


default search action
Avishek Adhikari
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j32]Sandip Kumar Mondal, Mostafizar Rahman, Santanu Sarkar, Avishek Adhikari:
Yoyo cryptanalysis on Future. Int. J. Appl. Cryptogr. 4(3/4): 238-249 (2024) - [j31]Satyam Kumar
, Sandip Kumar Mondal, Santanu Sarkar, Takanori Isobe, Anubhab Baksi, Avishek Adhikari:
Restricted near collision attack on Plantlet. J. Cryptogr. Eng. 14(1): 19-34 (2024) - [j30]Jina Varghese, Praveen K, Sabyasachi Dutta, Avishek Adhikari:
A novel approach for long-term secure storage of domain independent videos. J. Vis. Commun. Image Represent. 104: 104279 (2024) - [j29]Himadry Sekhar Roy, Prakash Dey, Sandip Kumar Mondal, Avishek Adhikari:
Cryptanalysis of full round FUTURE with multiple biclique structures. Peer Peer Netw. Appl. 17(1): 397-409 (2024) - [j28]Chandan Goswami, Avishek Adhikari, Suraj Kumar Sahoo, Pinaki Sarkar:
Authenticated key agreement for IoT network using HECC and CRT four co-primes. Peer Peer Netw. Appl. 17(4): 2397-2414 (2024) - [j27]Sandip Kumar Mondal
, Prakash Dey
, Himadry Sekhar Roy
, Avishek Adhikari
, Subhamoy Maitra
:
Improved Fault Analysis on Subterranean 2.0. IEEE Trans. Computers 73(6): 1631-1639 (2024) - [c25]Praveen K, Gabriel Anand K. S, Indranil Ghosh Ray, Avishek Adhikari, Sabyasachi Datta, Arnab Kumar Biswas
:
On the Design of a Searchable Encryption Protocol for Keyword Search using Proactive Secret Sharing. e-Science 2024: 1-8 - 2023
- [j26]Praveen K, Sabyasachi Dutta
, Avishek Adhikari, M. Sethumadhavan:
Proactive visual cryptographic schemes for general access structures. Multim. Tools Appl. 82(27): 41987-42019 (2023) - [j25]Md Kutubuddin Sardar, Jyotirmoy Pramanik
, Avishek Adhikari:
(t, k, n) Regional Secret Image Sharing over Finite Fields. Signal Process. 210: 109082 (2023) - [j24]Sandip Kumar Mondal, Mostafizar Rahman, Santanu Sarkar, Avishek Adhikari:
Revisiting Yoyo Tricks on AES. IACR Trans. Symmetric Cryptol. 2023(4): 28-57 (2023) - 2022
- [j23]Pinaki Sarkar, Suraj Kumar Sahoo, Chandan Goswami
, Avishek Adhikari:
Connectivity invariant lightweight resiliency improvement strategies for CRT-subset scheme. Ad Hoc Networks 129: 102803 (2022) - [j22]Suraj Kumar Sahoo, Avishek Adhikari
, Sabyasachi Dutta
:
Practical attacks on a class of secret image sharing schemes based on Chinese Remainder Theorem. Comput. Electr. Eng. 100: 107924 (2022) - 2021
- [e1]Avishek Adhikari
, Ralf Küsters
, Bart Preneel
:
Progress in Cryptology - INDOCRYPT 2021 - 22nd International Conference on Cryptology in India, Jaipur, India, December 12-15, 2021, Proceedings. Lecture Notes in Computer Science 13143, Springer 2021, ISBN 978-3-030-92517-8 [contents] - [i10]Jyotirmoy Pramanik, Avishek Adhikari:
Evolving Secret Sharing in Almost Semi-honest Model. IACR Cryptol. ePrint Arch. 2021: 1156 (2021) - 2020
- [j21]Subarsha Banerjee
, Avishek Adhikari:
Signless Laplacian spectrum of power graphs of finite cyclic groups. AKCE Int. J. Graphs Comb. 17(1): 356-366 (2020) - [j20]Md Kutubuddin Sardar, Avishek Adhikari:
Essential secret image sharing scheme with small and equal sized shadows. Signal Process. Image Commun. 87: 115923 (2020) - [c24]Jyotirmoy Pramanik
, Sabyasachi Dutta
, Partha Sarathi Roy
, Avishek Adhikari
:
Cheating Detectable Ramp Secret Sharing with Optimal Cheating Resiliency. ICISS 2020: 169-184 - [c23]Sabyasachi Dutta
, Md Kutubuddin Sardar, Avishek Adhikari, Sushmita Ruj
, Kouichi Sakurai:
Color Visual Cryptography Schemes Using Linear Algebraic Techniques over Rings. ICISS 2020: 198-217 - [i9]Jyotirmoy Pramanik, Avishek Adhikari:
Evolving Secret Sharing with Essential Participants. IACR Cryptol. ePrint Arch. 2020: 1035 (2020)
2010 – 2019
- 2019
- [j19]Sabyasachi Dutta
, Avishek Adhikari
, Sushmita Ruj
:
Maximal contrast color visual secret sharing schemes. Des. Codes Cryptogr. 87(7): 1699-1711 (2019) - [j18]Jyotirmoy Pramanik
, Avishek Adhikari:
Ramp secret sharing with cheater identification in presence of rushing cheaters. Groups Complex. Cryptol. 11(2): 103-113 (2019) - [c22]Sabyasachi Dutta
, Tamal Bhore, Md Kutubuddin Sardar, Avishek Adhikari, Kouichi Sakurai:
Visual Secret Sharing Scheme with Distributed Levels of Importance of Shadows. ICMC 2019: 19-32 - 2018
- [j17]Prakash Dey, Raghvendra Singh Rohit, Avishek Adhikari
:
Single key MITM attack and biclique cryptanalysis of full round Khudra. J. Inf. Secur. Appl. 41: 117-123 (2018) - [c21]Jyotirmoy Pramanik
, Partha Sarathi Roy
, Sabyasachi Dutta
, Avishek Adhikari, Kouichi Sakurai:
Secret Sharing Schemes on Compartmental Access Structure in Presence of Cheaters. ICISS 2018: 171-188 - [c20]Partha Sarathi Roy
, Sabyasachi Dutta
, Kirill Morozov, Avishek Adhikari, Kazuhide Fukushima
, Shinsaku Kiyomoto, Kouichi Sakurai:
Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness. ISPEC 2018: 578-594 - 2017
- [j16]Santanu Sarkar
, Prakash Dey, Avishek Adhikari, Subhamoy Maitra:
Probabilistic signature based generalized framework for differential fault analysis of stream ciphers. Cryptogr. Commun. 9(4): 523-543 (2017) - [j15]Ushnish Sarkar
, Avishek Adhikari
:
On relationship between Hamiltonian path and holes in -coloring of minimum span. Discret. Appl. Math. 222: 227-234 (2017) - [j14]Ushnish Sarkar
, Avishek Adhikari
:
A new graph parameter and a construction of larger graph without increasing radio k-chromatic number. J. Comb. Optim. 33(4): 1365-1377 (2017) - [c19]Sabyasachi Dutta
, Avishek Adhikari:
Contrast Optimal XOR Based Visual Cryptographic Schemes. ICITS 2017: 58-72 - [i8]Bibhas Chandra Das, Md Kutubuddin Sardar, Avishek Adhikari:
Efficient Constructions for t- (k, n)*-Random Grid Visual Cryptographic Schemes. IACR Cryptol. ePrint Arch. 2017: 779 (2017) - 2016
- [j13]Sabyasachi Dutta
, Raghvendra Singh Rohit, Avishek Adhikari:
Constructions and analysis of some efficient t - (k, n)∗-visual cryptographic schemes using linear algebraic techniques. Des. Codes Cryptogr. 80(1): 165-196 (2016) - [j12]Prakash Dey, Raghvendra Singh Rohit, Avishek Adhikari
:
Full key recovery of ACORN with a single fault. J. Inf. Secur. Appl. 29: 57-64 (2016) - [c18]Avishek Adhikari, Kirill Morozov, Satoshi Obana, Partha Sarathi Roy
, Kouichi Sakurai, Rui Xu:
Efficient Threshold Secret Sharing Schemes Secure Against Rushing Cheaters. ICITS 2016: 3-23 - [c17]Sabyasachi Dutta, Partha Sarathi Roy
, Avishek Adhikari, Kouichi Sakurai:
On the Robustness of Visual Cryptographic Schemes. IWDW 2016: 251-262 - [c16]Prakash Dey, Raghvendra Singh Rohit, Santanu Sarkar
, Avishek Adhikari:
Differential Fault Analysis on Tiaoxin and AEGIS Family of Ciphers. SSCC 2016: 74-86 - [i7]Sabyasachi Dutta, Tamal Bhore, Avishek Adhikari:
Efficient Construction of Visual Cryptographic Scheme for Compartmented Access Structures. IACR Cryptol. ePrint Arch. 2016: 1113 (2016) - 2015
- [j11]Angsuman Das, Avishek Adhikari, Kouichi Sakurai:
Plaintext checkable encryption with designated checker. Adv. Math. Commun. 9(1): 37-53 (2015) - [j10]Rita SahaRay, Avishek Adhikari:
Structural Form of a Minimal Critical Set for a Latin Square Representing the Elementary Abelian 2-group of Order 8. Ars Comb. 120: 181-191 (2015) - [j9]Ushnish Sarkar
, Avishek Adhikari:
On characterizing radio k-coloring problem by path covering problem. Discret. Math. 338(4): 615-620 (2015) - [c15]Prakash Dey, Abhishek Chakraborty, Avishek Adhikari, Debdeep Mukhopadhyay:
Improved practical differential fault analysis of grain-128. DATE 2015: 459-464 - [c14]Partha Sarathi Roy
, Angsuman Das, Avishek Adhikari:
Computationally Secure Cheating Identifiable Multi-Secret Sharing for General Access Structure. ICDCIT 2015: 278-287 - [c13]Angsuman Das, Avishek Adhikari:
Plaintext Checkable Signcryption. ICISS 2015: 324-333 - [i6]Santanu Sarkar, Prakash Dey, Avishek Adhikari, Subhamoy Maitra:
Probabilistic Signature Based Framework for Differential Fault Analysis of Stream Ciphers. IACR Cryptol. ePrint Arch. 2015: 508 (2015) - [i5]Avishek Adhikari, Kirill Morozov, Satoshi Obana, Partha Sarathi Roy, Kouichi Sakurai, Rui Xu:
Efficient Threshold Secret Sharing Schemes Secure against Rushing Cheaters. IACR Cryptol. ePrint Arch. 2015: 1115 (2015) - 2014
- [j8]Avishek Adhikari:
Linear algebraic techniques to construct monochrome visual cryptographic schemes for general access structure and its applications to color images. Des. Codes Cryptogr. 73(3): 865-895 (2014) - [j7]Partha Sarathi Roy
, Avishek Adhikari:
One-sided leakage-resilient privacy only two-message oblivious transfer. J. Inf. Secur. Appl. 19(4-5): 295-300 (2014) - [c12]Sabyasachi Dutta
, Avishek Adhikari:
XOR Based Non-monotone t- (k, n)^* -Visual Cryptographic Schemes Using Linear Algebra. ICICS 2014: 230-242 - [c11]Prakash Dey, Avishek Adhikari:
Improved Multi-Bit Differential Fault Analysis of Trivium. INDOCRYPT 2014: 37-52 - [c10]Partha Sarathi Roy
, Avishek Adhikari, Rui Xu, Kirill Morozov, Kouichi Sakurai:
An Efficient Robust Secret Sharing Scheme with Optimal Cheater Resiliency. SPACE 2014: 47-58 - [i4]Partha Sarathi Roy, Avishek Adhikari:
Multi-Use Multi-Secret Sharing Scheme for General Access Structure. CoRR abs/1409.0089 (2014) - [i3]Partha Sarathi Roy, Avishek Adhikari, Rui Xu, Kirill Morozov, Kouichi Sakurai:
An Efficient t-Cheater Identifiable Secret Sharing Scheme with Optimal Cheater Resiliency. IACR Cryptol. ePrint Arch. 2014: 628 (2014) - [i2]Prakash Dey, Abhishek Chakraborty, Avishek Adhikari, Debdeep Mukhopadhyay:
Multi-Bit Differential Fault Analysis of Grain-128 with Very Weak Assumptions. IACR Cryptol. ePrint Arch. 2014: 654 (2014) - 2013
- [c9]Angsuman Das, Avishek Adhikari:
Signcryption from Randomness Recoverable PKE Revisited. ICISS 2013: 78-90 - [c8]Angsuman Das, Sabyasachi Dutta
, Avishek Adhikari:
Indistinguishability against Chosen Ciphertext Verification Attack Revisited: The Complete Picture. ProvSec 2013: 104-120 - 2012
- [j6]Dong Hao, Xiaojuan Liao, Avishek Adhikari, Kouichi Sakurai, Makoto Yokoo
:
A repeated game approach for analyzing the collusion on selective forwarding in multihop wireless networks. Comput. Commun. 35(17): 2125-2137 (2012) - [j5]Angsuman Das
, Avishek Adhikari:
An efficient IND-CCA2 secure Paillier-based cryptosystem. Inf. Process. Lett. 112(22): 885-888 (2012) - 2011
- [j4]Mrinal Nandi
, Subrata Parui, Avishek Adhikari:
The domination numbers of cylindrical grid graphs. Appl. Math. Comput. 217(10): 4879-4889 (2011) - [c7]Liang Zhao, Takashi Nishide, Avishek Adhikari, Kyung Hyune Rhee, Kouichi Sakurai:
Cryptanalysis of Randomized Arithmetic Codes Based on Markov Model. Inscrypt 2011: 341-362 - [c6]Dong Hao, Avishek Adhikari, Kouichi Sakurai:
Mixed-Strategy Game Based Trust Management for Clustered Wireless Sensor Networks. INTRUST 2011: 239-257 - [i1]Angsuman Das, Avishek Adhikari:
An efficient multi-use multi-secret sharing scheme based on hash function. CoRR abs/1103.1730 (2011) - 2010
- [j3]Angsuman Das
, Avishek Adhikari:
An efficient multi-use multi-secret sharing scheme based on hash function. Appl. Math. Lett. 23(9): 993-996 (2010) - [c5]Liang Zhao, Avishek Adhikari, Kouichi Sakurai:
A New Scrambling Evaluation Scheme Based on Spatial Distribution Entropy and Centroid Difference of Bit-Plane. IWDW 2010: 29-44 - [c4]Liang Zhao, Avishek Adhikari, Di Xiao, Kouichi Sakurai:
Cryptanalysis on an Image Scrambling Encryption Scheme Based on Pixel Bit. IWDW 2010: 45-59
2000 – 2009
- 2007
- [j2]Avishek Adhikari, Mausumi Bose, Dewesh Kumar, Bimal K. Roy:
Applications of Partially Balanced Incomplete Block Designs in Developing (2, n) Visual Cryptographic Schemes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(5): 949-951 (2007) - 2006
- [c3]Avishek Adhikari:
DNA Secret Sharing. IEEE Congress on Evolutionary Computation 2006: 1407-1411 - 2005
- [j1]Rita SahaRay, Avishek Adhikari, Jennifer Seberry:
Critical sets in orthogonal arrays with 7 and 9 levels. Australas. J Comb. 33: 109-124 (2005) - 2004
- [c2]Avishek Adhikari, Tridib Kumar Dutta, Bimal K. Roy:
A New Black and White Visual Cryptographic Scheme for General Access Structures. INDOCRYPT 2004: 399-413 - 2003
- [c1]Avishek Adhikari, Somnath Sikdar:
A New (2, n)-Visual Threshold Scheme for Color Images. INDOCRYPT 2003: 148-161
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:08 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint