BibTeX records: Souradyuti Paul

download as .bib file

@inproceedings{DBLP:conf/icdcn/RajashekarKPS23,
  author       = {Kolichala Rajashekar and
                  Sushanta Karmakar and
                  Souradyuti Paul and
                  Subhajit Sidhanta},
  title        = {Topology-Aware Cluster Configuration for Real-time Multi-access Edge
                  Computing},
  booktitle    = {24th International Conference on Distributed Computing and Networking,
                  {ICDCN} 2023, Kharagpur, India, January 4-7, 2023},
  pages        = {286--287},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3571306.3571417},
  doi          = {10.1145/3571306.3571417},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcn/RajashekarKPS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/RajashekarPKS22,
  author       = {Kolichala Rajashekar and
                  Souradyuti Paul and
                  Sushanta Karmakar and
                  Subhajit Sidhanta},
  title        = {Topology Aware Cluster Configuration for Minimizing Communication
                  Delay in Edge Computing},
  booktitle    = {42nd {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2022, Bologna, Italy, July 10-13, 2022},
  pages        = {1310--1311},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICDCS54860.2022.00144},
  doi          = {10.1109/ICDCS54860.2022.00144},
  timestamp    = {Thu, 20 Oct 2022 09:13:03 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcs/RajashekarPKS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PaulS20,
  author       = {Souradyuti Paul and
                  Ananya Shrivastava},
  title        = {Efficient and Fair Multiparty Protocols using Blockchain and Trusted
                  Hardware},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {133},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/133},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PaulS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincrypt/PaulS19,
  author       = {Souradyuti Paul and
                  Ananya Shrivastava},
  editor       = {Peter Schwabe and
                  Nicolas Th{\'{e}}riault},
  title        = {Efficient Fair Multiparty Protocols Using Blockchain and Trusted Hardware},
  booktitle    = {Progress in Cryptology - {LATINCRYPT} 2019 - 6th International Conference
                  on Cryptology and Information Security in Latin America, Santiago
                  de Chile, Chile, October 2-4, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11774},
  pages        = {301--320},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30530-7\_15},
  doi          = {10.1007/978-3-030-30530-7\_15},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/latincrypt/PaulS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/KandeleP18,
  author       = {Suyash Kandele and
                  Souradyuti Paul},
  title        = {Key Assignment Scheme with Authenticated Encryption},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {4},
  pages        = {150--196},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i4.150-196},
  doi          = {10.13154/TOSC.V2018.I4.150-196},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/KandeleP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PaulS18,
  author       = {Souradyuti Paul and
                  Ananya Shrivastava},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Robust Multiparty Computation with Faster Verification Time},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {114--131},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_8},
  doi          = {10.1007/978-3-319-93638-3\_8},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PaulS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/KandeleP18,
  author       = {Suyash Kandele and
                  Souradyuti Paul},
  editor       = {Bart Preneel and
                  Frederik Vercauteren},
  title        = {Message-Locked Encryption with File Update},
  booktitle    = {Applied Cryptography and Network Security - 16th International Conference,
                  {ACNS} 2018, Leuven, Belgium, July 2-4, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10892},
  pages        = {678--695},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93387-0\_35},
  doi          = {10.1007/978-3-319-93387-0\_35},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/KandeleP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KumawatP18,
  author       = {Sudhakar Kumawat and
                  Souradyuti Paul},
  title        = {A New Constant-size Accountable Ring Signature Scheme Without Random
                  Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {242},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/242},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KumawatP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MastanP18,
  author       = {Indra Deep Mastan and
                  Souradyuti Paul},
  title        = {A New Approach to Deanonymization of Unreachable Bitcoin Nodes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {243},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/243},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MastanP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KandeleP18,
  author       = {Suyash Kandele and
                  Souradyuti Paul},
  title        = {Message-locked Encryption with File Update},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {422},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/422},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KandeleP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KandeleP18a,
  author       = {Suyash Kandele and
                  Souradyuti Paul},
  title        = {Key Assignment Scheme with Authenticated Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1233},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1233},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KandeleP18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/MastanP17,
  author       = {Indra Deep Mastan and
                  Souradyuti Paul},
  editor       = {Srdjan Capkun and
                  Sherman S. M. Chow},
  title        = {A New Approach to Deanonymization of Unreachable Bitcoin Nodes},
  booktitle    = {Cryptology and Network Security - 16th International Conference, {CANS}
                  2017, Hong Kong, China, November 30 - December 2, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11261},
  pages        = {277--298},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-030-02641-7\_13},
  doi          = {10.1007/978-3-030-02641-7\_13},
  timestamp    = {Wed, 25 Sep 2019 18:04:17 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/MastanP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/KumawatP17,
  author       = {Sudhakar Kumawat and
                  Souradyuti Paul},
  editor       = {Xiaofeng Chen and
                  Dongdai Lin and
                  Moti Yung},
  title        = {A New Constant-Size Accountable Ring Signature Scheme Without Random
                  Oracles},
  booktitle    = {Information Security and Cryptology - 13th International Conference,
                  Inscrypt 2017, Xi'an, China, November 3-5, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10726},
  pages        = {157--179},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-75160-3\_11},
  doi          = {10.1007/978-3-319-75160-3\_11},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/KumawatP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MoodyPS16,
  author       = {Dustin Moody and
                  Souradyuti Paul and
                  Daniel Smith{-}Tone},
  title        = {Improved indifferentiability security bound for the {JH} mode},
  journal      = {Des. Codes Cryptogr.},
  volume       = {79},
  number       = {2},
  pages        = {237--259},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0047-9},
  doi          = {10.1007/S10623-015-0047-9},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MoodyPS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/MoodyPS16,
  author       = {Dustin Moody and
                  Souradyuti Paul and
                  Daniel Smith{-}Tone},
  title        = {Indifferentiability security of the fast wide pipe hash: Breaking
                  the birthday barrier},
  journal      = {J. Math. Cryptol.},
  volume       = {10},
  number       = {2},
  pages        = {101--133},
  year         = {2016},
  url          = {https://doi.org/10.1515/jmc-2014-0044},
  doi          = {10.1515/JMC-2014-0044},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/MoodyPS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/PaulHG12,
  author       = {Souradyuti Paul and
                  Ekawat Homsirikamol and
                  Kris Gaj},
  editor       = {Steven D. Galbraith and
                  Mridul Nandi},
  title        = {A Novel Permutation-Based Hash Mode of Operation {FP} and the Hash
                  Function {SAMOSA}},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2012, 13th International Conference
                  on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7668},
  pages        = {509--527},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34931-7\_29},
  doi          = {10.1007/978-3-642-34931-7\_29},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/PaulHG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MoodyPS12,
  author       = {Dustin Moody and
                  Souradyuti Paul and
                  Daniel Smith{-}Tone},
  title        = {Improved Indifferentiability Security Bound for the {JH} Mode},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {278},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/278},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MoodyPS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PaulHG12,
  author       = {Souradyuti Paul and
                  Ekawat Homsirikamol and
                  Kris Gaj},
  title        = {A Novel Permutation-based Hash Mode of Operation {FP} and the Hash
                  Function {SAMOSA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {597},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/597},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PaulHG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MoodyPS11,
  author       = {Dustin Moody and
                  Souradyuti Paul and
                  Daniel Smith{-}Tone},
  title        = {Indifferentiability Security of the Fast Widepipe Hash: Breaking the
                  Birthday Barrier},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {630},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/630},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MoodyPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/NandiP10,
  author       = {Mridul Nandi and
                  Souradyuti Paul},
  editor       = {Guang Gong and
                  Kishan Chand Gupta},
  title        = {Speeding Up the Wide-Pipe: Secure and Fast Hashing},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2010 - 11th International Conference
                  on Cryptology in India, Hyderabad, India, December 12-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6498},
  pages        = {144--162},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17401-8\_12},
  doi          = {10.1007/978-3-642-17401-8\_12},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/indocrypt/NandiP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NandiP10,
  author       = {Mridul Nandi and
                  Souradyuti Paul},
  title        = {Speeding Up The Widepipe: Secure and Fast Hashing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {193},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/193},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NandiP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/SekarPP07,
  author       = {Gautham Sekar and
                  Souradyuti Paul and
                  Bart Preneel},
  editor       = {K. Srinathan and
                  C. Pandu Rangan and
                  Moti Yung},
  title        = {Related-Key Attacks on the Py-Family of Ciphers and an Approach to
                  Repair the Weaknesses},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2007, 8th International Conference
                  on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4859},
  pages        = {58--72},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77026-8\_6},
  doi          = {10.1007/978-3-540-77026-8\_6},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/SekarPP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/SekarPP07,
  author       = {Gautham Sekar and
                  Souradyuti Paul and
                  Bart Preneel},
  editor       = {Juan A. Garay and
                  Arjen K. Lenstra and
                  Masahiro Mambo and
                  Ren{\'{e}} Peralta},
  title        = {New Weaknesses in the Keystream Generation Algorithms of the Stream
                  Ciphers TPy and Py},
  booktitle    = {Information Security, 10th International Conference, {ISC} 2007, Valpara{\'{\i}}so,
                  Chile, October 9-12, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4779},
  pages        = {249--262},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75496-1\_17},
  doi          = {10.1007/978-3-540-75496-1\_17},
  timestamp    = {Fri, 03 Feb 2023 21:39:19 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/SekarPP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/weworc/SekarPP07,
  author       = {Gautham Sekar and
                  Souradyuti Paul and
                  Bart Preneel},
  editor       = {Stefan Lucks and
                  Ahmad{-}Reza Sadeghi and
                  Christopher Wolf},
  title        = {New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the
                  TPy6-A and the TPy6-B},
  booktitle    = {Research in Cryptology, Second Western European Workshop, WEWoRC 2007,
                  Bochum, Germany, July 4-6, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4945},
  pages        = {127--141},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-88353-1\_11},
  doi          = {10.1007/978-3-540-88353-1\_11},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/weworc/SekarPP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Paul07,
  author       = {Souradyuti Paul},
  title        = {Cryptanalysis of Stream Ciphers Based on Arrays and Modular Addition},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {54},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/054},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Paul07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SekarPP07,
  author       = {Gautham Sekar and
                  Souradyuti Paul and
                  Bart Preneel},
  title        = {Weaknesses in the Pseudorandom Bit Generation Algorithms of the Stream
                  Ciphers TPypy and TPy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {75},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/075},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SekarPP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SekarPP07a,
  author       = {Gautham Sekar and
                  Souradyuti Paul and
                  Bart Preneel},
  title        = {New Weaknesses in the Keystream Generation Algorithms of the Stream
                  Ciphers TPy and Py},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {230},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/230},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SekarPP07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SekarPP07b,
  author       = {Gautham Sekar and
                  Souradyuti Paul and
                  Bart Preneel},
  title        = {New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the
                  TPy6-A and the TPy6-B},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {436},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/436},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SekarPP07b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/PaulP06,
  author       = {Souradyuti Paul and
                  Bart Preneel},
  editor       = {Xuejia Lai and
                  Kefei Chen},
  title        = {On the (In)security of Stream Ciphers Based on Arrays and Modular
                  Addition},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2006, 12th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Shanghai, China, December 3-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4284},
  pages        = {69--83},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935230\_5},
  doi          = {10.1007/11935230\_5},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/PaulP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/PaulPS06,
  author       = {Souradyuti Paul and
                  Bart Preneel and
                  Gautham Sekar},
  editor       = {Matthew J. B. Robshaw},
  title        = {Distinguishing Attacks on the Stream Cipher Py},
  booktitle    = {Fast Software Encryption, 13th International Workshop, {FSE} 2006,
                  Graz, Austria, March 15-17, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4047},
  pages        = {405--421},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11799313\_26},
  doi          = {10.1007/11799313\_26},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/PaulPS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PaulP05,
  author       = {Souradyuti Paul and
                  Bart Preneel},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Solving Systems of Differential Equations of Addition},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {75--88},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_7},
  doi          = {10.1007/11506157\_7},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PaulP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/PaulP05,
  author       = {Souradyuti Paul and
                  Bart Preneel},
  editor       = {Subhamoy Maitra and
                  C. E. Veni Madhavan and
                  Ramarathnam Venkatesan},
  title        = {Near Optimal Algorithms for Solving Differential Equations of Addition
                  with Batch Queries},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2005, 6th International Conference
                  on Cryptology in India, Bangalore, India, December 10-12, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3797},
  pages        = {90--103},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11596219\_8},
  doi          = {10.1007/11596219\_8},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/PaulP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PaulP05,
  author       = {Souradyuti Paul and
                  Bart Preneel},
  title        = {On the (In)security of Stream Ciphers Based on Arrays and Modular
                  Addition (Full Version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {448},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/448},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PaulP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/PaulP04,
  author       = {Souradyuti Paul and
                  Bart Preneel},
  editor       = {Bimal K. Roy and
                  Willi Meier},
  title        = {A New Weakness in the {RC4} Keystream Generator and an Approach to
                  Improve the Security of the Cipher},
  booktitle    = {Fast Software Encryption, 11th International Workshop, {FSE} 2004,
                  Delhi, India, February 5-7, 2004, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3017},
  pages        = {245--259},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25937-4\_16},
  doi          = {10.1007/978-3-540-25937-4\_16},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/PaulP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PaulP04,
  author       = {Souradyuti Paul and
                  Bart Preneel},
  title        = {Solving Systems of Differential Equations of Addition},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {294},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/294},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PaulP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/PaulP03,
  author       = {Souradyuti Paul and
                  Bart Preneel},
  editor       = {Thomas Johansson and
                  Subhamoy Maitra},
  title        = {Analysis of Non-fortuitous Predictive States of the {RC4} Keystream
                  Generator},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2003, 4th International Conference
                  on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2904},
  pages        = {52--67},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24582-7\_4},
  doi          = {10.1007/978-3-540-24582-7\_4},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/PaulP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics