Goutam Paul
Goutam Paul
Associate Professor, Cryptology & Security Research Unit (CSRU), Indian Statistical Institute
Verified email at - Homepage
Cited by
Cited by
Operating systems: internals and design principles
W Stallings, GK Paul
Pearson, 2012
RC4 stream cipher and its variants
G Paul, S Maitra
CRC press, 2011
Analysis of RC4 and proposal of additional layers for better security margin
S Maitra, G Paul
International Conference on Cryptology in India, 27-39, 2008
(Non-) random sequences from (non-) random permutations—Analysis of RC4 stream cipher
S Sen Gupta, S Maitra, G Paul, S Sarkar
Journal of Cryptology 27 (1), 67-108, 2014
Permutation after RC4 key scheduling reveals the secret key
G Paul, S Maitra
International Workshop on Selected Areas in Cryptography, 360-377, 2007
Towards a more democratic mining in bitcoins
G Paul, P Sarkar, S Mukherjee
International Conference on Information Systems Security, 185-203, 2014
New form of permutation bias and secret key leakage in keystream bytes of RC4
S Maitra, G Paul
International Workshop on Fast Software Encryption, 253-269, 2008
On non-negligible bias of the first output byte of RC4 towards the first three bytes of the secret key
G Paul, S Rathi, S Maitra
Designs, Codes and Cryptography 49 (1), 123-134, 2008
Attack on broadcast RC4 revisited
S Maitra, G Paul, S Sen Gupta
International Workshop on Fast Software Encryption, 199-217, 2011
Searching for Hidden Messages: Automatic Detection of Steganography.
G Berg, I Davidson, MY Duan, G Paul
IAAI, 51-56, 2003
Internal state recovery of Grain-v1 employing normality order of the filter function
MJ Mihaljević, S Gangopadhyay, G Paul, H Imai
IET Information Security 6 (2), 55-64, 2012
Proposal for quantum rational secret sharing
A Maitra, SJ De, G Paul, AK Pal
Physical Review A 92 (2), 022305, 2015
A machine learning approach towards the prediction of protein–ligand binding affinity based on fundamental molecular properties
I Kundu, G Paul, R Banerjee
RSC advances 8 (22), 12127-12137, 2018
Generic cryptographic weakness of k-normal Boolean functions in certain stream ciphers and cryptanalysis of grain-128
M Mihaljević, S Gangopadhyay, G Paul, H Imai
Periodica Mathematica Hungarica 65 (2), 205-227, 2012
Double-block hash-then-sum: a paradigm for constructing BBB secure PRF
N Datta, A Dutta, M Nandi, G Paul
IACR Transactions on Symmetric Cryptology, 36-92, 2018
Single key variant of PMAC_Plus
N Datta, A Dutta, M Nandi, G Paul, L Zhang
Cryptology ePrint Archive, 2017
Locating secret messages in images
I Davidson, G Paul
Proceedings of the tenth ACM SIGKDD international conference on Knowledge …, 2004
CoARX: a coprocessor for ARX-based cryptographic algorithms
K Shahzad, A Khalid, ZE Rákossy, G Paul, A Chattopadhyay
2013 50th ACM/EDAC/IEEE Design Automation Conference (DAC), 1-10, 2013
Keyless dynamic optimal multi-bit image steganography using energetic pixels
G Paul, I Davidson, I Mukherjee, SS Ravi
Multimedia tools and applications 76 (5), 7445-7471, 2017
A complete characterization of the evolution of RC4 pseudo random generation algorithm
R Basu, S Ganguly, S Maitra, G Paul
Journal of Mathematical Cryptology 2 (3), 257-289, 2008
The system can't perform the operation now. Try again later.
Articles 1–20