Goutam Paul
Goutam Paul
Associate Professor, Cryptology & Security Research Unit (CSRU), Indian Statistical Institute
Adresse e-mail validée de - Page d'accueil
Citée par
Citée par
Operating systems: internals and design principles
W Stallings, GK Paul
Pearson, 2012
RC4 stream cipher and its variants
G Paul, S Maitra
CRC press, 2011
Analysis of RC4 and proposal of additional layers for better security margin
S Maitra, G Paul
Progress in Cryptology-INDOCRYPT 2008: 9th International Conference on …, 2008
(Non-) random sequences from (non-) random permutations—Analysis of RC4 stream cipher
S Sen Gupta, S Maitra, G Paul, S Sarkar
Journal of Cryptology 27, 67-108, 2014
Towards a more democratic mining in bitcoins
G Paul, P Sarkar, S Mukherjee
Information Systems Security: 10th International Conference, ICISS 2014 …, 2014
Permutation after RC4 key scheduling reveals the secret key
G Paul, S Maitra
Selected Areas in Cryptography 4876, 360-377, 2007
New form of permutation bias and secret key leakage in keystream bytes of RC4
S Maitra, G Paul
Fast Software Encryption: 15th International Workshop, FSE 2008, Lausanne …, 2008
On non-negligible bias of the first output byte of RC4 towards the first three bytes of the secret key
G Paul, S Rathi, S Maitra
Designs, Codes and Cryptography 49, 123-134, 2008
Attack on broadcast RC4 revisited
S Maitra, G Paul, S Sen Gupta
Fast Software Encryption: 18th International Workshop, FSE 2011, Lyngby …, 2011
Searching for Hidden Messages: Automatic Detection of Steganography.
G Berg, I Davidson, MY Duan, G Paul
IAAI, 51-56, 2003
Internal state recovery of Grain-v1 employing normality order of the filter function
MJ Mihaljević, S Gangopadhyay, G Paul, H Imai
IET Information Security 6 (2), 55-64, 2012
A machine learning approach towards the prediction of protein–ligand binding affinity based on fundamental molecular properties
I Kundu, G Paul, R Banerjee
RSC advances 8 (22), 12127-12137, 2018
Proposal for quantum rational secret sharing
A Maitra, SJ De, G Paul, AK Pal
Physical Review A 92 (2), 022305, 2015
Double-block hash-then-sum: a paradigm for constructing BBB secure PRF
N Datta, A Dutta, M Nandi, G Paul
IACR Transactions on Symmetric Cryptology, 36-92, 2018
Single key variant of PMAC_Plus
N Datta, A Dutta, M Nandi, G Paul, L Zhang
Cryptology ePrint Archive, 2017
Keyless dynamic optimal multi-bit image steganography using energetic pixels
G Paul, I Davidson, I Mukherjee, SS Ravi
Multimedia tools and applications 76, 7445-7471, 2017
Generic cryptographic weakness of k-normal Boolean functions in certain stream ciphers and cryptanalysis of grain-128
M Mihaljević, S Gangopadhyay, G Paul, H Imai
Periodica Mathematica Hungarica 65 (2), 205-227, 2012
A PVD based high capacity steganography algorithm with embedding in non-sequential position
G Paul, SK Saha, D Burman
Multimedia Tools and Applications 79 (19-20), 13449-13479, 2020
Locating secret messages in images
I Davidson, G Paul
Proceedings of the tenth ACM SIGKDD international conference on Knowledge …, 2004
Device-independent quantum private query
A Maitra, G Paul, S Roy
Physical Review A 95 (4), 042344, 2017
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20