What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Subhamoy Maitra
Google Scholar
ORCID:
0000-0002-8348-7971
41
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/cic
Construction of Maiorana-McFarland type cryptographically significant Boolean functions with good implementation properties.
Deng Tang
Anupam Chattopadhyay
Manmatha Roy
Bimal Mandal
Subhamoy Maitra
2025
journals/tosc
Significantly Improved Cryptanalysis of Salsa20 with Two-Round Criteria.
Sabyasachi Dey
Subhamoy Maitra
Santanu Sarkar
Nitin Kumar Sharma
2023
journals/tosc
Cryptanalysis of Reduced Round ChaCha - New Attack & Deeper Analysis.
Sabyasachi Dey
Hirendra Kumar Garai
Subhamoy Maitra
2021
conf/sacrypt
How Do the Arbiter PUFs Sample the Boolean Function Class?
Animesh Roy
Dibyendu Roy
Subhamoy Maitra
2016
journals/tosc
Significantly Improved Multi-bit Differentials for Reduced Round Salsa and ChaCha.
Arka Rai Choudhuri
Subhamoy Maitra
2014
journals/joc
(Non-)Random Sequences from (Non-)Random Permutations - Analysis of RC4 Stream Cipher.
Sourav Sen Gupta
Subhamoy Maitra
Goutam Paul
Santanu Sarkar
2014
conf/fse
Dependence in IV-Related Bytes of RC4 Key Enhances Vulnerabilities in WPA.
Sourav Sen Gupta
Subhamoy Maitra
Willi Meier
Goutam Paul
Santanu Sarkar
2013
conf/acisp
A Chosen IV Related Key Attack on Grain-128a.
Subhadeep Banik
Subhamoy Maitra
Santanu Sarkar
Meltem Sönmez Turan
2013
conf/iciss
Error Correction of Partially Exposed RSA Private Keys from MSB Side.
Santanu Sarkar
Sourav Sen Gupta
Subhamoy Maitra
2013
conf/iciss
New Long-Term Glimpse of RC4 Stream Cipher.
Subhamoy Maitra
Sourav Sen Gupta
2013
conf/ches
A Differential Fault Attack on MICKEY 2.0.
Subhadeep Banik
Subhamoy Maitra
2013
conf/africacrypt
New Results on Generalization of Roos-Type Biases and Related Keystreams of RC4.
Subhamoy Maitra
Goutam Paul
Santanu Sarkar
Michael Lehmann
Willi Meier
2012
conf/ches
Side Channel Attack to Actual Cryptanalysis: Breaking CRT-RSA with Low Weight Decryption Exponents.
Santanu Sarkar
Subhamoy Maitra
2012
conf/ches
A Differential Fault Attack on the Grain Family of Stream Ciphers.
Subhadeep Banik
Subhamoy Maitra
Santanu Sarkar
2011
conf/fse
Attack on Broadcast RC4 Revisited.
Subhamoy Maitra
Goutam Paul
Sourav Sen Gupta
2011
conf/iciss
Some Combinatorial Results towards State Recovery Attack on RC4.
Apurba Das
Subhamoy Maitra
Goutam Paul
Santanu Sarkar
2011
conf/iwsec
A Theoretical Analysis of the Structure of HC-128.
Goutam Paul
Subhamoy Maitra
Shashwat Raizada
2011
conf/sacrypt
Proof of Empirical RC4 Biases and New Key Correlations.
Sourav Sen Gupta
Subhamoy Maitra
Goutam Paul
Santanu Sarkar
2010
conf/ctrsa
Efficient CRT-RSA Decryption for Small Encryption Exponents.
Subhamoy Maitra
Santanu Sarkar
2010
conf/iwsec
Publishing Upper Half of RSA Decryption Exponent.
Subhamoy Maitra
Santanu Sarkar
Sourav Sen Gupta
2010
conf/africacrypt
Factoring RSA Modulus Using Prime Reconstruction from Random Known Bits.
Subhamoy Maitra
Santanu Sarkar
Sourav Sen Gupta
2009
conf/acns
Partial Key Exposure Attack on CRT-RSA.
Santanu Sarkar
Subhamoy Maitra
2008
conf/fse
New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4.
Subhamoy Maitra
Goutam Paul
2008
conf/acisp
Recovering RC4 Permutation from 2048 Keystream Bytes if jIs Stuck.
Subhamoy Maitra
Goutam Paul
2008
conf/icisc
Improved Partial Key Exposure Attacks on RSA by Guessing a Few Bits of One of the Prime Factors.
Santanu Sarkar
Subhamoy Maitra
2007
conf/sacrypt
Permutation After RC4 Key Scheduling Reveals the Secret Key.
Goutam Paul
Subhamoy Maitra
2005
conf/fse
Cryptographically Significant Boolean Functions: Construction and Analysis in Terms of Algebraic Immunity.
Deepak Kumar Dalai
Kishan Chand Gupta
Subhamoy Maitra
2005
conf/iciss
A Hybrid Design of Key Pre-distribution Scheme for Wireless Sensor Networks.
Dibyendu Chakrabarti
Subhamoy Maitra
Bimal K. Roy
2004
conf/fse
Minimum Distance between Bent and 1-Resilient Boolean Functions.
Soumen Maity
Subhamoy Maitra
2004
conf/fse
Results on Rotation Symmetric Bent and Correlation Immune Boolean Functions.
Pantelimon Stanica
Subhamoy Maitra
John A. Clark
2003
conf/acns
Efficient Software Implementation of LFSR and Boolean Function and Its Application in Nonlinear Combiner Model.
Sandeepan Chowdhury
Subhamoy Maitra
2002
conf/icics
A Robust Block Oriented Watermarking Scheme in Spatial Domain.
Tanmoy Kanti Das
Subhamoy Maitra
2002
conf/icics
Further Results on Multiples of Primitive Polynomials and Their Products over GF(2).
Ayineedi Venkateswarlu
Subhamoy Maitra
2002
conf/sacrypt
Multiples of Primitive Polynomials and Their Products over GF(2).
Subhamoy Maitra
Kishan Chand Gupta
Ayineedi Venkateswarlu
2001
conf/ches
Efficient Implementation of "Large" Stream Cipher Systems.
Palash Sarkar
Subhamoy Maitra
2001
conf/icics
Primitive Polynomials over GF(2) - A Cryptologic Approach.
Kishan Chand Gupta
Subhamoy Maitra
2001
conf/sacrypt
Linear Codes in Constructing Resilient Functions with High Nonlinearity.
Enes Pasalic
Subhamoy Maitra
2000
conf/crypto
Nonlinearity Bounds and Constructions of Resilient Boolean Functions.
Palash Sarkar
Subhamoy Maitra
2000
conf/eurocrypt
Construction of Nonlinear Boolean Functions with Important Cryptographic Properties.
Palash Sarkar
Subhamoy Maitra
1999
conf/acisp
Enumeration of Correlation Immune Boolean Functions.
Subhamoy Maitra
Palash Sarkar
1999
conf/crypto
Highly Nonlinear Resilient Functions Optimizing Siegenthaler's Inequality.
Subhamoy Maitra
Palash Sarkar
Coauthors
Animesh Roy
(1)
Anupam Chattopadhyay
(1)
Apurba Das
(1)
Arka Rai Choudhuri
(1)
Ayineedi Venkateswarlu
(2)
Bimal K. Roy
(1)
Bimal Mandal
(1)
Deepak Kumar Dalai
(1)
Deng Tang
(1)
Dibyendu Chakrabarti
(1)
Dibyendu Roy
(1)
Enes Pasalic
(1)
Goutam Paul
(10)
Hirendra Kumar Garai
(1)
John A. Clark
(1)
Kishan Chand Gupta
(3)
Manmatha Roy
(1)
Meltem Sönmez Turan
(1)
Michael Lehmann
(1)
Nitin Kumar Sharma
(1)
Palash Sarkar
(5)
Pantelimon Stanica
(1)
Sabyasachi Dey
(2)
Sandeepan Chowdhury
(1)
Santanu Sarkar
(15)
Shashwat Raizada
(1)
Soumen Maity
(1)
Sourav Sen Gupta
(8)
Subhadeep Banik
(3)
Subhamoy Maitra
(41)
Tanmoy Kanti Das
(1)
Willi Meier
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to