Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Souradyuti Paul
@inproceedings{DBLP:conf/icdcn/RajashekarKPS23, author = {Kolichala Rajashekar and Sushanta Karmakar and Souradyuti Paul and Subhajit Sidhanta}, title = {Topology-Aware Cluster Configuration for Real-time Multi-access Edge Computing}, booktitle = {24th International Conference on Distributed Computing and Networking, {ICDCN} 2023, Kharagpur, India, January 4-7, 2023}, pages = {286--287}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3571306.3571417}, doi = {10.1145/3571306.3571417}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcn/RajashekarKPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/RajashekarPKS22, author = {Kolichala Rajashekar and Souradyuti Paul and Sushanta Karmakar and Subhajit Sidhanta}, title = {Topology Aware Cluster Configuration for Minimizing Communication Delay in Edge Computing}, booktitle = {42nd {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2022, Bologna, Italy, July 10-13, 2022}, pages = {1310--1311}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICDCS54860.2022.00144}, doi = {10.1109/ICDCS54860.2022.00144}, timestamp = {Thu, 20 Oct 2022 09:13:03 +0200}, biburl = {https://dblp.org/rec/conf/icdcs/RajashekarPKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PaulS20, author = {Souradyuti Paul and Ananya Shrivastava}, title = {Efficient and Fair Multiparty Protocols using Blockchain and Trusted Hardware}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {133}, year = {2020}, url = {https://eprint.iacr.org/2020/133}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PaulS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latincrypt/PaulS19, author = {Souradyuti Paul and Ananya Shrivastava}, editor = {Peter Schwabe and Nicolas Th{\'{e}}riault}, title = {Efficient Fair Multiparty Protocols Using Blockchain and Trusted Hardware}, booktitle = {Progress in Cryptology - {LATINCRYPT} 2019 - 6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, October 2-4, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11774}, pages = {301--320}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30530-7\_15}, doi = {10.1007/978-3-030-30530-7\_15}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/latincrypt/PaulS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/KandeleP18, author = {Suyash Kandele and Souradyuti Paul}, title = {Key Assignment Scheme with Authenticated Encryption}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {4}, pages = {150--196}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i4.150-196}, doi = {10.13154/TOSC.V2018.I4.150-196}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/KandeleP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PaulS18, author = {Souradyuti Paul and Ananya Shrivastava}, editor = {Willy Susilo and Guomin Yang}, title = {Robust Multiparty Computation with Faster Verification Time}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {114--131}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_8}, doi = {10.1007/978-3-319-93638-3\_8}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PaulS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/KandeleP18, author = {Suyash Kandele and Souradyuti Paul}, editor = {Bart Preneel and Frederik Vercauteren}, title = {Message-Locked Encryption with File Update}, booktitle = {Applied Cryptography and Network Security - 16th International Conference, {ACNS} 2018, Leuven, Belgium, July 2-4, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10892}, pages = {678--695}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93387-0\_35}, doi = {10.1007/978-3-319-93387-0\_35}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/acns/KandeleP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KumawatP18, author = {Sudhakar Kumawat and Souradyuti Paul}, title = {A New Constant-size Accountable Ring Signature Scheme Without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {242}, year = {2018}, url = {http://eprint.iacr.org/2018/242}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KumawatP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MastanP18, author = {Indra Deep Mastan and Souradyuti Paul}, title = {A New Approach to Deanonymization of Unreachable Bitcoin Nodes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {243}, year = {2018}, url = {http://eprint.iacr.org/2018/243}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MastanP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KandeleP18, author = {Suyash Kandele and Souradyuti Paul}, title = {Message-locked Encryption with File Update}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {422}, year = {2018}, url = {https://eprint.iacr.org/2018/422}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KandeleP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KandeleP18a, author = {Suyash Kandele and Souradyuti Paul}, title = {Key Assignment Scheme with Authenticated Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1233}, year = {2018}, url = {https://eprint.iacr.org/2018/1233}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KandeleP18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/MastanP17, author = {Indra Deep Mastan and Souradyuti Paul}, editor = {Srdjan Capkun and Sherman S. M. Chow}, title = {A New Approach to Deanonymization of Unreachable Bitcoin Nodes}, booktitle = {Cryptology and Network Security - 16th International Conference, {CANS} 2017, Hong Kong, China, November 30 - December 2, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11261}, pages = {277--298}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-030-02641-7\_13}, doi = {10.1007/978-3-030-02641-7\_13}, timestamp = {Wed, 25 Sep 2019 18:04:17 +0200}, biburl = {https://dblp.org/rec/conf/cans/MastanP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/KumawatP17, author = {Sudhakar Kumawat and Souradyuti Paul}, editor = {Xiaofeng Chen and Dongdai Lin and Moti Yung}, title = {A New Constant-Size Accountable Ring Signature Scheme Without Random Oracles}, booktitle = {Information Security and Cryptology - 13th International Conference, Inscrypt 2017, Xi'an, China, November 3-5, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10726}, pages = {157--179}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-75160-3\_11}, doi = {10.1007/978-3-319-75160-3\_11}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/KumawatP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MoodyPS16, author = {Dustin Moody and Souradyuti Paul and Daniel Smith{-}Tone}, title = {Improved indifferentiability security bound for the {JH} mode}, journal = {Des. Codes Cryptogr.}, volume = {79}, number = {2}, pages = {237--259}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0047-9}, doi = {10.1007/S10623-015-0047-9}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MoodyPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/MoodyPS16, author = {Dustin Moody and Souradyuti Paul and Daniel Smith{-}Tone}, title = {Indifferentiability security of the fast wide pipe hash: Breaking the birthday barrier}, journal = {J. Math. Cryptol.}, volume = {10}, number = {2}, pages = {101--133}, year = {2016}, url = {https://doi.org/10.1515/jmc-2014-0044}, doi = {10.1515/JMC-2014-0044}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/MoodyPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/PaulHG12, author = {Souradyuti Paul and Ekawat Homsirikamol and Kris Gaj}, editor = {Steven D. Galbraith and Mridul Nandi}, title = {A Novel Permutation-Based Hash Mode of Operation {FP} and the Hash Function {SAMOSA}}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2012, 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7668}, pages = {509--527}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34931-7\_29}, doi = {10.1007/978-3-642-34931-7\_29}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/PaulHG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MoodyPS12, author = {Dustin Moody and Souradyuti Paul and Daniel Smith{-}Tone}, title = {Improved Indifferentiability Security Bound for the {JH} Mode}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {278}, year = {2012}, url = {http://eprint.iacr.org/2012/278}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MoodyPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PaulHG12, author = {Souradyuti Paul and Ekawat Homsirikamol and Kris Gaj}, title = {A Novel Permutation-based Hash Mode of Operation {FP} and the Hash Function {SAMOSA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {597}, year = {2012}, url = {http://eprint.iacr.org/2012/597}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PaulHG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MoodyPS11, author = {Dustin Moody and Souradyuti Paul and Daniel Smith{-}Tone}, title = {Indifferentiability Security of the Fast Widepipe Hash: Breaking the Birthday Barrier}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {630}, year = {2011}, url = {http://eprint.iacr.org/2011/630}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MoodyPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/NandiP10, author = {Mridul Nandi and Souradyuti Paul}, editor = {Guang Gong and Kishan Chand Gupta}, title = {Speeding Up the Wide-Pipe: Secure and Fast Hashing}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2010 - 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6498}, pages = {144--162}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17401-8\_12}, doi = {10.1007/978-3-642-17401-8\_12}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/indocrypt/NandiP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NandiP10, author = {Mridul Nandi and Souradyuti Paul}, title = {Speeding Up The Widepipe: Secure and Fast Hashing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {193}, year = {2010}, url = {http://eprint.iacr.org/2010/193}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NandiP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/SekarPP07, author = {Gautham Sekar and Souradyuti Paul and Bart Preneel}, editor = {K. Srinathan and C. Pandu Rangan and Moti Yung}, title = {Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4859}, pages = {58--72}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77026-8\_6}, doi = {10.1007/978-3-540-77026-8\_6}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/SekarPP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/SekarPP07, author = {Gautham Sekar and Souradyuti Paul and Bart Preneel}, editor = {Juan A. Garay and Arjen K. Lenstra and Masahiro Mambo and Ren{\'{e}} Peralta}, title = {New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py}, booktitle = {Information Security, 10th International Conference, {ISC} 2007, Valpara{\'{\i}}so, Chile, October 9-12, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4779}, pages = {249--262}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75496-1\_17}, doi = {10.1007/978-3-540-75496-1\_17}, timestamp = {Fri, 03 Feb 2023 21:39:19 +0100}, biburl = {https://dblp.org/rec/conf/isw/SekarPP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/weworc/SekarPP07, author = {Gautham Sekar and Souradyuti Paul and Bart Preneel}, editor = {Stefan Lucks and Ahmad{-}Reza Sadeghi and Christopher Wolf}, title = {New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B}, booktitle = {Research in Cryptology, Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4945}, pages = {127--141}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-88353-1\_11}, doi = {10.1007/978-3-540-88353-1\_11}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/weworc/SekarPP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Paul07, author = {Souradyuti Paul}, title = {Cryptanalysis of Stream Ciphers Based on Arrays and Modular Addition}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {54}, year = {2007}, url = {http://eprint.iacr.org/2007/054}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Paul07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SekarPP07, author = {Gautham Sekar and Souradyuti Paul and Bart Preneel}, title = {Weaknesses in the Pseudorandom Bit Generation Algorithms of the Stream Ciphers TPypy and TPy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {75}, year = {2007}, url = {http://eprint.iacr.org/2007/075}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SekarPP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SekarPP07a, author = {Gautham Sekar and Souradyuti Paul and Bart Preneel}, title = {New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {230}, year = {2007}, url = {http://eprint.iacr.org/2007/230}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SekarPP07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SekarPP07b, author = {Gautham Sekar and Souradyuti Paul and Bart Preneel}, title = {New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {436}, year = {2007}, url = {http://eprint.iacr.org/2007/436}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SekarPP07b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/PaulP06, author = {Souradyuti Paul and Bart Preneel}, editor = {Xuejia Lai and Kefei Chen}, title = {On the (In)security of Stream Ciphers Based on Arrays and Modular Addition}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4284}, pages = {69--83}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935230\_5}, doi = {10.1007/11935230\_5}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/PaulP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/PaulPS06, author = {Souradyuti Paul and Bart Preneel and Gautham Sekar}, editor = {Matthew J. B. Robshaw}, title = {Distinguishing Attacks on the Stream Cipher Py}, booktitle = {Fast Software Encryption, 13th International Workshop, {FSE} 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4047}, pages = {405--421}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11799313\_26}, doi = {10.1007/11799313\_26}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/PaulPS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PaulP05, author = {Souradyuti Paul and Bart Preneel}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Solving Systems of Differential Equations of Addition}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {75--88}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_7}, doi = {10.1007/11506157\_7}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PaulP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/PaulP05, author = {Souradyuti Paul and Bart Preneel}, editor = {Subhamoy Maitra and C. E. Veni Madhavan and Ramarathnam Venkatesan}, title = {Near Optimal Algorithms for Solving Differential Equations of Addition with Batch Queries}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2005, 6th International Conference on Cryptology in India, Bangalore, India, December 10-12, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3797}, pages = {90--103}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596219\_8}, doi = {10.1007/11596219\_8}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/PaulP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PaulP05, author = {Souradyuti Paul and Bart Preneel}, title = {On the (In)security of Stream Ciphers Based on Arrays and Modular Addition (Full Version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {448}, year = {2005}, url = {http://eprint.iacr.org/2005/448}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PaulP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/PaulP04, author = {Souradyuti Paul and Bart Preneel}, editor = {Bimal K. Roy and Willi Meier}, title = {A New Weakness in the {RC4} Keystream Generator and an Approach to Improve the Security of the Cipher}, booktitle = {Fast Software Encryption, 11th International Workshop, {FSE} 2004, Delhi, India, February 5-7, 2004, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3017}, pages = {245--259}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25937-4\_16}, doi = {10.1007/978-3-540-25937-4\_16}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/PaulP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PaulP04, author = {Souradyuti Paul and Bart Preneel}, title = {Solving Systems of Differential Equations of Addition}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {294}, year = {2004}, url = {http://eprint.iacr.org/2004/294}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PaulP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/PaulP03, author = {Souradyuti Paul and Bart Preneel}, editor = {Thomas Johansson and Subhamoy Maitra}, title = {Analysis of Non-fortuitous Predictive States of the {RC4} Keystream Generator}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2003, 4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2904}, pages = {52--67}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24582-7\_4}, doi = {10.1007/978-3-540-24582-7\_4}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/PaulP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.