Journal/Conference/Book
Chapter
2024
1.
Jayaprakash Kar, Sourav
Mukhopadhyay, Kshirasagar Naik, "SL-PPCP: Secure and Low-Cost Privacy-Preserving
Communication Protocol for Vehicular Ad Hoc Networks," in IEEE
Transactions on Vehicular Technology, doi: 10.1109/TVT.2024.3362152.
2.
Anushree Belel, Ratna
Dutta and Sourav Mukhopadhyay:
Key-homomorphic and Revocable Ciphertext-Policy
Attribute Based Key Encapsulation Mechanism for Multimedia Applications,
Multimedia Tools and Applications, Springer, 2024 (Accepted).
2023
3.
Anushree Belel, Ratna
Dutta and Sourav Mukhopadhyay:
Hierarchical Identity-Based Inner Product Functional Encryption for Unbounded
Hierarchical Depth. In the Proceeding of the 25th International Symposium on
Stabilization, Safety and Security of Distributed Systems (SSS 2023), LNCS,
Springer-Verlag, 2-4 October 2023, New Jersey, USA.
(accepted)
4.
Amit
Kumar Singh, Kamalesh Acharya, and Sourav Mukhopadhyay,
“Constructions of Broadcast Encryption with Personalized Messages from Bilinear
Map”, Computer Communications, 2023 (Accepted)
5.
Amit Kumar Singh, Kamalesh Acharya, and Sourav Mukhopadhyay, “Post-quantum Secure Recipient
Revocable Broadcast Encryption Supporting Anonymity”, Multimedia Tools and
Applications, Springer 2023 (Accepted)
6.
Pratish Datta, Ratna Dutta and Sourav Mukhopadhyay, “Short attribute-based signatures for arbitrary Turing
machines from standard assumptions”, Designs, Codes and Cryptography, Springer
2023. (Accepted)
2022
7.
Ramprasad Sarkar, Mriganka
Mandal and Sourav Mukhopadhyay.
"Quantum-Safe Identity-based Broadcast Encryption with Provable Security
from Multivariate Cryptography", Advances in Mathematics of Communications
(AMC), Doi-http://dx.doi.org/10.3934/amc.2022026, American
Institute of Mathematical Sciences, 2022.
8.
Anushree Belel, Ratna Dutta and Sourav Mukhopadhyay:
Communication-friendly Threshold Trapdoor Function from Weaker Assumption for
Distributed Cryptography. Annals of Telecommunications, Springer 2022
(Accepted)
9.
Anushree Belel, Ratna Dutta and Sourav Mukhopadhyay: Key
Encapsulation Mechanism in Ciphertext-Policy
Attribute Based Setting Featuring Revocation and Key-homomorphic Property. In
the Proceeding of the 19th International Conference on Security and
Cryptography (SECRYPT 2022), July 11-13, 2022 (Accepted).
10. Anushree Belel, Ratna Dutta and Sourav Mukhopadhyay: Hierarchical
Identity Based Inner Product Functional Encryption for Privacy Preserving
Statistical Analysis without q-type assumption, in the proceeding of the Third
International Conference on Emerging Information Security and Applications
(EISA 2022), Wuhan, China, Springer, October 29-30, 2022.
11. Subhranil
Dutta, Ratna Dutta and Sourav
Mukhopadhyay: Constructing Pairing Free Unbounded
Inner Product Functional Encryption Schemes with Unbounded Inner Product
Policy. In the Proceeding of the 15th International Conference on Security for
Information Technology and Communications (SECITC 2022), LNCS, Springer-Verlag, 8-9 December, 2022 (Accepted).
12. Anushree Belel, Ratna Dutta and Sourav Mukhopadhyay: Trapdoor
Function from Weaker Assumption in the Standard Model for Decentralized
Network, in the proceedingd of thr
8th International Cryptology and Information Security Conference 2022
(CRYPTOLOGY2022), Port Dickson, Malaysia, July 26-28, 2022.
2021
13. Ravi
Anand, Arpita Mitra, Subhamoy Mitra, Chandra Sekhar Mukherjee, Sourav Mukhopadhyay. "Quantum
Resource estimation for fsr based estimation
symmetric ciphers & related grover's attacks",
In the Proceeding of 22nd International
Conference on Cryptology in India (Indocrypt 2021), LNCS, Springer-Verlag (to appear).
14. S.
Rana, D. Mishra and S. Mukhopadhyay: Blockchain-based multimedia content
distribution with the assured system update mechanism, Multimedia Tools and
Applications (Springer), 2021, Accepted. (Impact Factor: 2.313)
15. M.
Kansal, R. Dutta and S. Mukhopadhyay: 'Lattice based
Nominative Signature using Pseudorandom Function' IET Information Security,
(Accepted, 2021) (Impact Factor: .89).
2020
16. Ravi
Anand, Arpita Maitra, and Sourav Mukhopadhyay. "Evaluation of Quantum
Cryptanalysis on SPECK", In the Proceeding of 21st International Conference on Cryptology in
India (Indocrypt 2020), LNCS, Springer-Verlag (to
appear).
17. Sarbani
Roy and Sourav Mukhopadhyay.
“(t,n) Threshold d-level
quantum secret sharing based on quantum Fourier transformation”, Quantum
Information & Computation, Vol. 20 (No. 11 & 12), pp. 957- 968, 2020.
18. Ravi
Anand, Arpita Maitra, and Sourav Mukhopadhyay." Grover on SIMON",
Quantum Information Processing, Springer, 2020 (to appear).
19. Saurabh Rana, Mohammad S. Obaidat, Dheerendra Mishra, Sourav Mukhopadhyay and Balqies Sadoun. " Computational
Efficient Authenticated Digital Content Distribution Frameworks for DRM
Systems: Review and Outlook", IEEE Systems Journal, 2020 (to appear).
2019
20. Sarbani
Roy and Sourav Mukhopadhyay.
“Device-independent quantum secret sharing in arbitrary even dimensions”, Phys.
Rev. A, American Physical Society, 100, 012319 (2019).
21. Pratish Datta, Ratna Dutta and Sourav Mukhopadhyay. “Constrained
Pseudorandom Functions for Turing Machines Revisited: How to Achieve
Verifiability and Key Delegation”. Algorithmica
81(9): 3245-3390 (2019).
22. Meenakshi Kansal, Ratna Dutta and Sourav Mukhopadhyay. “Group
Signature from Lattices preserving Forward Security in Dynamic setting”,
Advances in Mathematics of Communications (AMC), American Institute of
Mathematical Sciences, (accepted) 2019.
23. Jangirala
Srinivas, Dheerendra Mishra, Sourav
Mukhopadhyay, SaruKumari, VandanaGuleria. “An Authentication Framework for Roaming
Service in Global Mobility Networks”. ITC 48(1): 129-145 (2019).
24. Pratish Datta, Ratna Dutta and Sourav Mukhopadhyay. " Succinct
Predicate and Online-Offline Multi-Input Inner Product Encryptions under
Standard Static Assumptions". Journal of Information Security and
Applications, ELSEVIER, Volume 48, October 2019.
25. Meenakshi Kansal, Ratna Dutta and Sourav Mukhopadhyay. "Construction
for a Nominative Signature Scheme from Lattice with Enhanced Security". In
the Proceeding of 3th International Conference on Codes, Cryptology And Information Security (C2SI),2019, LNCS, Springer-Verlag.
2018
26. Ravi Anand, Akhilesh Siddhanti, Subhamoy Maitra and Sourav Mukhopadhyay. "Differential
Fault Attack on SIMON with very few Faults". In the Proceeding of 19th International
Conference on Cryptology in India (Indocrypt 2018), LNCS, Springer-Verlag.
27. Sarbani
Roy, Arpita Maitra, and Sourav Mukhopadhyay."Measurement-device-independent
quantum private query with qutrits",
International Journal of Quantum Information, Vol. 16, No. 4 (2018) 1850045 (16
pages), World Scientific Publishing Company.
28. Jangirala
Srinivas, Dheerendra Mishra, Sourav
Mukhopadhyay, Saru Kumari. "Provably secure biometric based
authentication and key agreement protocol for wireless sensor networks".
J. Ambient Intelligence and Humanized Computing 9(4): 875-895 (2018).
29. Pratish Datta, Ratna Dutta and Sourav Mukhopadhyay. "Functional Signcryption". Journal of
Information Security and Applications, ELSEVIER, Volume 42, October 2018, Pages 118-134..
2017
30. Ankita Chaturvedi, Dheerendra Mishra, Jangirala Srinivas and Sourav Mukhopadhyay. " A privacy preserving
biometric-based three-factor remote user authenticated key agreement
scheme", in Journal of Information Security and Applications (Elsevier),
Accepted, 2017.
31. Jangirala
Srinivas, Sourav Mukhopadhyay,
and Ashok Kumar Das. "A Multi-Server Environment with Secure and Efficient
Remote User Authentication Scheme based on Dynamic ID using Smart Cards,"
in Wireless Personal Communications (Springer), 2017, Accepted. (2015 SCI
Impact Factor: 0.701)
32. Jangirala
Srinivas, Sourav Mukhopadhyay,
Dheerendra Mishra. "Secure and efficient user
authentication scheme for multi-gateway wireless sensor networks," in Journal
of Ad Hoc Networks 54: 147-169 (2017) (Citation Index: SCIE,
Impact Factor: 1.456).
33. Pratish Datta, Ratna Dutta and Sourav Mukhopadhyay. "Constrained Pseudorandom
Functions for Unconstrained Inputs Revisited: Achieving Verifiability and Key
Delegation". In the Proceeding of 20th International Conference on the Theory and
Practice of Public-Key Cryptography (PKC 2017), LNCS, Springer-Verlag.
34. Pratish Datta, Ratna Dutta and Sourav Mukhopadhyay. "Strongly Full-Hiding
Inner Product Encryption". Theoretical Computer Science (TCS) Journal,
ELSEVIER, 2017.
2016
35. Dheerendra
Mishra, Ashok Kumar Das, Sourav Mukhopadhyay,
and Mohammad Wazid. "A Secure and Robust
Smartcard-Based Authentication Scheme for Session Initiation Protocol Using
Elliptic Curve Cryptography," in Wireless Personal Communications
(Springer), Vol. 91, No. 3, pp.1361-1391, 2016, DOI: 10.1007/s11277-016-3533-0.
(2015 SCI Impact Factor: 0.701)
36. Ankita Chaturvedi, Ashok Kumar Das, Dheerendra
Mishra, and Sourav Mukhopadhyay.
"Design of a secure smartcard-based multi-server authentication
scheme," in Journal of Information Security and Applications (Elsevier),
Vol. 30, pp. 64-80, 2016. [Indexed in Emerging Sources Citation Index (ESCI),
Thomson Reuters]
37. Dheerendra
Mishra, Ashok Kumar Das, and Sourav Mukhopadhyay. "A secure and efficient ECC-based user
anonymity-preserving session initiation authentication protocol using smart
card," in Peer-to-Peer Networking and Applications (Springer), Vol. 9, No.
1, pp.171-192, 2016. (2015 SCI Impact Factor: 1.000)
38. Ashok
Kumar Das, Dheerendra Mishra, and Sourav
Mukhopadhyay. "An anonymous and secure
biometric-based enterprise digital rights management system for mobile
environment," in Security and Communication Networks (Wiley), Vol. 8, No.
18, pp. 3383-3404, 2015, DOI: 10.1002/sec.1266. (2015 SCI Impact Factor: 0.806)
39. Srinivas
Jangirala, Dheerendra
Mishra, Sourav Mukhopadhyay.
"Secure Lightweight User Authentication and Key Agreement Scheme for
Wireless Sensor Networks Tailored for the Internet of Things Environment".
ICISS 2016: 45-65
40. Pratish Datta, Ratna Dutta and Sourav Mukhopadhyay. "Adaptively
Secure Unrestricted Attribute-Based Encryption with Subset Difference
Revocation in Bilinear Groups of Prime Order", In the Proceeding of 8th International Conference on Cryptology,
AFRICACRYPT 2016, LNCS, Springer-Verlag
41. Pratish Datta, Ratna Dutta and Sourav Mukhopadhyay. "Functional
Encryption for Inner Product with Full Function Privacy", In the Proceeding of 19th International
Conference on the Theory and Practice of Public-Key Cryptography (PKC 2016), LNCS, Springer-Verlag.
2015
42. Dheerendra
Mishra, Ashok Kumar Das, Ankita Chaturvedi,
and Sourav Mukhopadhyay.
"A secure password-based authentication and key agreement scheme using
smart cards," in Journal of Information Security and Applications
(Elsevier), Vol. 23, pp. 28-43, August 2015, DOI: 10.1016/j.jisa.2015.06.003.
[Indexed in Emerging Sources Citation Index (ESCI), Thomson Reuters]
43. Dheerendra
Mishra, Ankita Chaturvedi,
and Sourav Mukhopadhyay,
"An Improved Biometric-based Remote User Authentication Scheme for
Connected Health Care", in International
Journal of Ad Hoc and Ubiquitous Computing (IJAHUC), Inderscience, 18(1/2): 75-84,
2015.
44. Dheerendra
Mishra, Ankita Chaturvedi,
and Sourav Mukhopadhyay,
"Design of a Lightweight Two-factor Authentication Scheme with Smart Card
Revocation," in Journal of Information Security and Applications
(Elsevier), Vol. 23, pp. 44-51, August 2015, DOI: 10.1016/j.jisa.2015.06.003.
[Indexed in Emerging Sources Citation Index (ESCI), Thomson Reuters]
45. Pratish Datta, Ratna Dutta and Sourav Mukhopadhyay. "General
Circuit Realizing Compact Attribute-Based Encryption and Signcryption
from Multilinear Maps", In the Proceeding of 16th International Conference on Cryptology (Indocrypt 2015), LNCS,
Springer-Verlag.
46. Pratish Datta, Ratna Dutta and Sourav Mukhopadhyay. "Functional
Signcryption: Notion, Construction, and Applications", In the Proceeding of Seventh International
Conference on Provable Security (ProvSec 2015) LNCS, Springer-Verlag.
47. Dibyendu Roy, Ankita Chaturvedi and Sourav Mukhopadhyay. "New
Constructions of T-function", In the Proceeding of the 11th
Information Security Practice and Experience Conference (ISPEC
2015), LNCS,
Springer-Verlag, 2015.
48. Pratish Datta, Ratna Dutta and Sourav Mukhopadhyay. "General
Circuit Realizing Compact Revocable Attribute-Based Encryption from Multilinear
Maps", In the Proceeding of the 18th Information Security
Conference (ISC 2015), LNCS,
Springer-Verlag, 2015.
49. Pratish Datta, Ratna Dutta and Sourav Mukhopadhyay. "Fully
Secure Online/Offline Predicate and Attribute-Based Encryption", In the Proceeding of the 11th Information
Security Practice and Experience Conference (ISPEC 2015), LNCS,
Springer-Verlag, 2015.
2014
50. Ankita
Chaturvedi, Dheerendra
Mishra, and Sourav Mukhopadhyay,
"An Enhanced Dynamic ID-Based Authentication Scheme for Telecare Medical
Information Systems", in Journal of
King Saud University - Computer and Information Sciences, ELSEVIER, 2014 (Accepted).
51. Dibyendu Roy, Pratish Datta, and Sourav Mukhopadhyay,
"Algebraic Cryptanalysis of Stream Ciphers Using Decomposition of Boolean
Function", in Journal of Applied Mathematics and
Computing, Springer,
2014.
52. Dheerendra
Mishra, Jangirala Srinivas, and Sourav
Mukhopadhyay, "A Secure and Efficient Chaotic
Map-based Authenticated Key Agreement Scheme for Telecare Medicine Information
Systems",
in Journal of Medical Systems, Springer. (Citation Index: SCIE, Impact
Factor: 1.783).
53. Dheerendra
Mishra, Ashok Kumar Das,
and Sourav Mukhopadhyay,
"A Secure User Anonymity-Preserving Biometric-Based Multi-Server
Authenticated Key Agreement Scheme using Smart Cards", in International
Journal of Expert Systems with Applications, ELSEVIER. (Citation
Index: SCIE, Impact Factor: 1.854)
54. Dheerendra
Mishra, and Sourav Mukhopadhyay,
"A Privacy Enabling Content Distribution Framework for Digital Rights
Management", in International
Journal of trust management in computing and communications (Accepted).
55. Dheerendra
Mishra, Sourav Mukhopadhyay,
Saru Kumari, Muhammad Khurram Khan, and Ankita Chaturvedi, "Security Enhancement of a Biometric based
Authentication Scheme for Telecare Medicine Information Systems with
Nonce", in Journal of Medical
Systems, 38 (5) pp. 1-11, 2014. doi:
http://dx.doi.org/10.1007/s10916-014-0041-1. (Citation Index: SCIE, Impact
Factor: 1.783).
56. Dheerendra
Mishra, Ankita Chaturvedi, Sourav Mukhopadhyay, Saru Kumari, and Muhammad Khurram Khan, "Cryptanalysis and Improvement of Yan et
al.'s Biometric-based Authentication Scheme for Telecare Medicine Information
Systems", in Journal of Medical
Systems (Accepted). (Citation Index: SCIE, Impact Factor: 1.783).
57. Sarbari Mitra, Sourav Mukhopadhyay, and Ratna Dutta, "Key Pre-Distribution in a
Non-Uniform Rectangular Grid for Wireless Sensor Networks". in Journal of Applied Mathematics and
Computing, Springer,
2014.
58. Pratish Datta, Dibyendu Roy and Sourav Mukhopadhyay. "A
Probabilistic Algebraic Attack on the Grain Family of Stream Ciphers". In
the Proceeding of the 7th International Conference on Network and System
Security (NSS 2014), LNCS, Springer-Verlag, 2014.
59.
Dheerendra
Mishra and Sourav Mukhopadhyay.
"Cryptanalysis of Two
Authentication Scheme for DRM System". In the
Proceeding of the 2nd International
Conference on Security in Computer Networks and Distributed Systems (SNDS-2014), Springer (CCIS),
ISSN: 1865:0929, 2014.
60. Pratish Datta, Ratna Dutta and Sourav Mukhopadhyay. "Fully
Secure Self-Updatable Encryption in Prime Order Bilinear Groups", In the
Proceeding of Information Security, the Seventeenth International
Conference (ISC 2014), LNCS, Springer-Verlag, 2014.
61. Pratish Datta, Ratna Dutta and Sourav Mukhopadhyay. "Universally
Composable Efficient Priced Oblivious Transfer from a
Flexible Membership Encryption", In the Proceeding of 19th Australasian
Conference on Information Security and Privacy (ACISP 2014), LNCS, Springer-Verlag, 2014.
62. Dheerendra Mishra and Sourav
Mukhopadhyay. "Cryptanalysis of Yang et al.'s Digital Rights Management Authentication
Scheme Based on Smart Card". In the Proceeding of
the 2nd International
Conference on Security in Computer Networks and Distributed Systems (SNDS-2014), Springer (CCIS),
ISSN: 1865:0929, 2014.
63. Dibyendu Roy, Pratish Datta and Sourav Mukhopadhyay. "A New Variant of Algebraic Attack". In the Proceeding of the 2nd International Conference on Security in Computer Networks and Distributed Systems (SNDS-2014), Springer (CCIS), ISSN: 1865:0929, 2014.
2013
64. Sarbari Mitra, Sourav Mukhopadhyay, and Ratna Dutta, "A Deterministic Key Pre-distribution Scheme for
WSN Using Projective Planes and Their Complements". in International Journal of Trust Management in Computing
and Communications (IJTMCC), 2013 (Citation
Index: SCI).
65. Sarbari Mitra, Sourav Mukhopadhyay, and Ratna Dutta, "Unconditionally-Secure Key Pre-Distribution for Triangular Grid Based Wireless Sensor Network". in Journal of Applied Mathematics and Computing, Springer, 2013.
66. Ankita Chaturvedi, Dheerendra Mishra and Sourav Mukhopadhyay. "Improved Biometric-based Three-factor Remote User Authentication Scheme
with Key Agreement using Smart Card", In the Proceeding of
the 9th International Conference on Information Systems Security (ICISS 2013), LNCS, Springer-Verlag,
2013.
67. Dheerendra Mishra and Sourav
Mukhopadhyay. "Cryptanalysis of Pairing-free Identity-Based
Authenticated Key Agreement Protocols", In the Proceeding
of the 9th International Conference on Information Systems Security (ICISS 13),
LNCS, Springer-Verlag,
2013.
68. Dheerendra Mishra, Vinod Kumar and Sourav Mukhopadhyay. "A Pairing-free Identity Based Authentication Framework for Cloud Computing", In the Proceeding of the 7th International Conference on Network and System Security (NSS 2013), LNCS, Springer-Verlag, 2013.
69. Dheerendra Mishra and Sourav Mukhopadhyay. "Privacy Preserving Mechanism in Multi-Distributor based DRM
System", In the Proceeding of the 9th Information Security Practice and
Experience Conference (ISPEC 2013), LNCS, Springer-Verlag, 2013.
70. Sarbari Mitra and
Sourav Mukhopadhyay."
Key Pre-Distribution in a Non-Uniform Network Using Combinatorial Design",
In the Proceeding of 9th International Conference on Heterogeneous Networking
for Quality, Reliability, Security and Robustness (Qshine
2013), LNICST (Springer Lecture Notes of ICST). 2013.
71. Dheerendra Mishra and Sourav
Mukhopadhyay."A Certificateless Authenticated Key
Agreement Protocol for Digital Rights Management System", In the Proceeding
of 9th International Conference on Heterogeneous Networking for Quality,
Reliability, Security and Robustness (Qshine 2013),
LNICST (Springer Lecture Notes of ICST). 2013.
72. Sarbari Mitra, Sourav Mukhopadhyay and Ratna Dutta."Unconditionally
Secure Fully Connected Key Establishment using Deployment Knowledge", In
the Proceeding of AsiaARES 2013, LNCS,
Springer-Verlag, 2013.
2012
73. Sarbari Mitra, Sourav Mukhopadhyay, and Ratna Dutta. "A Group-Based
Deterministic Key Predistribution Scheme for Wireless
Sensor Network", in International
Journal of Wireless and Mobile Computing (IJWMC), Special Issue on u- and
e-Service, Science and Technology, 2012 (Citation Index: SCI).
74. Sarbari Mitra, Sourav Mukhopadhyay and Ratna Dutta. "Flexible Deterministic Approach to Key
Pre-Distribution in Grid Based WSN", In Proceeding of ADHOCNETS 2012,
LNICST (Springer Lecture Notes of ICST). 2012.
75. Dheerendra Mishra and Sourav
Mukhopadhyay. "Towards a Secure, Transparent and
Privacy-Preserving DRM System", In Proceeding of the International
Conference on Security in Computer Networks and Distributed Systems
(SNDS-2012), Springer. 2012.
76. Dheerendra Mishra and Sourav Mukhopadhyay. "Privacy
Rights Management in Multiparty Multilevel DRM System", In Proceeding of the International Conference
on Advances in Computing, Communications and Informatics (ICACCI-2012), ACM
digital library. 2012.
77. Amitabha Chakrabarty,
Martin Collier and Sourav Mukhopadhyay.
"Adaptive Routing Strategy for Large Scale Rearrangeable Symmetric Networks", Evolving
Developments in Grid and Cloud Computing: Advancing Research. Book Chapter,
P. 212-222, Chapter15, ISBN13:
9781466600560, 2012. IGI Global
2011
78. Sarbari Mitra, Ratna Dutta and Sourav Mukhopadhyay. "A Hierarchical Deterministic Key Predistribution for WSN Using Projective Planes", In
Proceeding of ADHOCNETS 2011, LNICST (Springer Lecture Notes of ICST). 2011.
79. Ratna Dutta, Sourav Mukhopadhyay and Dheerendra
Mishra. "Access Policy Based Key Management in Multi-Level
Multi-Distributor DRM Architecture", In Proceeding of InfoSecHiComNet
2011, LNCS,
Springer-Verlag, 2011.
80. Sarbari Mitra, Ratna Dutta and Sourav Mukhopadhyay. "Towards a Deterministic Hierarchical
Key Predistribution for WSN Using Complementary Fano Plane", In Proceeding of SecureComm
2011, LNICST (Springer Lecture Notes of ICST). 2011.
81. Ratna Dutta, Dheerendra
Mishra and Sourav Mukhopadhyay. "Vector Space Access Structure
and ID based Distributed DRM Key Management", In proceedings of ID2011, LNCS, Springer-Verlag,
2011.
2010 - 2009
82. Ratna Dutta, Sourav
Mukhopadhyay, and Martin Collier.
"Computationally secure self-healing key distribution with revocation in
wireless ad hoc networks", in Journal
of Ad Hoc Networks 8(6): 597-613 (Citation Index: SCIE,
Impact Factor: 1.456).
83. Amitabha Chakrabarty,
Martin Collier, and Sourav Mukhopadhyay.
"Adaptive Routing Strategy for Large Scale Rearrangeable
Symmetric Networks". in International Journal of Grid and High
Performance Computing (IJGHPC), 2(2): 53-63.
84. Sourav Mukhopadhyay and Palash Sarkar. "Hardware Architecture and
Cost/time/data Trade-off for Generic Inversion of One-way Function". in Journal
of Computacion y Sistemas,
ISSN 1405-5546, Special Issue on Applied Cryptography & Data Security, pp
331-355, Volume 12, No. 3, 2009.
85. Amitabha Chakrabarty, Martin
Collier and Sourav Mukhopadhyay.
"Symmetric Rearrangeable Networks: Algorithms
and Rearrangement Limits", In Proceedings of
the 7th International Conference on Information Technology - New Generations
(ITNG), April 12-14, 2010, Las Vegas, Nevada, USA.
86. Amitabha Chakrabarty,
Martin Collier and Sourav Mukhopadhyay.
"Matrix Based Nonblocking Routing Algorithm for
Bene's Networks". Proceeding of the International Conference on Future
Computational Technologies and Applications (FUTURE COMPUTING 2009). IEEE Computer Society Press. Athens, Greece, November
15-20, 2009.
87. Amitabha Chakrabarty,
Martin Collier and Sourav Mukhopadhyay.
"Dynamic Path Selection Algorithm for Beneˇs
Network". Proceeding of the IEEE International conference on Computational
Intelligence, Communication Systems and Networks (CICSyN2009). IEEE Computer Society Press, 2009.
88. Ratna Dutta, Sourav Mukhopadhyay and Tom Dowling. "Generalized
Self-Healing Key Distribution in Wireless Ad hoc Networks with Trade-Offs in
User's Pre-Arranged Life Cycle and Collusion Resistance". Proceeding
of the 5th ACM International Symposium on QoS and
Security for Wireless and Mobile Networks (Q2SWinet 2009). ACM Press. Canary
Islands, Spain, 26-30 October, 2009.
89. Ratna Dutta, Sourav Mukhopadhyay and Tom Dowling. "Enhanced Access
Polynomial Based Self-Healing Key Distribution". Proceeding of the ICST
International Workshop on Security in Emerging Wireless Communication and
Networking Systems (SEWCN09). LNICST (Springer Lecture Notes of ICST). Athens,
Greece, September 14, 2009.
90. Ratna Dutta, Sourav Mukhopadhyay and Tom Dowling. "Key Management in
Multi-Distributor based DRM System with Mobile Clients using IBE".
Proceeding of the IEEE International conference on the Applications of Digital
Information and Web Technologies (ICADIWT 2009). IEEE
Computer Society Press. London, UK, August 4-6, 2009.
91. Ratna Dutta, Sourav Mukhopadhyay and Tom Dowling. "Trade-Off between
Collusion Resistance and User Life Cycle in Self-Healing Key Distributions with
t-Revocation". Proceeding of the IEEE International conference on the
Applications of Digital Information and Web Technologies (ICADIWT 2009). IEEE Computer Society Press. London, UK, August 4-6,
2009.
2008 - 2007
92. Ratna Dutta, Sourav Mukhopadhyay and Sabu Emmanuel.
"Low Bandwidth Self-Healing Key Distribution in Wireless Ad Hoc
Network". Proceeding of the IEEE Asia International Conference on
Modelling and Simulation (AMS 2008), IEEE Computer Society Press, Kuala Lumpur,
Malaysia 13-15 May, 2008.
93. Ratna Dutta, Sourav Mukhopadhyay, Amitabha Das and Sabu Emmanuel. "Generalized Self-Healing Key
Distribution using Vector Space Access Structure". Proceedings of IFIP
Networking 2008, LNCS 4982, pp. 612-623, Springer-Verlag,
2008.
94. Ratna Dutta and Sourav Mukhopadhyay. "Improved Self-Healing Key Distribution
with Revocation in Wireless Sensor Network". Proceeding of the IEEE
Wireless Communications and Networking Conference (WCNC 2007), Hong Kong, 2007.
95. Ratna Dutta, Sourav Mukhopadhyay and Yong Dong Wu. "Constant Storage
Self-Healing Key Distribution with Revocation in Wireless Sensor Network".
Proceeding of the IEEE International Conference on Communications (ICC 2007),
Glasgow, 2007.
96. Ratna Dutta, Chang Ee-Chien and Sourav Mukhopadhyay.
"Efficient Self-Healing Key Distributions with Revocation for Wireless
Network using One Way Key Chains". Proceedings of the 5th International
Conference on Applied Cryptography and Network Security (ACNS 2007), LNCS
4521, pp. 385-400, Springer-Verlag, 2007.
97. Ratna Dutta and Sourav Mukhopadhyay. "Designing Scalable Self-Healing Key
Distribution Schemes with Revocation Capability". Proceedings of the 5th
International Symposium on Parallel and Distributed Processing and Applications
(ISPA-07), LNCS 4742, pp. 419-430, Springer-Verlag,
2007.
2006 and before
98. Sourav Mukhopadhyay and Palash Sarkar. "Hardware Architecture and Trade-offs
for Generic Inversion of One-way Functions". IEEE International Symposium
on Circuits and Systems (ISCAS 2006), Greece, 2006.
99. Sourav Mukhopadhyay and Palash Sarkar. "Application of LFSRs for Parallel
Sequence Generation in Cryptologic Algorithms". Proceedings of Applied
Cryptography and Information Security 2006 (ACIS 2006) in conjunction with
ICCSA 2006, LNCS 3982, pp. 426-435, Springer Verlag,
2006.
100.
Sourav Mukhopadhyay and Palash Sarkar.
"On the Effectiveness of TMTO and Exhaustive Search Attacks".
Proceedings of the 1st International Workshop on Security (IWSEC2006), LNCS
4266 , pp. 337-352, Springer Verlag,
2006.
101.
Alex Biryukov, Sourav Mukhopadhyay and Palash Sarkar.
"Improved Time-Memory Trade-offs with Multiple Data". Proceedings of
Selected Areas in Cryptography (SAC 2005), LNCS 3897, pp. 110-127,
Springer Verlag, 2005.
102.
Sourav Mukhopadhyay and Palash Sarkar.
"Application of LFSRs in Time/Memory Trade-Off Cryptanalysis".
Proceedings of Workshop on Information Security Applications (WISA 2005), LNCS
3786, pp. 25-37, Springer Verlag, 2005.
103.
Bimal Roy
and Sourav Mukhopadhyay.
"Statistical Cryptanalysis on Block Cipher". in Journal of the
Indian Society for Probability and Statistics, Vol. 7, 2003.
104.
Sourav Mukhopadhyay. "Time/Memory Trade-Off: A Survey".
in Journal of the Indian Statistical Association (JISA), Special Issue
on Statistics in Cryptology, Volume 42, No. 2, ISSN 0537-2585, 2004.