Search

Your search keyword '"CHOWDHURY, DIPANWITA ROY"' showing total 256 results

Search Constraints

Start Over You searched for: Author "CHOWDHURY, DIPANWITA ROY" Remove constraint Author: "CHOWDHURY, DIPANWITA ROY"
256 results on '"CHOWDHURY, DIPANWITA ROY"'

Search Results

1. Modeling Linear and Non-linear Layers: An MILP Approach Towards Finding Differential and Impossible Differential Propagations

3. Security Analysis of WG-7 Lightweight Stream Cipher against Cube Attack

4. Efficient Algorithms for Modeling SBoxes Using MILP

5. Key-Dependent Dynamic SBox for KASUMI Block Cipher

6. Deep Learning-Based Differential Distinguishers for NIST Standard Authenticated Encryption and Permutations

7. Guarding the Beats by Defending Resource Depletion Attacks on Implantable Cardioverter Defibrillators

10. Security Analysis of WAGE Against Division Property Based Cube Attack

11. New Techniques for Modeling SBoxes: An MILP Approach

12. Facial Image Manipulation Detection Using Cellular Automata and Transfer Learning

13. Deep Learning Based Differential Classifier of PRIDE and RC5

18. Preventing Fault Attacks on S-Boxes of AES-Like Block Ciphers

19. Image Encryption with Parallel Evolution of 2-D Cellular Automata

20. CArrency: An Energy-Efficient Proof-of-Work Scheme for Crypto-Currencies

21. Preventing Fault Attack on Stream Ciphers by Fault Detection and Correction

22. Design of Hash Function Using Two Dimensional Cellular Automata

27. A Family of Subfield Hyperelliptic Curves for Use in Cryptography

29. On the Security of the Double-Block-Length Hash Function NCASH

30. An Efficient Parallel Implementation of Impossible-Differential Cryptanalysis for Five-Round AES-128

34. A Secure and Efficient Protocol for Group Key agreement in Heterogeneous Environment

37. On the Practical Implementation of Impossible Differential Cryptanalysis on Reduced-Round AES

38. On the Security of Designing a Cellular Automata Based Stream Cipher

42. EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis with a Case-Study on PAEQ

43. Scope: On the Side Channel Vulnerability of Releasing Unverified Plaintexts

44. Gain: Practical Key-Recovery Attacks on Round-reduced PAEQ

47. AEC: A Practical Scheme for Authentication with Error Correction

48. CASH: Cellular Automata Based Parameterized Hash

49. Inapplicability of Fault Attacks against Trivium on a Cellular Automata Based Stream Cipher

50. A Scalable Method for Constructing Non-linear Cellular Automata with Period 2 n − 1

Catalog

Books, media, physical & digital resources