BibTeX records: Sourav Sen Gupta

download as .bib file

@inproceedings{DBLP:conf/www/ZhaoGKL21,
  author    = {Lin Zhao and
               Sourav Sen Gupta and
               Arijit Khan and
               Robby Luo},
  editor    = {Jure Leskovec and
               Marko Grobelnik and
               Marc Najork and
               Jie Tang and
               Leila Zia},
  title     = {Temporal Analysis of the Entire Ethereum Blockchain Network},
  booktitle = {{WWW} '21: The Web Conference 2021, Virtual Event / Ljubljana, Slovenia,
               April 19-23, 2021},
  pages     = {2258--2269},
  publisher = {{ACM} / {IW3C2}},
  year      = {2021},
  url       = {https://doi.org/10.1145/3442381.3449916},
  doi       = {10.1145/3442381.3449916},
  timestamp = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/www/ZhaoGKL21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/LeeKGOL20,
  author    = {Xi Tong Lee and
               Arijit Khan and
               Sourav Sen Gupta and
               Yu Hann Ong and
               Xuan Liu},
  editor    = {Yennun Huang and
               Irwin King and
               Tie{-}Yan Liu and
               Maarten van Steen},
  title     = {Measurements, Analyses, and Insights on the Entire Ethereum Blockchain
               Network},
  booktitle = {{WWW} '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020},
  pages     = {155--166},
  publisher = {{ACM} / {IW3C2}},
  year      = {2020},
  url       = {https://doi.org/10.1145/3366423.3380103},
  doi       = {10.1145/3366423.3380103},
  timestamp = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/www/LeeKGOL20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mam/RaviNBKGC19,
  author    = {Prasanna Ravi and
               Zakaria Najm and
               Shivam Bhasin and
               Mustafa Khairallah and
               Sourav Sen Gupta and
               Anupam Chattopadhyay},
  title     = {Security is an architectural design constraint},
  journal   = {Microprocess. Microsystems},
  volume    = {68},
  pages     = {17--27},
  year      = {2019},
  url       = {https://doi.org/10.1016/j.micpro.2019.03.003},
  doi       = {10.1016/j.micpro.2019.03.003},
  timestamp = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/mam/RaviNBKGC19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/JhaMNG19,
  author    = {Ashwin Jha and
               Cuauhtemoc Mancillas{-}L{\'{o}}pez and
               Mridul Nandi and
               Sourav Sen Gupta},
  title     = {On Random Read Access in {OCB}},
  journal   = {{IEEE} Trans. Inf. Theory},
  volume    = {65},
  number    = {12},
  pages     = {8325--8344},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIT.2019.2925613},
  doi       = {10.1109/TIT.2019.2925613},
  timestamp = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tit/JhaMNG19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/RaviGCB19,
  author    = {Prasanna Ravi and
               Sourav Sen Gupta and
               Anupam Chattopadhyay and
               Shivam Bhasin},
  editor    = {Sonia Bela{\"{\i}}d and
               Tim G{\"{u}}neysu},
  title     = {Improving Speed of Dilithium's Signing Procedure},
  booktitle = {Smart Card Research and Advanced Applications - 18th International
               Conference, {CARDIS} 2019, Prague, Czech Republic, November 11-13,
               2019, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {11833},
  pages     = {57--73},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-42068-0\_4},
  doi       = {10.1007/978-3-030-42068-0\_4},
  timestamp = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/cardis/RaviGCB19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcnn/ChattopadhyayCG19,
  author    = {Nandish Chattopadhyay and
               Anupam Chattopadhyay and
               Sourav Sen Gupta and
               Michael Kasper},
  title     = {Curse of Dimensionality in Adversarial Examples},
  booktitle = {International Joint Conference on Neural Networks, {IJCNN} 2019 Budapest,
               Hungary, July 14-19, 2019},
  pages     = {1--8},
  publisher = {{IEEE}},
  year      = {2019},
  url       = {https://doi.org/10.1109/IJCNN.2019.8851795},
  doi       = {10.1109/IJCNN.2019.8851795},
  timestamp = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/ijcnn/ChattopadhyayCG19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/indocrypt/2019,
  editor    = {Feng Hao and
               Sushmita Ruj and
               Sourav Sen Gupta},
  title     = {Progress in Cryptology - {INDOCRYPT} 2019 - 20th International Conference
               on Cryptology in India, Hyderabad, India, December 15-18, 2019, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11898},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-35423-7},
  doi       = {10.1007/978-3-030-35423-7},
  isbn      = {978-3-030-35422-0},
  timestamp = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/indocrypt/2019.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RaviGCKNB19,
  author    = {Prasanna Ravi and
               Sourav Sen Gupta and
               Anupam Chattopadhyay and
               Mustafa Khairallah and
               Zakaria Najm and
               Shivam Bhasin},
  title     = {Security is an Architectural Design Constraint},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2019},
  pages     = {182},
  year      = {2019},
  url       = {https://eprint.iacr.org/2019/182},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/RaviGCKNB19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RaviGCB19,
  author    = {Prasanna Ravi and
               Sourav Sen Gupta and
               Anupam Chattopadhyay and
               Shivam Bhasin},
  title     = {Improving Speed of Dilithium's Signing Procedure},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2019},
  pages     = {420},
  year      = {2019},
  url       = {https://eprint.iacr.org/2019/420},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/RaviGCB19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apccas/MitraBGC18,
  author    = {Sananda Mitra and
               Sumanta Bose and
               Sourav Sen Gupta and
               Anupam Chattopadhyay},
  title     = {Secure and Tamper-resilient Distributed Ledger for Data Aggregation
               in Autonomous Vehicles},
  booktitle = {2018 {IEEE} Asia Pacific Conference on Circuits and Systems, {APCCAS}
               2018, Chengdu, China, October 26-30, 2018},
  pages     = {548--551},
  publisher = {{IEEE}},
  year      = {2018},
  url       = {https://doi.org/10.1109/APCCAS.2018.8605625},
  doi       = {10.1109/APCCAS.2018.8605625},
  timestamp = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/apccas/MitraBGC18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ntms/RaikwarMRGCL18,
  author    = {Mayank Raikwar and
               Subhra Mazumdar and
               Sushmita Ruj and
               Sourav Sen Gupta and
               Anupam Chattopadhyay and
               Kwok{-}Yan Lam},
  title     = {A Blockchain Framework for Insurance Processes},
  booktitle = {9th {IFIP} International Conference on New Technologies, Mobility
               and Security, {NTMS} 2018, Paris, France, February 26-28, 2018},
  pages     = {1--4},
  publisher = {{IEEE}},
  year      = {2018},
  url       = {https://doi.org/10.1109/NTMS.2018.8328731},
  doi       = {10.1109/NTMS.2018.8328731},
  timestamp = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/ntms/RaikwarMRGCL18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1811-06632,
  author    = {Wesley Joon{-}Wie Tann and
               Xing Jie Han and
               Sourav Sen Gupta and
               Yew{-}Soon Ong},
  title     = {Towards Safer Smart Contracts: {A} Sequence Learning Approach to Detecting
               Vulnerabilities},
  journal   = {CoRR},
  volume    = {abs/1811.06632},
  year      = {2018},
  url       = {http://arxiv.org/abs/1811.06632},
  archivePrefix = {arXiv},
  eprint    = {1811.06632},
  timestamp = {Fri, 08 Feb 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/corr/abs-1811-06632.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/KumarRSG17,
  author    = {Vineet Kumar and
               Aneek Roy and
               Sourya Sengupta and
               Sourav Sen Gupta},
  editor    = {Rudrapatna K. Shyamasundar and
               Virendra Singh and
               Jaideep Vaidya},
  title     = {Parallelized Common Factor Attack on {RSA}},
  booktitle = {Information Systems Security - 13th International Conference, {ICISS}
               2017, Mumbai, India, December 16-20, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10717},
  pages     = {303--312},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-72598-7\_18},
  doi       = {10.1007/978-3-319-72598-7\_18},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/KumarRSG17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SarkarGPM15,
  author    = {Santanu Sarkar and
               Sourav Sen Gupta and
               Goutam Paul and
               Subhamoy Maitra},
  title     = {Proving TLS-attack related open biases of {RC4}},
  journal   = {Des. Codes Cryptogr.},
  volume    = {77},
  number    = {1},
  pages     = {231--253},
  year      = {2015},
  url       = {https://doi.org/10.1007/s10623-014-0003-0},
  doi       = {10.1007/s10623-014-0003-0},
  timestamp = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dcc/SarkarGPM15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/GuptaMPS14,
  author    = {Sourav Sen Gupta and
               Subhamoy Maitra and
               Goutam Paul and
               Santanu Sarkar},
  title     = {(Non-)Random Sequences from (Non-)Random Permutations - Analysis of
               {RC4} Stream Cipher},
  journal   = {J. Cryptol.},
  volume    = {27},
  number    = {1},
  pages     = {67--108},
  year      = {2014},
  url       = {https://doi.org/10.1007/s00145-012-9138-1},
  doi       = {10.1007/s00145-012-9138-1},
  timestamp = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/joc/GuptaMPS14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/GuptaMMPS14,
  author    = {Sourav Sen Gupta and
               Subhamoy Maitra and
               Willi Meier and
               Goutam Paul and
               Santanu Sarkar},
  editor    = {Carlos Cid and
               Christian Rechberger},
  title     = {Dependence in IV-Related Bytes of {RC4} Key Enhances Vulnerabilities
               in {WPA}},
  booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
               London, UK, March 3-5, 2014. Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8540},
  pages     = {350--369},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-662-46706-0\_18},
  doi       = {10.1007/978-3-662-46706-0\_18},
  timestamp = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/fse/GuptaMMPS14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/GuptaCK13,
  author    = {Sourav Sen Gupta and
               Anupam Chattopadhyay and
               Ayesha Khalid},
  title     = {Designing integrated accelerator for stream ciphers with structural
               similarities},
  journal   = {Cryptogr. Commun.},
  volume    = {5},
  number    = {1},
  pages     = {19--47},
  year      = {2013},
  url       = {https://doi.org/10.1007/s12095-012-0074-6},
  doi       = {10.1007/s12095-012-0074-6},
  timestamp = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ccds/GuptaCK13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/int/StanicaSGMK13,
  author    = {Pantelimon Stanica and
               Santanu Sarkar and
               Sourav Sen Gupta and
               Subhamoy Maitra and
               Nirupam Kar},
  title     = {Counting Heron triangles with Constraints},
  journal   = {Integers},
  volume    = {13},
  pages     = {A3},
  year      = {2013},
  url       = {http://math.colgate.edu/\%7Eintegers/n3/n3.Abstract.html},
  timestamp = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/int/StanicaSGMK13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/GuptaCSMS13,
  author    = {Sourav Sen Gupta and
               Anupam Chattopadhyay and
               Koushik Sinha and
               Subhamoy Maitra and
               Bhabani P. Sinha},
  title     = {High-Performance Hardware Implementation for {RC4} Stream Cipher},
  journal   = {{IEEE} Trans. Computers},
  volume    = {62},
  number    = {4},
  pages     = {730--743},
  year      = {2013},
  url       = {https://doi.org/10.1109/TC.2012.19},
  doi       = {10.1109/TC.2012.19},
  timestamp = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tc/GuptaCSMS13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/KumarJGU13,
  author    = {Sheethal Kumar and
               Pai B. J. Jaipal and
               Sourav Sen Gupta and
               Vigesh R. Ungrapalli},
  editor    = {Aditya Bagchi and
               Indrakshi Ray},
  title     = {Traitor-Traceable Key Pre-distribution Based on Visual Secret Sharing},
  booktitle = {Information Systems Security - 9th International Conference, {ICISS}
               2013, Kolkata, India, December 16-20, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8303},
  pages     = {199--213},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-45204-8\_15},
  doi       = {10.1007/978-3-642-45204-8\_15},
  timestamp = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/KumarJGU13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/MaitraG13,
  author    = {Subhamoy Maitra and
               Sourav Sen Gupta},
  editor    = {Aditya Bagchi and
               Indrakshi Ray},
  title     = {New Long-Term Glimpse of {RC4} Stream Cipher},
  booktitle = {Information Systems Security - 9th International Conference, {ICISS}
               2013, Kolkata, India, December 16-20, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8303},
  pages     = {230--238},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-45204-8\_17},
  doi       = {10.1007/978-3-642-45204-8\_17},
  timestamp = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/MaitraG13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SarkarGM13,
  author    = {Santanu Sarkar and
               Sourav Sen Gupta and
               Subhamoy Maitra},
  editor    = {Aditya Bagchi and
               Indrakshi Ray},
  title     = {Error Correction of Partially Exposed {RSA} Private Keys from {MSB}
               Side},
  booktitle = {Information Systems Security - 9th International Conference, {ICISS}
               2013, Kolkata, India, December 16-20, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8303},
  pages     = {345--359},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-45204-8\_26},
  doi       = {10.1007/978-3-642-45204-8\_26},
  timestamp = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/iciss/SarkarGM13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuptaMM13,
  author    = {Sourav Sen Gupta and
               Subhamoy Maitra and
               Willi Meier},
  title     = {Distinguishing {WPA}},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2013},
  pages     = {476},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/476},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/GuptaMM13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SarkarGPM13,
  author    = {Santanu Sarkar and
               Sourav Sen Gupta and
               Goutam Paul and
               Subhamoy Maitra},
  title     = {Proving TLS-attack related open biases of {RC4}},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2013},
  pages     = {502},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/502},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/SarkarGPM13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuptaCK12,
  author    = {Sourav Sen Gupta and
               Anupam Chattopadhyay and
               Ayesha Khalid},
  title     = {Designing Integrated Accelerator for Stream Ciphers with Structural
               Similarities},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2012},
  pages     = {48},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/048},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/GuptaCK12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/MaitraPS11,
  author    = {Subhamoy Maitra and
               Goutam Paul and
               Sourav Sen Gupta},
  editor    = {Antoine Joux},
  title     = {Attack on Broadcast {RC4} Revisited},
  booktitle = {Fast Software Encryption - 18th International Workshop, {FSE} 2011,
               Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6733},
  pages     = {199--217},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-21702-9\_12},
  doi       = {10.1007/978-3-642-21702-9\_12},
  timestamp = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/fse/MaitraPS11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/GuptaCK11,
  author    = {Sourav Sen Gupta and
               Anupam Chattopadhyay and
               Ayesha Khalid},
  editor    = {Daniel J. Bernstein and
               Sanjit Chatterjee},
  title     = {HiPAcc-LTE: An Integrated High Performance Accelerator for 3GPP {LTE}
               Stream Ciphers},
  booktitle = {Progress in Cryptology - {INDOCRYPT} 2011 - 12th International Conference
               on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7107},
  pages     = {196--215},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-25578-6\_16},
  doi       = {10.1007/978-3-642-25578-6\_16},
  timestamp = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/indocrypt/GuptaCK11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/GuptaMPS11,
  author    = {Sourav Sen Gupta and
               Subhamoy Maitra and
               Goutam Paul and
               Santanu Sarkar},
  editor    = {Ali Miri and
               Serge Vaudenay},
  title     = {Proof of Empirical {RC4} Biases and New Key Correlations},
  booktitle = {Selected Areas in Cryptography - 18th International Workshop, {SAC}
               2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {7118},
  pages     = {151--168},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-28496-0\_9},
  doi       = {10.1007/978-3-642-28496-0\_9},
  timestamp = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/sacrypt/GuptaMPS11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1111-0094,
  author    = {Manosij Ghosh Dastidar and
               Sourav Sen Gupta},
  title     = {Generalization of a few results in Integer Partitions},
  journal   = {CoRR},
  volume    = {abs/1111.0094},
  year      = {2011},
  url       = {http://arxiv.org/abs/1111.0094},
  archivePrefix = {arXiv},
  eprint    = {1111.0094},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/corr/abs-1111-0094.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SenguptaMPS11,
  author    = {Sourav Sen Gupta and
               Subhamoy Maitra and
               Goutam Paul and
               Santanu Sarkar},
  title     = {{RC4:} (Non-)Random Words from (Non-)Random Permutations},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2011},
  pages     = {448},
  year      = {2011},
  url       = {http://eprint.iacr.org/2011/448},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/SenguptaMPS11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/MaitraSG10,
  author    = {Subhamoy Maitra and
               Santanu Sarkar and
               Sourav Sen Gupta},
  editor    = {Daniel J. Bernstein and
               Tanja Lange},
  title     = {Factoring {RSA} Modulus Using Prime Reconstruction from Random Known
               Bits},
  booktitle = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference
               on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010.
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6055},
  pages     = {82--99},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-12678-9\_6},
  doi       = {10.1007/978-3-642-12678-9\_6},
  timestamp = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/africacrypt/MaitraSG10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/SarkarSM10,
  author    = {Santanu Sarkar and
               Sourav Sen Gupta and
               Subhamoy Maitra},
  editor    = {Guang Gong and
               Kishan Chand Gupta},
  title     = {Partial Key Exposure Attack on {RSA} - Improvements for Limited Lattice
               Dimensions},
  booktitle = {Progress in Cryptology - {INDOCRYPT} 2010 - 11th International Conference
               on Cryptology in India, Hyderabad, India, December 12-15, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6498},
  pages     = {2--16},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-17401-8\_2},
  doi       = {10.1007/978-3-642-17401-8\_2},
  timestamp = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/indocrypt/SarkarSM10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/SenguptaSMS10,
  author    = {Sourav Sen Gupta and
               Koushik Sinha and
               Subhamoy Maitra and
               Bhabani P. Sinha},
  editor    = {Guang Gong and
               Kishan Chand Gupta},
  title     = {One Byte per Clock: {A} Novel {RC4} Hardware},
  booktitle = {Progress in Cryptology - {INDOCRYPT} 2010 - 11th International Conference
               on Cryptology in India, Hyderabad, India, December 12-15, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6498},
  pages     = {347--363},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-17401-8\_24},
  doi       = {10.1007/978-3-642-17401-8\_24},
  timestamp = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/indocrypt/SenguptaSMS10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/MaitraSS10,
  author    = {Subhamoy Maitra and
               Santanu Sarkar and
               Sourav Sen Gupta},
  editor    = {Isao Echizen and
               Noboru Kunihiro and
               Ry{\^{o}}ichi Sasaki},
  title     = {Publishing Upper Half of {RSA} Decryption Exponent},
  booktitle = {Advances in Information and Computer Security - 5th International
               Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6434},
  pages     = {25--39},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-16825-3\_3},
  doi       = {10.1007/978-3-642-16825-3\_3},
  timestamp = {Mon, 15 Jun 2020 17:00:57 +0200},
  biburl    = {https://dblp.org/rec/conf/iwsec/MaitraSS10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics