Invited Talks on Quantum Information and Computation
  1. Quantum Entanglement and Its Applications.
    One-day seminar for the teachers of the Electronics and Communication Engineering (ECE) Department of Techno Main, Salt Lake, Kolkata, India, August 25, 2023.
  2. Does Monogamy of Entanglement hold universally?
    Seminar at the Center for Quantum Engineering, Research and Education (CQuERE), TCG CREST, Kolkata, India, July 25, 2023.
  3. Cyber Security through Quantum Goggles.
    Inaugural Seminar of a lecture series in celebration of India’s presidency of the G20, organized by the Department of Liberal Arts, Indian Institute of Technology, Bhilai, India, March 3, 2023.
  4. Mathematics for Quantum Computation.
    Invited Lecture, Faculty Development Program on Mathematics and its applications, Mathematics Department, St. Xavier’s College, Kolkata, India, February 18, 2023.
  5. Quantum Cryptography and Beyond.
    Keynote Talk at International Conference on Cryptology and Network Security with Machine Learning (ICCNSML, December 16-18, 2022), Department of Mathematics, Pranveer Singh Institute of Technology (PSIT), Kanpur, India, December 16, 2022.
  6. From Classical to Quantum Security.
    A webinar on Cyber Security, organized by the Department of Information Technology, Sikkim Manipal Institute of Technology (SMIT), Majitar, Sikkim, India,  as a part of the celebration of Cyber Jaagrookta Diwas (CJD), November 2, 2022.
  7. Monogamy of Entanglement and Its Violation in Indistinguishable Particles.                                                                                                              Presented as a CQT-talk at Centre for Quantum Technologies (CQT), National University of Singapore (NUS), May 11, 2022.
  8. Quantum Cryptography.
    Online Short Term Training Program (STTP) on Quantum Computing and Its Applications (July 19-24, 2021), sponsored by AICTE, organized by Maulana Abul Kalam Azad University of Technology (MAKAUT), India, July 22, 2021.
  9. Quantum Computing and Cryptography.
    Online Short-Term Training Program (STTP) on Information Security and Digital Forensics (November 23-28, 2020), sponsored by AICTE, organized by Army Institute of Technology (AIT), Pune, India, November 24, 2020.
  10. Transition from Classical to Quantum Cryptography.
    Crypto-Innovation Webinar Series: Part VII, Data Security Council of India (DSCI), under the aegis of National Association of Software and Service Companies (NASSCOM), and Ministry of Electronics & Information Technology (MeitY), Govt. of India, July 27, 2020.
  11. The War between Classical and Quantum Cryptography.
    International Symposium on Quantum Information Technologies (ISQIT, December 2-5, 2019), Defence Institute of Advanced Technology (DIAT), Pune, India, December 5, 2019.
  12. Towards Practical Quantum Cryptography.
    Faculty Development Program on Cryptography and Cyber Security,  B.P. Poddar Institute of Management and Technology, Kolkata, India, March 26, 2019.
  13. From Classical to Quantum Cryptography and Beyond.
    Fifth International Conference on Mathematics and Computing (February 7-9, 2019), Kalinga Institute of Industrial Technology (KIIT) School of Computer Engineering, Bhubaneswar, Odisha, India, February 9, 2019.
  14. Quantum Cheque, Quantum Currency and Quantum Bitcoins.
    IndoQuant: Workshop on Quantum Computing and Information (January 11-13, 2019), Department of Computer Science, Indian Institute of Technology (IIT) Hyderabad, India, January 13, 2019.
  15. Integer Factorization using Closed Timelike Curves.
    Asia Pacific Conference and Workshop on Quantum Information Science (APCWQIS, December 19-23, 2018), Indian Institutes of Science Education and Research (IISER) Kolkata, India, December 21, 2018.
  16. Quantum Cryptography for Computer Scientists.
    TEQIP-III Sponsored Short Term Course on Cryptology (STC, November 12-16, 2018), National Institute of Technology (NIT) Durgapur, India, November 14, 2018.
  17. Mathematical Background of Quantum Cryptography.
    TEQIP-III Sponsored Short Term Course on Cryptology (STC, November 12-16, 2018), National Institute of Technology (NIT) Durgapur, India, November 14, 2018.
  18. Parallelism in Quantum Algorithms.
    One day National Workshop on Quantum Computing and Communication Technologies (NWQCCT) at Defence Research and Development Organisation (DRDO) Bhawan, New Delhi, India, October 5, 2018.
  19. Quantum Computation: Reality, Imagination, Achievements and Possibilities.
    Seminar at Bhabha Atomic Research Centre (BARC), Mumbai, India, December 22, 2017.
  20. Aspects of Quantum Cryptography.
    One-day Workshop on Cyberspace and Cyber Security (WCSCS), organized as a part of the 5th Global Conference on Cyberspace (GCCS), Indian Institutes of Science Education and Research, Kolkata, India, November 4, 2017.
  21. Quantum Cryptography and Key Distribution.
    TEQIP-II sponsored a short-term training program (STTP, October 30 – November 3, 2017) on Multimedia Security, Cryptocurrency and Forensics, National Institute of Technology, Raipur, India, November 2, 2017.
  22. Introduction to Quantum Computing.
    TEQIP-II sponsored a short-term training program (STTP, October 30 – November 3, 2017) on Multimedia Security, Cryptocurrency and Forensics, National Institute of Technology, Raipur, India, November 2, 2017.
  23. The Science and Engineering of Quantum Computation.
    Seminar at Condensed Matter Physics Research Centre, Physics Department, Jadavpur University, Kolkata, India, June 23, 2017.
  24. Quantum Key Distribution and Its Cryptanalysis.
    An academic program on Quantum Optics and Quantum Technology (June 5-8, 2017) at the Indian Association for the Cultivation of Science (IACS), organized by its Department of Materials Science and Raman Centre for Atomic and Molecular Sciences, Kolkata, India, June 6, 2017.
  25. Classical and Quantum Computation: Friends or Foes?
    Academic Discussion on Classical and Quantum Computation and Information, organized by J C Bose Science Heritage Museum (JCBSHM) in collaboration with Cambridge University Press (CUP), Kolkata, India, May 18, 2017.
  26. From Classical Computation to Quantum Information.
    Workshop on Quantum Technologies, Jagadish Chandra Bose Centre for Advanced Technology (JCBCAT), Defence Research & Development Organisation (DRDO), Kolkata, India, April 18, 2017.
  27. Quantum Cryptography.
    National Instructional Workshop on Cryptology (March 10-12, 2017), Department of Computer Science and Systems Engineering, Andhra University, Visakhapatnam, India, March 12, 2017.
  28. Quantum Computers: Myth vs. Reality.
    Second North-East Workshop on Computing: Theory and Applications at Tezpur Centre of Indian Statistical Institute (Feb 20-24, 2017), organized by the Computer and Communication Sciences Division (CCSD) of the Institute, February 24, 2017.
  29. Secure Communication in Pre-Quantum, Quantum and Post-Quantum Era.
    International Conference on Advanced Computing (ICAC, Oct 26-27, 2016), Maulana Abul Kalam Azad University of Technology, Kolkata, India, Oct 27, 2016.
  30. Introduction to Quantum Cryptography.
    National Instructional Workshop on Cryptology (April 6-8, 2016), Central University of Rajasthan, Ajmer, India, April 8, 2016.
  31. The death and rebirth of classical cryptography in a quantum world.
    International School and Conference on Quantum Information (Feb 9-18, 2016), Institute of Physics (IOP), Bhubaneswar, India, February 10, 2016.
  32. Pre-Quantum Cryptology.
    International School and Conference on Quantum Information (Feb 9-18, 2016), Institute of Physics (IOP), Bhubaneswar, India, February 9, 2016.
  33. Pre-Quantum Information Theory.
    International School and Conference on Quantum Information (Feb 9-18, 2016), Institute of Physics (IOP), Bhubaneswar, India, February 9, 2016.
  34. An Overview of Quantum Information and Computation.
    Lecture Meeting organized by Computer Chapter of IEEE Kolkata Section, Jadavpur University, Kolkata, India, January 29, 2016.
    Click HERE to view/listen.
  35. Quantum Rational Secret Sharing.
    Seminar at Physics and Applied Mathematics Unit (PAMU), Indian Statistical Institute, Kolkata, India, August 19, 2015.
  36. Interplay between Mutual Information and Success Probability: A Deeper Look into the Security of BB84.
    Seminar at Theoretical Physics Division, Physical Research Laboratory (PRL), Ahmedabad, India, November 21, 2014.
  37. An Introduction to Quantum Key Distribution.
    Cryptography Seminar Series, Indian Statistical Institute (ISI), Kolkata, India, May 21, 2014.
  38. Is classical information and computation dead in a quantum world?
    Seminar at the Department of Computer Science & Technology, Indian Institute of Engineering Science and Technology (IIEST), Shibpur, Howrah, India, April 17, 2014.
  39. No Cloning Theorem and Quantum Key Distribution.
    Seminar at the Department of Mathematics, Birla Institute of Technology and Science (BITS) Pilani, K. K. Birla Goa campus, Goa, India, December 6, 2013.
  40. Classical Cryptography in a Quantum World.
    Satellite Meeting on Quantum Correlation and Its Possible Application in Communication and Cryptography (Sep 2-3, 2013), Indian Statistical Institute (ISI), Kolkata, India, September 2, 2013.
  41. Architectural and Implementation Issues of Robust Cryptosystems in the Quantum Era: A Case Study.
    Network Meeting of the Alexander von Humboldt Foundation (November 28-30, 2012), Institute of Theoretical Informatics, Karlsruher Institut fur Technologie (KIT), Karlsruhe, Germany, November 29, 2012.
  42. Pseudo-Random Generators: from Classical to Quantum Security.
    Seminar at the Ultra High-Speed Mobile Information and Communication (UMIC) Research Centre, Rheinisch-Westfälische Technische Hochschule (RWTH) Aachen, Germany, July 11, 2012.
  43. Protecting Privacy: from Stone-age to Quantum World.
    Seminar for the Faculty Members of the Department of Computer Science & Engineering, the Department of Information Technology and the Department of Master of Computer Application, Siliguri Institute of Technology, Siliguri, India, January 20, 2012.
  44. Four-State BB84 is as Secure as the Six-State Protocol.
    Security Fundamentals (SF) Meeting, Research Center for Information Security (RCIS), National Institute of Advanced Industrial Science and Technology (AIST), Tsukuba, Japan, November 15, 2011.

Invited Talks on Classical Cryptology
  1. Crypto Currents (Current State of the Art of Cryptography).
    Seminar in the Department of Computer Science & Engineering, Artificial Intelligence & Machine Learning, Computer Science & Business Systems (CSE AIML CSBS) of Institute of Engineering & Management (IEM), Salt Lake, Kolkata, India, August 24, 2023.
  2. Cyber security is Mathematics and Cyber security is not Mathematics.
    One day Faculty and staff development program on Cyber Security, MCKV Institute of Engineering, Howrah, India, December 9, 2021.
  3. Data anonymization: Past, Present and Future.
    Keynote Lecture at the Symposium on the Anonymiser Hackathon, organized by the Dept. of IT & Electronics, Govt. of West Bengal, supported by Webel, Sapio Analytics, AWS, NASSCOM, IEEE, IETE, KPMG and Bengal Chamber of Commerce & Industry, at the Biswa Bangla Convention Centre, Kolkata, India, August 12, 2023.
  4. Applications of Cryptology.
    Online Foundation Course on Cyber Security (March 1-5, 2021), Centre for Development of Advanced Computing (CDAC), Kolkata, India, March 3, 2021.
  5. WiFi and Transport Layer Security: A Cryptographic Journey.
    Webinar at a short-term course on “Information Security: Approaches in Application to Physical Layer” (January 11-15, 2021), Department of Information Technology, Indian Institute of Engineering Science and Technology (IIEST), Shibpur, Howrah, India, January 12, 2021.
  6. Security in Cyber-Physical Systems.
    Online Short-term training program on Challenges and Applications of Cyber-Physical Systems (December 7-12, 2020) in association with AICTE, organized by Gandhi Institute of Engineering and Technology (GIET), Gunupur, Odisha, India. December 7, 2020.
  7. WiFi and TLS Cipher Suits and the Saga of RC4.
    Connections (Nov 13-14, 2019) – A pre-IETF India Forum, organized by India Internet Engineering Society (IIESoc), Kolkata, India, November 14, 2019.
  8. Cryptography and Cryptanalysis.
    AICTE-ATAL Workshop on Cyber Security, Centre for Development of Advanced Computing (CDAC), Kolkata, India, October 22, 2019.
  9. Cryptographic Applications in Wireless Communications.
    One-Day Workshop on Cryptography, Telecommunication Headquarters, West Bengal Police, Kolkata, India, June 19, 2019.
  10. Standardization, Vulnerability Testing and Cryptanalysis of Stream Ciphers.
    Workshop on Detailed Overview of Cryptology and Security and their significance in Software Application/ICT products (June 17-19, 2019), for the scientists of Standardisation Testing and Quality Certification (STQC) Directorate, Ministry of Electronics &  Information Technology (MeitY), Govt. of India, held at Indian  Statistical  Institute,  Kolkata, India, June 17, 2019.
  11. Introduction to Stream Cipher.
    Workshop on Detailed Overview of Cryptology and Security and their Significance in Software Application/ICT products (June 17-19, 2019), for the scientists of Standardisation Testing and Quality Certification (STQC) Directorate, Ministry of  Electronics  & Information Technology (MeitY), Govt. of India, held at Indian  Statistical  Institute,  Kolkata, India, June 17, 2019.
  12. Consensus Protocols in Bitcoins.
    Faculty Development Program on Cryptography and Cyber Security,  B.P. Poddar Institute of Management and Technology, Kolkata, India, March 26, 2019.
  13. Introduction to Secret Sharing.
    Advanced Training in Mathematics Workshop (ATMW) on Cryptology (April 10-14, 2018), Indian Statistical Institute (ISI), Kolkata, India, sponsored by National Centre for Mathematics (a joint centre of IIT Bombay and TIFR, Mumbai), April 11, 2018.
  14. Introduction to Randomness, Numbers and Cryptography.
    Scholastic Test of Excellence in Mathematical Sciences (STEMS) Camp (February 9-11, 2018), Chennai Mathematical Institute, Chennai, India, February 10, 2018.
  15. Design and Analysis of Encryption Algorithms.
    Workshop on Some Theoretical Aspects in Computing and Applications (January 8-12, 2018), Department of Computer Science and Technology, Indian Institute of Engineering Science and Technology (IIEST), Shibpur, Howrah, India, January 12, 2018.
  16. Cryptographic Security for Communication Network.
    National Conference on Advancement of Security in Modern Communication Network (ACIN), Electronics and Communication Engineering Department, Dr. Sudhir Chandra Sur Degree Engineering College, Kolkata, India, October 27, 2017.
  17. Cryptography: a saga of reincarnation!
    Annual Technical Fest – DAKSHH, Heritage Institute of Technology, Kolkata, India, March 20, 2017.
  18. Random number generation and its applications.
    Workshop on Mathematics, Computer Science and Cryptology (Jan 30-31, 2017), Bhawanipur Education Society College, Kolkata, India, January 30, 2017.
  19. From Battle-fields to Bank ATMs — the Evolution of Cryptology.
    Seminar at Bhawanipur Education Society College, Kolkata, India, September 16, 2016.
  20. How Randomness Is Used in Cryptography.
    One-day State-Level Workshop on Mathematics, Computer Science and Cryptology, Department of Mathematics, Computer Science and Science Forum, Mrinalini Datta Mahavidyapith, Birati, Kolkata, India, August 23, 2016.
  21. From Randomness to WiFi Security and Beyond.
    Seminar at Department of Mathematics and Statistics, Himachal Pradesh University, Shimla, India, June 6, 2016.
  22. Some Ores from Crypto-mines.
    Special Research Talk for Summer Internship in Cryptology (May 16 – July 15, 2016), Indian Statistical Institute (ISI), Kolkata, India, May 20, 2016.
  23. Introduction to Stream Cipher Security.
    Workshop on Cryptology for North Eastern States (January 21-27, 2016), Applied Statistics Unit (ASU), Indian Statistical Institute (ISI), Kolkata, India, January 27, 2016.
  24. Introduction to Stream Cipher Design.
    Workshop on Cryptology for North Eastern States (January 21-27, 2016), Applied Statistics Unit (ASU), Indian Statistical Institute (ISI), Kolkata, India, January 25, 2016.
  25. Overview of Hardware Cryptography.
    Workshop on Digital Design (Nov 6-8, 2015), Advanced Computing and Microelectronics Unit (ACMU), Indian Statistical Institute (ISI), Kolkata, India, November 6, 2015.
  26. Non-randomness of Reduced-round Salsa20 and Its Implications.
    Workshop on Security of Symmetric Ciphers in Network Protocols (May 25-29, 2015), International Centre for Mathematical Sciences (ICMS), Edinburgh, under EPSRC-DST Indo-UK Initiative in Applied Mathematics, May 28, 2015.
  27. Differential Cryptanalysis of Salsa20.
    Targeted Training Program at Indian Statistical Institute (ISI), Delhi, India, March 20, 2015.
  28. Linear Cryptanalysis of HC-128.
    Targeted Training Program at Indian Statistical Institute (ISI), Delhi, India, March 20, 2015.
  29. An Application of Random Graphs in Cryptanalysis.
    ASU Seminar Series, Applied Statistics Unit (ASU), Indian Statistical Institute (ISI), Kolkata, India, March 3, 2015.
  30. A Short Tour of Symmetric Key Encryption: Stream Ciphers.
    National Level North East Workshop on Cryptology (January 22-24, 2015), C.I. College, Bishnupur, Manipur, India, January 23, 2015.
  31. A Short Tour of Symmetric Key Encryption: Block Ciphers.
    National Level North East Workshop on Cryptology (January 22-24, 2015), C.I. College, Bishnupur, Manipur, India, January 23, 2015.
  32. Statistical Cryptanalysis of RC4 as used in WEP, WPA and TLS: Foundations and Important Results.
    Winter School on Interplay Between Statistics and Cryptology (December 1-5, 2014), organized by Applied Statistics Unit, Indian Statistical Institute, Kolkata, in collaboration with EPSRC-DST Indo-UK Initiative in Applied Mathematics, December 3, 2014.
  33. Number Theoretic Algorithms for Public Key Cryptography.
    Course on Cryptography, Department of Computer Science & Engineering, Tripura Institute of Technology (TIT), Agartala, India, November 8, 2014.
  34. From Insecure Randomness to Secure Pseudo-randomness: A journey with permutation over integers modulo N.
    Colloquium at Department of Computer Science, University at Albany, State University of New York, U.S.A., July 21, 2014.
  35. Permutation, Randomness and WiFi Security.
    Seminar at Department of Computer Science, University of Nevada, Las Vegas, U.S.A.,July 17, 2014
  36. Symmetric Key Cryptography: Stream Ciphers.
    Short Term Course on Cryptography (May 18-24, 2014), Department of Mathematics, Indian Institute Technology (IIT) Kharagpur, India, May 18, 2014.
  37.  Introduction to Classical Cryptography.
    Short Term Course on Cryptography (May 18-24, 2014), Department of Mathematics, Indian Institute Technology (IIT) Kharagpur, India, May 18, 2014.
  38. Introduction to Block Ciphers.
    Staff Development Programme on Cryptography & Information Security (Sep 21-25, 2013), Govt. College of Engineering & Textile Technology – Berhampore, Murshidabad, India, Sep 22, 2013.
  39. Introduction to Cryptology.
    Staff Development Programme on Cryptography & Information Security (Sep 21-25, 2013), Govt. College of Engineering & Textile Technology – Berhampore, Murshidabad, India, Sep 21, 2013.
  40. Biases and Distinguishers of the RC4 Stream Cipher.
    Seminar at Crypto and Security group, Department of Electrical and Information Technology, Lund University, Sweden, March 27, 2013.
  41. A Look into (Non-)Randomness of RC4 Stream Cipher.
    Theory Seminar at Center for the Theory of Interactive Computation (CTIC),Aarhus University, Denmark, March 22, 2013.
  42. The RC4 Landscape: Hills, Canyons and Plateaus.
    Seminar at Security and Cryptography Laboratory (LASEC), School of Computer and Communication Sciences (I&C), Ecole Polytechnique Federale de Lausanne (EPFL), Switzerland, February 8, 2013.
  43. Connection between Information Theory and Security.
    Seminar at the Institute for Communication Technologies and Embedded Systems (ICE), Rheinisch-Westfälische Technische Hochschule (RWTH) Aachen, Germany, June 26, 2012.
  44. An Overview of Classical Information and Classical Cryptography.
    Workshop on Information and Security in Quantum World (March 28-30, 2012), Indian Statistical Institute, Kolkata, India, March 28, 2012.
  45. Distinguishing Attacks on Stream Ciphers.
    ASU Seminar Series, Applied Statistics Unit (ASU), Indian Statistical Institute (ISI), Kolkata, India, November 29, 2011.
  46. Trivial and Non-trivial Issues of TRIVIUM.
    Workshop on eSTREAM Ciphers (Sep 30-Oct 1, 2011), Indian Statistical Institute, Delhi Centre, India, September 30, 2011.
  47. Stream Ciphers: from One Time Pad to 4G.
    National Level Workshop on Cryptology (September 29-30, 2011) for College and University Teachers and Students, West Bengal State University, Barasat, India, September 29, 2011.
  48. How to Send Secret Messages in Public.
    NAMSAA Popular Talk Series, New Alipore Multipurpose School, Kolkata, India, September 24, 2011.
  49. Partial State Exposure of HC-128 and Its Consequences.
    Indo-Japan Joint Workshop on Cryptography, Indian Statistical Institute, Kolkata, India, September 15, 2011.
  50. Random Number Generation and Stream Cipher.
    Tutorial Workshop on Cryptology, Rajabazar Science College Campus, University of Calcutta, India; jointly organized by the University of Calcutta & the Centre of Excellence in Cryptology, Indian Statistical Institute, July 16, 2011.
  51. Wireless Encryption Algorithms.
    UGC Refresher Course for College and University Teachers on Security in Wired and Wireless Networks, School of Mobile Computing and Communication, Jadavpur University, Kolkata, India, July 14, 2011.
  52. Randomness and Cryptography.
    Seminar organized by Computer Chapter of IEEE Calcutta Section, School of Mobile Computing and Communication, Jadavpur University, Kolkata, India, July 13, 2011.
  53. Cryptology: The Art and Science of Secure Communication.
    Workshop on Emerging Technology in Computing, June 8, 2011, St. Thomas’ College of Engineering & Technology, Kolkata, India.
  54. Fundamentals of Stream Ciphers.
    National Level Instructional Workshop on Cryptology (May 9-13, 2011), Centre for Cyber Security, Amrita Vishya Vidyapeetham, Coimbatore, India, May 11, 2011.
  55. Cryptosystems and Cryptanalytic Attacks.
    Training on Information and Network Security, Scientific Analysis Group (SAG), Defence Research & Development Organisation (DRDO), Delhi, Ministry of Defence, Govt. of India, February 4, 2011.
  56. Symmetric Key Cryptography: Some Modern Stream Ciphers.
    BARC Lecture Series on Cryptology, Supercomputing Facility, Computer Division, Bhabha Atomic Research Centre (BARC), Mumbai, India, November 23, 2010.
  57. State of the Art Software Stream Ciphers.
    National Level Instructional Workshop on Cryptology (for University and College Teachers of the North-East Region, May 5-7, 2010), Department of Mathematics, Manipur University, Imphal, India, May 6, 2010.
  58. Construction of Full State from Half State of HC-128.
    Seminar at Coding & Cryptography Research Group (CCRG), Division of Mathematical Sciences, School of Physical & Mathematical Sciences, Nanyang Technological University (NTU), Singapore, March 10, 2010.
  59. New Distinguishing Attacks on HC-128.
    Security Fundamentals (SF) Meeting, Research Center for Information Security (RCIS), National Institute of Advanced Industrial Science and Technology (AIST), Akihabara Site, Tokyo, Japan, July 13, 2009.
  60. Stream Cipher RC4: A Case Study.
    Workshop on Teaching Cryptology at Undergraduate Level, Indian Statistical Institute (ISI), Kolkata, India; jointly organized by the Cryptology Research Society of India (CRSI) and the Institute of Mathematical Sciences (IMSc), Chennai, India; partially sponsored by Department of Science and Technology (DST), Government of India, June 18, 2009.
  61. Recent Advances in RC4 Cryptanalysis.
    Workshop on Cryptography, Institute of Mathematics and Applications (IMA), Bhubaneswar; co-organized by the National Institute of Science Education and Research (NISER), Bhubaneswar (an Autonomous Institution of Department of Atomic Energy, Government of India); sponsored by the Science and Technology Department, State Council on Science and Technology, Government of Orissa and Institute of Mathematical Sciences (IMSc), Chennai, India, December 6, 2008.
  62. Cryptology: A Technical Overview.
    Seminar at TwoPiRadian Infotech Private Limited (http://www.2pirad.com), Kolkata, India, February 2, 2008.
  63. On New Weaknesses of the RC4 Stream Cipher.
    Centre for Applied Cryptographic Research (CACR) Seminar Series, University of Waterloo, Ontario, Canada, August 22, 2007.
  64. Structural Weakness of the Key Scheduling of RC4.
    1st Indo-French Workshop on Cryptography and Related Topics (IFW), Paris, France, organized by the Indo-French Centre for the Promotion of Advanced Research under the Department of Science and Technology (DST), Government of India and the Ministry of Foreign Affairs, Government of France, June 11, 2007.
  65. Basics of Public Key Cryptography.
    State Level Seminar on Application of Cryptology in Industry and Cryptanalysis (ACIC), Science City, Kolkata, India, organized by the Department of Information Technology of the RCC Institute of Information Technology and Partially Sponsored by Cognizant Technology Solutions (CTS), May 5, 2007.

Invited Talks on Mathematics
  1. Applications of Mathematics in Data Security.
    Workshop on Mathematics-Cryptology-Computer Science for Higher Secondary students of Rahara Ramkrishna Mission High School, Rahara, India, September 19, 2018.
  2. Mathematics in Art.
    Workshop on Mathematics-Cryptology-Computer Science for Higher Secondary students of (i) Jadavpur Sammilita Balika Vidyalaya, (ii) Baghajatin Balika Vidyalaya and (iii) Sir Nripendra Nath Girls High School, organized by Netaji Nagar College for Women, Kolkata, India, November 3, 2017.
  3. A Refresher on Probability.
    Special Talk for Summer Internship in Cryptology (May 15 – July 7, 2017), Indian Statistical Institute (ISI), Kolkata, India, May 15, 2017.
  4. Power and Limitations of Mathematical Logic.
    MathSpectrum – Symposium on varied flavours of mathematics for college teachers of any discipline, organized by Netaji Nagar College for Women, Kolkata, India, March 30, 2017.
  5. Applications of Finite Fields.
    UGC Sponsored Refresher Course for College and University Teachers on Mathematics and Its Applications (Jan 02 – Jan 21, 2017), Department of Mathematics, Jadavpur University, Kolkata, India, January 21, 2017.
  6. Theory of Finite Fields.
    UGC Sponsored Refresher Course for College and University Teachers on Mathematics and Its Applications (Jan 02 – Jan 21, 2017), Department of Mathematics, Jadavpur University, Kolkata, India, January 20, 2017.
  7. Application of Mathematics in Science and Technology.
    Workshop on Mathematics-Cryptology-Computer Science for Higher Secondary students of (i) Jadavpur Sammilita Balika Vidyalaya, (ii) Lake Gardens School, (iii) Better High School and (iv) New Alipore Multipurpose School, organized by Netaji Nagar College for Women, Kolkata, India, December 8, 2016.
  8. Mathematics for Computer Science.
    One-day State-Level Workshop on Mathematics, Computer Science and Cryptology, Department of Mathematics, Brahmananda Keshab Chandra (BKC) College, Kolkata, India, November 8, 2016.
  9. Mathematical and Statistical Foundations of Cryptology and Security.
    Seminar for one-week academic visit to Indian Statistical Institute, Kolkata, India, by the students of Mathematics (Hons) and Statistics (Hons) of Ramnarain Ruia College, Mumbai, India, organized by Machine Intelligence Unit (MIU), Indian Statistical Institute (ISI), Kolkata, India, September 9, 2016.
  10. Surprising Mathematics in Nature.
    Public Seminar at Netaji Nagar College for Women, Kolkata, India, March 30, 2016.
  11. Mathematics in Nature.
    One-Day Workshop on Interesting Mathematical Concepts for Non-Mathematicians, South Calcutta Girls’ College, Kolkata, India, December 1, 2015.
    Click HERE to view / listen.
  12. Modular Arithmetic in Block Ciphers.
    Course on Cryptography, Department of Computer Science & Engineering, Tripura Institute of Technology (TIT), Agartala, India, November 7, 2014.
  13. Statistics in Cryptology.
    Seminar for one-week visit to Indian Statistical Institute, Kolkata, India, by the students of Post Graduate Diploma in Statistical Methods with Applications, Indian Statistical Institute North East Centre, Tezpur, Applied Statistics Unit (ASU), Indian Statistical Institute (ISI), Kolkata, India, December 7, 2011.
  14. Theory of Metrics.
    Seminar at Centre for Distributed Computing, Jadavpur University, Kolkata, India, January 21, 2011.
  15. Algebraic Inequalities.
    Training program for the Regional Mathematical Olympiad (RMO) 2008 qualified candidates (West Bengal Region), Indian Statistical Institute, Kolkata, India, December 29, 2008.

Invited Talks on Computer Science
  1. Consensus Protocols in Blockchain Technology.
    Workshop on Crypto Currency organized by Andhra Pradesh Electronics and Information Technology Agency (APEITA), an autonomous society of Government of Andhra Pradesh, Visakhapatnam, India, April 22, 2017.
  2. Keyless Dynamic Optimal Multibit Data Hiding in Energetic Pixels.
    India-Japanese Workshop on Cryptographic Techniques for Cyber Security (Feb 13-14, 2017), Department of Computer Science and Engineering, Indian Institute of Technology Roorkee, India, February 13, 2017.
  3. Introduction to Time Complexity Analysis of Algorithms.
    Workshop on Mathematics-Cryptology-Computer Science for Higher Secondary students of A. K. Ghosh Memorial School and Khanpur (Boys) High School, organized by Netaji Nagar College for Women, Kolkata, India, September 26, 2016.
  4. Algorithms — Correctness, Efficiency and Optimality.
    Workshop on Mathematics-Cryptology-Computer Science for Higher Secondary students of Kamala Girls’ High School and Harinavi Subhasini Balika Sikshalaya, organized by Netaji Nagar College for Women, Kolkata, India, September 21, 2016.
  5. Computer Science in Cryptology.
    Workshop on Mathematics, Computer Science and Cryptology, Vivekananda College, Thakurpukur, Kolkata, India, September 14, 2016.
  6. Problem-Solving in Computer and Algorithmic Thinking.
    One-Day Workshop on Cryptology, Mathematics and Theoretical Computer Science for Higher Secondary students of Jadavpur Vidyapith, organized by Netaji Nagar College for Women, Kolkata, India, January 27, 2016.
  7. State-of-the-Art Research Areas in Computer Science.
    Seminar at Jadavpur University, organized by Jadavpur University Linux Users Group for all undergraduate engineering students of all colleges, Jadavpur University, Kolkata, India, August 26, 2015.
    Click HERE to view / listen.
  8. Introduction to Google Summer of Code.
    Inaugural speech at an awareness program for Google Summer of Code, organized by Jadavpur University Linux Users Group in association with Google Student Ambassador – India, Jadavpur University, Kolkata, India, March 24, 2015.
  9. Automata Theory and Its Applications.
    Faculty Training Program at Bengal Institute of Technology (Techno-India Group of Colleges), Kolkata, India, December 20, 2013.
  10. Introduction to Information and Coding Theory.
    UGC Refresher Course for College and University Teachers on Theoretical Aspects of Computer Science, Department of Computer Science & Engineering, Jadavpur University, Kolkata, India, February 5, 2009.
  11. On Analysis and Design of Algorithms.
    UGC Refresher Course for College and University Teachers on Theoretical Aspects of Computer Science, Department of Computer Science & Engineering, Jadavpur University, Kolkata, India, February 6, 2009.
  12. Propositional and Predicate Logic in Computer Science.
    UGC Refresher Course for College and University Teachers on Theoretical Aspects of Computer Science, Department of Computer Science & Engineering, Jadavpur University, Kolkata, India, February 9, 2009.
  13. Introduction to Artificial Intelligence and Its Applications in Robotics.
    Robotics Workshop, St. Thomas’ College of Engineering & Technology, Kolkata, India, July 9, 2007.

Invited Talks on Education
  1. Teaching as a Way of Learning.
    2nd Sharing Knowledge, Insights, and Lessons Learned (SKILL) Conference, SUNY Albany; organized by the Center for Excellence in Teaching and Learning (CETL), SUNY Albany, U.S.A., October 16, 2004.
  2. Beyond Data and Digits: My Teaching Experiences in the CSI Department.
    1st Sharing Knowledge, Insights, and Lessons Learned (SKILL) Conference, SUNY Albany; organized by the Center for Excellence in Teaching and Learning (CETL), SUNY Albany, U.S.A., November 1, 2003.