The SCEAS System
| |||||||

## Search the dblp DataBase
Subhamoy Maitra:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
## Publications of Author- Subhamoy Maitra, Palash Sarkar
**Enumeration of Correlation Immune Boolean Functions.**[Citation Graph (0, 0)][DBLP] ACISP, 1999, pp:12-25 [Conf] - Sandeepan Chowdhury, Subhamoy Maitra
**Efficient Software Implementation of LFSR and Boolean Function and Its Application in Nonlinear Combiner Model.**[Citation Graph (0, 0)][DBLP] ACNS, 2003, pp:387-402 [Conf] - Palash Sarkar, Subhamoy Maitra
**Efficient Implementation of "Large" Stream Cipher Systems.**[Citation Graph (0, 0)][DBLP] CHES, 2001, pp:319-332 [Conf] - Subhamoy Maitra, Palash Sarkar
**Highly Nonlinear Resilient Functions Optimizing Siegenthaler's Inequality.**[Citation Graph (0, 0)][DBLP] CRYPTO, 1999, pp:198-215 [Conf] - Palash Sarkar, Subhamoy Maitra
**Nonlinearity Bounds and Constructions of Resilient Boolean Functions.**[Citation Graph (0, 0)][DBLP] CRYPTO, 2000, pp:515-532 [Conf] - Palash Sarkar, Subhamoy Maitra
**Construction of Nonlinear Boolean Functions with Important Cryptographic Properties.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 2000, pp:485-506 [Conf] - Deepak Kumar Dalai, Kishan Chand Gupta, Subhamoy Maitra
**Cryptographically Significant Boolean Functions: Construction and Analysis in Terms of Algebraic Immunity.**[Citation Graph (0, 0)][DBLP] FSE, 2005, pp:98-111 [Conf] - Soumen Maity, Subhamoy Maitra
**Minimum Distance between Bent and 1-Resilient Boolean Functions.**[Citation Graph (0, 0)][DBLP] FSE, 2004, pp:143-160 [Conf] - Pantelimon Stanica, Subhamoy Maitra, John A. Clark
**Results on Rotation Symmetric Bent and Correlation Immune Boolean Functions.**[Citation Graph (0, 0)][DBLP] FSE, 2004, pp:161-177 [Conf] - Kishan Chand Gupta, Subhamoy Maitra
**Primitive Polynomials over GF(2) - A Cryptologic Approach.**[Citation Graph (0, 0)][DBLP] ICICS, 2001, pp:23-34 [Conf] - Tanmoy Kanti Das, Subhamoy Maitra
**A Robust Block Oriented Watermarking Scheme in Spatial Domain.**[Citation Graph (0, 0)][DBLP] ICICS, 2002, pp:184-196 [Conf] - Ayineedi Venkateswarlu, Subhamoy Maitra
**Further Results on Multiples of Primitive Polynomials and Their Products over GF(2).**[Citation Graph (0, 0)][DBLP] ICICS, 2002, pp:231-242 [Conf] - Dibyendu Chakrabarti, Subhamoy Maitra, Bimal K. Roy
**A Hybrid Design of Key Pre-distribution Scheme for Wireless Sensor Networks.**[Citation Graph (0, 0)][DBLP] ICISS, 2005, pp:228-238 [Conf] - Selçuk Kavut, Subhamoy Maitra, Sumanta Sarkar, Melek D. Yücel
**Enumeration of 9-Variable Rotation Symmetric Boolean Functions Having Nonlinearity > 240.**[Citation Graph (0, 0)][DBLP] INDOCRYPT, 2006, pp:266-279 [Conf] - Kishan Chand Gupta, Subhamoy Maitra
**Multiples of Primitive Polynomials over GF(2).**[Citation Graph (0, 0)][DBLP] INDOCRYPT, 2001, pp:62-72 [Conf] - Sandeepan Chowdhury, Subhamoy Maitra
**Efficient Software Implementation of Linear Feedback Shift Registers.**[Citation Graph (0, 0)][DBLP] INDOCRYPT, 2001, pp:297-307 [Conf] - John A. Clark, Jeremy L. Jacob, Susan Stepney, Subhamoy Maitra, William Millan
**Evolving Boolean Functions Satisfying Multiple Criteria.**[Citation Graph (0, 0)][DBLP] INDOCRYPT, 2002, pp:246-259 [Conf] - Subhamoy Maitra
**Autocorrelation Properties of Correlation Immune Boolean Functions.**[Citation Graph (0, 0)][DBLP] INDOCRYPT, 2001, pp:242-253 [Conf] - Subhamoy Maitra, Dipti Prasad Mukherjee
**Spatial Domain Digital Watermarking with Buyer Authentication.**[Citation Graph (0, 0)][DBLP] INDOCRYPT, 2001, pp:149-161 [Conf] - Deepak Kumar Dalai, Kishan Chand Gupta, Subhamoy Maitra
**Results on Algebraic Immunity for Cryptographically Significant Boolean Functions.**[Citation Graph (0, 0)][DBLP] INDOCRYPT, 2004, pp:92-106 [Conf] - Tanmoy Kanti Das, Subhamoy Maitra
**Cryptanalysis of Optimal Differential Energy Watermarking (DEW) and a Modified Robust Scheme.**[Citation Graph (0, 0)][DBLP] INDOCRYPT, 2002, pp:135-148 [Conf] - Sugata Gangopadhyay, Subhamoy Maitra
**Further Results Related to Generalized Nonlinearity.**[Citation Graph (0, 0)][DBLP] INDOCRYPT, 2002, pp:260-274 [Conf] - Dibyendu Chakrabarti, Subhamoy Maitra, Bimal K. Roy
**A Key Pre-distribution Scheme for Wireless Sensor Networks: Merging Blocks in Combinatorial Design.**[Citation Graph (0, 0)][DBLP] ISC, 2005, pp:89-103 [Conf] - Tanmoy Kanti Das, Subhamoy Maitra
**Cryptanalysis of "Wavelet Tree Quantization" Watermarking Scheme.**[Citation Graph (0, 0)][DBLP] IWDC, 2004, pp:219-230 [Conf] - Dibyendu Chakrabarti, Subhamoy Maitra, Bimal K. Roy
**Clique Size in Sensor Networks with Key Pre-distribution Based on Transversal Design.**[Citation Graph (0, 0)][DBLP] IWDC, 2005, pp:329-337 [Conf] - Tanmoy Kanti Das, Jianying Zhou, Subhamoy Maitra
**Cryptanalysis of a Wavelet Based Watermarking Scheme.**[Citation Graph (0, 0)][DBLP] IWDW, 2004, pp:192-203 [Conf] - Tanmoy Kanti Das, Hyoung Joong Kim, Subhamoy Maitra
**Security Evaluation of Generalized Patchwork Algorithm from Cryptanalytic Viewpoint.**[Citation Graph (0, 0)][DBLP] KES (1), 2005, pp:1240-1247 [Conf] - Subhamoy Maitra, Tanmoy Kanti Das, Jianying Zhou
**An Information Hiding Framework for Lightweight Mobile Devices with Digital Camera.**[Citation Graph (0, 0)][DBLP] PReMI, 2005, pp:491-496 [Conf] - Subhamoy Maitra, Kishan Chand Gupta, Ayineedi Venkateswarlu
**Multiples of Primitive Polynomials and Their Products over GF(2).**[Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 2002, pp:214-231 [Conf] - Enes Pasalic, Subhamoy Maitra
**Linear Codes in Constructing Resilient Functions with High Nonlinearity.**[Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 2001, pp:60-74 [Conf] - Deepak Kumar Dalai, Subhamoy Maitra
**Reducing the Number of Homogeneous Linear Equations in Finding Annihilators.**[Citation Graph (0, 0)][DBLP] SETA, 2006, pp:376-390 [Conf] - Subhamoy Maitra, Enes Pasalic
**A Maiorana-McFarland type construction for resilient Boolean functions on**[Citation Graph (0, 0)][DBLP]*n*variables (*n*even) with nonlinearity >2^{n-1}-2^{n/2}+2^{n/2-2}. Discrete Applied Mathematics, 2006, v:154, n:2, pp:357-369 [Journal] - Deepak Kumar Dalai, Subhamoy Maitra, Sumanta Sarkar
**Basic Theory in Construction of Boolean Functions with Maximum Possible Annihilator Immunity.**[Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 2006, v:40, n:1, pp:41-58 [Journal] - Sugata Gangopadhyay, Pradipkumar H. Keskar, Subhamoy Maitra
**Patterson-Wiedemann construction revisited.**[Citation Graph (0, 0)][DBLP] Discrete Mathematics, 2006, v:306, n:14, pp:1540-1556 [Journal] - Dibyendu Chakrabarti, Subhamoy Maitra, Bimal K. Roy
**A key pre-distribution scheme for wireless sensor networks: merging blocks in combinatorial design.**[Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2006, v:5, n:2, pp:105-114 [Journal] - Subhamoy Maitra
**Highly nonlinear balanced Boolean functions with good local and global avalanche characteristics.**[Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 2002, v:83, n:5, pp:281-286 [Journal] - Subhamoy Maitra, Palash Sarkar
**Hamming Weights of Correlation Immune Boolean Functions.**[Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 1999, v:71, n:3-4, pp:149-153 [Journal] - Pantelimon Stanica, Subhamoy Maitra
**A constructive count of rotation symmetric functions.**[Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 2003, v:88, n:6, pp:299-304 [Journal] - Subhamoy Maitra
**On Nonlinearity and Autocorrelation Properties of Correlation Immune Boolean Functions.**[Citation Graph (0, 0)][DBLP] J. Inf. Sci. Eng., 2004, v:20, n:2, pp:305-323 [Journal] - Tanmoy Kanti Das, Subhamoy Maitra
**Analysis of the "Wavelet Tree Quantization" watermarking strategy and a modified robust scheme.**[Citation Graph (0, 0)][DBLP] Multimedia Syst., 2006, v:12, n:2, pp:151-163 [Journal] - Palash Sarkar, Subhamoy Maitra
**Cross-Correlation Analysis of Cryptographically Useful Boolean Functions and S-Boxes.**[Citation Graph (0, 0)][DBLP] Theory Comput. Syst., 2002, v:35, n:1, pp:39-57 [Journal] - Palash Sarkar, Subhamoy Maitra
**Efficient Implementation of Cryptographically Useful 'Large' Boolean Functions.**[Citation Graph (0, 0)][DBLP] IEEE Trans. Computers, 2003, v:52, n:4, pp:410-417 [Journal] - Subhamoy Maitra, Kishan Chand Gupta, Ayineedi Venkateswarlu
**Results on multiples of primitive polynomials and their products over GF(2).**[Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 2005, v:341, n:1-3, pp:311-343 [Journal] - Subhamoy Maitra, Palash Sarkar
**Cryptographically significant Boolean functions with five valued Walsh spectra.**[Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 2002, v:276, n:1-2, pp:133-146 [Journal] - Claude Carlet, Deepak Kumar Dalai, Kishan Chand Gupta, Subhamoy Maitra
**Algebraic Immunity for Cryptographically Significant Boolean Functions: Analysis and Construction.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2006, v:52, n:7, pp:3105-3121 [Journal] - Subhamoy Maitra, Enes Pasalic
**Further constructions of resilient Boolean functions with very high nonlinearity.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2002, v:48, n:7, pp:1825-1834 [Journal] - Subhamoy Maitra, Palash Sarkar
**Modifications of Patterson-Wiedemann functions for cryptographic applications.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2002, v:48, n:1, pp:278-284 [Journal] - Subhamoy Maitra, Palash Sarkar
**Maximum nonlinearity of symmetric Boolean functions on odd number of variables.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2002, v:48, n:9, pp:2626-2630 [Journal] - Enes Pasalic, Subhamoy Maitra
**Linear codes in generalized construction of resilient functions with very high nonlinearity.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2002, v:48, n:8, pp:2182-2191 [Journal] - Palash Sarkar, Subhamoy Maitra
**Construction of Nonlinear Resilient Boolean Functions Using "Small" Affine Functions.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2004, v:50, n:9, pp:2185-2193 [Journal] - Selçuk Kavut, Subhamoy Maitra, Melek D. Yücel
**Search for Boolean Functions With Excellent Profiles in the Rotation Symmetric Class.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2007, v:53, n:5, pp:1743-1751 [Journal] - Tanmoy Kanti Das, Subhamoy Maitra, Jianying Zhou
**Cryptanalysis of Chu's DCT based watermarking scheme.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Multimedia, 2006, v:8, n:3, pp:629-632 [Journal] - Dipti Prasad Mukherjee, Subhamoy Maitra, Scott T. Acton
**Spatial domain digital watermarking of multimedia objects for buyer authentication.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Multimedia, 2004, v:6, n:1, pp:1-15 [Journal] - Palash Sarkar, Subhamoy Maitra
**Balancedness and correlation immunity of symmetric Boolean functions.**[Citation Graph (0, 0)][DBLP] Discrete Mathematics, 2007, v:307, n:19-20, pp:2351-2358 [Journal] **On Some Sequences of the Secret Pseudo-random Index j in RC4 Key Scheduling.**[Citation Graph (, )][DBLP]**On Non-randomness of the Permutation After RC4 Key Scheduling.**[Citation Graph (, )][DBLP]**Construction of Rotation Symmetric Boolean Functions on Odd Number of Variables with Maximum Algebraic Immunity.**[Citation Graph (, )][DBLP]**Recovering RC4 Permutation from 2048 Keystream Bytes if jIs Stuck.**[Citation Graph (, )][DBLP]**Partial Key Exposure Attack on CRT-RSA.**[Citation Graph (, )][DBLP]**Efficient CRT-RSA Decryption for Small Encryption Exponents.**[Citation Graph (, )][DBLP]**New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4.**[Citation Graph (, )][DBLP]**Improved Partial Key Exposure Attacks on RSA by Guessing a Few Bits of One of the Prime Factors.**[Citation Graph (, )][DBLP]**Analysis of RC4 and Proposal of Additional Layers for Better Security Margin.**[Citation Graph (, )][DBLP]**A New Class of Weak Encryption Exponents in RSA.**[Citation Graph (, )][DBLP]**Revisiting Wiener's Attack - New Weak Keys in RSA.**[Citation Graph (, )][DBLP]**Permutation After RC4 Key Scheduling Reveals the Secret Key.**[Citation Graph (, )][DBLP]**Factoring RSA Modulus Using Prime Reconstruction from Random Known Bits.**[Citation Graph (, )][DBLP]**Almost Boolean Functions: The Design of Boolean Functions by Spectral Inversion.**[Citation Graph (, )][DBLP]**On affine (non)equivalence of Boolean functions.**[Citation Graph (, )][DBLP]**Rotation symmetric Boolean functions - Count and cryptographic properties.**[Citation Graph (, )][DBLP]**On non-negligible bias of the first output byte of RC4 towards the first three bytes of the secret key.**[Citation Graph (, )][DBLP]**Idempotents in the neighbourhood of Patterson-Wiedemann functions having Walsh spectra zeros.**[Citation Graph (, )][DBLP]**Results on rotation symmetric bent functions.**[Citation Graph (, )][DBLP]
Search in 0.739secs, Finished in 0.743secs | |||||||

| |||||||

| |||||||

System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002 for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002 |