Souradyuti Paul
Souradyuti Paul
Indian Institute of Technology, Bhilai
Verified email at iitbhilai.ac.in - Homepage
TitleCited byYear
A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher
S Paul, B Preneel
International Workshop on Fast Software Encryption, 245-259, 2004
1842004
Analysis of non-fortuitous predictive states of the RC4 keystream generator
S Paul, B Preneel
International Conference on Cryptology in India, 52-67, 2003
622003
Third-round report of the SHA-3 cryptographic hash algorithm competition
S Chang, R Perlner, WE Burr, MS Turan, JM Kelsey, S Paul, LE Bassham
NIST Interagency Report 7896, 121, 2012
562012
Distinguishing attacks on the stream cipher py
S Paul, B Preneel, G Sekar
International Workshop on Fast Software Encryption, 405-421, 2006
48*2006
Experimental Study of Reinforced Concrete Assemblies under Column Removal Scenario.
HS Lew, Y Bao, S Pujol, MA Sozen
ACI Structural Journal 111 (4), 2014
442014
On the (in) security of stream ciphers based on arrays and modular addition
S Paul, B Preneel
International Conference on the Theory and Application of Cryptology and …, 2006
442006
Solving systems of differential equations of addition
S Paul, B Preneel
Australasian Conference on Information Security and Privacy, 75-88, 2005
402005
Using distributed apriori association rule and classical apriori mining algorithms for grid based knowledge discovery
R Sumithra, S Paul
2010 Second International conference on Computing, Communication and …, 2010
322010
Roots of Leadership: Analysis of the Narratives from African American Women Leaders in Higher Education.
T Alexander
International Journal of Learning 17 (4), 2010
322010
Status report on the first round of the SHA-3 cryptographic hash algorithm competition
A Regenscheid, S Zhang, J Kelsey, M Nandi, S Paul, R Perlner, ...
US Department of Commerce, National Institute of Standards and Technology, 2009
272009
Speeding up the wide-pipe: Secure and fast hashing
M Nandi, S Paul
International Conference on Cryptology in India, 144-162, 2010
242010
Hash partitioned apriori in parallel and distributed data mining environment with dynamic data allocation approach
S Paul, V Saravanan
2008 International Conference on Computer Science and Information Technology …, 2008
182008
Near optimal algorithms for solving differential equations of addition with batch queries
S Paul, B Preneel
International conference on cryptology in India, 90-103, 2005
182005
Targeted delivery system based on gemcitabine-loaded silk fibroin nanoparticles for lung cancer therapy
F Mottaghitalab, M Kiani, M Farokhi, SC Kundu, RL Reis, M Gholami, ...
ACS applied materials & interfaces 9 (37), 31600-31611, 2017
172017
Status report on the second round of the SHA-3 cryptographic hash algorithm competition
MS Turan, LE Bassham, W Burr, D Chang, S Zhang, MJ Dworkin, ...
US Department of Commerce, National Institute of Standards and Technology, 2011
152011
Parallel and distributed data mining
S Paul
New Fundamental Technologies in Data Mining, 2011
152011
Related-key Attacks on the Py-family of Ciphers and an Approach to Repair the Weaknesses
G Sekar, S Paul, B Preneel
International Conference on Cryptology in India, 58-72, 2007
152007
Improved indifferentiability security bound for the JH mode
D Moody, S Paul, D Smith-Tone
Designs, Codes and Cryptography 79 (2), 237-259, 2016
142016
New weaknesses in the keystream generation algorithms of the stream ciphers TPy and Py
G Sekar, S Paul, B Preneel
International Conference on Information Security, 249-262, 2007
142007
New weaknesses in the keystream generation algorithms of the stream ciphers TPy and Py
G Sekar, S Paul, B Preneel
International Conference on Information Security, 249-262, 2007
142007
The system can't perform the operation now. Try again later.
Articles 1–20