default search action
Sourav Mukhopadhyay
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j44]Ramprasad Sarkar, Mriganka Mandal, Sourav Mukhopadhyay:
Quantum-safe identity-based broadcast encryption with provable security from multivariate cryptography. Adv. Math. Commun. 18(3): 814-827 (2024) - [j43]Amit Kumar Singh, Kamalesh Acharya, Sourav Mukhopadhyay:
Post-quantum secure recipient revocable broadcast encryption supporting anonymity. Multim. Tools Appl. 83(2): 4519-4531 (2024) - [j42]Anushree Belel, Ratna Dutta, Sourav Mukhopadhyay:
Key-homomorphic and revocable ciphertext-policy attribute based key encapsulation mechanism for multimedia applications. Multim. Tools Appl. 83(33): 78827-78859 (2024) - [j41]Jayaprakash Kar, Sourav Mukhopadhyay, Kshirasagar Naik:
SL-PPCP: Secure and Low-Cost Privacy-Preserving Communication Protocol for Vehicular Ad Hoc Networks. IEEE Trans. Veh. Technol. 73(6): 8942-8956 (2024) - [i24]Tapaswini Mohanty, Vikas Srivastava, Sumit Kumar Debnath, Debasish Roy, Kouichi Sakurai, Sourav Mukhopadhyay:
An Experimentally Validated Feasible Quantum Protocol for Identity-Based Signature with Application to Secure Email Communication. CoRR abs/2403.18247 (2024) - 2023
- [j40]Anushree Belel, Ratna Dutta, Sourav Mukhopadhyay:
Communication-friendly threshold trapdoor function from weaker assumption for distributed cryptography. Ann. des Télécommunications 78(3-4): 221-233 (2023) - [j39]Kamalesh Acharya, Amit Kumar Singh, Sourav Mukhopadhyay:
Constructions of broadcast encryption with personalized messages from bilinear map. Comput. Commun. 209: 91-101 (2023) - [j38]Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay:
Short attribute-based signatures for arbitrary Turing machines from standard assumptions. Des. Codes Cryptogr. 91(5): 1845-1872 (2023) - [c52]Anushree Belel, Ratna Dutta, Sourav Mukhopadhyay:
Hierarchical Identity-Based Inner Product Functional Encryption for Unbounded Hierarchical Depth. SSS 2023: 274-288 - 2022
- [c51]Anushree Belel, Ratna Dutta, Sourav Mukhopadhyay:
Hierarchical Identity Based Inner Product Functional Encryption for Privacy Preserving Statistical Analysis Without q-type Assumption. EISA 2022: 108-125 - [c50]Subhranil Dutta, Ratna Dutta, Sourav Mukhopadhyay:
Constructing Pairing Free Unbounded Inner Product Functional Encryption Schemes with Unbounded Inner Product Policy. SecITC 2022: 102-116 - [c49]Anushree Belel, Ratna Dutta, Sourav Mukhopadhyay:
Key Encapsulation Mechanism in Ciphertext-policy Attribute based Setting Featuring Revocation and Key-homomorphic Property. SECRYPT 2022: 349-356 - [i23]Subhranil Dutta, Tapas Pal, Amit Kumar Singh, Sourav Mukhopadhyay:
Embedded Identity Traceable Identity-Based IPFE from Pairings and Lattices. IACR Cryptol. ePrint Arch. 2022: 1196 (2022) - 2021
- [j37]Meenakshi Kansal, Ratna Dutta, Sourav Mukhopadhyay:
Lattice-based nominative signature using pseudorandom function. IET Inf. Secur. 15(4): 317-332 (2021) - [j36]Saurabh Rana, Dheerendra Mishra, Sourav Mukhopadhyay:
Blockchain-based multimedia content distribution with the assured system update mechanism. Multim. Tools Appl. 80(19): 29423-29436 (2021) - [j35]Saurabh Rana, Mohammad S. Obaidat, Dheerendra Mishra, Sourav Mukhopadhyay, Balqies Sadoun:
Computational Efficient Authenticated Digital Content Distribution Frameworks for DRM Systems: Review and Outlook. IEEE Syst. J. 15(2): 1586-1593 (2021) - [c48]Ravi Anand, Arpita Maitra, Subhamoy Maitra, Chandra Sekhar Mukherjee, Sourav Mukhopadhyay:
Quantum Resource Estimation for FSR Based Symmetric Ciphers and Related Grover's Attacks. INDOCRYPT 2021: 179-198 - 2020
- [j34]Meenakshi Kansal, Ratna Dutta, Sourav Mukhopadhyay:
Group signature from lattices preserving forward security in dynamic setting. Adv. Math. Commun. 14(4): 535-553 (2020) - [j33]Sarbani Roy, Sourav Mukhopadhyay:
(t, n) Threshold d-level QSS based on QFT. Quantum Inf. Comput. 20(11&12): 957-968 (2020) - [j32]Ravi Anand, Arpita Maitra, Sourav Mukhopadhyay:
Grover on $\, SIMON\, $. Quantum Inf. Process. 19(9): 340 (2020) - [c47]Ravi Anand, Arpita Maitra, Sourav Mukhopadhyay:
Evaluation of Quantum Cryptanalysis on SPECK. INDOCRYPT 2020: 395-413 - [i22]Ravi Anand, Subhamoy Maitra, Arpita Maitra, Chandra Sekhar Mukherjee, Sourav Mukhopadhyay:
Resource Estimation of Grovers-kind Quantum Cryptanalysis against FSR based Symmetric Ciphers. IACR Cryptol. ePrint Arch. 2020: 1438 (2020)
2010 – 2019
- 2019
- [j31]Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay:
Constrained Pseudorandom Functions for Turing Machines Revisited: How to Achieve Verifiability and Key Delegation. Algorithmica 81(9): 3245-3390 (2019) - [j30]Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay:
Succinct Predicate and Online-Offline Multi-Input Inner Product Encryptions under Standard Static Assumptions. J. Inf. Secur. Appl. 48 (2019) - [j29]Jangirala Srinivas, Dheerendra Mishra, Sourav Mukhopadhyay, Saru Kumari, Vandana Guleria:
An Authentication Framework for Roaming Service in Global Mobility Networks. Inf. Technol. Control. 48(1): 129-145 (2019) - [c46]Meenakshi Kansal, Ratna Dutta, Sourav Mukhopadhyay:
Construction for a Nominative Signature Scheme from Lattice with Enhanced Security. C2SI 2019: 72-91 - [i21]Meenakshi Kansal, Ratna Dutta, Sourav Mukhopadhyay:
Efficient Construction of Nominative Signature Secure under Symmetric Key Primitives and Standard Assumptions on Lattice. IACR Cryptol. ePrint Arch. 2019: 1232 (2019) - 2018
- [j28]Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay:
Functional Signcryption. J. Inf. Secur. Appl. 42: 118-134 (2018) - [j27]Jangirala Srinivas, Dheerendra Mishra, Sourav Mukhopadhyay, Saru Kumari:
Provably secure biometric based authentication and key agreement protocol for wireless sensor networks. J. Ambient Intell. Humaniz. Comput. 9(4): 875-895 (2018) - [c45]Ravi Anand, Akhilesh Siddhanti, Subhamoy Maitra, Sourav Mukhopadhyay:
Differential Fault Attack on SIMON with Very Few Faults. INDOCRYPT 2018: 107-119 - 2017
- [j26]Jangirala Srinivas, Sourav Mukhopadhyay, Dheerendra Mishra:
Secure and efficient user authentication scheme for multi-gateway wireless sensor networks. Ad Hoc Networks 54: 147-169 (2017) - [j25]Dheerendra Mishra, Saru Kumari, Muhammad Khurram Khan, Sourav Mukhopadhyay:
An anonymous biometric-based remote user-authenticated key agreement scheme for multimedia systems. Int. J. Commun. Syst. 30(1) (2017) - [j24]Ankita Chaturvedi, Dheerendra Mishra, Srinivas Jangirala, Sourav Mukhopadhyay:
A privacy preserving biometric-based three-factor remote user authenticated key agreement scheme. J. Inf. Secur. Appl. 32: 15-26 (2017) - [j23]Ankita Chaturvedi, Dheerendra Mishra, Sourav Mukhopadhyay:
An enhanced dynamic ID-based authentication scheme for telecare medical information systems. J. King Saud Univ. Comput. Inf. Sci. 29(1): 54-62 (2017) - [j22]Jangirala Srinivas, Dheerendra Mishra, Sourav Mukhopadhyay:
A Mutual Authentication Framework for Wireless Medical Sensor Networks. J. Medical Syst. 41(5): 80:1-80:19 (2017) - [j21]Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay:
Strongly full-hiding inner product encryption. Theor. Comput. Sci. 667: 16-50 (2017) - [j20]Srinivas Jangirala, Sourav Mukhopadhyay, Ashok Kumar Das:
A Multi-server Environment with Secure and Efficient Remote User Authentication Scheme Based on Dynamic ID Using Smart Cards. Wirel. Pers. Commun. 95(3): 2735-2767 (2017) - [j19]Jangirala Srinivas, Sourav Mukhopadhyay, Dheerendra Mishra:
A Self-Verifiable Password Based Authentication Scheme for Multi-Server Architecture Using Smart Card. Wirel. Pers. Commun. 96(4): 6273-6297 (2017) - [c44]Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay:
Constrained Pseudorandom Functions for Unconstrained Inputs Revisited: Achieving Verifiability and Key Delegation. Public Key Cryptography (2) 2017: 463-493 - [i20]Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay:
Attribute-Based Signatures for Turing Machines. IACR Cryptol. ePrint Arch. 2017: 801 (2017) - [i19]Meenakshi Kansal, Ratna Dutta, Sourav Mukhopadhyay:
Forward Secure Efficient Group Signature in Dynamic Setting using Lattices. IACR Cryptol. ePrint Arch. 2017: 1128 (2017) - 2016
- [j18]Ankita Chaturvedi, Ashok Kumar Das, Dheerendra Mishra, Sourav Mukhopadhyay:
Design of a secure smart card-based multi-server authentication scheme. J. Inf. Secur. Appl. 30: 64-80 (2016) - [j17]Dheerendra Mishra, Ashok Kumar Das, Sourav Mukhopadhyay:
A secure and efficient ECC-based user anonymity-preserving session initiation authentication protocol using smart card. Peer-to-Peer Netw. Appl. 9(1): 171-192 (2016) - [j16]Dheerendra Mishra, Ashok Kumar Das, Sourav Mukhopadhyay:
An anonymous and secure biometric-based enterprise digital rights management system for mobile environment. Secur. Commun. Networks 9(16): 3762 (2016) - [j15]Dheerendra Mishra, Ashok Kumar Das, Sourav Mukhopadhyay, Mohammad Wazid:
A Secure and Robust Smartcard-Based Authentication Scheme for Session Initiation Protocol Using Elliptic Curve Cryptography. Wirel. Pers. Commun. 91(3): 1361-1391 (2016) - [c43]Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay:
Adaptively Secure Unrestricted Attribute-Based Encryption with Subset Difference Revocation in Bilinear Groups of Prime Order. AFRICACRYPT 2016: 325-345 - [c42]Srinivas Jangirala, Dheerendra Mishra, Sourav Mukhopadhyay:
Secure Lightweight User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for the Internet of Things Environment. ICISS 2016: 45-65 - [c41]Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay:
Functional Encryption for Inner Product with Full Function Privacy. Public Key Cryptography (1) 2016: 164-195 - [i18]Dibyendu Roy, Sourav Mukhopadhyay:
Fault analysis and weak key-IV attack on Sprout. IACR Cryptol. ePrint Arch. 2016: 207 (2016) - [i17]Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay:
Verifiable and Delegatable Constrained Pseudorandom Functions for Unconstrained Inputs. IACR Cryptol. ePrint Arch. 2016: 784 (2016) - [i16]Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay:
Succinct Predicate and Online-Offline Multi-Input Inner Product Encryptions under Standard Static Assumptions. IACR Cryptol. ePrint Arch. 2016: 904 (2016) - [i15]Dibyendu Roy, Sourav Mukhopadhyay:
Some results on ACORN. IACR Cryptol. ePrint Arch. 2016: 1132 (2016) - 2015
- [j14]Dheerendra Mishra, Ankita Chaturvedi, Sourav Mukhopadhyay:
An improved biometric-based remote user authentication scheme for connected healthcare. Int. J. Ad Hoc Ubiquitous Comput. 18(1/2): 75-84 (2015) - [j13]Dheerendra Mishra, Ashok Kumar Das, Ankita Chaturvedi, Sourav Mukhopadhyay:
A secure password-based authentication and key agreement scheme using smart cards. J. Inf. Secur. Appl. 23: 28-43 (2015) - [j12]Dheerendra Mishra, Ankita Chaturvedi, Sourav Mukhopadhyay:
Design of a lightweight two-factor authentication scheme with smart card revocation. J. Inf. Secur. Appl. 23: 44-53 (2015) - [j11]Ashok Kumar Das, Dheerendra Mishra, Sourav Mukhopadhyay:
An anonymous and secure biometric-based enterprise digital rights management system for mobile environment. Secur. Commun. Networks 8(18): 3383-3404 (2015) - [c40]Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay:
Compact Attribute-Based Encryption and Signcryption for General Circuits from Multilinear Maps. INDOCRYPT 2015: 3-24 - [c39]Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay:
Fully Secure Online/Offline Predicate and Attribute-Based Encryption. ISPEC 2015: 331-345 - [c38]Dibyendu Roy, Ankita Chaturvedi, Sourav Mukhopadhyay:
New Constructions of T-function. ISPEC 2015: 395-405 - [c37]Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay:
General Circuit Realizing Compact Revocable Attribute-Based Encryption from Multilinear Maps. ISC 2015: 336-354 - [c36]Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay:
Functional Signcryption: Notion, Construction, and Applications. ProvSec 2015: 268-288 - [i14]Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay:
Fully Secure Unbounded Revocable Attribute-Based Encryption in Prime Order Bilinear Groups via Subset Difference Method. IACR Cryptol. ePrint Arch. 2015: 293 (2015) - [i13]Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay:
General Circuit Realizing Compact Revocable Attribute-Based Encryption from Multilinear Maps. IACR Cryptol. ePrint Arch. 2015: 884 (2015) - [i12]Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay:
Functional Signcryption: Notion, Construction, and Applications. IACR Cryptol. ePrint Arch. 2015: 913 (2015) - [i11]Dibyendu Roy, Sourav Mukhopadhyay:
Fault Analysis on the Stream Ciphers LILI-128 and Achterbahn. IACR Cryptol. ePrint Arch. 2015: 1077 (2015) - [i10]Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay:
Compact Attribute-Based Encryption and Signcryption for General Circuits from Multilinear Maps. IACR Cryptol. ePrint Arch. 2015: 1188 (2015) - [i9]Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay:
Functional Encryption for Inner Product with Full Function Privacy. IACR Cryptol. ePrint Arch. 2015: 1255 (2015) - 2014
- [j10]Dheerendra Mishra, Ashok Kumar Das, Sourav Mukhopadhyay:
A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards. Expert Syst. Appl. 41(18): 8129-8143 (2014) - [j9]Dheerendra Mishra, Sourav Mukhopadhyay:
A privacy enabling content distribution framework for digital rights management. Int. J. Trust. Manag. Comput. Commun. 2(1): 22-39 (2014) - [j8]Sarbari Mitra, Ratna Dutta, Sourav Mukhopadhyay:
A deterministic key pre-distribution scheme for WSN using projective planes and their complements. Int. J. Trust. Manag. Comput. Commun. 2(2): 150-184 (2014) - [j7]Sarbari Mitra, Sourav Mukhopadhyay, Ratna Dutta:
A group-based deterministic key pre-distribution scheme for wireless sensor network. Int. J. Wirel. Mob. Comput. 7(5): 435-447 (2014) - [j6]Dheerendra Mishra, Sourav Mukhopadhyay, Saru Kumari, Muhammad Khurram Khan, Ankita Chaturvedi:
Security Enhancement of a Biometric based Authentication Scheme for Telecare Medicine Information Systems with Nonce. J. Medical Syst. 38(5): 41 (2014) - [j5]Dheerendra Mishra, Sourav Mukhopadhyay, Ankita Chaturvedi, Saru Kumari, Muhammad Khurram Khan:
Cryptanalysis and Improvement of Yan et al.'s Biometric-Based Authentication Scheme for Telecare Medicine Information Systems. J. Medical Syst. 38(6): 24 (2014) - [j4]Dheerendra Mishra, Jangirala Srinivas, Sourav Mukhopadhyay:
A Secure and Efficient Chaotic Map-Based Authenticated Key Agreement Scheme for Telecare Medicine Information Systems. J. Medical Syst. 38(10): 120 (2014) - [c35]Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay:
Universally Composable Efficient Priced Oblivious Transfer from a Flexible Membership Encryption. ACISP 2014: 98-114 - [c34]Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay:
Fully Secure Self-Updatable Encryption in Prime Order Bilinear Groups. ISC 2014: 1-18 - [c33]Pratish Datta, Dibyendu Roy, Sourav Mukhopadhyay:
A Probabilistic Algebraic Attack on the Grain Family of Stream Ciphers. NSS 2014: 558-565 - [c32]Dheerendra Mishra, Sourav Mukhopadhyay:
Cryptanalysis of Two Authentication Scheme for DRM System. SNDS 2014: 184-191 - [c31]Dibyendu Roy, Pratish Datta, Sourav Mukhopadhyay:
A New Variant of Algebraic Attack. SNDS 2014: 211-222 - [c30]Dheerendra Mishra, Sourav Mukhopadhyay:
Cryptanalysis of Yang et al.'s Digital Rights Management Authentication Scheme Based on Smart Card. SNDS 2014: 288-297 - [i8]Pratish Datta, Dibyendu Roy, Sourav Mukhopadhyay:
A Probabilistic Algebraic Attack on the Grain Family of Stream Cipher. IACR Cryptol. ePrint Arch. 2014: 510 (2014) - [i7]Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay:
Universally Composable Efficient Priced Oblivious Transfer from a Flexible Membership Encryption. IACR Cryptol. ePrint Arch. 2014: 584 (2014) - [i6]Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay:
Fully Secure Self-Updatable Encryption in Prime Order Bilinear Groups. IACR Cryptol. ePrint Arch. 2014: 940 (2014) - 2013
- [c29]Ankita Chaturvedi, Dheerendra Mishra, Sourav Mukhopadhyay:
Improved Biometric-Based Three-factor Remote User Authentication Scheme with Key Agreement Using Smart Card. ICISS 2013: 63-77 - [c28]Dheerendra Mishra, Sourav Mukhopadhyay:
Cryptanalysis of Pairing-Free Identity-Based Authenticated Key Agreement Protocols. ICISS 2013: 247-254 - [c27]Sarbari Mitra, Sourav Mukhopadhyay, Ratna Dutta:
Unconditionally Secure Fully Connected Key Establishment Using Deployment Knowledge. ICT-EurAsia 2013: 496-501 - [c26]Dheerendra Mishra, Sourav Mukhopadhyay:
Secure Content Delivery in DRM System with Consumer Privacy. ISPEC 2013: 321-335 - [c25]Dheerendra Mishra, Vinod Kumar, Sourav Mukhopadhyay:
A Pairing-Free Identity Based Authentication Framework for Cloud Computing. NSS 2013: 721-727 - [c24]Sarbari Mitra, Sourav Mukhopadhyay:
Key Pre-distribution in a Non-uniform Network Using Combinatorial Design. QSHINE 2013: 155-170 - [c23]Dheerendra Mishra, Sourav Mukhopadhyay:
A Certificateless Authenticated Key Agreement Protocol for Digital Rights Management System. QSHINE 2013: 568-577 - [i5]Dheerendra Mishra, Sourav Mukhopadhyay:
Cryptanalysis of Wu and Xu's authentication scheme for Telecare Medicine Information Systems. CoRR abs/1309.5255 (2013) - [i4]Dheerendra Mishra, Ankita Chaturvedi, Sourav Mukhopadhyay:
Cryptanalysis and Improvement of Jiang et al.'s Smart Card Based Remote User Authentication Scheme. CoRR abs/1312.4793 (2013) - 2012
- [c22]Sarbari Mitra, Sourav Mukhopadhyay, Ratna Dutta:
A Flexible Deterministic Approach to Key Pre-distribution in Grid Based WSNs. ADHOCNETS 2012: 164-179 - [c21]Dheerendra Mishra, Sourav Mukhopadhyay:
Privacy rights management in multiparty multilevel DRM system. ICACCI 2012: 625-631 - [c20]Dheerendra Mishra, Sourav Mukhopadhyay:
Towards a Secure, Transparent and Privacy-Preserving DRM System. SNDS 2012: 304-313 - 2011
- [c19]Ratna Dutta, Dheerendra Mishra, Sourav Mukhopadhyay:
Vector Space Access Structure and ID Based Distributed DRM Key Management. ACC (4) 2011: 223-232 - [c18]Sarbari Mitra, Ratna Dutta, Sourav Mukhopadhyay:
A Hierarchical Deterministic Key Pre-distribution for WSN Using Projective Planes. ADHOCNETS 2011: 16-31 - [c17]Ratna Dutta, Dheerendra Mishra, Sourav Mukhopadhyay:
Access Policy Based Key Management in Multi-level Multi-distributor DRM Architecture. InfoSecHiComNet 2011: 57-71 - [c16]Sarbari Mitra, Ratna Dutta, Sourav Mukhopadhyay:
Towards a Deterministic Hierarchical Key Predistribution for WSN Using Complementary Fano Plane. SecureComm 2011: 373-388 - 2010
- [j3]Ratna Dutta, Sourav Mukhopadhyay, Martin Collier:
Computationally secure self-healing key distribution with revocation in wireless ad hoc networks. Ad Hoc Networks 8(6): 597-613 (2010) - [j2]Amitabha Chakrabarty, Martin Collier, Sourav Mukhopadhyay:
Adaptive Routing Strategy for Large Scale Rearrangeable Symmetric Networks. Int. J. Grid High Perform. Comput. 2(2): 53-63 (2010) - [c15]Amitabha Chakrabarty, Martin Collier, Sourav Mukhopadhyay:
Symmetric Rearrangeable Networks: Algorithms and Rearrangement Limits. ITNG 2010: 1274-1277
2000 – 2009
- 2009
- [j1]Sourav Mukhopadhyay, Palash Sarkar:
Hardware Architecture and Cost/time/data Trade-off for Generic Inversion of One-Way Function. Computación y Sistemas 12(3) (2009) - [c14]Amitabha Chakrabarty, Martin Collier, Sourav Mukhopadhyay:
Dynamic Path Selection Algorithm for Bene-Networks. CICSyN 2009: 23-28 - [c13]Ratna Dutta, Sourav Mukhopadhyay, Tom Dowling:
Generalized self-healing key distribution in wireless adhoc networks with trade-offs in user's pre-arranged life cycle and collusion resistance. Q2SWinet 2009: 80-87 - [c12]Ratna Dutta, Sourav Mukhopadhyay, Tom Dowling:
Enhanced Access Polynomial Based Self-healing Key Distribution. SEWCN 2009: 13-24 - 2008
- [c11]Ratna Dutta, Sourav Mukhopadhyay, Sabu Emmanuel:
Low Bandwidth Self-Healing Key Distribution for Broadcast Encryption. Asia International Conference on Modelling and Simulation 2008: 867-872 - [c10]Ratna Dutta, Sourav Mukhopadhyay, Amitabha Das, Sabu Emmanuel:
Generalized Self-healing Key Distribution Using Vector Space Access Structure. Networking 2008: 612-623 - 2007
- [c9]Ratna Dutta, Ee-Chien Chang, Sourav Mukhopadhyay:
Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains. ACNS 2007: 385-400 - [c8]Ratna Dutta, Yongdong Wu, Sourav Mukhopadhyay:
Constant Storage Self-Healing Key Distribution with Revocation in Wireless Sensor Network. ICC 2007: 1323-1328 - [c7]Ratna Dutta, Sourav Mukhopadhyay:
Designing Scalable Self-healing Key Distribution Schemes with Revocation Capability. ISPA 2007: 419-430 - [c6]Ratna Dutta, Sourav Mukhopadhyay:
Improved Self-Healing Key Distribution with Revocation in Wireless Sensor Network. WCNC 2007: 2963-2968 - 2006
- [c5]Sourav Mukhopadhyay, Palash Sarkar:
Application of LFSRs for Parallel Sequence Generation in Cryptologic Algorithms. ICCSA (3) 2006: 436-445 - [c4]Sourav Mukhopadhyay, Palash Sarkar:
Hardware architecture and trade-offs for generic inversion of one-way functions. ISCAS 2006 - [c3]Sourav Mukhopadhyay, Palash Sarkar:
On the Effectiveness of TMTO and Exhaustive Search Attacks. IWSEC 2006: 337-352 - [i3]Sourav Mukhopadhyay, Palash Sarkar:
Application of LFSRs for Parallel Sequence Generation in Cryptologic Algorithms. IACR Cryptol. ePrint Arch. 2006: 42 (2006) - [i2]Sourav Mukhopadhyay, Palash Sarkar:
A New Cryptanalytic Time/Memory/Data Trade-off Algorithm. IACR Cryptol. ePrint Arch. 2006: 127 (2006) - 2005
- [c2]Alex Biryukov, Sourav Mukhopadhyay, Palash Sarkar:
Improved Time-Memory Trade-Offs with Multiple Data. Selected Areas in Cryptography 2005: 110-127 - [c1]Sourav Mukhopadhyay, Palash Sarkar:
Application of LFSRs in Time/Memory Trade-Off Cryptanalysis. WISA 2005: 25-37 - [i1]Sourav Mukhopadhyay, Palash Sarkar:
TMTO With Multiple Data: Analysis and New Single Table Trade-offs. IACR Cryptol. ePrint Arch. 2005: 214 (2005)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-18 20:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint