A novel approach towards realizing optimum data transfer and Automatic Variable Key (AVK) in cryptography P Chakrabarti, B Bhuyan, A Chowdhuri, C Bhunia
IJCSNS 8 (5), 241, 2008
61 2008 Chaos-based medical image encryption scheme using special nonlinear filtering function based LFSR S Deb, B Bhuyan
Multimedia Tools and Applications 80, 19803-19826, 2021
35 2021 Using game theory to model DoS attack and defence B Kumar, B Bhuyan
Sādhanā 44 (12), 245, 2019
32 2019 Secure image encryption scheme using high efficiency word-oriented feedback shift register over finite field S Deb, B Biswas, B Bhuyan
Multimedia Tools and Applications 78, 34901-34925, 2019
22 2019 Performance analysis of current lightweight stream ciphers for constrained environments S Deb, B Bhuyan
Sādhanā 45, 1-12, 2020
14 2020 Study and scope of signcryption for cloud data access control S Debnath, MVL Nunsanga, B Bhuyan
Advances in Computer, Communication and Control: Proceedings of ETES 2018 …, 2019
14 2019 Game theoretical defense mechanism against reputation based sybil attacks B Kumar, B Bhuyan
Procedia Computer Science 167, 2465-2477, 2020
12 2020 Design and analysis of LFSR-based stream cipher S Deb, B Bhuyan, NC Gupta
Proceedings of the International Conference on Computing and Communication …, 2018
12 2018 A new public key scheme based on integer factorization and discrete logarithm P Goswami, MM Singh, B Bhuyan
Palestine Journal of Mathematics 6 (2), 580-584, 2017
11 2017 Performance evaluation of grain family and espresso ciphers for applications on resource constrained devices S Deb, B Bhuyan
ICT Express 4 (1), 19-23, 2018
10 2018 Application of. Automatic Variable Key (AVK) in RSA P Chakrabarti, B Bhuyan, A Chowdhuri, CT Bhunia
International Journal HIT Transactions on ECCN 2 (5), 2007
9 2007 A provable secure key-escrow-free identity-based signature scheme without using secure channel at the phase of private key issuance SC Sahana, ML Das, B Bhuyan
Sādhanā 44, 1-9, 2019
7 2019 Large universe attribute based encryption enabled secured data access control for cloud storage with computation outsourcing S Debnath, B Bhuyan
Multiagent and Grid Systems 15 (2), 99-119, 2019
6 2019 A new public key scheme based on DRSA and generalized GDLP P Goswami, MM Singh, B Bhuyan
Discrete Mathematics, Algorithms and Applications 8 (04), 1650057, 2016
6 2016 Efficient and scalable outsourced data access control with user revocation in cloud: a comprehensive study S Debnath, B Bhuyan
Multiagent and Grid Systems 14 (4), 383-401, 2018
4 2018 An efficient key escrow-free identity-based signature scheme SC Sahana, B Bhuyan, ML Das
Int J Appl Eng Res 12 (19), 8964-8971, 2017
4 2017 A new public key encryption scheme based on two cryptographic assumptions P Goswami, MM Singh, B Bhuyan
Malaya Journal of Matematik 3 (04), 419-422, 2015
4 2015 Colour image encryption using an improved version of stream cipher and chaos S Deb, B Bhuyan, N Kar, KS Reddy
International Journal of Ad Hoc and Ubiquitous Computing 41 (2), 118-133, 2022
3 2022 A Provable Secure Short Signature Scheme Based on Bilinear Pairing over Elliptic Curve. SC Sahana, B Bhuyan
Int. J. Netw. Secur. 21 (1), 145-152, 2019
3 2019 A new public key cryptosystem over P Goswami, MM Singh, B Bhuyan
Discrete Mathematics, Algorithms and Applications 9 (06), 1750080, 2017
3 2017