default search action
Goutam Paul 0001
Person information
- affiliation: Indian Statistical Institute, Cryptology and Security Research Unit, Kolkata, India
- affiliation (former): Jadavpur University, Department of Computer Science and Engineering, Kolkata, India
- affiliation (former): State University of New York, Albany, NY, USA
Other persons with the same name
- Goutam Paul 0002 — MCKV Institute of Engineering, West Bengal, India
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j47]Amit Jana, Goutam Paul:
Differential fault attack on SPN-based sponge and SIV-like AE schemes. J. Cryptogr. Eng. 14(2): 363-381 (2024) - [j46]Nayan Ranjan Das, Ankur Konar, Imon Mukherjee, Goutam Paul:
A complex network analysis approach to compare the performance of batsmen across different formats. Knowl. Based Syst. 284: 111269 (2024) - [j45]Imon Mukherjee, Goutam Paul:
High capacity secure dynamic multi-bit data hiding using Fibonacci Energetic pixels. Multim. Tools Appl. 83(2): 5181-5206 (2024) - [c46]Nayana Das, Saikat Basu, Goutam Paul, Vijay S. Rao:
User-Authenticated Device-Independent Quantum Secure Direct Communication Protocol. SOCC 2024: 1-6 - [i48]Nirupam Basak, Goutam Paul:
Improved Routing of Multiparty Entanglement over Quantum Networks. CoRR abs/2409.14694 (2024) - 2023
- [j44]Nayan Ranjan Das, Subhrojit Ghosh, Imon Mukherjee, Goutam Paul:
Adoption of a ranking based indexing method for the cricket teams. Expert Syst. Appl. 213(Part): 118796 (2023) - [j43]Nirupam Basak, Nayana Das, Goutam Paul, Kaushik Nandi, Nixon Patel:
Quantum secret sharing protocol using GHZ state: implementation on IBM qiskit. Quantum Inf. Process. 22(11): 393 (2023) - [j42]Nayan Ranjan Das, Imon Mukherjee, Anubhav D. Patel, Goutam Paul:
An intelligent clustering framework for substitute recommendation and player selection. J. Supercomput. 79(15): 16409-16441 (2023) - [i47]Amit Jana, Anup Kumar Kundu, Goutam Paul:
SDFA: Statistical-Differential Fault Attack on Linear Structured SBox-Based Ciphers. IACR Cryptol. ePrint Arch. 2023: 1018 (2023) - [i46]Amit Jana, Mostafizar Rahman, Dhiman Saha, Goutam Paul:
Switching the Top Slice of the Sandwich with Extra Filling Yields a Stronger Boomerang for NLFSR-based Block Ciphers. IACR Cryptol. ePrint Arch. 2023: 1543 (2023) - 2022
- [j41]Pratap Chandra Mandal, Imon Mukherjee, Goutam Paul, B. N. Chatterji:
Digital image steganography: A literature survey. Inf. Sci. 609: 1451-1488 (2022) - [j40]Amit Jana, Anirban Nath, Goutam Paul, Dhiman Saha:
Differential fault analysis of NORX using variants of coupon collector problem. J. Cryptogr. Eng. 12(4): 433-459 (2022) - [j39]Nayana Das, Goutam Paul:
Measurement device-independent quantum secure direct communication with user authentication. Quantum Inf. Process. 21(7): 260 (2022) - [c45]Amit Jana, Goutam Paul:
Differential Fault Attack on PHOTON-Beetle. ASHES@CCS 2022: 25-34 - [i45]Mostafizar Rahman, Dhiman Saha, Goutam Paul:
Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos. IACR Cryptol. ePrint Arch. 2022: 25 (2022) - 2021
- [j38]Pritam Chattopadhyay, Ayan Mitra, Goutam Paul, Vasilios Zarikas:
Bound on Efficiency of Heat Engine from Uncertainty Relation Viewpoint. Entropy 23(4): 439 (2021) - [j37]Nabanita Mukherjee (Ganguly), Goutam Paul, Sanjoy Kumar Saha:
Two-point FFT-based high capacity image steganography using calendar based message encoding. Inf. Sci. 552: 278-290 (2021) - [j36]Nayana Das, Goutam Paul:
Secure multi-party quantum conference and XOR computation. Quantum Inf. Comput. 21(3&4): 203-232 (2021) - [j35]Mostafizar Rahman, Dhiman Saha, Goutam Paul:
Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos. IACR Trans. Symmetric Cryptol. 2021(3): 137-169 (2021) - [c44]Nayan Ranjan Das, Ratna Priya, Imon Mukherjee, Goutam Paul:
Modified Hedonic Based Price Prediction Model for Players in IPL Auction. ICCCNT 2021: 1-7 - [i44]Nayana Das, Goutam Paul, Ritajit Majumdar:
Quantum Secure Direct Communication with Mutual Authentication using a Single Basis. CoRR abs/2101.03577 (2021) - [i43]Nayana Das, Goutam Paul:
Secure Multi-Party Quantum Conference and Xor Computation. CoRR abs/2101.05560 (2021) - [i42]Mostafizar Rahman, Goutam Paul:
Grover on Present: Quantum Resource Estimation. IACR Cryptol. ePrint Arch. 2021: 1655 (2021) - 2020
- [j34]Ayan Mitra, Pritam Chattopadhyay, Goutam Paul, Vasilios Zarikas:
Binary Black Hole Information Loss Paradox and Future Prospects. Entropy 22(12): 1387 (2020) - [j33]Nabanita Mukherjee (Ganguly), Goutam Paul, Sanjoy Kumar Saha, Debanjan Burman:
A PVD based high capacity steganography algorithm with embedding in non-sequential position. Multim. Tools Appl. 79(19-20): 13449-13479 (2020) - [c43]Mostafizar Rahman, Dhiman Saha, Goutam Paul:
Cryptanalysis of FlexAEAD. AFRICACRYPT 2020: 152-171 - [c42]Amit Jana, Dhiman Saha, Goutam Paul:
Differential Fault Analysis of NORX. ASHES@CCS 2020: 67-79 - [i41]Nayana Das, Goutam Paul:
Two Efficient Device Independent Quantum Dialogue Protocols. CoRR abs/2005.03518 (2020) - [i40]Nayana Das, Goutam Paul:
Improving the Security of "Measurement-Device-Independent Quantum Communication without Encryption". CoRR abs/2006.05263 (2020) - [i39]Nayana Das, Goutam Paul:
Cryptanalysis of Quantum Secure Direct Communication Protocol with Mutual Authentication Based on Single Photons and Bell States. CoRR abs/2007.03710 (2020) - [i38]Mostafizar Rahman, Goutam Paul:
Quantum Attacks on HCTR and its Variants. IACR Cryptol. ePrint Arch. 2020: 802 (2020)
2010 – 2019
- 2019
- [j32]Soumik Ghosh, Arnab Adhikary, Goutam Paul:
Revisiting integer factorization using closed timelike curves. Quantum Inf. Process. 18(1): 30 (2019) - [j31]Nayana Das, Goutam Paul, Arpita Maitra:
Dimensionality distinguishers. Quantum Inf. Process. 18(6): 171 (2019) - [i37]Nayana Das, Goutam Paul, Arpita Maitra:
Dimensionality Distinguishers. CoRR abs/1904.11405 (2019) - [i36]Mostafizar Rahman, Dhiman Saha, Goutam Paul:
Iterated Truncated Differential for Internal Keyed Permutation of FlexAEAD. IACR Cryptol. ePrint Arch. 2019: 539 (2019) - [i35]Amit Jana, Dhiman Saha, Goutam Paul:
Differential Fault Analysis of NORX. IACR Cryptol. ePrint Arch. 2019: 760 (2019) - 2018
- [j30]Sugata Gangopadhyay, Goutam Paul, Nishant Sinha, Pantelimon Stanica:
Generalized nonlinearity of S-boxes. Adv. Math. Commun. 12(1): 115-122 (2018) - [j29]Amit Jana, Goutam Paul:
Revisiting RC4 key collision: Faster search algorithm and new 22-byte colliding key pairs. Cryptogr. Commun. 10(3): 479-508 (2018) - [j28]Goutam Paul, Souvik Ray:
Analysis of burn-in period for RC4 state transition. Cryptogr. Commun. 10(5): 881-908 (2018) - [j27]Goutam Paul, Souvik Ray:
On data complexity of distinguishing attacks versus message recovery attacks on stream ciphers. Des. Codes Cryptogr. 86(6): 1211-1247 (2018) - [j26]Nabanita Mukherjee (Ganguly), Goutam Paul, Sanjoy Kumar Saha:
An efficient multi-bit steganography algorithm in spatial domain with two-layer security. Multim. Tools Appl. 77(14): 18451-18481 (2018) - [j25]Soumik Ghosh, Arnab Adhikary, Goutam Paul:
Quantum signaling to the past using P-CTCS. Quantum Inf. Comput. 18(11&12): 965-974 (2018) - [j24]Amit Behera, Goutam Paul:
Quantum to classical one-way function and its applications in quantum money authentication. Quantum Inf. Process. 17(8): 200 (2018) - [j23]Nilanjan Datta, Avijit Dutta, Mridul Nandi, Goutam Paul:
Double-block Hash-then-Sum: A Paradigm for Constructing BBB Secure PRF. IACR Trans. Symmetric Cryptol. 2018(3): 36-92 (2018) - [j22]Dhiman Saha, Mostafizar Rahman, Goutam Paul:
New Yoyo Tricks with AES-based Permutations. IACR Trans. Symmetric Cryptol. 2018(4): 102-127 (2018) - [i34]Madhuparna Das, Goutam Paul:
Analysis of the Game "2048" and its Generalization in Higher Dimensions. CoRR abs/1804.07393 (2018) - [i33]Nilanjan Datta, Avijit Dutta, Mridul Nandi, Goutam Paul:
Double-block Hash-then-Sum: A Paradigm for Constructing BBB Secure PRF. IACR Cryptol. ePrint Arch. 2018: 804 (2018) - 2017
- [j21]Goutam Paul, Ian Davidson, Imon Mukherjee, S. S. Ravi:
Keyless dynamic optimal multi-bit image steganography using energetic pixels. Multim. Tools Appl. 76(5): 7445-7471 (2017) - [j20]Nilanjan Datta, Avijit Dutta, Mridul Nandi, Goutam Paul, Liting Zhang:
Single Key Variant of PMAC_Plus. IACR Trans. Symmetric Cryptol. 2017(4): 268-305 (2017) - [j19]Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay:
RC4-AccSuite: A Hardware Acceleration Suite for RC4-Like Stream Ciphers. IEEE Trans. Very Large Scale Integr. Syst. 25(3): 1072-1084 (2017) - [c41]Suvradip Chakraborty, Goutam Paul, C. Pandu Rangan:
Efficient Compilers for After-the-Fact Leakage: From CPA to CCA-2 Secure PKE to AKE. ACISP (1) 2017: 343-362 - [c40]Goutam Paul, Anupam Chattopadhyay, Chander Chandak:
Designing Parity Preserving Reversible Circuits. RC 2017: 77-89 - [i32]Goutam Paul, Souvik Ray:
Analysis of Burn-in period for RC4 State Transition. IACR Cryptol. ePrint Arch. 2017: 175 (2017) - [i31]Suvradip Chakraborty, Goutam Paul, C. Pandu Rangan:
Efficient Compilers for After-the-Fact Leakage: from CPA to CCA-2 secure PKE to AKE. IACR Cryptol. ePrint Arch. 2017: 451 (2017) - [i30]Nilanjan Datta, Avijit Dutta, Mridul Nandi, Goutam Paul, Liting Zhang:
Single Key Variant of PMAC_Plus. IACR Cryptol. ePrint Arch. 2017: 848 (2017) - 2016
- [j18]Ayesha Khalid, Muhammad Hassan, Goutam Paul, Anupam Chattopadhyay:
RunFein: a rapid prototyping framework for Feistel and SPN-based block ciphers. J. Cryptogr. Eng. 6(4): 299-323 (2016) - [j17]Goutam Paul, Anupam Chattopadhyay:
Three Snakes in One Hole: The First Systematic Hardware Accelerator Design for SOSEMANUK with Optional Serpent and SNOW 2.0 Modes. IEEE Trans. Computers 65(2): 640-653 (2016) - [j16]Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay, Faezeh Abediostad, Syed Imad Ud Din, Muhammad Hassan, Baishik Biswas, Prasanna Ravi:
RunStream: A High-Level Rapid Prototyping Framework for Stream Ciphers. ACM Trans. Embed. Comput. Syst. 15(3): 61:1-61:27 (2016) - [c39]Avijit Dutta, Mridul Nandi, Goutam Paul:
One-Key Compression Function Based MAC with Security Beyond Birthday Bound. ACISP (1) 2016: 343-358 - [c38]Goutam Paul, Abhiroop Sanyal:
Revisiting the Security Proof of QUAD Stream Cipher: Some Corrections and Tighter Bounds. Inscrypt 2016: 103-116 - [c37]Christina Boura, Avik Chakraborti, Gaëtan Leurent, Goutam Paul, Dhiman Saha, Hadi Soleimany, Valentin Suder:
Key Recovery Attack Against 2.5-Round \pi -Cipher. FSE 2016: 535-553 - [c36]Sanat Ghoshal, Goutam Paul:
Exploiting Block-Chain Data Structure for Auditorless Auditing on Cloud Data. ICISS 2016: 359-371 - [i29]Atanu Acharyya, Goutam Paul:
Revisiting Optimal Eavesdropping in Quantum Cryptography: Choice of Interaction Is Unique up to Rotation of the Underlying Basis. CoRR abs/1610.07148 (2016) - [i28]Christina Boura, Avik Chakraborti, Gaëtan Leurent, Goutam Paul, Dhiman Saha, Hadi Soleimany, Valentin Suder:
Key Recovery Attack against 2.5-round pi-Cipher. IACR Cryptol. ePrint Arch. 2016: 502 (2016) - [i27]Amit Jana, Goutam Paul:
Revisiting RC4 Key Collision: Faster Search Algorithm and New 22-byte Colliding Key Pairs. IACR Cryptol. ePrint Arch. 2016: 1001 (2016) - 2015
- [j15]Santanu Sarkar, Sourav Sen Gupta, Goutam Paul, Subhamoy Maitra:
Proving TLS-attack related open biases of RC4. Des. Codes Cryptogr. 77(1): 231-253 (2015) - [j14]Kaushik Nandi, Goutam Paul:
Quantum information splitting using a pair of GHZ states. Quantum Inf. Comput. 15(11&12): 1041-1047 (2015) - [j13]Chithrabhanu Perumangatt, Aadhi Abdul Rahim, Gangi Reddy Salla, Shashi Prabhakar, Goutam Kumar Samanta, Goutam Paul, Ravindra Pratap Singh:
Three-particle hyper-entanglement: teleportation and quantum key distribution. Quantum Inf. Process. 14(10): 3813-3826 (2015) - [c35]Goutam Paul:
Revisiting Democratic Mining in Bitcoins: Its Weakness and Possible Remedies. ICISS 2015: 161-170 - [c34]Suvradip Chakraborty, Goutam Paul, C. Pandu Rangan:
Forward-Secure Authenticated Symmetric Key Exchange Protocol: New Security Model and Secure Construction. ProvSec 2015: 149-166 - [i26]Arpita Maitra, Sourya Joyee De, Goutam Paul, Asim K. Pal:
A Proposal for Quantum Rational Secret Sharing. CoRR abs/1501.04212 (2015) - [i25]Kaushik Nandi, Goutam Paul:
Quantum Information splitting using a pair of {\it GHZ} states. CoRR abs/1501.07529 (2015) - [i24]Arpita Maitra, Goutam Paul:
A Resilient Quantum Secret Sharing Scheme. CoRR abs/1501.07756 (2015) - [i23]Arpita Maitra, Goutam Paul, Asim K. Pal:
Millionaires' Problem with Rational Players: a Unified Approach in Classical and Quantum Paradigms. CoRR abs/1504.01974 (2015) - [i22]Subhamoy Maitra, Goutam Paul, Willi Meier:
Salsa20 Cryptanalysis: New Moves and Revisiting Old Styles. IACR Cryptol. ePrint Arch. 2015: 217 (2015) - [i21]Avijit Dutta, Goutam Paul:
Lifting the Security of NI-MAC Beyond Birthday Bound. IACR Cryptol. ePrint Arch. 2015: 1016 (2015) - [i20]Arpita Maitra, Goutam Paul, Asim K. Pal:
Fairness in Secure Two-Party Computation with Rational Players. IACR Cryptol. ePrint Arch. 2015: 1071 (2015) - [i19]Goutam Paul, Souvik Ray:
On Data Complexity of Distinguishing Attacks vs. Message Recovery Attacks on Stream Ciphers. IACR Cryptol. ePrint Arch. 2015: 1174 (2015) - 2014
- [j12]Goutam Paul, Anupam Chattopadhyay:
Designing stream ciphers with scalable data-widths: a case study with HC-128. J. Cryptogr. Eng. 4(2): 135-143 (2014) - [j11]Sourav Sen Gupta, Subhamoy Maitra, Goutam Paul, Santanu Sarkar:
(Non-)Random Sequences from (Non-)Random Permutations - Analysis of RC4 Stream Cipher. J. Cryptol. 27(1): 67-108 (2014) - [c33]Sourav Sen Gupta, Subhamoy Maitra, Willi Meier, Goutam Paul, Santanu Sarkar:
Dependence in IV-Related Bytes of RC4 Key Enhances Vulnerabilities in WPA. FSE 2014: 350-369 - [c32]Goutam Paul, Pratik Sarkar, Sarbajit Mukherjee:
Towards a More Democratic Mining in Bitcoins. ICISS 2014: 185-203 - [c31]Sumitra Biswal, Goutam Paul, Shashwat Raizada:
Preserving Privacy in Location-Based Services Using Sudoku Structures. ICISS 2014: 448-463 - [c30]Ayesha Khalid, Prasanna Ravi, Anupam Chattopadhyay, Goutam Paul:
One Word/Cycle HC-128 Accelerator via State-Splitting Optimization. INDOCRYPT 2014: 283-303 - [c29]Zheng Wang, Goutam Paul, Anupam Chattopadhyay:
Processor Design with Asymmetric Reliability. ISVLSI 2014: 565-570 - [c28]Avijit Dutta, Goutam Paul:
Deterministic Hard Fault Attack on Trivium. IWSEC 2014: 134-145 - 2013
- [j10]Tamaghna Acharya, Goutam Paul:
Maximum lifetime broadcast communications in cooperative multihop wireless ad hoc networks: Centralized and distributed approaches. Ad Hoc Networks 11(6): 1667-1682 (2013) - [j9]Arpita Maitra, Goutam Paul:
Eavesdropping in semiquantum key distribution protocol. Inf. Process. Lett. 113(12): 418-422 (2013) - [c27]Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay:
New Speed Records for Salsa20 Stream Cipher Using an Autotuning Framework on GPUs. AFRICACRYPT 2013: 189-207 - [c26]Subhamoy Maitra, Goutam Paul, Santanu Sarkar, Michael Lehmann, Willi Meier:
New Results on Generalization of Roos-Type Biases and Related Keystreams of RC4. AFRICACRYPT 2013: 222-239 - [c25]Shubhajit Saha, Goutam Paul:
On effective sharing of user generated content. APCHI 2013: 114-118 - [c24]Goutam Paul, Soumi Paul:
Proposal for a novel computerized menu-presentation interface for restaurants. APCHI 2013: 119-122 - [c23]Khawar Shahzad, Ayesha Khalid, Zoltán Endre Rákossy, Goutam Paul, Anupam Chattopadhyay:
CoARX: a coprocessor for ARX-based cryptographic algorithms. DAC 2013: 133:1-133:10 - [c22]Ayesha Khalid, Muhammad Hassan, Anupam Chattopadhyay, Goutam Paul:
RAPID-FeinSPN: A Rapid Prototyping Framework for Feistel and SPN-Based Block Ciphers. ICISS 2013: 169-190 - [c21]Imon Mukherjee, Goutam Paul:
Efficient Multi-bit Image Steganography in Spatial Domain. ICISS 2013: 270-284 - [e1]Goutam Paul, Serge Vaudenay:
Progress in Cryptology - INDOCRYPT 2013 - 14th International Conference on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedings. Lecture Notes in Computer Science 8250, Springer 2013, ISBN 978-3-319-03514-7 [contents] - [i18]Goutam Paul, Anupam Chattopadhyay, Chander Chandak:
Designing Parity Preserving Reversible Circuits. CoRR abs/1308.0840 (2013) - [i17]Chithrabhanu Perumangatt, Aadhi Abdul Rahim, Gangi Reddy Salla, Shashi Prabhakar, Goutam Kumar Samanta, Goutam Paul, Ravindra Pratap Singh:
Three particle Hyper Entanglement: Teleportation and Quantum Key Distribution. CoRR abs/1311.7318 (2013) - [i16]Ayesha Khalid, Deblin Bagchi, Goutam Paul, Anupam Chattopadhyay:
Optimized GPU Implementation and Performance Analysis of HC Series of Stream Ciphers. IACR Cryptol. ePrint Arch. 2013: 59 (2013) - [i15]Goutam Paul, Anupam Chattopadhyay:
Three Snakes in One Hole: A 67 Gbps Flexible Hardware for SOSEMANUK with Optional Serpent and SNOW 2.0 Modes. IACR Cryptol. ePrint Arch. 2013: 282 (2013) - [i14]Santanu Sarkar, Sourav Sen Gupta, Goutam Paul, Subhamoy Maitra:
Proving TLS-attack related open biases of RC4. IACR Cryptol. ePrint Arch. 2013: 502 (2013) - [i13]Goutam Paul, Subhamoy Maitra, Anupam Chattopadhyay:
Quad-RC4: Merging Four RC4 States towards a 32-bit Stream Cipher. IACR Cryptol. ePrint Arch. 2013: 572 (2013) - 2012
- [j8]Miodrag J. Mihaljevic, Sugata Gangopadhyay, Goutam Paul, Hideki Imai:
Internal state recovery of grain-v1 employing normality order of the filter function. IET Inf. Secur. 6(2): 55-64 (2012) - [j7]Miodrag J. Mihaljevic, Sugata Gangopadhyay, Goutam Paul, Hideki Imai:
Internal state recovery of keystream generator LILI-128 based on a novel weakness of the employed Boolean function. Inf. Process. Lett. 112(21): 805-810 (2012) - [j6]Miodrag J. Mihaljevic, Sugata Gangopadhyay, Goutam Paul, Hideki Imai:
Generic cryptographic weakness of k-normal Boolean functions in certain stream ciphers and cryptanalysis of grain-128. Period. Math. Hung. 65(2): 205-227 (2012) - [c20]Ayesha Khalid, Deblin Bagchi, Goutam Paul, Anupam Chattopadhyay:
Optimized GPU Implementation and Performance Analysis of HC Series of Stream Ciphers. ICISC 2012: 293-308 - [c19]Goutam Paul, Ian Davidson, Imon Mukherjee, S. S. Ravi:
Keyless Steganography in Spatial Domain Using Energetic Pixels. ICISS 2012: 134-148 - [c18]Arpita Maitra, Goutam Paul:
Another Look at Symmetric Incoherent Optimal Eavesdropping against BB84. INDOCRYPT 2012: 80-99 - [c17]Goutam Paul, Shashwat Raizada:
Impact of Extending Side Channel Attack on Cipher Variants: A Case Study with the HC Series of Stream Ciphers. SPACE 2012: 32-44 - [c16]Anupam Chattopadhyay, Goutam Paul:
Exploring security-performance trade-offs during hardware accelerator design of stream cipher RC4. VLSI-SoC 2012: 251-254 - [i12]Arpita Maitra, Goutam Paul:
Eavesdropping in Semiquantum Key Distribution Protocol: Classical vs. Hadamard Bob. CoRR abs/1205.2807 (2012) - 2011
- [j5]Subhamoy Maitra, Goutam Paul, Shashwat Raizada, Subhabrata Sen, Rudradev Sengupta:
Some observations on HC-128. Des. Codes Cryptogr. 59(1-3): 231-245 (2011) - [c15]Subhamoy Maitra, Goutam Paul, Sourav Sen Gupta:
Attack on Broadcast RC4 Revisited. FSE 2011: 199-217 - [c14]Apurba Das, Subhamoy Maitra, Goutam Paul, Santanu Sarkar:
Some Combinatorial Results towards State Recovery Attack on RC4. ICISS 2011: 204-214 - [c13]Goutam Paul, Subhamoy Maitra, Shashwat Raizada:
A Theoretical Analysis of the Structure of HC-128. IWSEC 2011: 161-177 - [c12]Sourav Sen Gupta, Subhamoy Maitra, Goutam Paul, Santanu Sarkar:
Proof of Empirical RC4 Biases and New Key Correlations. Selected Areas in Cryptography 2011: 151-168 - [i11]Sourav Sen Gupta, Subhamoy Maitra, Goutam Paul, Santanu Sarkar:
RC4: (Non-)Random Words from (Non-)Random Permutations. IACR Cryptol. ePrint Arch. 2011: 448 (2011) - [i10]Arpita Maitra, Goutam Paul:
A Note on Four-State BB84 Protocol. IACR Cryptol. ePrint Arch. 2011: 588 (2011) - 2010
- [j4]Sayan Bhattacharya, Goutam Paul, Swagato Sanyal:
A cops and robber game in multidimensional grids. Discret. Appl. Math. 158(16): 1745-1751 (2010) - [c11]Miodrag J. Mihaljevic, Sugata Gangopadhyay, Goutam Paul, Hideki Imai:
A generic weakness of the k-normal Boolean functions exposed to dedicated algebraic attack. ISITA 2010: 911-916 - [i9]Goutam Paul, Imon Mukherjee:
Image Sterilization to Prevent LSB-based Steganographic Transmission. CoRR abs/1012.5573 (2010) - [i8]Goutam Paul, Subhamoy Maitra, Shashwat Raizada:
A Combinatorial Analysis of HC-128. IACR Cryptol. ePrint Arch. 2010: 387 (2010)
2000 – 2009
- 2009
- [j3]Goutam Paul, Subhamoy Maitra:
On biases of permutation and keystream bytes of RC4 towards the secret key. Cryptogr. Commun. 1(2): 225-268 (2009) - [c10]Riddhipratim Basu, Subhamoy Maitra, Goutam Paul, Tanmoy Talukdar:
On Some Sequences of the Secret Pseudo-random Index j in RC4 Key Scheduling. AAECC 2009: 137-148 - [c9]Shashwat Raizada, Goutam Paul, Vineet Pandey:
Nearby-Friend Discovery Protocol for Multiple Users. CSE (3) 2009: 238-243 - [i7]Sayan Bhattacharya, Goutam Paul, Swagato Sanyal:
On Necessary and Sufficient Number of Cops in the Game of Cops and Robber in Multidimensional Grids. CoRR abs/0909.1381 (2009) - [i6]Sounak Gupta, Goutam Paul:
Revisiting Fermat's Factorization for the RSA Modulus. CoRR abs/0910.4179 (2009) - 2008
- [j2]Goutam Paul, Siddheshwar Rathi, Subhamoy Maitra:
On non-negligible bias of the first output byte of RC4 towards the first three bytes of the secret key. Des. Codes Cryptogr. 49(1-3): 123-134 (2008) - [j1]Riddhipratim Basu, Shirshendu Ganguly, Subhamoy Maitra, Goutam Paul:
A complete characterization of the evolution of RC4 pseudo random generation algorithm. J. Math. Cryptol. 2(3): 257-289 (2008) - [c8]Subhamoy Maitra, Goutam Paul:
Recovering RC4 Permutation from 2048 Keystream Bytes if jIs Stuck. ACISP 2008: 306-320 - [c7]Subhamoy Maitra, Goutam Paul:
New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4. FSE 2008: 253-269 - [c6]Subhamoy Maitra, Goutam Paul:
Analysis of RC4 and Proposal of Additional Layers for Better Security Margin. INDOCRYPT 2008: 27-39 - [i5]Subhamoy Maitra, Goutam Paul:
Analysis of RC4 and Proposal of Additional Layers for Better Security Margin. IACR Cryptol. ePrint Arch. 2008: 396 (2008) - [i4]Subhamoy Maitra, Goutam Paul, Shashwat Raizada:
Some Observations on HC-128. IACR Cryptol. ePrint Arch. 2008: 499 (2008) - 2007
- [c5]Goutam Paul, Subhamoy Maitra, Rohit Srivastava:
On Non-randomness of the Permutation After RC4 Key Scheduling. AAECC 2007: 100-109 - [c4]Goutam Paul, Subhamoy Maitra:
Permutation After RC4 Key Scheduling Reveals the Secret Key. Selected Areas in Cryptography 2007: 360-377 - [i3]Goutam Paul, Subhamoy Maitra:
RC4 State Information at Any Stage Reveals the Secret Key. IACR Cryptol. ePrint Arch. 2007: 208 (2007) - [i2]Subhamoy Maitra, Goutam Paul:
New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4. IACR Cryptol. ePrint Arch. 2007: 261 (2007) - [i1]Goutam Paul, Subhamoy Maitra, Rohit Srivastava:
On Non-Randomness of the Permutation after RC4 Key Scheduling. IACR Cryptol. ePrint Arch. 2007: 305 (2007) - 2004
- [c3]Goutam Paul:
Occam's Razor and a Non-Syntactic Measure of Decision Tree Complexity. AAAI 2004: 962-963 - [c2]Ian Davidson, Goutam Paul:
Locating secret messages in images. KDD 2004: 545-550 - 2003
- [c1]George Berg, Ian Davidson, Ming-Yuan Duan, Goutam Paul:
Searching for Hidden Messages: Automatic Detection of Steganography. IAAI 2003: 51-56
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-19 20:47 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint