Chowdhury, Dipanwita Roy
126  results:
?
2

Key-Dependent Dynamic SBox for KASUMI Block Cipher:

, In: Lecture Notes in Networks and Systems; Proceedings of the Tenth International Conference on Mathematics and Computing,
Sardar, Amit ; Chowdhury, Dipanwita Roy - p. 191-205 , 2024
 
?
3

Guarding the Beats by Defending Resource Depletion Attacks ..:

, In: Lecture Notes in Networks and Systems; Proceedings of the Tenth International Conference on Mathematics and Computing,
Mitra, Anisha ; Chowdhury, Dipanwita Roy - p. 231-243 , 2024
 
?
4

Non-malleable Codes from Leakage Resilient Cryptographic Pr..:

, In: Information Security and Cryptology; Lecture Notes in Computer Science,
 
?
5

Deep Learning-Based Differential Distinguishers for NIST St..:

, In: Lecture Notes in Networks and Systems; Proceedings of the Tenth International Conference on Mathematics and Computing,
 
?
7

New Techniques for Modeling SBoxes: An MILP Approach:

, In: Cryptology and Network Security; Lecture Notes in Computer Science,
 
?
8

Facial Image Manipulation Detection Using Cellular Automata..:

, In: Lecture Notes in Networks and Systems; Proceedings of the Ninth International Conference on Mathematics and Computing,
 
?
9

Security Analysis of WG-7 Lightweight Stream Cipher Against..:

, In: Lecture Notes in Networks and Systems; Proceedings of the Ninth International Conference on Mathematics and Computing,
 
?
10

Security Analysis of WAGE Against Division Property Based C..:

, In: Information Security Practice and Experience; Lecture Notes in Computer Science,
 
?
11

Deep Learning Based Differential Classifier of PRIDE and RC:

, In: Applications and Techniques in Information Security; Communications in Computer and Information Science,
 
?
12

Intrusion detection for power grid: a review:

Dasgupta, Rupshali ; Pramanik, Meghabriti ; Mitra, Pabitra.
International Journal of Information Security.  23 (2023)  2 - p. 1317-1329 , 2023
 
?
13

Preventing Fault Attacks on S-Boxes of AES-Like Block Ciphe..:

, In: Communications in Computer and Information Science; Cyber Warfare, Security and Space Research,
 
?
14

Image Encryption with Parallel Evolution of 2-D Cellular Au..:

, In: Proceedings of the Seventh International Conference on Mathematics and Computing; Advances in Intelligent Systems and Computing,
 
?
15

CArrency: An Energy-Efficient Proof-of-Work Scheme for Cryp..:

, In: Proceedings of the Seventh International Conference on Mathematics and Computing; Advances in Intelligent Systems and Computing,
 
1-15