004
IACR Cryptol. ePrint Arch., 2004
2003
2002
Proceedings of the Progress in Cryptology, 2002