


Остановите войну!
for scientists:


default search action
Goutam Paul 0001
Person information

- affiliation: Indian Statistical Institute, Cryptology and Security Research Unit, Kolkata, India
- affiliation (former): Jadavpur University, Department of Computer Science and Engineering, Kolkata, India
- affiliation (former): State University of New York, Albany, NY, USA
Other persons with the same name
- Goutam Paul 0002 — MCKV Institute of Engineering, West Bengal, India
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j43]Nayan Ranjan Das
, Subhrojit Ghosh, Imon Mukherjee
, Goutam Paul
:
Adoption of a ranking based indexing method for the cricket teams. Expert Syst. Appl. 213(Part): 118796 (2023) - [j42]Nayan Ranjan Das
, Imon Mukherjee, Anubhav D. Patel, Goutam Paul:
An intelligent clustering framework for substitute recommendation and player selection. J. Supercomput. 79(15): 16409-16441 (2023) - [i48]Nayana Das, Goutam Paul:
Device-Independent Quantum Secure Direct Communication with User Authentication. CoRR abs/2304.03201 (2023) - [i47]Amit Jana, Anup Kumar Kundu, Goutam Paul:
SDFA: Statistical-Differential Fault Attack on Linear Structured SBox-Based Ciphers. IACR Cryptol. ePrint Arch. 2023: 1018 (2023) - [i46]Amit Jana, Mostafizar Rahman, Dhiman Saha, Goutam Paul:
Switching the Top Slice of the Sandwich with Extra Filling Yields a Stronger Boomerang for NLFSR-based Block Ciphers. IACR Cryptol. ePrint Arch. 2023: 1543 (2023) - 2022
- [j41]Pratap Chandra Mandal, Imon Mukherjee
, Goutam Paul, B. N. Chatterji:
Digital image steganography: A literature survey. Inf. Sci. 609: 1451-1488 (2022) - [j40]Amit Jana, Anirban Nath, Goutam Paul
, Dhiman Saha:
Differential fault analysis of NORX using variants of coupon collector problem. J. Cryptogr. Eng. 12(4): 433-459 (2022) - [j39]Nayana Das, Goutam Paul
:
Measurement device-independent quantum secure direct communication with user authentication. Quantum Inf. Process. 21(7): 260 (2022) - [c45]Amit Jana, Goutam Paul:
Differential Fault Attack on PHOTON-Beetle. ASHES@CCS 2022: 25-34 - [i45]Mostafizar Rahman, Dhiman Saha, Goutam Paul:
Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos. IACR Cryptol. ePrint Arch. 2022: 25 (2022) - 2021
- [j38]Pritam Chattopadhyay
, Ayan Mitra
, Goutam Paul
, Vasilios Zarikas
:
Bound on Efficiency of Heat Engine from Uncertainty Relation Viewpoint. Entropy 23(4): 439 (2021) - [j37]Nabanita Mukherjee (Ganguly), Goutam Paul, Sanjoy Kumar Saha:
Two-point FFT-based high capacity image steganography using calendar based message encoding. Inf. Sci. 552: 278-290 (2021) - [j36]Nayana Das, Goutam Paul:
Secure multi-party quantum conference and XOR computation. Quantum Inf. Comput. 21(3&4): 203-232 (2021) - [j35]Mostafizar Rahman, Dhiman Saha, Goutam Paul:
Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos. IACR Trans. Symmetric Cryptol. 2021(3): 137-169 (2021) - [c44]Nayan Ranjan Das
, Ratna Priya, Imon Mukherjee, Goutam Paul:
Modified Hedonic Based Price Prediction Model for Players in IPL Auction. ICCCNT 2021: 1-7 - [i44]Nayana Das, Goutam Paul, Ritajit Majumdar:
Quantum Secure Direct Communication with Mutual Authentication using a Single Basis. CoRR abs/2101.03577 (2021) - [i43]Nayana Das, Goutam Paul:
Secure Multi-Party Quantum Conference and Xor Computation. CoRR abs/2101.05560 (2021) - [i42]Mostafizar Rahman, Goutam Paul:
Grover on Present: Quantum Resource Estimation. IACR Cryptol. ePrint Arch. 2021: 1655 (2021) - 2020
- [j34]Ayan Mitra
, Pritam Chattopadhyay
, Goutam Paul
, Vasilios Zarikas
:
Binary Black Hole Information Loss Paradox and Future Prospects. Entropy 22(12): 1387 (2020) - [j33]Nabanita Mukherjee (Ganguly), Goutam Paul
, Sanjoy Kumar Saha, Debanjan Burman:
A PVD based high capacity steganography algorithm with embedding in non-sequential position. Multim. Tools Appl. 79(19-20): 13449-13479 (2020) - [c43]Mostafizar Rahman, Dhiman Saha, Goutam Paul:
Cryptanalysis of FlexAEAD. AFRICACRYPT 2020: 152-171 - [c42]Amit Jana, Dhiman Saha, Goutam Paul:
Differential Fault Analysis of NORX. ASHES@CCS 2020: 67-79 - [i41]Nayana Das, Goutam Paul:
Two Efficient Device Independent Quantum Dialogue Protocols. CoRR abs/2005.03518 (2020) - [i40]Nayana Das, Goutam Paul:
Improving the Security of "Measurement-Device-Independent Quantum Communication without Encryption". CoRR abs/2006.05263 (2020) - [i39]Nayana Das, Goutam Paul:
Cryptanalysis of Quantum Secure Direct Communication Protocol with Mutual Authentication Based on Single Photons and Bell States. CoRR abs/2007.03710 (2020) - [i38]Mostafizar Rahman, Goutam Paul:
Quantum Attacks on HCTR and its Variants. IACR Cryptol. ePrint Arch. 2020: 802 (2020)
2010 – 2019
- 2019
- [j32]Soumik Ghosh, Arnab Adhikary, Goutam Paul
:
Revisiting integer factorization using closed timelike curves. Quantum Inf. Process. 18(1): 30 (2019) - [j31]Nayana Das, Goutam Paul
, Arpita Maitra:
Dimensionality distinguishers. Quantum Inf. Process. 18(6): 171 (2019) - [i37]Nayana Das, Goutam Paul, Arpita Maitra:
Dimensionality Distinguishers. CoRR abs/1904.11405 (2019) - [i36]Mostafizar Rahman, Dhiman Saha, Goutam Paul:
Iterated Truncated Differential for Internal Keyed Permutation of FlexAEAD. IACR Cryptol. ePrint Arch. 2019: 539 (2019) - [i35]Amit Jana, Dhiman Saha, Goutam Paul:
Differential Fault Analysis of NORX. IACR Cryptol. ePrint Arch. 2019: 760 (2019) - 2018
- [j30]Sugata Gangopadhyay, Goutam Paul, Nishant Sinha, Pantelimon Stanica:
Generalized nonlinearity of S-boxes. Adv. Math. Commun. 12(1): 115-122 (2018) - [j29]Amit Jana, Goutam Paul
:
Revisiting RC4 key collision: Faster search algorithm and new 22-byte colliding key pairs. Cryptogr. Commun. 10(3): 479-508 (2018) - [j28]Goutam Paul
, Souvik Ray
:
Analysis of burn-in period for RC4 state transition. Cryptogr. Commun. 10(5): 881-908 (2018) - [j27]Goutam Paul
, Souvik Ray
:
On data complexity of distinguishing attacks versus message recovery attacks on stream ciphers. Des. Codes Cryptogr. 86(6): 1211-1247 (2018) - [j26]Nabanita Mukherjee (Ganguly), Goutam Paul
, Sanjoy Kumar Saha:
An efficient multi-bit steganography algorithm in spatial domain with two-layer security. Multim. Tools Appl. 77(14): 18451-18481 (2018) - [j25]Soumik Ghosh, Arnab Adhikary, Goutam Paul:
Quantum signaling to the past using P-CTCS. Quantum Inf. Comput. 18(11&12): 965-974 (2018) - [j24]Amit Behera, Goutam Paul
:
Quantum to classical one-way function and its applications in quantum money authentication. Quantum Inf. Process. 17(8): 200 (2018) - [j23]Nilanjan Datta, Avijit Dutta
, Mridul Nandi
, Goutam Paul:
Double-block Hash-then-Sum: A Paradigm for Constructing BBB Secure PRF. IACR Trans. Symmetric Cryptol. 2018(3): 36-92 (2018) - [j22]Dhiman Saha, Mostafizar Rahman, Goutam Paul:
New Yoyo Tricks with AES-based Permutations. IACR Trans. Symmetric Cryptol. 2018(4): 102-127 (2018) - [i34]Madhuparna Das
, Goutam Paul:
Analysis of the Game "2048" and its Generalization in Higher Dimensions. CoRR abs/1804.07393 (2018) - [i33]Nilanjan Datta, Avijit Dutta, Mridul Nandi, Goutam Paul:
Double-block Hash-then-Sum: A Paradigm for Constructing BBB Secure PRF. IACR Cryptol. ePrint Arch. 2018: 804 (2018) - 2017
- [j21]Goutam Paul, Ian Davidson, Imon Mukherjee
, S. S. Ravi:
Keyless dynamic optimal multi-bit image steganography using energetic pixels. Multim. Tools Appl. 76(5): 7445-7471 (2017) - [j20]Nilanjan Datta, Avijit Dutta
, Mridul Nandi, Goutam Paul, Liting Zhang:
Single Key Variant of PMAC_Plus. IACR Trans. Symmetric Cryptol. 2017(4): 268-305 (2017) - [j19]Ayesha Khalid, Goutam Paul
, Anupam Chattopadhyay:
RC4-AccSuite: A Hardware Acceleration Suite for RC4-Like Stream Ciphers. IEEE Trans. Very Large Scale Integr. Syst. 25(3): 1072-1084 (2017) - [c41]Suvradip Chakraborty, Goutam Paul, C. Pandu Rangan:
Efficient Compilers for After-the-Fact Leakage: From CPA to CCA-2 Secure PKE to AKE. ACISP (1) 2017: 343-362 - [c40]Goutam Paul, Anupam Chattopadhyay, Chander Chandak:
Designing Parity Preserving Reversible Circuits. RC 2017: 77-89 - [i32]Goutam Paul, Souvik Ray:
Analysis of Burn-in period for RC4 State Transition. IACR Cryptol. ePrint Arch. 2017: 175 (2017) - [i31]Suvradip Chakraborty, Goutam Paul, C. Pandu Rangan:
Efficient Compilers for After-the-Fact Leakage: from CPA to CCA-2 secure PKE to AKE. IACR Cryptol. ePrint Arch. 2017: 451 (2017) - [i30]Nilanjan Datta, Avijit Dutta, Mridul Nandi, Goutam Paul, Liting Zhang:
Single Key Variant of PMAC_Plus. IACR Cryptol. ePrint Arch. 2017: 848 (2017) - 2016
- [j18]Ayesha Khalid, Muhammad Hassan, Goutam Paul, Anupam Chattopadhyay:
RunFein: a rapid prototyping framework for Feistel and SPN-based block ciphers. J. Cryptogr. Eng. 6(4): 299-323 (2016) - [j17]Goutam Paul, Anupam Chattopadhyay:
Three Snakes in One Hole: The First Systematic Hardware Accelerator Design for SOSEMANUK with Optional Serpent and SNOW 2.0 Modes. IEEE Trans. Computers 65(2): 640-653 (2016) - [j16]Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay, Faezeh Abediostad, Syed Imad Ud Din, Muhammad Hassan, Baishik Biswas, Prasanna Ravi
:
RunStream: A High-Level Rapid Prototyping Framework for Stream Ciphers. ACM Trans. Embed. Comput. Syst. 15(3): 61:1-61:27 (2016) - [c39]Avijit Dutta
, Mridul Nandi
, Goutam Paul:
One-Key Compression Function Based MAC with Security Beyond Birthday Bound. ACISP (1) 2016: 343-358 - [c38]Goutam Paul, Abhiroop Sanyal:
Revisiting the Security Proof of QUAD Stream Cipher: Some Corrections and Tighter Bounds. Inscrypt 2016: 103-116 - [c37]Christina Boura, Avik Chakraborti, Gaëtan Leurent
, Goutam Paul, Dhiman Saha, Hadi Soleimany, Valentin Suder:
Key Recovery Attack Against 2.5-Round \pi -Cipher. FSE 2016: 535-553 - [c36]Sanat Ghoshal, Goutam Paul:
Exploiting Block-Chain Data Structure for Auditorless Auditing on Cloud Data. ICISS 2016: 359-371 - [i29]Atanu Acharyya, Goutam Paul:
Revisiting Optimal Eavesdropping in Quantum Cryptography: Choice of Interaction Is Unique up to Rotation of the Underlying Basis. CoRR abs/1610.07148 (2016) - [i28]Christina Boura, Avik Chakraborti, Gaëtan Leurent, Goutam Paul, Dhiman Saha, Hadi Soleimany, Valentin Suder:
Key Recovery Attack against 2.5-round pi-Cipher. IACR Cryptol. ePrint Arch. 2016: 502 (2016) - [i27]Amit Jana, Goutam Paul:
Revisiting RC4 Key Collision: Faster Search Algorithm and New 22-byte Colliding Key Pairs. IACR Cryptol. ePrint Arch. 2016: 1001 (2016) - 2015
- [j15]Santanu Sarkar
, Sourav Sen Gupta
, Goutam Paul, Subhamoy Maitra:
Proving TLS-attack related open biases of RC4. Des. Codes Cryptogr. 77(1): 231-253 (2015) - [j14]Kaushik Nandi, Goutam Paul:
Quantum information splitting using a pair of GHZ states. Quantum Inf. Comput. 15(11&12): 1041-1047 (2015) - [j13]Chithrabhanu Perumangatt, Aadhi Abdul Rahim, Gangi Reddy Salla, Shashi Prabhakar
, Goutam Kumar Samanta
, Goutam Paul, Ravindra Pratap Singh
:
Three-particle hyper-entanglement: teleportation and quantum key distribution. Quantum Inf. Process. 14(10): 3813-3826 (2015) - [c35]Goutam Paul:
Revisiting Democratic Mining in Bitcoins: Its Weakness and Possible Remedies. ICISS 2015: 161-170 - [c34]Suvradip Chakraborty, Goutam Paul, C. Pandu Rangan:
Forward-Secure Authenticated Symmetric Key Exchange Protocol: New Security Model and Secure Construction. ProvSec 2015: 149-166 - [i26]Arpita Maitra, Sourya Joyee De, Goutam Paul, Asim K. Pal:
A Proposal for Quantum Rational Secret Sharing. CoRR abs/1501.04212 (2015) - [i25]Kaushik Nandi, Goutam Paul:
Quantum Information splitting using a pair of {\it GHZ} states. CoRR abs/1501.07529 (2015) - [i24]Arpita Maitra, Goutam Paul:
A Resilient Quantum Secret Sharing Scheme. CoRR abs/1501.07756 (2015) - [i23]Arpita Maitra, Goutam Paul, Asim K. Pal:
Millionaires' Problem with Rational Players: a Unified Approach in Classical and Quantum Paradigms. CoRR abs/1504.01974 (2015) - [i22]Subhamoy Maitra, Goutam Paul, Willi Meier:
Salsa20 Cryptanalysis: New Moves and Revisiting Old Styles. IACR Cryptol. ePrint Arch. 2015: 217 (2015) - [i21]Avijit Dutta, Goutam Paul:
Lifting the Security of NI-MAC Beyond Birthday Bound. IACR Cryptol. ePrint Arch. 2015: 1016 (2015) - [i20]Arpita Maitra, Goutam Paul, Asim K. Pal:
Fairness in Secure Two-Party Computation with Rational Players. IACR Cryptol. ePrint Arch. 2015: 1071 (2015) - [i19]Goutam Paul, Souvik Ray:
On Data Complexity of Distinguishing Attacks vs. Message Recovery Attacks on Stream Ciphers. IACR Cryptol. ePrint Arch. 2015: 1174 (2015) - 2014
- [j12]Goutam Paul, Anupam Chattopadhyay:
Designing stream ciphers with scalable data-widths: a case study with HC-128. J. Cryptogr. Eng. 4(2): 135-143 (2014) - [j11]Sourav Sen Gupta
, Subhamoy Maitra, Goutam Paul, Santanu Sarkar
:
(Non-)Random Sequences from (Non-)Random Permutations - Analysis of RC4 Stream Cipher. J. Cryptol. 27(1): 67-108 (2014) - [c33]Sourav Sen Gupta
, Subhamoy Maitra, Willi Meier, Goutam Paul, Santanu Sarkar
:
Dependence in IV-Related Bytes of RC4 Key Enhances Vulnerabilities in WPA. FSE 2014: 350-369 - [c32]Goutam Paul, Pratik Sarkar, Sarbajit Mukherjee:
Towards a More Democratic Mining in Bitcoins. ICISS 2014: 185-203 - [c31]Sumitra Biswal, Goutam Paul, Shashwat Raizada:
Preserving Privacy in Location-Based Services Using Sudoku Structures. ICISS 2014: 448-463 - [c30]Ayesha Khalid, Prasanna Ravi
, Anupam Chattopadhyay, Goutam Paul:
One Word/Cycle HC-128 Accelerator via State-Splitting Optimization. INDOCRYPT 2014: 283-303 - [c29]Zheng Wang, Goutam Paul, Anupam Chattopadhyay:
Processor Design with Asymmetric Reliability. ISVLSI 2014: 565-570 - [c28]Avijit Dutta
, Goutam Paul:
Deterministic Hard Fault Attack on Trivium. IWSEC 2014: 134-145 - 2013
- [j10]Tamaghna Acharya, Goutam Paul:
Maximum lifetime broadcast communications in cooperative multihop wireless ad hoc networks: Centralized and distributed approaches. Ad Hoc Networks 11(6): 1667-1682 (2013) - [j9]Arpita Maitra, Goutam Paul:
Eavesdropping in semiquantum key distribution protocol. Inf. Process. Lett. 113(12): 418-422 (2013) - [c27]Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay:
New Speed Records for Salsa20 Stream Cipher Using an Autotuning Framework on GPUs. AFRICACRYPT 2013: 189-207 - [c26]Subhamoy Maitra, Goutam Paul, Santanu Sarkar, Michael Lehmann, Willi Meier:
New Results on Generalization of Roos-Type Biases and Related Keystreams of RC4. AFRICACRYPT 2013: 222-239 - [c25]Shubhajit Saha, Goutam Paul:
On effective sharing of user generated content. APCHI 2013: 114-118 - [c24]Goutam Paul, Soumi Paul:
Proposal for a novel computerized menu-presentation interface for restaurants. APCHI 2013: 119-122 - [c23]Khawar Shahzad, Ayesha Khalid, Zoltán Endre Rákossy, Goutam Paul, Anupam Chattopadhyay:
CoARX: a coprocessor for ARX-based cryptographic algorithms. DAC 2013: 133:1-133:10 - [c22]Ayesha Khalid, Muhammad Hassan, Anupam Chattopadhyay, Goutam Paul:
RAPID-FeinSPN: A Rapid Prototyping Framework for Feistel and SPN-Based Block Ciphers. ICISS 2013: 169-190 - [c21]Imon Mukherjee
, Goutam Paul:
Efficient Multi-bit Image Steganography in Spatial Domain. ICISS 2013: 270-284 - [e1]Goutam Paul, Serge Vaudenay:
Progress in Cryptology - INDOCRYPT 2013 - 14th International Conference on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedings. Lecture Notes in Computer Science 8250, Springer 2013, ISBN 978-3-319-03514-7 [contents] - [i18]Goutam Paul, Anupam Chattopadhyay, Chander Chandak:
Designing Parity Preserving Reversible Circuits. CoRR abs/1308.0840 (2013) - [i17]Chithrabhanu Perumangatt, Aadhi Abdul Rahim, Gangi Reddy Salla, Shashi Prabhakar, Goutam Kumar Samanta, Goutam Paul, Ravindra Pratap Singh:
Three particle Hyper Entanglement: Teleportation and Quantum Key Distribution. CoRR abs/1311.7318 (2013) - [i16]Ayesha Khalid, Deblin Bagchi, Goutam Paul, Anupam Chattopadhyay:
Optimized GPU Implementation and Performance Analysis of HC Series of Stream Ciphers. IACR Cryptol. ePrint Arch. 2013: 59 (2013) - [i15]Goutam Paul, Anupam Chattopadhyay:
Three Snakes in One Hole: A 67 Gbps Flexible Hardware for SOSEMANUK with Optional Serpent and SNOW 2.0 Modes. IACR Cryptol. ePrint Arch. 2013: 282 (2013) - [i14]Santanu Sarkar, Sourav Sen Gupta, Goutam Paul, Subhamoy Maitra:
Proving TLS-attack related open biases of RC4. IACR Cryptol. ePrint Arch. 2013: 502 (2013) - [i13]Goutam Paul, Subhamoy Maitra, Anupam Chattopadhyay:
Quad-RC4: Merging Four RC4 States towards a 32-bit Stream Cipher. IACR Cryptol. ePrint Arch. 2013: 572 (2013) - 2012
- [j8]Miodrag J. Mihaljevic, Sugata Gangopadhyay, Goutam Paul, Hideki Imai:
Internal state recovery of grain-v1 employing normality order of the filter function. IET Inf. Secur. 6(2): 55-64 (2012) - [j7]Miodrag J. Mihaljevic, Sugata Gangopadhyay, Goutam Paul, Hideki Imai:
Internal state recovery of keystream generator LILI-128 based on a novel weakness of the employed Boolean function. Inf. Process. Lett. 112(21): 805-810 (2012) - [j6]Miodrag J. Mihaljevic, Sugata Gangopadhyay, Goutam Paul, Hideki Imai:
Generic cryptographic weakness of k-normal Boolean functions in certain stream ciphers and cryptanalysis of grain-128. Period. Math. Hung. 65(2): 205-227 (2012) - [c20]Ayesha Khalid, Deblin Bagchi, Goutam Paul, Anupam Chattopadhyay:
Optimized GPU Implementation and Performance Analysis of HC Series of Stream Ciphers. ICISC 2012: 293-308 - [c19]Goutam Paul, Ian Davidson, Imon Mukherjee
, S. S. Ravi:
Keyless Steganography in Spatial Domain Using Energetic Pixels. ICISS 2012: 134-148 - [c18]Arpita Maitra, Goutam Paul:
Another Look at Symmetric Incoherent Optimal Eavesdropping against BB84. INDOCRYPT 2012: 80-99 - [c17]Goutam Paul, Shashwat Raizada:
Impact of Extending Side Channel Attack on Cipher Variants: A Case Study with the HC Series of Stream Ciphers. SPACE 2012: 32-44 - [c16]Anupam Chattopadhyay, Goutam Paul:
Exploring security-performance trade-offs during hardware accelerator design of stream cipher RC4. VLSI-SoC 2012: 251-254 - [i12]Arpita Maitra, Goutam Paul:
Eavesdropping in Semiquantum Key Distribution Protocol: Classical vs. Hadamard Bob. CoRR abs/1205.2807 (2012) - 2011
- [j5]Subhamoy Maitra, Goutam Paul, Shashwat Raizada, Subhabrata Sen, Rudradev Sengupta
:
Some observations on HC-128. Des. Codes Cryptogr. 59(1-3): 231-245 (2011) - [c15]Subhamoy Maitra, Goutam Paul, Sourav Sen Gupta
:
Attack on Broadcast RC4 Revisited. FSE 2011: 199-217 - [c14]Apurba Das, Subhamoy Maitra, Goutam Paul, Santanu Sarkar
:
Some Combinatorial Results towards State Recovery Attack on RC4. ICISS 2011: 204-214 - [c13]Goutam Paul, Subhamoy Maitra, Shashwat Raizada:
A Theoretical Analysis of the Structure of HC-128. IWSEC 2011: 161-177 - [c12]Sourav Sen Gupta
, Subhamoy Maitra, Goutam Paul, Santanu Sarkar
:
Proof of Empirical RC4 Biases and New Key Correlations. Selected Areas in Cryptography 2011: 151-168 - [i11]Sourav Sen Gupta, Subhamoy Maitra, Goutam Paul, Santanu Sarkar:
RC4: (Non-)Random Words from (Non-)Random Permutations. IACR Cryptol. ePrint Arch. 2011: 448 (2011) - [i10]Arpita Maitra, Goutam Paul:
A Note on Four-State BB84 Protocol. IACR Cryptol. ePrint Arch. 2011: 588 (2011) - 2010
- [j4]Sayan Bhattacharya, Goutam Paul, Swagato Sanyal:
A cops and robber game in multidimensional grids. Discret. Appl. Math. 158(16): 1745-1751 (2010) - [c11]Miodrag J. Mihaljevic, Sugata Gangopadhyay, Goutam Paul, Hideki Imai:
A generic weakness of the k-normal Boolean functions exposed to dedicated algebraic attack. ISITA 2010: 911-916 - [i9]Goutam Paul, Imon Mukherjee:
Image Sterilization to Prevent LSB-based Steganographic Transmission. CoRR abs/1012.5573 (2010) - [i8]Goutam Paul, Subhamoy Maitra, Shashwat Raizada:
A Combinatorial Analysis of HC-128. IACR Cryptol. ePrint Arch. 2010: 387 (2010)
2000 – 2009
- 2009
- [j3]