Publications


Journal/Conference/Book Chapter

 

2021

1.     S. Rana, D. Mishra and S. Mukhopadhyay: Blockchain-based multimedia content distribution with the assured system update mechanism, Multimedia Tools and Applications (Springer), 2021, Accepted. (Impact Factor: 2.313)

2.     M. Kansal, R. Dutta and S. Mukhopadhyay: 'Lattice based Nominative Signature using Pseudorandom Function' IET Information Security, (Accepted, 2021) (Impact Factor: .89).

2020

3.     Ravi Anand, Arpita Maitra, and Sourav Mukhopadhyay. "Evaluation of Quantum Cryptanalysis on SPECK", In the Proceeding of 21st International Conference on Cryptology in India (Indocrypt 2020), LNCS, Springer-Verlag (to appear).

4.     Sarbani Roy and Sourav Mukhopadhyay. “(t,n) Threshold d-level quantum secret sharing based on quantum Fourier transformation”, Quantum Information & Computation, Vol. 20 (No. 11 & 12), pp. 957- 968, 2020.

5.     Ravi Anand, Arpita Maitra, and Sourav Mukhopadhyay." Grover on SIMON", Quantum Information Processing, Springer, 2020 (to appear).

6.     Saurabh Rana,  Mohammad S. Obaidat, Dheerendra Mishra, Sourav Mukhopadhyay and Balqies Sadoun. " Computational Efficient Authenticated Digital Content Distribution Frameworks for DRM Systems: Review and Outlook", IEEE Systems Journal, 2020 (to appear).

2019

7.     Sarbani Roy and Sourav Mukhopadhyay. “Device-independent quantum secret sharing in arbitrary even dimensions”, Phys. Rev. A, American Physical Society, 100, 012319 (2019).

8.     Pratish Datta, Ratna Dutta and Sourav Mukhopadhyay. “Constrained Pseudorandom Functions for Turing Machines Revisited: How to Achieve Verifiability and Key Delegation”. Algorithmica 81(9): 3245-3390 (2019).

9.     Meenakshi Kansal, Ratna Dutta and Sourav Mukhopadhyay. “Group Signature from Lattices preserving Forward Security in Dynamic setting”, Advances in Mathematics of Communications (AMC), American Institute of Mathematical Sciences, (accepted) 2019.

10.  Jangirala Srinivas, Dheerendra Mishra, Sourav Mukhopadhyay, SaruKumari, VandanaGuleria. “An Authentication Framework for Roaming Service in Global Mobility Networks”. ITC 48(1): 129-145 (2019).

11.  Pratish Datta, Ratna Dutta and Sourav Mukhopadhyay. " Succinct Predicate and Online-Offline Multi-Input Inner Product Encryptions under Standard Static Assumptions". Journal of Information Security and Applications, ELSEVIER, Volume 48, October 2019.

12.  Meenakshi Kansal, Ratna Dutta and Sourav Mukhopadhyay. "Construction for a Nominative Signature Scheme from Lattice with Enhanced Security". In the Proceeding of 3th International Conference on Codes, Cryptology And Information Security (C2SI),2019, LNCS, Springer-Verlag.

2018

13.  Ravi Anand, Akhilesh Siddhanti, Subhamoy Maitra and Sourav Mukhopadhyay. "Differential Fault Attack on SIMON with very few Faults". In the Proceeding of 19th International Conference on Cryptology in India (Indocrypt 2018), LNCS, Springer-Verlag.

14.  Sarbani Roy, Arpita Maitra, and Sourav Mukhopadhyay."Measurement-device-independent quantum private query with qutrits", International Journal of Quantum Information, Vol. 16, No. 4 (2018) 1850045 (16 pages), World Scientific Publishing Company.

15.  Jangirala Srinivas, Dheerendra Mishra, Sourav Mukhopadhyay, Saru Kumari. "Provably secure biometric based authentication and key agreement protocol for wireless sensor networks". J. Ambient Intelligence and Humanized Computing 9(4): 875-895 (2018).

16.  Pratish Datta, Ratna Dutta and Sourav Mukhopadhyay. "Functional Signcryption". Journal of Information Security and Applications, ELSEVIER, Volume 42, October 2018, Pages 118-134..

2017

17.  Ankita Chaturvedi, Dheerendra Mishra, Jangirala Srinivas and Sourav Mukhopadhyay. " A privacy preserving biometric-based three-factor remote user authenticated key agreement scheme", in Journal of Information Security and Applications (Elsevier), Accepted, 2017.

18.  Jangirala Srinivas, Sourav Mukhopadhyay, and Ashok Kumar Das. "A Multi-Server Environment with Secure and Efficient Remote User Authentication Scheme based on Dynamic ID using Smart Cards," in Wireless Personal Communications (Springer), 2017, Accepted. (2015 SCI Impact Factor: 0.701)

19.  Jangirala Srinivas, Sourav Mukhopadhyay, Dheerendra Mishra. "Secure and efficient user authentication scheme for multi-gateway wireless sensor networks," in Journal of Ad Hoc Networks 54: 147-169 (2017) (Citation Index: SCIE, Impact Factor: 1.456).

20.  Pratish Datta, Ratna Dutta and Sourav Mukhopadhyay. "Constrained Pseudorandom Functions for Unconstrained Inputs Revisited: Achieving Verifiability and Key Delegation". In the Proceeding of 20th International Conference on the Theory and Practice of Public-Key Cryptography (PKC 2017), LNCS, Springer-Verlag.

21.  Pratish Datta, Ratna Dutta and Sourav Mukhopadhyay. "Strongly Full-Hiding Inner Product Encryption". Theoretical Computer Science (TCS) Journal, ELSEVIER, 2017.

2016

22.  Dheerendra Mishra, Ashok Kumar Das, Sourav Mukhopadhyay, and Mohammad Wazid. "A Secure and Robust Smartcard-Based Authentication Scheme for Session Initiation Protocol Using Elliptic Curve Cryptography," in Wireless Personal Communications (Springer), Vol. 91, No. 3, pp.1361-1391, 2016, DOI: 10.1007/s11277-016-3533-0. (2015 SCI Impact Factor: 0.701)

23.  Ankita Chaturvedi, Ashok Kumar Das, Dheerendra Mishra, and Sourav Mukhopadhyay. "Design of a secure smartcard-based multi-server authentication scheme," in Journal of Information Security and Applications (Elsevier), Vol. 30, pp. 64-80, 2016. [Indexed in Emerging Sources Citation Index (ESCI), Thomson Reuters]

24.  Dheerendra Mishra, Ashok Kumar Das, and Sourav Mukhopadhyay. "A secure and efficient ECC-based user anonymity-preserving session initiation authentication protocol using smart card," in Peer-to-Peer Networking and Applications (Springer), Vol. 9, No. 1, pp.171-192, 2016. (2015 SCI Impact Factor: 1.000)

25.  Ashok Kumar Das, Dheerendra Mishra, and Sourav Mukhopadhyay. "An anonymous and secure biometric-based enterprise digital rights management system for mobile environment," in Security and Communication Networks (Wiley), Vol. 8, No. 18, pp. 3383-3404, 2015, DOI: 10.1002/sec.1266. (2015 SCI Impact Factor: 0.806)

26.  Srinivas Jangirala, Dheerendra Mishra, Sourav Mukhopadhyay. "Secure Lightweight User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for the Internet of Things Environment". ICISS 2016: 45-65

27.  Pratish Datta, Ratna Dutta and Sourav Mukhopadhyay. "Adaptively Secure Unrestricted Attribute-Based Encryption with Subset Difference Revocation in Bilinear Groups of Prime Order", In the Proceeding of 8th International Conference on Cryptology, AFRICACRYPT 2016, LNCS, Springer-Verlag

28.  Pratish Datta, Ratna Dutta and Sourav Mukhopadhyay. "Functional Encryption for Inner Product with Full Function Privacy", In the Proceeding of 19th International Conference on the Theory and Practice of Public-Key Cryptography (PKC 2016), LNCS, Springer-Verlag.

2015

29.  Dheerendra Mishra, Ashok Kumar Das, Ankita Chaturvedi, and Sourav Mukhopadhyay. "A secure password-based authentication and key agreement scheme using smart cards," in Journal of Information Security and Applications (Elsevier), Vol. 23, pp. 28-43, August 2015, DOI: 10.1016/j.jisa.2015.06.003. [Indexed in Emerging Sources Citation Index (ESCI), Thomson Reuters]

30.  Dheerendra Mishra, Ankita Chaturvedi, and Sourav Mukhopadhyay, "An Improved Biometric-based Remote User Authentication Scheme for Connected Health Care", in International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC), Inderscience, 18(1/2): 75-84, 2015.

31.  Dheerendra Mishra, Ankita Chaturvedi, and Sourav Mukhopadhyay, "Design of a Lightweight Two-factor Authentication Scheme with Smart Card Revocation," in Journal of Information Security and Applications (Elsevier), Vol. 23, pp. 44-51, August 2015, DOI: 10.1016/j.jisa.2015.06.003. [Indexed in Emerging Sources Citation Index (ESCI), Thomson Reuters]

32.  Pratish Datta, Ratna Dutta and Sourav Mukhopadhyay. "General Circuit Realizing Compact Attribute-Based Encryption and Signcryption from Multilinear Maps", In the Proceeding of 16th International Conference on Cryptology (Indocrypt 2015), LNCS, Springer-Verlag.

33.  Pratish Datta, Ratna Dutta and Sourav Mukhopadhyay. "Functional Signcryption: Notion, Construction, and Applications", In the Proceeding of Seventh International Conference on Provable Security (ProvSec 2015) LNCS, Springer-Verlag.

34.  Dibyendu Roy, Ankita Chaturvedi and Sourav Mukhopadhyay. "New Constructions of T-function", In the Proceeding of the 11th Information Security Practice and Experience Conference (ISPEC 2015), LNCS, Springer-Verlag, 2015.

35.  Pratish Datta, Ratna Dutta and Sourav Mukhopadhyay. "General Circuit Realizing Compact Revocable Attribute-Based Encryption from Multilinear Maps", In the Proceeding of the 18th Information Security Conference (ISC 2015), LNCS, Springer-Verlag, 2015.

36.  Pratish Datta, Ratna Dutta and Sourav Mukhopadhyay. "Fully Secure Online/Offline Predicate and Attribute-Based Encryption", In the Proceeding of the 11th Information Security Practice and Experience Conference (ISPEC 2015), LNCS, Springer-Verlag, 2015.

2014

37.  Ankita Chaturvedi, Dheerendra Mishra, and Sourav Mukhopadhyay, "An Enhanced Dynamic ID-Based Authentication Scheme for Telecare Medical Information Systems", in Journal of King Saud University - Computer and Information Sciences, ELSEVIER, 2014 (Accepted).

38.  Dibyendu Roy, Pratish Datta, and Sourav Mukhopadhyay, "Algebraic Cryptanalysis of Stream Ciphers Using Decomposition of Boolean Function", in Journal of Applied Mathematics and Computing, Springer, 2014.

39.  Dheerendra Mishra, Jangirala Srinivas, and Sourav Mukhopadhyay, "A Secure and Efficient Chaotic Map-based Authenticated Key Agreement Scheme for Telecare Medicine Information Systems", in Journal of Medical Systems, Springer. (Citation Index: SCIE, Impact Factor: 1.783).

40.  Dheerendra Mishra, Ashok Kumar Das, and Sourav Mukhopadhyay, "A Secure User Anonymity-Preserving Biometric-Based Multi-Server Authenticated Key Agreement Scheme using Smart Cards", in International Journal of Expert Systems with Applications, ELSEVIER. (Citation Index: SCIE, Impact Factor: 1.854)

41.  Dheerendra Mishra, and Sourav Mukhopadhyay, "A Privacy Enabling Content Distribution Framework for Digital Rights Management", in International Journal of trust management in computing and communications (Accepted).

42.  Dheerendra Mishra, Sourav Mukhopadhyay, Saru Kumari, Muhammad Khurram Khan, and Ankita Chaturvedi, "Security Enhancement of a Biometric based Authentication Scheme for Telecare Medicine Information Systems with Nonce", in Journal of Medical Systems, 38 (5) pp. 1-11, 2014. doi: http://dx.doi.org/10.1007/s10916-014-0041-1. (Citation Index: SCIE, Impact Factor: 1.783).

43.  Dheerendra Mishra, Ankita Chaturvedi, Sourav Mukhopadhyay, Saru Kumari, and Muhammad Khurram Khan, "Cryptanalysis and Improvement of Yan et al.'s Biometric-based Authentication Scheme for Telecare Medicine Information Systems", in Journal of Medical Systems (Accepted). (Citation Index: SCIE, Impact Factor: 1.783).

44.  Sarbari Mitra, Sourav Mukhopadhyay, and Ratna Dutta, "Key Pre-Distribution in a Non-Uniform Rectangular Grid for Wireless Sensor Networks". in Journal of Applied Mathematics and Computing, Springer, 2014.

45.  Pratish Datta, Dibyendu Roy and Sourav Mukhopadhyay. "A Probabilistic Algebraic Attack on the Grain Family of Stream Ciphers". In the Proceeding of the 7th International Conference on Network and System Security (NSS 2014), LNCS, Springer-Verlag, 2014.

46.   Dheerendra Mishra and Sourav Mukhopadhyay. "Cryptanalysis of Two Authentication Scheme for DRM System". In the Proceeding of the 2nd International Conference on Security in Computer Networks and Distributed Systems (SNDS-2014), Springer (CCIS), ISSN: 1865:0929, 2014.

47.  Pratish Datta, Ratna Dutta and Sourav Mukhopadhyay. "Fully Secure Self-Updatable Encryption in Prime Order Bilinear Groups", In the Proceeding of Information Security, the Seventeenth International Conference (ISC 2014), LNCS, Springer-Verlag, 2014.

48.  Pratish Datta, Ratna Dutta and Sourav Mukhopadhyay. "Universally Composable Efficient Priced Oblivious Transfer from a Flexible Membership Encryption", In the Proceeding of 19th Australasian Conference on Information Security and Privacy (ACISP 2014), LNCS, Springer-Verlag, 2014.

49.  Dheerendra Mishra and Sourav Mukhopadhyay. "Cryptanalysis of Yang et al.'s Digital Rights Management Authentication Scheme Based on Smart Card". In the Proceeding of the 2nd International Conference on Security in Computer Networks and Distributed Systems (SNDS-2014), Springer (CCIS), ISSN: 1865:0929, 2014.

50.   Dibyendu Roy, Pratish Datta and Sourav Mukhopadhyay. "A New Variant of Algebraic Attack". In the Proceeding of the 2nd International Conference on Security in Computer Networks and Distributed Systems (SNDS-2014), Springer (CCIS), ISSN: 1865:0929, 2014.

2013

51.  Sarbari Mitra, Sourav Mukhopadhyay, and Ratna Dutta, "A Deterministic Key Pre-distribution Scheme for WSN Using Projective Planes and Their Complements". in International Journal of Trust Management in Computing and Communications (IJTMCC), 2013 (Citation Index: SCI).

52.   Sarbari Mitra, Sourav Mukhopadhyay, and Ratna Dutta, "Unconditionally-Secure Key Pre-Distribution for Triangular Grid Based Wireless Sensor Network". in Journal of Applied Mathematics and Computing, Springer, 2013.

53.   Ankita Chaturvedi, Dheerendra Mishra and Sourav Mukhopadhyay. "Improved Biometric-based Three-factor Remote User Authentication Scheme with Key Agreement using Smart Card", In the Proceeding of the 9th International Conference on Information Systems Security (ICISS 2013), LNCS, Springer-Verlag, 2013.

54.  Dheerendra Mishra and Sourav Mukhopadhyay. "Cryptanalysis of Pairing-free Identity-Based Authenticated Key Agreement Protocols", In the Proceeding of the 9th International Conference on Information Systems Security (ICISS 13), LNCS, Springer-Verlag, 2013.

55.   Dheerendra Mishra, Vinod Kumar and Sourav Mukhopadhyay. "A Pairing-free Identity Based Authentication Framework for Cloud Computing", In the Proceeding of the 7th International Conference on Network and System Security (NSS 2013), LNCS, Springer-Verlag, 2013.

56.  Dheerendra Mishra and Sourav Mukhopadhyay. "Privacy Preserving Mechanism in Multi-Distributor based DRM System", In the Proceeding of the 9th Information Security Practice and Experience Conference (ISPEC 2013), LNCS, Springer-Verlag, 2013.

57.  Sarbari Mitra and Sourav Mukhopadhyay." Key Pre-Distribution in a Non-Uniform Network Using Combinatorial Design", In the Proceeding of 9th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (Qshine 2013), LNICST (Springer Lecture Notes of ICST). 2013.

58.  Dheerendra Mishra and Sourav Mukhopadhyay."A Certificateless Authenticated Key Agreement Protocol for Digital Rights Management System", In the Proceeding of 9th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (Qshine 2013), LNICST (Springer Lecture Notes of ICST). 2013.

59.  Sarbari Mitra, Sourav Mukhopadhyay and Ratna Dutta."Unconditionally Secure Fully Connected Key Establishment using Deployment Knowledge", In the Proceeding of AsiaARES 2013, LNCS, Springer-Verlag, 2013.

2012

60.  Sarbari Mitra, Sourav Mukhopadhyay, and Ratna Dutta. "A Group-Based Deterministic Key Predistribution Scheme for Wireless Sensor Network", in International Journal of Wireless and Mobile Computing (IJWMC), Special Issue on u- and e-Service, Science and Technology, 2012 (Citation Index: SCI).

61.  Sarbari Mitra, Sourav Mukhopadhyay and Ratna Dutta. "Flexible Deterministic Approach to Key Pre-Distribution in Grid Based WSN", In Proceeding of ADHOCNETS 2012, LNICST (Springer Lecture Notes of ICST). 2012.

62.  Dheerendra Mishra and Sourav Mukhopadhyay. "Towards a Secure, Transparent and Privacy-Preserving DRM System", In Proceeding of the International Conference on Security in Computer Networks and Distributed Systems (SNDS-2012), Springer. 2012.

63.  Dheerendra Mishra and Sourav Mukhopadhyay. "Privacy Rights Management in Multiparty Multilevel DRM System", In Proceeding of the International Conference on Advances in Computing, Communications and Informatics (ICACCI-2012), ACM digital library. 2012.

64.  Amitabha Chakrabarty, Martin Collier and Sourav Mukhopadhyay. "Adaptive Routing Strategy for Large Scale Rearrangeable Symmetric Networks", Evolving Developments in Grid and Cloud Computing: Advancing Research. Book Chapter, P. 212-222, Chapter15, ISBN13: 9781466600560, 2012. IGI Global

 

2011

65.  Sarbari Mitra, Ratna Dutta and Sourav Mukhopadhyay. "A Hierarchical Deterministic Key Predistribution for WSN Using Projective Planes", In Proceeding of ADHOCNETS 2011, LNICST (Springer Lecture Notes of ICST). 2011.

66.  Ratna Dutta, Sourav Mukhopadhyay and Dheerendra Mishra. "Access Policy Based Key Management in Multi-Level Multi-Distributor DRM Architecture", In Proceeding of InfoSecHiComNet 2011, LNCS, Springer-Verlag, 2011.

67.  Sarbari Mitra, Ratna Dutta and Sourav Mukhopadhyay. "Towards a Deterministic Hierarchical Key Predistribution for WSN Using Complementary Fano Plane", In Proceeding of SecureComm 2011, LNICST (Springer Lecture Notes of ICST). 2011.

68.  Ratna Dutta, Dheerendra Mishra and Sourav Mukhopadhyay. "Vector Space Access Structure and ID based Distributed DRM Key Management", In proceedings of ID2011, LNCS, Springer-Verlag, 2011.

2010 - 2009

69.  Ratna Dutta, Sourav Mukhopadhyay, and Martin Collier. "Computationally secure self-healing key distribution with revocation in wireless ad hoc networks", in Journal of Ad Hoc Networks 8(6): 597-613 (Citation Index: SCIE, Impact Factor: 1.456).

70.  Amitabha Chakrabarty, Martin Collier, and Sourav Mukhopadhyay. "Adaptive Routing Strategy for Large Scale Rearrangeable Symmetric Networks". in International Journal of Grid and High Performance Computing (IJGHPC), 2(2): 53-63.

71.  Sourav Mukhopadhyay and Palash Sarkar. "Hardware Architecture and Cost/time/data Trade-off for Generic Inversion of One-way Function". in Journal of Computacion y Sistemas, ISSN 1405-5546, Special Issue on Applied Cryptography & Data Security, pp 331-355, Volume 12, No. 3, 2009.

72.  Amitabha Chakrabarty, Martin Collier and Sourav Mukhopadhyay. "Symmetric Rearrangeable Networks: Algorithms and Rearrangement Limits", In Proceedings of the 7th International Conference on Information Technology - New Generations (ITNG), April 12-14, 2010, Las Vegas, Nevada, USA.

73.  Amitabha Chakrabarty, Martin Collier and Sourav Mukhopadhyay. "Matrix Based Nonblocking Routing Algorithm for Bene's Networks". Proceeding of the International Conference on Future Computational Technologies and Applications (FUTURE COMPUTING 2009). IEEE  Computer Society Press. Athens, Greece, November 15-20, 2009.

74.  Amitabha Chakrabarty, Martin Collier and Sourav Mukhopadhyay. "Dynamic Path Selection Algorithm for Beneˇs Network". Proceeding of the IEEE International conference on Computational Intelligence, Communication Systems and Networks (CICSyN2009). IEEE  Computer Society Press, 2009.

75.  Ratna Dutta, Sourav Mukhopadhyay and Tom Dowling. "Generalized Self-Healing Key Distribution in Wireless Ad hoc Networks with Trade-Offs in User's Pre-Arranged Life Cycle and Collusion Resistance".  Proceeding of the 5th ACM International Symposium on QoS and Security for Wireless and Mobile Networks (Q2SWinet 2009). ACM Press. Canary Islands, Spain, 26-30 October, 2009.

76.  Ratna Dutta, Sourav Mukhopadhyay and Tom Dowling. "Enhanced Access Polynomial Based Self-Healing Key Distribution". Proceeding of the ICST International Workshop on Security in Emerging Wireless Communication and Networking Systems (SEWCN09). LNICST (Springer Lecture Notes of ICST). Athens, Greece, September 14, 2009.

77.  Ratna Dutta, Sourav Mukhopadhyay and Tom Dowling. "Key Management in Multi-Distributor based DRM System with Mobile Clients using IBE". Proceeding of the IEEE International conference on the Applications of Digital Information and Web Technologies (ICADIWT 2009). IEEE  Computer Society Press. London, UK, August 4-6, 2009.

78.  Ratna Dutta, Sourav Mukhopadhyay and Tom Dowling. "Trade-Off between Collusion Resistance and User Life Cycle in Self-Healing Key Distributions with t-Revocation". Proceeding of the IEEE International conference on the Applications of Digital Information and Web Technologies (ICADIWT 2009). IEEE  Computer Society Press. London, UK, August 4-6, 2009.

2008 - 2007

79.  Ratna Dutta, Sourav Mukhopadhyay and Sabu Emmanuel. "Low Bandwidth Self-Healing Key Distribution in Wireless Ad Hoc Network". Proceeding of the IEEE Asia International Conference on Modelling and Simulation (AMS 2008), IEEE Computer Society Press, Kuala Lumpur, Malaysia 13-15 May, 2008.

80.  Ratna Dutta, Sourav Mukhopadhyay, Amitabha Das and Sabu Emmanuel. "Generalized Self-Healing Key Distribution using Vector Space Access Structure". Proceedings of IFIP Networking 2008, LNCS 4982, pp. 612-623, Springer-Verlag, 2008.

81.  Ratna Dutta and Sourav Mukhopadhyay. "Improved Self-Healing Key Distribution with Revocation in Wireless Sensor Network". Proceeding of the IEEE Wireless Communications and Networking Conference (WCNC 2007), Hong Kong, 2007.

82.  Ratna Dutta, Sourav Mukhopadhyay and Yong Dong Wu. "Constant Storage Self-Healing Key Distribution with Revocation in Wireless Sensor Network". Proceeding of the IEEE International Conference on Communications (ICC 2007), Glasgow, 2007.

83.  Ratna Dutta, Chang Ee-Chien and Sourav Mukhopadhyay. "Efficient Self-Healing Key Distributions with Revocation for Wireless Network using One Way Key Chains". Proceedings of the 5th International Conference on Applied Cryptography and Network Security (ACNS 2007), LNCS 4521, pp. 385-400, Springer-Verlag, 2007.

84.  Ratna Dutta and Sourav Mukhopadhyay. "Designing Scalable Self-Healing Key Distribution Schemes with Revocation Capability". Proceedings of the 5th International Symposium on Parallel and Distributed Processing and Applications (ISPA-07), LNCS 4742, pp. 419-430, Springer-Verlag, 2007.

2006 and before

85.  Sourav Mukhopadhyay and Palash Sarkar. "Hardware Architecture and Trade-offs for Generic Inversion of One-way Functions". IEEE International Symposium on Circuits and Systems (ISCAS 2006), Greece, 2006.

86.  Sourav Mukhopadhyay and Palash Sarkar. "Application of LFSRs for Parallel Sequence Generation in Cryptologic Algorithms". Proceedings of Applied Cryptography and Information Security 2006 (ACIS 2006) in conjunction with ICCSA 2006, LNCS 3982, pp. 426-435, Springer Verlag, 2006.

87.  Sourav Mukhopadhyay and Palash Sarkar. "On the Effectiveness of TMTO and Exhaustive Search Attacks". Proceedings of the 1st International Workshop on Security (IWSEC2006), LNCS 4266 , pp. 337-352, Springer Verlag, 2006.

88.  Alex Biryukov, Sourav Mukhopadhyay and Palash Sarkar. "Improved Time-Memory Trade-offs with Multiple Data". Proceedings of Selected Areas in Cryptography (SAC 2005), LNCS 3897, pp. 110-127, Springer Verlag, 2005.

89.  Sourav Mukhopadhyay and Palash Sarkar. "Application of LFSRs in Time/Memory Trade-Off Cryptanalysis". Proceedings of Workshop on Information Security Applications (WISA 2005), LNCS 3786, pp. 25-37, Springer Verlag, 2005.

90.  Bimal Roy and Sourav Mukhopadhyay. "Statistical Cryptanalysis on Block Cipher". in Journal of the Indian Society for Probability and Statistics, Vol. 7, 2003.

91.  Sourav Mukhopadhyay. "Time/Memory Trade-Off: A Survey". in Journal of the Indian Statistical Association (JISA), Special Issue on Statistics in Cryptology, Volume 42, No. 2, ISSN 0537-2585, 2004.

 

Home