Chowdhury, Dipanwita Roy
122  Ergebnisse:
Personensuche X
?
2

Non-malleable Codes from Leakage Resilient Cryptographic Pr..:

, In: Information Security and Cryptology; Lecture Notes in Computer Science,
 
?
3

Security Analysis of WAGE Against Division Property Based C..:

, In: Information Security Practice and Experience; Lecture Notes in Computer Science,
 
?
4

Deep Learning Based Differential Classifier of PRIDE and RC:

, In: Applications and Techniques in Information Security; Communications in Computer and Information Science,
 
?
6

New Techniques for Modeling SBoxes: An MILP Approach:

, In: Cryptology and Network Security; Lecture Notes in Computer Science,
 
?
7

Security Analysis of WG-7 Lightweight Stream Cipher Against..:

, In: Lecture Notes in Networks and Systems; Proceedings of the Ninth International Conference on Mathematics and Computing,
 
?
8

Facial Image Manipulation Detection Using Cellular Automata..:

, In: Lecture Notes in Networks and Systems; Proceedings of the Ninth International Conference on Mathematics and Computing,
 
?
9

Intrusion detection for power grid: a review:

Dasgupta, Rupshali ; Pramanik, Meghabriti ; Mitra, Pabitra.
International Journal of Information Security.  23 (2023)  2 - p. 1317-1329 , 2023
 
?
10

Image Encryption with Parallel Evolution of 2-D Cellular Au..:

, In: Proceedings of the Seventh International Conference on Mathematics and Computing; Advances in Intelligent Systems and Computing,
 
?
11

Preventing Fault Attacks on S-Boxes of AES-Like Block Ciphe..:

, In: Communications in Computer and Information Science; Cyber Warfare, Security and Space Research,
 
?
12

CArrency: An Energy-Efficient Proof-of-Work Scheme for Cryp..:

, In: Proceedings of the Seventh International Conference on Mathematics and Computing; Advances in Intelligent Systems and Computing,
 
?
13

An Attack on Linear Scan Chains for Stream Ciphers and the ..:

Das, Bijoy ; Sardar, Amit ; Maiti, Swapan..
Journal of Hardware and Systems Security.  5 (2021)  3-4 - p. 191-207 , 2021
 
?
14

Design of Hash Function Using Two Dimensional Cellular Auto..:

, In: Advances in Intelligent Systems and Computing; Proceedings of the Fifth International Conference on Mathematics and Computing,
 
?
 
1-15