The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Subhamoy Maitra: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Subhamoy Maitra, Palash Sarkar
    Enumeration of Correlation Immune Boolean Functions. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:12-25 [Conf]
  2. Sandeepan Chowdhury, Subhamoy Maitra
    Efficient Software Implementation of LFSR and Boolean Function and Its Application in Nonlinear Combiner Model. [Citation Graph (0, 0)][DBLP]
    ACNS, 2003, pp:387-402 [Conf]
  3. Palash Sarkar, Subhamoy Maitra
    Efficient Implementation of "Large" Stream Cipher Systems. [Citation Graph (0, 0)][DBLP]
    CHES, 2001, pp:319-332 [Conf]
  4. Subhamoy Maitra, Palash Sarkar
    Highly Nonlinear Resilient Functions Optimizing Siegenthaler's Inequality. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:198-215 [Conf]
  5. Palash Sarkar, Subhamoy Maitra
    Nonlinearity Bounds and Constructions of Resilient Boolean Functions. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2000, pp:515-532 [Conf]
  6. Palash Sarkar, Subhamoy Maitra
    Construction of Nonlinear Boolean Functions with Important Cryptographic Properties. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2000, pp:485-506 [Conf]
  7. Deepak Kumar Dalai, Kishan Chand Gupta, Subhamoy Maitra
    Cryptographically Significant Boolean Functions: Construction and Analysis in Terms of Algebraic Immunity. [Citation Graph (0, 0)][DBLP]
    FSE, 2005, pp:98-111 [Conf]
  8. Soumen Maity, Subhamoy Maitra
    Minimum Distance between Bent and 1-Resilient Boolean Functions. [Citation Graph (0, 0)][DBLP]
    FSE, 2004, pp:143-160 [Conf]
  9. Pantelimon Stanica, Subhamoy Maitra, John A. Clark
    Results on Rotation Symmetric Bent and Correlation Immune Boolean Functions. [Citation Graph (0, 0)][DBLP]
    FSE, 2004, pp:161-177 [Conf]
  10. Kishan Chand Gupta, Subhamoy Maitra
    Primitive Polynomials over GF(2) - A Cryptologic Approach. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:23-34 [Conf]
  11. Tanmoy Kanti Das, Subhamoy Maitra
    A Robust Block Oriented Watermarking Scheme in Spatial Domain. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:184-196 [Conf]
  12. Ayineedi Venkateswarlu, Subhamoy Maitra
    Further Results on Multiples of Primitive Polynomials and Their Products over GF(2). [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:231-242 [Conf]
  13. Dibyendu Chakrabarti, Subhamoy Maitra, Bimal K. Roy
    A Hybrid Design of Key Pre-distribution Scheme for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICISS, 2005, pp:228-238 [Conf]
  14. Selçuk Kavut, Subhamoy Maitra, Sumanta Sarkar, Melek D. Yücel
    Enumeration of 9-Variable Rotation Symmetric Boolean Functions Having Nonlinearity > 240. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2006, pp:266-279 [Conf]
  15. Kishan Chand Gupta, Subhamoy Maitra
    Multiples of Primitive Polynomials over GF(2). [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2001, pp:62-72 [Conf]
  16. Sandeepan Chowdhury, Subhamoy Maitra
    Efficient Software Implementation of Linear Feedback Shift Registers. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2001, pp:297-307 [Conf]
  17. John A. Clark, Jeremy L. Jacob, Susan Stepney, Subhamoy Maitra, William Millan
    Evolving Boolean Functions Satisfying Multiple Criteria. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2002, pp:246-259 [Conf]
  18. Subhamoy Maitra
    Autocorrelation Properties of Correlation Immune Boolean Functions. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2001, pp:242-253 [Conf]
  19. Subhamoy Maitra, Dipti Prasad Mukherjee
    Spatial Domain Digital Watermarking with Buyer Authentication. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2001, pp:149-161 [Conf]
  20. Deepak Kumar Dalai, Kishan Chand Gupta, Subhamoy Maitra
    Results on Algebraic Immunity for Cryptographically Significant Boolean Functions. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:92-106 [Conf]
  21. Tanmoy Kanti Das, Subhamoy Maitra
    Cryptanalysis of Optimal Differential Energy Watermarking (DEW) and a Modified Robust Scheme. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2002, pp:135-148 [Conf]
  22. Sugata Gangopadhyay, Subhamoy Maitra
    Further Results Related to Generalized Nonlinearity. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2002, pp:260-274 [Conf]
  23. Dibyendu Chakrabarti, Subhamoy Maitra, Bimal K. Roy
    A Key Pre-distribution Scheme for Wireless Sensor Networks: Merging Blocks in Combinatorial Design. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:89-103 [Conf]
  24. Tanmoy Kanti Das, Subhamoy Maitra
    Cryptanalysis of "Wavelet Tree Quantization" Watermarking Scheme. [Citation Graph (0, 0)][DBLP]
    IWDC, 2004, pp:219-230 [Conf]
  25. Dibyendu Chakrabarti, Subhamoy Maitra, Bimal K. Roy
    Clique Size in Sensor Networks with Key Pre-distribution Based on Transversal Design. [Citation Graph (0, 0)][DBLP]
    IWDC, 2005, pp:329-337 [Conf]
  26. Tanmoy Kanti Das, Jianying Zhou, Subhamoy Maitra
    Cryptanalysis of a Wavelet Based Watermarking Scheme. [Citation Graph (0, 0)][DBLP]
    IWDW, 2004, pp:192-203 [Conf]
  27. Tanmoy Kanti Das, Hyoung Joong Kim, Subhamoy Maitra
    Security Evaluation of Generalized Patchwork Algorithm from Cryptanalytic Viewpoint. [Citation Graph (0, 0)][DBLP]
    KES (1), 2005, pp:1240-1247 [Conf]
  28. Subhamoy Maitra, Tanmoy Kanti Das, Jianying Zhou
    An Information Hiding Framework for Lightweight Mobile Devices with Digital Camera. [Citation Graph (0, 0)][DBLP]
    PReMI, 2005, pp:491-496 [Conf]
  29. Subhamoy Maitra, Kishan Chand Gupta, Ayineedi Venkateswarlu
    Multiples of Primitive Polynomials and Their Products over GF(2). [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2002, pp:214-231 [Conf]
  30. Enes Pasalic, Subhamoy Maitra
    Linear Codes in Constructing Resilient Functions with High Nonlinearity. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2001, pp:60-74 [Conf]
  31. Deepak Kumar Dalai, Subhamoy Maitra
    Reducing the Number of Homogeneous Linear Equations in Finding Annihilators. [Citation Graph (0, 0)][DBLP]
    SETA, 2006, pp:376-390 [Conf]
  32. Subhamoy Maitra, Enes Pasalic
    A Maiorana-McFarland type construction for resilient Boolean functions on n variables (n even) with nonlinearity >2n-1-2n/2+2n/2-2. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 2006, v:154, n:2, pp:357-369 [Journal]
  33. Deepak Kumar Dalai, Subhamoy Maitra, Sumanta Sarkar
    Basic Theory in Construction of Boolean Functions with Maximum Possible Annihilator Immunity. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2006, v:40, n:1, pp:41-58 [Journal]
  34. Sugata Gangopadhyay, Pradipkumar H. Keskar, Subhamoy Maitra
    Patterson-Wiedemann construction revisited. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 2006, v:306, n:14, pp:1540-1556 [Journal]
  35. Dibyendu Chakrabarti, Subhamoy Maitra, Bimal K. Roy
    A key pre-distribution scheme for wireless sensor networks: merging blocks in combinatorial design. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2006, v:5, n:2, pp:105-114 [Journal]
  36. Subhamoy Maitra
    Highly nonlinear balanced Boolean functions with good local and global avalanche characteristics. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2002, v:83, n:5, pp:281-286 [Journal]
  37. Subhamoy Maitra, Palash Sarkar
    Hamming Weights of Correlation Immune Boolean Functions. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1999, v:71, n:3-4, pp:149-153 [Journal]
  38. Pantelimon Stanica, Subhamoy Maitra
    A constructive count of rotation symmetric functions. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2003, v:88, n:6, pp:299-304 [Journal]
  39. Subhamoy Maitra
    On Nonlinearity and Autocorrelation Properties of Correlation Immune Boolean Functions. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2004, v:20, n:2, pp:305-323 [Journal]
  40. Tanmoy Kanti Das, Subhamoy Maitra
    Analysis of the "Wavelet Tree Quantization" watermarking strategy and a modified robust scheme. [Citation Graph (0, 0)][DBLP]
    Multimedia Syst., 2006, v:12, n:2, pp:151-163 [Journal]
  41. Palash Sarkar, Subhamoy Maitra
    Cross-Correlation Analysis of Cryptographically Useful Boolean Functions and S-Boxes. [Citation Graph (0, 0)][DBLP]
    Theory Comput. Syst., 2002, v:35, n:1, pp:39-57 [Journal]
  42. Palash Sarkar, Subhamoy Maitra
    Efficient Implementation of Cryptographically Useful 'Large' Boolean Functions. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2003, v:52, n:4, pp:410-417 [Journal]
  43. Subhamoy Maitra, Kishan Chand Gupta, Ayineedi Venkateswarlu
    Results on multiples of primitive polynomials and their products over GF(2). [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2005, v:341, n:1-3, pp:311-343 [Journal]
  44. Subhamoy Maitra, Palash Sarkar
    Cryptographically significant Boolean functions with five valued Walsh spectra. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2002, v:276, n:1-2, pp:133-146 [Journal]
  45. Claude Carlet, Deepak Kumar Dalai, Kishan Chand Gupta, Subhamoy Maitra
    Algebraic Immunity for Cryptographically Significant Boolean Functions: Analysis and Construction. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2006, v:52, n:7, pp:3105-3121 [Journal]
  46. Subhamoy Maitra, Enes Pasalic
    Further constructions of resilient Boolean functions with very high nonlinearity. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2002, v:48, n:7, pp:1825-1834 [Journal]
  47. Subhamoy Maitra, Palash Sarkar
    Modifications of Patterson-Wiedemann functions for cryptographic applications. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2002, v:48, n:1, pp:278-284 [Journal]
  48. Subhamoy Maitra, Palash Sarkar
    Maximum nonlinearity of symmetric Boolean functions on odd number of variables. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2002, v:48, n:9, pp:2626-2630 [Journal]
  49. Enes Pasalic, Subhamoy Maitra
    Linear codes in generalized construction of resilient functions with very high nonlinearity. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2002, v:48, n:8, pp:2182-2191 [Journal]
  50. Palash Sarkar, Subhamoy Maitra
    Construction of Nonlinear Resilient Boolean Functions Using "Small" Affine Functions. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2004, v:50, n:9, pp:2185-2193 [Journal]
  51. Selçuk Kavut, Subhamoy Maitra, Melek D. Yücel
    Search for Boolean Functions With Excellent Profiles in the Rotation Symmetric Class. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2007, v:53, n:5, pp:1743-1751 [Journal]
  52. Tanmoy Kanti Das, Subhamoy Maitra, Jianying Zhou
    Cryptanalysis of Chu's DCT based watermarking scheme. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Multimedia, 2006, v:8, n:3, pp:629-632 [Journal]
  53. Dipti Prasad Mukherjee, Subhamoy Maitra, Scott T. Acton
    Spatial domain digital watermarking of multimedia objects for buyer authentication. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Multimedia, 2004, v:6, n:1, pp:1-15 [Journal]
  54. Palash Sarkar, Subhamoy Maitra
    Balancedness and correlation immunity of symmetric Boolean functions. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 2007, v:307, n:19-20, pp:2351-2358 [Journal]

  55. On Some Sequences of the Secret Pseudo-random Index j in RC4 Key Scheduling. [Citation Graph (, )][DBLP]


  56. On Non-randomness of the Permutation After RC4 Key Scheduling. [Citation Graph (, )][DBLP]


  57. Construction of Rotation Symmetric Boolean Functions on Odd Number of Variables with Maximum Algebraic Immunity. [Citation Graph (, )][DBLP]


  58. Recovering RC4 Permutation from 2048 Keystream Bytes if jIs Stuck. [Citation Graph (, )][DBLP]


  59. Partial Key Exposure Attack on CRT-RSA. [Citation Graph (, )][DBLP]


  60. Efficient CRT-RSA Decryption for Small Encryption Exponents. [Citation Graph (, )][DBLP]


  61. New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4. [Citation Graph (, )][DBLP]


  62. Improved Partial Key Exposure Attacks on RSA by Guessing a Few Bits of One of the Prime Factors. [Citation Graph (, )][DBLP]


  63. Analysis of RC4 and Proposal of Additional Layers for Better Security Margin. [Citation Graph (, )][DBLP]


  64. A New Class of Weak Encryption Exponents in RSA. [Citation Graph (, )][DBLP]


  65. Revisiting Wiener's Attack - New Weak Keys in RSA. [Citation Graph (, )][DBLP]


  66. Permutation After RC4 Key Scheduling Reveals the Secret Key. [Citation Graph (, )][DBLP]


  67. Factoring RSA Modulus Using Prime Reconstruction from Random Known Bits. [Citation Graph (, )][DBLP]


  68. Almost Boolean Functions: The Design of Boolean Functions by Spectral Inversion. [Citation Graph (, )][DBLP]


  69. On affine (non)equivalence of Boolean functions. [Citation Graph (, )][DBLP]


  70. Rotation symmetric Boolean functions - Count and cryptographic properties. [Citation Graph (, )][DBLP]


  71. On non-negligible bias of the first output byte of RC4 towards the first three bytes of the secret key. [Citation Graph (, )][DBLP]


  72. Idempotents in the neighbourhood of Patterson-Wiedemann functions having Walsh spectra zeros. [Citation Graph (, )][DBLP]


  73. Results on rotation symmetric bent functions. [Citation Graph (, )][DBLP]


Search in 0.135secs, Finished in 0.138secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002