Publications in 2022

  • K. Saha, A. Nath: Open books and embeddings of smooth and contact manifolds, Advances in Geometry 2022

  • A. Das, S. K. Mishra: The L∞-deformations of associative Rota–Baxter algebras and homotopy Rota–Baxter operators, Journal of Mathematical Physics 2022

  • J. Ray, R. Sujatha: SELMER GROUPS OF ELLIPTIC CURVES OVER THE PGL(2) EXTENSION, Nagoya Mathematical Journal 2022

  • A. Dutta, M. Nandi, A. Saha: Proof of Mirror Theory for \xi_max=2, IEEE Transactions of Information Theory 2022.

  • P. Sadhukhan: Exploring the Pertinence of Distance Functions for Nominal Multi-label Data, AIAI 2022. URL: https://doi.org/10.1007/978-3-031-08337-2_18

  • A. Bhattacharjee, A. Dutta, E. List, M. Nandi: CENCPP* – Beyond-birthday-secure Encryption from Public Permutations, Design Codes and Cryptography 2022.

  • Y. L. Chen, A. Dutta, M. Nandi: Multi-User BBB Security of Public Permutation Based MAC, Cryptography and Communications (to appear) 2022.

  • S. Chattopadhyay: Improving Performance of High Throughput Wireless Access Networks – An Experience in Learning, 23rd International Conference on Distributed Computing and Networking, January 2022 Pages 229–231, https://doi.org/10.1145/3491003.3493331

  • A. Mondal, A. Mukhopadhyay, S. Chattopadhyay: Machine learning-driven automatic storage space recommendation for object-based cloud storage system. Complex Intelligent. System. 8, 489–505 (2022). https://doi.org/10.1007/s40747-021-00517-4

  • A. Banerjee, S. De, K. Majumder, D. Dash and S. Chattopadhyay. Construction of energy minimized WSN using GA-SAMP-MWPSO and K-mean clustering algorithm with LDCF deployment strategy. J Supercomput (2022). https://doi.org/10.1007/s11227-021-04265-7




Publications in 2021

  • N. Datta, A. Dutta, K. Dutta: Improved Security Bound of (E/D)WCDM, IACR Transactions on Symmetric Cryptology 2021 (4): 138 – 176. [Link]

  • S. S. Chaudhury: On Quantum Evolving Secret Sharing Schemes – Further Studies and Improvements, Quantum Information and Computation (2021).

  • T. SAPV, D. Bera, A. Maitra, S. Maitra: Quantum Algorithms for Cryptographically Significant Boolean Functions, Springer Briefs in Computer Science, Springer, 2021, ISSN 2191-5768, ISBN 978-981-16-3060-6. [Link]

  • A. Dutta, M. Nandi, S. Talnikar: Permutation Based EDM: An Inverse Free BBB Secure PRF. IACR Trans. Symmetric Cryptol. 2021(2): 31-70 (2021).

  • A. Chakraborty, J. B. Etnyre, H. Min: Cabling Legendrian and transverse knots. Journal of Differential Geometry (to appear).

  • A. Ghanwat, K. Saha: On Embedding of 4-manifolds. Indian Journal of Pure and Applied Math (2021). [Link]

  • A. Chakraborti, N. Datta, A.Jha, C.M. Lopez, M. Nandi: tHyENA: Making HyENA Even Smaller. INDOCRYPT 2021: 26 – 48. [Link]

  • R. Anand, A. Maitra, S. Maitra, C. S. Mukherjee, S. Mukhopadhyay: Quantum Resource Estimation for FSR based Symmetric Ciphers & Related Grovers Attacks. INDOCRYPT 2021: 179 – 198. [Link]

  • A. Chakraborti, N. Datta, A.Jha, C.M. Lopez, M. Nandi, Y. Sasaki: Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher. INDOCRYPT 2021: 114 – 137. [Link]

  • P. Sadhukhan, S. Palit: Oversampling the minority class using a dedicated fitness function and genetic algorithmic progression. Concurrency Computat Pract Exper. 2021; e6648. [Link]

  • A. Pakrashi, P. Sadhukhan, B. Mac NameeML-NCA: Multi-label Neighbourhood Component Analysis. LIDTA@PKDD/ECML 2021




Publications in 2020

  • A. Dutta: Minimizing the Two-Round Tweakable Even-Mansour Cipher. ASIACRYPT (1) 2020: 601-629
  • R. Anand, A. Maitra, S. Mukhopadhyay: Grover on SIMON, Quantum Information Processing, Vol-19, number-340, (2020), (SCIE, Impact Factor 2.283). https://link.springer.com/article/10.1007/s11128-020-02844-w.

  • A. Dutta, M. Nandi: BBB Secure Nonce Based MAC Using Public Permutations. AFRICACRYPT 2020, pp 172-191 (2020).

  • R. Anand, A. Maitra, S. Mukhopadhyay: Evaluation of Quantum Cryptanalysis on SPECK, Progress in Cryptology INDOCRYPT 2020, pp 395-413. Lecture Notes in Computer Science 12578, Springer.

  • J. Dave, A. Dutta, P. Faruki, V. Laxmi, M. S. Gaur: Secure Proof of Ownership Using Merkle Tree for Deduplicated Storage. Autom. Control. Comput. Sci. 54(4): 358-370 (2020).




Covid Update Summary

K. Sengupta, P. K. Das: COVID-19_R_Zero_Estimation_India (Last Updated on 29 March 2022)