Research Papers

   Refereed International Journal Papers
  1. Imon Mukherjee and Goutam Paul. High capacity secure dynamic multi-bit data hiding using Fibonacci Energetic pixels. Accepted in Multimedia Tools and Applications journal (Springer), May 2023.
  2. Nayan Ranjan Das, Imon Mukherjee, Anubhav D. Patel and Goutam Paul. An intelligent clustering framework for substitute recommendation and player selection. Accepted in the Journal of Supercomputing (Springer), April 2023.
  3. Nayan Ranjan Das, Subhrojit Ghosh, Imon Mukherjee and Goutam Paul. Adoption of a ranking based indexing method for the cricket teams. In Expert Systems with Applications (Elsevier), article 118796, vol. 213, part A, March 2023.
  4. Amit Jana, Anirban Nath, Dhiman Saha and Goutam Paul. Differential fault analysis of NORX using variants of coupon collector problem. In Journal of Cryptographic Engineering (Springer), pages 433–459, vol. 12, issue 4, November 2022.
  5. Nayana Das and Goutam Paul. Measurement-Device-Independent Quantum Secure Direct Communication with User Authentication. In Quantum Information Processing (Springer), article 260, vol. 21, issue 7, July 2022.
  6. Mostafizar Rahman and Goutam Paul. Grover on KATAN: Quantum Resources Estimation. In IEEE Transactions on Quantum Engineering (IEEE), article 3140376, pages 1-9, vol. 3, January 2022.
  7. Nayana Das and Goutam Paul. Cryptanalysis of Quantum Secure Direct Communication Protocol with Mutual Authentication Based on Single Photons and Bell States. Accepted for publication in Europhysics Letters (EDP Sciences, IOP Publishing, Italian Physical Society), August 2021.
  8. Nayana Das, Ritajit Majumdar and Goutam Paul. Quantum Secure Direct Communication with Mutual Authentication using a Single Basis. In International Journal of Theoretical Physics (Springer), pages 4044-4065, vol. 60, issue 11-12, November 2021.
  9. Mostafizar Rahman, Dhiman Saha and Goutam Paul. Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos. Accepted for publication in IACR Transactions on Symmetric Cryptology (Ruhr University Bochum), vol. 2021, no. 3, 2021.
  10. Tanmoy Pandit, Pritam Chattopadhyay and Goutam Paul. Non-commutative space engine: a boost to thermodynamic processes. Accepted for publication in Modern Physics Letters A, July 2021.
  11. Atanu Acharyya and Goutam Paul. A complete characterization of the optimal unitary attacks in quantum cryptology with refined optimality criteria involving the attacker's Hilbert space only. In The European Physical Journal D, section Quantum Information, vol. 75, article 215, July 2021.
  12. Soumya Das, Anindya Banerji and Goutam Paul. Maximum violation of monogamy of entanglement for indistinguishable particles by measures that are monogamous for indistinguishable particles. As a Letter in Physical Review A (American Physical Society), article L010402, vol. 104, July 2021.
  13. Ayan Mitra, Pritam Chattopadhyay, Vasilious Zarikas and Goutam Paul. Bound on the efficiency of heat engine from uncertainty relation viewpoint. In Entropy, article 439, vol. 23, issue 4, April 2021.
  14. Shankar K. Ghosh, Suvankar Ghosh, Raja Banerjee and Goutam Paul. A graph-theoretic model to understand the behavioural difference of PPCA among its paralogs towards recognition of DXCA. In Journal of Biosciences (Springer), article 35, vol. 46, April 2021.
  15.  Nabanita Mukherjee (Ganguly), Sanjoy Kumar Saha and Goutam Paul. Two-point FFT based high capacity image steganography using calender based message encoding. In Information Sciences (Elsevier), pages 278-290, vol. 552, April 2021.
  16. Nayana Das and Goutam Paul. Secure multi-party quantum conference and XOR computation. In Quantum Information and Computation (Rinton Press), pages 203-232, vol. 21, issues 3 & 4, March 2021.
  17. Ayan Mitra, Pritam Chattopadhyay Vasilious Zarikas and Goutam Paul. Binary Black Hole Information Loss Paradox and Future Prospects. In Entropy, article 1387, vol. 22, issue 12, December 2020.
  18. Nayana Das and Goutam Paul. Improving the security of "measurement-device-independent quantum communication without encryption". In Science Bulletin (Elsevier), pages 2048-2049, vol. 65, issue 24, December 2020.
  19. Mostafizar Rahman and Goutam Paul. Quantum Attacks on HCTR and its Variants. In IEEE Transactions on Quantum Engineering (IEEE), article 3102408, pages 1-8, vol. 1, November 2020.
  20. Soumya Das, Anindya Banerji and Goutam Paul. Hyper-hybrid entanglement, indistinguishability, and two-particle entanglement swapping. In Physical Review A (American Physical Society), article 052401, vol. 102, November 2020.
  21. Soumya Das and Goutam Paul. A New Error-Modeling of Hardy’s Paradox for Superconducting Qubits and its Experimental Verification. In ACM Transactions on Quantum Computing (ACM publication board), article 4, vol. 1, issue 1, October 2020.
  22. Nayana Das and Goutam Paul. Two efficient measurement device independent quantum dialogue protocols. In International Journal of Quantum Information, article 2050038, vol. 18, issue 7, October 2020.
  23. Nabanita Mukherjee (Ganguly), Debanjan Burman, Sanjoy Kumar Saha and Goutam Paul. A PVD based high capacity steganography algorithm with embedding in non-sequential position. In Multimedia Tools and Applications journal (Springer), pages 13449–13479, vol. 79, January 2020.
  24. Pritam Chattopadhyay and Goutam Paul. Relativistic quantum heat engine from uncertainty relation standpoint. In Scientific Reports (Nature), Article number: 16967, vol. 9, 18 November 2019.
  25. Ayan Mitra, Pritam Chattopadhyay, and Goutam Paul. Probing Uncertainty Relations in Non-Commutative Space. In International Journal of Theoretical Physics (Springer), pages 2619–2631, vol. 58, issue 8, 2019.
  26. Nayana Das, Arpita Maitra and Goutam Paul. Dimensionality distinguishers. In Quantum Information Processing (Springer), article 171, vol. 18, issue 6, June 2019.
  27. Soumik Ghosh, Arnab Adhikary and Goutam Paul. Revisiting Integer Factorization using Closed Timelike Curves. In Quantum Information Processing (Springer), article 30, vol. 18, issue 1, January 2019.
  28. Soumik Ghosh, Arnab Adhikary and Goutam Paul. Quantum signaling to the past using P-CTCS. In Quantum Information and Computation (Rinton Press), pages 965--974, volume 18, vol. 11 & 12, September 2018.
  29. Dhiman Saha, Mostafizar Rahman and Goutam Paul. New Yoyo Tricks with AES-based Permutations. To appear in IACR Transactions on Symmetric Cryptology (Ruhr University Bochum), vol. 2018, no. 4, 2018.
  30. Nilanjan Datta, Avijit Dutta, Mridul Nandi and Goutam Paul. Double-block Hash-then-Sum: A Paradigm for Constructing BBB Secure PRF. To appear in IACR Transactions on Symmetric Cryptology (Ruhr University Bochum), vol. 2018, no. 3, 2018.
  31. Goutam Paul and Souvik Ray. Analysis of Burn-in period for RC4 State Transition. In Cryptography and Communications (Springer), pages 881--908, vol. 10, issue 5, September 2018.
  32. Amit Behera and Goutam Paul. Quantum to Classical One Way Function and Its Applications in Quantum Money Authentication. In Quantum Information Processing (Springer), article 200, vol. 17, issue 8, August 2018.
  33. Nabanita Mukherjee (Ganguly), Goutam Paul and Sanjoy Kumar Saha. An Efficient Multi-bit Steganography Algorithm in Spatial Domain with Two-layer Security. In Multimedia Tools and Applications journal (Springer), pages 18451--18481, vol. 77, issue 14, July 2018.
  34. Goutam Paul and Souvik Ray. On Data Complexity of Distinguishing Attacks vs. Message Recovery Attacks on Stream Ciphers. In Designs, Codes and Cryptography (Springer), pages 1211--1247, vol. 86, issue 6, June 2018.
  35. Amit Jana and Goutam Paul. Revisiting RC4 Key Collision: Faster Search Algorithm and New 22-byte Colliding Key Pairs. In Cryptography and Communications (Springer), pages 479--508, vol. 10, issue 3, May 2018.
  36. Indra Kundu, Goutam Paul and Raja Banerjee. A machine learning approach towards the prediction of protein-ligand binding affinity based on fundamental molecular properties. In RSC Advances journal (Royal Society of Chemistry), pages 12127--12137, vol. 2018, issue 8, 2018.
  37. Sugata Gangopadhyay, Goutam Paul, Nishant Sinha and Pantelimon Stănică. Generalized Nonlinearity of S-boxes. In Advances in Mathematics of Communications (American Institute of Mathematical Sciences, AIMS), pages 115--122, vol. 12, issue 1, February 2018.
  38. Nilanjan Datta, Avijit Dutta, Mridul Nandi, Goutam Paul and Liting Zhang. Single Key Variant of PMAC_Plus. In IACR Transactions on Symmetric Cryptology (Ruhr University Bochum), pages 268--305, vol. 2017, no. 4, 2017.
  39. Ashutosh Rai and Goutam Paul. Strong quantum solutions in conflicting-interest Bayesian games. In Physical Review A (American Physical Society), article 042340, volume 96, October 2017.
  40. Arpita Maitra, Goutam Paul and Sarbani Roy. Device-independent quantum private query. In Physical Review A (American Physical Society), article 042344, volume 95, issue 4, April 2017.
  41. Goutam Paul, Ian Davidson, Imon Mukherjee and S. S. Ravi. Keyless Dynamic Optimal Multi-bit Image Steganography using Energetic Pixels. In Multimedia Tools and Applications journal (Springer), vol. 76, issue 5, March 2017.
  42. Ayesha Khalid, Goutam Paul and Anupam Chattopadhyay. RC4-AccSuite: A Hardware Acceleration Suite for RC4-like Stream Ciphers. In IEEE Transactions on Very Large Scale Integration Systems (IEEE Circuits and Systems Society, IEEE Computer Society, and IEEE Solid-State Circuits Society), pages 1072--1084, vol. 25, issue 3, March 2017.
  43. Atanu Acharyya and Goutam Paul. Revisiting optimal eavesdropping in quantum cryptography: Optimal interaction is unique up to rotation of the underlying basis. In Physical Review A (American Physical Society), article 022326, volume 95, issue 2, February 2017.
  44. Ayesha Khalid, Muhammad Hassan, Goutam Paul and Anupam Chattopadhyay. RunFein: A rapid prototyping framework for Feistel and SPN-based block ciphers. In Journal of Cryptographic Engineering (Springer), pages 299--323, vol. 6, issue 4, November 2016.
  45. Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay, Faezeh Abediostad, Syed Imad Ud Din, Muhammad Hassan, Baishik Biswas and Prasanna Ravi. RunStream: A High-level Rapid Prototyping Framework for Stream Ciphers. In ACM Transactions on Embedded Computing Systems (ACM publication board), article 61, vol. 15, issue 3, July 2016.
  46. Goutam Paul, Shashwat Raizada and Vineet Pandey. RVClose: Discovering Nearby-Friend Groups in Multi-user Environment. In IPSI BgD Transactions on Internet Research (IPSI Bgd Internet Research Society), pages 9--16, vol. 12, issue 2 (Special issue on Advances in Cryptology and Information Security), July 2016.
  47. Arpita Maitra and Goutam Paul. On Symmetric Incoherent Eavesdropping on BB84 and its Variants. In IPSI BgD Transactions on Advanced Research (IPSI Bgd Internet Research Society), pages 25--37, vol. 12, issue 2 (Special issue on Advances in Cryptology and Information Security), July 2016.
  48. Goutam Paul and Anupam Chattopadhyay. Three Snakes in One Hole: The First Systematic Hardware Accelerator Design for SOSEMANUK with Optional Serpent and SNOW 2.0 Modes. In IEEE Transactions on Computers (IEEE Computer Society), pages 640--653, vol. 65, issue 2, February 2016.
  49. Chithrabhanu Perumangatt, Aadhi Abdul Rahim, Salla Gangi Reddy, Shashi Prabhakar, Goutam Kumar Samanta, Goutam Paul and Ravindra Pratap Singh. Three particle Hyper-entanglement: Teleportation and Quantum Key Distribution. In Quantum Information Processing (Springer), pages 3813--3826, vol. 14, issue 10, October 2015.
  50. Santanu Sarkar, Sourav Sen Gupta, Goutam Paul and Subhamoy Maitra. Proving TLS-attack related open biases of RC4. In Designs, Codes and Cryptography (Springer), pages 231--253, vol. 77, issue 1, October 2015.
  51. Kaushik Nandi and Goutam Paul. Quantum Information Splitting Using a Pair of GHZ States. In Quantum Information and Computation (Rinton Press), pages 1041--1047, vol. 15, issue 11 & 12, September 2015.
  52. Arpita Maitra, Sourya Joyee De, Goutam Paul and Asim K. Pal. Proposal for Quantum Rational Secret Sharing. In Physical Review A (American Physical Society), article 022305, volume 92, issue 2, August 2015.
  53. Arpita Maitra and Goutam Paul. A Resilient Quantum Secret Sharing Scheme. In International Journal of Theoretical Physics (Springer), pages 398--408, vol. 54, issue 2, February 2015.
  54. Imon Mukherjee, Goutam Paul and Jarvis Altrin Jawahar. Defeating Steganography with Multibit Sterilization using Pixel Eccentricity. In IPSI BgD Transactions on Advanced Research (IPSI Bgd Internet Research Society), pages 25--34, vol. 11, issue 1, January 2015.
  55. Goutam Paul and Anupam Chattopadhyay. Designing Stream Ciphers with Scalable Data-widths: A Case Study with HC-128. In Journal of Cryptographic Engineering (Springer), pages 135--143, vol. 4, issue 2, June 2014.
  56. Sourav Sen Gupta, Subhamoy Maitra, Goutam Paul and Santanu Sarkar. (Non-)Random Sequences from (Non-)Random Permutations-Analysis of RC4 stream cipher. In Journal of Cryptology (Springer), pages 67--108, vol. 27, issue 1, January 2014.
  57. Tamaghna Acharya and Goutam Paul. Maximum Lifetime Broadcast Communications in Cooperative Multihop Wireless Ad Hoc Networks: Centralized and Distributed Approaches. In Ad Hoc Networks (Elsevier), pages 1667--1682, vol. 11, issue 6, August 2013.
  58. Arpita Maitra and Goutam Paul. Eavesdropping in Semiquantum Key Distribution Protocol. In Information Processing Letters (Elsevier), pages 418--422, vol. 113, issue 12, June 30, 2013.
  59. Miodrag Mihaljevic, Sugata Gangopadhyay, Goutam Paul, Hideki Imai. Generic Cryptographic Weakness of k-normal Boolean Functions in Certain Stream Ciphers and Cryptanalysis of Grain-128. In Periodica Mathematica Hungarica (Springer), pages 205--227, vol. 65, issue 2, December 2012.
  60. Miodrag Mihaljevic, Sugata Gangopadhyay, Goutam Paul and Hideki Imai. Internal State Recovery of Keystream Generator LILI-128 Based on a Novel Weakness of the Employed Boolean Function. In Information Processing Letters (Elsevier), pages 805--810, vol.112, no. 21, November 15, 2012.
  61. Miodrag Mihaljevic, Sugata Gangopadhyay, Goutam Paul and Hideki Imai. Internal State Recovery of Grain-v1 Using Normality Order of the Filter Function. In IET Information Security (IET Research Journals), pages 55--64, vol. 6, no. 2, June 2012.
  62. Subhamoy Maitra, Goutam Paul, Shashwat Raizada, Subhabrata Sen and Rudradev Sengupta. Some Observations on HC-128. In Designs, Codes and Cryptography (Springer), pages 231--245, vol. 59, no. 1–3, April 2011.
  63. Sayan Bhattacharya, Goutam Paul and Swagato Sanyal. A Cops and Robber Game in Multidimensional Grids. In Discrete Applied Mathematics (Elsevier), pages 1745--1751, vol. 158, no. 16, August 2010.
  64. Goutam Paul and Subhamoy Maitra. On Biases of Permutation and Keystream Bytes of RC4 towards the Secret Key. In Cryptography and Communications (Springer), pages 225--268, vol. 1, no. 2, September 2009.
  65. Goutam Paul, Siddheshwar Rathi and Subhamoy Maitra. On Non-negligible Bias of the First Output Byte of RC4 towards the First Three Bytes of the Secret Key. In Designs, Codes and Cryptography (Springer), pages 123--134, vol. 49, no. 1–3, December 2008.
  66. Riddhipratim Basu, Shirshendu Ganguly, Subhamoy Maitra, Goutam Paul. A Complete Characterization of the Evolution of RC4 Pseudo Random Generation Algorithm. In Journal of Mathematical Cryptology (de Gruyter), pages 257--289, vol. 2, no. 3, October 2008.
    Refereed International Conference Papers
  67. Nayana Das and Goutam Paul. Improving the Security of “Measurement-Device-Independent Quantum Communication without Encryption” (Poster). In 12th International Conference on Quantum Cryptography (QCrypt), August 29 - September 2, 2022, Taipei, Taiwan.
  68. Amit Jana and Goutam Paul. Differential Fault Attack on PHOTON-Beetle. In Proceedings of the 6th ACM Workshop on Attacks and Solutions in Hardware Security (ASHES), November 2022, Los Angeles, USA, pages 25–34.
  69. Amit Jana, Dhiman Saha and Goutam Paul. Differential Fault Analysis of NORX. In Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware Security (ASHES), November 2020, Virtual Event (USA), pages 67–79.
  70. Mostafizar Rahman, Dhiman Saha and Goutam Paul. Cryptanalysis of FlexAEAD. In Proceedings of the 12th International Conference on Cryptology in Africa (AFRICACRYPT), July 20-22, 2020, Cairo, Egypt, pages 152-171, vol. 12174, Lecture Notes in Computer Science (LNCS), Springer.
  71. Nabanita Mukherjee, Goutam Paul and Sanjoy Kumar Saha. A Novel Position Concealment Audio Steganography in Insensible Frequency. To appear in Proceedings of the 5th International Conference on Computational Intelligence in Data Mining (ICCIDM), December 15-16, 2018, Burla, Odisha, India, pages 383–392, Advances in Intelligent Systems and Computing, vol. 990, Springer.
  72. Goutam Paul, Anupam Chattopadhyay and Chander Chandak. Designing Parity Preserving Reversible Circuits. In Proceedings of the 9th International Conference on Reversible Computation, July 6-7, 2017, Kolkata, India, pages 77-89, vol. 10301, Lecture Notes in Computer Science (LNCS), Springer.
  73. Suvradip Chakraborty, Goutam Paul and Chandrasekaran Pandu Rangan. Efficient Compilers for After-the-Fact Leakage: from CPA to CCA-2 secure PKE to AKE. In Proceedings of the 22nd Australasian Conference on Information Security and Privacy (ACISP), July 3-5, 2017, Auckland, New Zealand, pages 343--362, vol. 10342, LNCS, Springer.
  74. Sanat Ghoshal and Goutam Paul. Exploiting Block-Chain Data Structure for Auditorless Auditing on Cloud Data. In Proceedings of the 12th International Conference on Information Systems Security (ICISS), Dec 16-20, 2016, Jaipur, India, pages 359--371, vol. 10063, LNCS, Springer.
  75. Goutam Paul and Abhiroop Sanyal. Revisiting the Security Proof of QUAD Stream Cipher: Some Corrections and Tighter Bounds. In Proceedings of the 12th International Conference on Information Security and Cryptology (INSCRYPT), Nov 4-6, 2016, Beijing, China, pages 103--116, vol. 10143, LNCS, Springer.
  76. Avijit Dutta, Mridul Nandi and Goutam Paul. One-Key Compression Function Based MAC with Security beyond Birthday Bound. In Proceedings of the 21st Australasian Conference on Information Security and Privacy (ACISP), July 4-6, 2016, Melbourne, Australia, pages 343--358, vol. 9722, LNCS, Springer.
  77. Christina Boura, Avik Chakraborti, Gaëtan Leurent, Goutam Paul, Dhiman Saha, Hadi Soleimany and Valentin Suder. Key Recovery Attack against 2.5-round π-Cipher. In Proceedings of the 23rd International Workshop on Fast Software Encryption (FSE), March 20-23, 2016, Bochum, Germany, pages  535--553, vol. 9783, LNCS, Springer.
  78. Goutam Paul. Revisiting Democratic Mining in Bitcoins: Its Weakness and Possible Remedies. In Proceedings of the 11th International Conference on Information Systems Security (ICISS), Dec 16-20, 2015, Kolkata, India, pages 161--170, vol. 9478, LNCS, Springer.
  79. Suvradip Chakraborty, Goutam Paul and Chandrasekaran Pandu Rangan. Forward-Secure Authenticated Symmetric Key Exchange Protocols: New Security Models and Some Constructions. In Proceedings of the 9th International Conference on Provable Security (ProvSec), November 24-26, 2015, Kanazawa, Japan, pages 149–166, vol. 9451, LNCS, Springer.
  80. Subhamoy Maitra, Goutam Paul and Willi Meier. Salsa20 Cryptanalysis: New Moves and Revisiting Old Styles. In Proceedings of the 9th International Workshop on Coding and Cryptography (WCC), April 13-17, 2015, Paris, France.
  81. Goutam Paul, Pratik Sarkar and Sarbajit Mukherjee. Towards a More Democratic Mining in Bitcoins. In Proceedings of 10th International Conference on Information Systems Security (ICISS), Dec 16-20, 2014, Hyderabad, India, pages 185–203, vol. 8880, LNCS, Springer.
  82. Sumitra Biswal, Goutam Paul and Shashwat Raizada. Preserving Privacy in LocationBased Services Using Sudoku Structures. In Proceedings of the 10th International Conference on Information Systems Security (ICISS), Dec 16-20, 2014, Hyderabad, India, pages 448–463, vol. 8880, LNCS, Springer.
  83. Ayesha Khalid, Prasanna Ravi, Anupam Chattopadhyay and Goutam Paul. One Word/Cycle HC-128 Accelerator via State-Splitting Optimization. In Proceedings of the 15th International Conference on Cryptology in India (INDOCRYPT), December 14-17, 2014, New Delhi, India, pages 283–303, vol. 8885, LNCS, Springer.
  84. Avijit Dutta and Goutam Paul. Deterministic Hard Fault Attack on Trivium. In Proceedings of the 9th International Workshop on Security (IWSEC), August 27-29, 2014, Hirosaki, Japan, pages 134–145, vol. 8639, LNCS, Springer.
  85. Zheng Wang, Goutam Paul and Anupam Chattopadhyay. Processor Design with Asymmetric Reliability. In Proceedings of the 13th IEEE Computer Society Annual Symposium on VLSI (ISVLSI), July 9-11, 2014, Tampa, Florida, U.S.A., pages 565–570.
  86. Sourav Sen Gupta, Subhamoy Maitra, Willi Meier, Goutam Paul and Santanu Sarkar.Dependence in IV-related bytes of RC4 key enhances vulnerabilities in WPA. In Proceedings of the 21st International Workshop on Fast Software Encryption (FSE), March 3-5, 2014, London, pages 350-369, vol. 8540, LNCS, Springer.
  87. Imon Mukherjee and Goutam Paul. Efficient Multi-bit Image Steganography in Spatial Domain. In Proceedings of the 9th International Conference on Information Systems Security (ICISS), Dec 16-20, 2013, Kolkata, India, pages 270–284, vol. 8303, LNCS, Springer.
  88. Ayesha Khalid, Muhammad Hassan, Anupam Chattopadhyay and Goutam Paul.RAPID-FeinSPN: A Rapid Prototyping Framework for Feistel and SPN-Based Block Ciphers. In Proceedings of the 9th International Conference on Information Systems Security (ICISS), Dec 16-20, 2013, Kolkata, India, pages 169–190, vol. 8303, LNCS, Springer.
  89. Shubhajit Saha and Goutam Paul. On Effective Sharing of User Generated Content. In Proceedings of the 11th Asia Pacific Conference on Computer Human Interaction (APCHI), September 24-27, 2013, Bangalore, India, pages 114–118.
  90. Goutam Paul and Soumi Paul. Proposal for a Novel Computerized Menu-Presentation Interface for Restaurants. In Proceedings of the 11th Asia Pacific Conference on Computer Human Interaction (APCHI), September 24-27, 2013, Bangalore, India, pages 119–122.
  91. Ayesha Khalid, Goutam Paul and Anupam Chattopadhyay. New Speed Records for Salsa20 Stream Cipher using an Autotuning Framework on GPUs. In Proceedings of the 6th International Conference on Cryptology in Africa (AFRICACRYPT), June 22-24, 2013, Cairo, Egypt, pages 189–207, vol. 7918, LNCS, Springer.
  92. Subhamoy Maitra, Goutam Paul, Santanu Sarkar, Michael Lehmann and Willi Meier.New Results on Generalization of Roos-type Biases and Related Keystream of RC4.In Proceedings of the 6th International Conference on Cryptology in Africa (AFRICACRYPT), June 22-24, 2013, Cairo, Egypt, pages 222–239, vol. 7918, LNCS, Springer.
  93. Khawar Shahzad, Ayesha Khalid, Zolt´an Endre R´akossy, Goutam Paul and AnupamChattopadhyay. CoARX: A Coprocessor for ARX-based Cryptographic Algorithms. In Proceedings of the 50th ACM/IEEE Design Automation Conference (DAC), June 2-6,2013, Austin, U.S.A., Article No. 133, ACM.
  94. Arpita Maitra and Goutam Paul. Symmetric Incoherent Eavesdropping against MDIQKD. In Proceedings of the 8th International Workshop on Coding and Cryptography (WCC), April 15-19, 2013, Bergen, Norway, pages 413–426.
  95. Ayesha Khalid, Deblin Bagchi, Goutam Paul and Anupam Chattopadhyay. Optimized GPU Implementation and Performance Analysis of HC Series of Stream Ciphers. InProceedings of the 15th International Conference on Information Security and Cryptology (ICISC), November 28-30, 2012, Seoul, Korea, pages 293–308, vol. 7839, LNCS, Springer.
  96. Goutam Paul, Ian Davidson, Imon Mukherjee and S. S. Ravi. Keyless Steganography in Spatial Domain using Energetic Pixels. In Proceedings of the 8th International Conference on Information Systems Security (ICISS), Dec 15-19, 2012, Guwahati, India, pages 134–148, vol. 7671, LNCS, Springer.
  97. Arpita Maitra and Goutam Paul. Another Look at Symmetric Incoherent Optimal Eavesdropping against BB84. In Proceedings of the 13th International Conference on Cryptology in India (INDOCRYPT), December 9-12, 2012, Kolkata, India, pages 80–99, vol. 7668, LNCS, Springer.
  98. Goutam Paul and Shashwat Raizada. Impact of Extending Side Channel Attack on Cipher Variants: A Case Study with the HC Series of Stream Ciphers. In Proceedings of International Conference on Security, Privacy and Applied Cryptography Engineering (SPACE), November 2-3, 2012, Chennai, India, pages 32–44, vol. 7644, LNCS, Springer.
  99. Anupam Chattopadhyay and Goutam Paul. Exploring Security-Performance Tradeoffs during Hardware Accelerator Design of Stream Cipher RC4. In Proceedings of the 20th IFIP/IEEE International Conference on Very Large Scale Integration and System-on-Chip (VLSI-SoC), October 7-10, 2012, Santa Cruz, U.S.A., pages 251–254.
  100. Goutam Paul and Imon Mukherjee. Sterilization of Stego-images through Histogram Normalization. In Proceedings of the 11th International Conference on Security and Management (SAM), July 16-19, 2012, Las Vegas, U.S.A., pages 448–454.
  101. Apurba Das, Subhamoy Maitra, Goutam Paul and Santanu Sarkar. Some Combinatorial Results Towards State Recovery Attack on RC4. In Proceedings of the 7th International Conference on Information Systems Security (ICISS), Dec 15-19, 2011, Kolkata, India, pages 204–214, vol. 7093, LNCS, Springer.
  102. Goutam Paul, Subhamoy Maitra and Shashwat Raizada. A Theoretical Analysis of the Structure of HC-128. In Proceedings of the 6th International Workshop on Security (IWSEC), November 8-10, 2011, Tokyo, Japan, pages 161–177, vol. 7038, LNCS, Springer.
  103. Sourav Sen Gupta, Subhamoy Maitra, Goutam Paul and Santanu Sarkar. Proof of Empirical RC4 Biases and New Key Correlations. In Proceedings of the 18th Workshop on Selected Areas in Cryptography (SAC), August 11-12, 2011, Toronto, Canada, pages 151–168, vol. 7118, LNCS, Springer.
  104. Imon Mukherjee and Goutam Paul. Double Bit Sterilization of Stego-images. In Proceedings of the 10th International Conference on Security and Management (SAM),July 18-21, 2011, Las Vegas, U.S.A., pages 743–746.
  105. Miodrag Mihaljevic, Sugata Gangopadhyay, Goutam Paul, Hideki Imai. An Algorithm for the Internal State Recovery of Grain-v1. In 11th Central European Conference on Cryptology (CECC), June 30-July 2, 2011, Debrecen, Hungary.
  106. Subhamoy Maitra, Goutam Paul and Sourav Sen Gupta. Attack on Broadcast RC4 Revisited. In Proceedings of the 18th Fast Software Encryption (FSE) Workshop, February 13-16, 2011, Lyngby, Denmark, pages 199–217, vol. 6733, LNCS, Springer.
  107. Miodrag Mihaljevic, Sugata Gangopadhyay, Goutam Paul, Hideki Imai. A GenericWeakness of the k-normal Boolean Functions Exposed to Dedicated Algebraic Attack. In Proceedings of the 11th International Symposium on Information Theory and its Applications (ISITA), October 17-20, 2010, Taichung, Taiwan, pages 911–916.
  108. Shashwat Raizada, Goutam Paul and Vineet Pandey. Nearby-Friend Discovery Protocol for Multiple Users. In Proceedings of the 2009 IEEE International Conference onComputational Science and Engineering (CSE), vol. 3, Track: International Symposium on Secure Computing (SecureCom 2009), August 29-31, 2009, Vancouver, Canada, pages 238–243, IEEE Computer Society Press.
  109. Riddhipratim Basu, Subhamoy Maitra, Goutam Paul and Tanmoy Talukdar. On Some Sequences of the Secret Pseudo-random Index j in RC4 Key Scheduling. In Proceedings of the 18th International Symposium on Applied Algebra, Algebraic Algorithms and Error Correcting Codes (AAECC), June 8-12, 2009, Tarragona, Spain, pages 137–148, vol. 5527,LNCS, Springer.
  110. Subhamoy Maitra, Goutam Paul and Shashwat Raizada. Some Observations on HC-128. In Proceedings of the 6th International Workshop on Coding and Cryptography (WCC), May 10-15, 2009, Ullensvang, Norway, pages 527–539.
  111. Subhamoy Maitra and Goutam Paul. Analysis of RC4 and Proposal of Additional Layers for Better Security Margin. In Proceedings of the 9th International Conference on Cryptology in India (INDOCRYPT), December 14-17, 2008, Indian Institute of Technology, Kharagpur, India, pages 27–39, vol. 5365, LNCS, Springer.
  112. Subhamoy Maitra and Goutam Paul. Recovering RC4 Permutation from 2048 Keystream Bytes if j is Stuck. In Proceedings of the 13th Australasian Conference on Information Security and Privacy (ACISP), July 7-9, 2008, Wollongong, Australia, pages 306–320, vol. 5107, LNCS, Springer.
  113. Riddhipratim Basu, Shirshendu Ganguly, Subhamoy Maitra, Goutam Paul. RC4 Keystream Always Leaks Information about the Hidden Index j . In Proceedings of the State of the Art of Stream Ciphers (SASC), special Workshop hosted by ECRYPT, the European Network of Excellence in Cryptography, February 13-14, 2008, Lausanne, Switzerland, pages 233–247.
  114. Subhamoy Maitra and Goutam Paul. New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4. In Proceedings of the 15th Fast Software Encryption (FSE) Workshop, February 10-13, 2008, Lausanne, Switzerland, pages 253–269, vol. 5086, LNCS, Springer.
  115. Goutam Paul, Subhamoy Maitra and Rohit Srivastava. On Non-Randomness of the Permutation after RC4 Key Scheduling. In Proceedings of the 17th International Symposium on Applied Algebra, Algebraic Algorithms and Error Correcting Codes (AAECC), December 16-20, 2007, Bangalore, India, pages 100–109, vol. 4851, LNCS, Springer.
  116. Goutam Paul and Subhamoy Maitra. Permutation after RC4 Key Scheduling Reveals the Secret Key. In Proceedings of the 14th Workshop on Selected Areas in Cryptography (SAC), August 16-17, 2007, Ottawa, Canada, pages 360–377, vol. 4876, LNCS, Springer.
  117. Sayan Bhattacharya, Goutam Paul and Swagato Sanyal. On Necessary and Sufficient Number of Cops in the Game of Cops and Robber in Multidimensional Grids. In 8th Asian Symposium on Computer Mathematics (ASCM), December 15-17, 2007, Singapore.
  118. Goutam Paul, Siddheshwar Rathi and Subhamoy Maitra. On Non-negligible Bias of the First Output Byte of RC4 towards the First Three Bytes of the Secret Key. In Proceedings of the 5th International Workshop on Coding and Cryptography (WCC), April 16-20, 2007, Versailles, France, pages 285–294.
  119. Goutam Paul. Occam’s Razor and a Non-syntactic Measure of Decision Tree Complexity. In Proceedings of the 19th National Conference on Artificial Intelligence (AAAI), July 25-29, 2004, San Jose, California, U.S.A., pages 962–963.
  120. Ian Davidson and Goutam Paul. Locating Secret Messages in Images. In Proceedings of the 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), August 22-25, 2004, Seattle, Washington, U.S.A., pages 545–550.
  121. George Berg, Ian Davidson, Ming-Yuan Duan and Goutam Paul. Searching for Hidden Messages: Automatic Detection of Steganography. In Proceedings of the 15th Innovative Applications of Artificial Intelligence (IAAI) Conference, August 12-14, 2003, Acapulco, Mexico, pages 51–56.
  122. Somnath Pal, Tridib Kumar Saha, Goutam K. Paul, Chinmay Maiti and Ananda Mohan Ghosh. Multi-method Decision Tree Learning for Data Mining. In Proceedings of the 28th Annual Convention and Exhibition of IEEE India Council (IEEE-ACE), December 20-21, 2002, Science City, Kolkata, India, pages 238–242.
    Pre-Prints / Other Publications
  123. Madhuparna Das and Goutam Paul. Analysis of the Game "2048" and its Generalization in Higher Dimensions. In arXiv.org e-Print Archive, arXiv:1804.07393 [cs.DM], April 19, 2018.
  124. Madhuparna Das and Goutam Paul. A Short Note on Prime Gaps. In arXiv.org e-Print Archive, arXiv:1710.09891 [math.NT], Oct 26, 2017.
  125. Shashanka Balakuntala and Goutam Paul. Quantum Error Correction using Hypergraph States. In arXiv.org e-Print Archive, arXiv:1708.03756 [qant-ph], Aug 12, 2017.
  126. Jyotirmoy Basak, Bappaditya Ghosh, Arpita Maitra and Goutam Paul. Device Independent Quantum Private Query with Finite Number of Entangled Qubits. In arXiv.org e-Print Archive, arXiv:1705.04570 [qant-ph], May 12, 2017.
  127. Goutam Paul. Can Quantum Physics be the Science of Both Matter and Spirit? In the conference on Quantum Physics and Consciousness (QPC), Feb 4-5, 2017, Rabindra Tirtha, New Town, Kolkata, India.
  128. Arpita Maitra, Goutam Paul and Asim K. Pal. Revisiting Secure Two-Party Computation with Rational Players. In Cryptology ePrint Archive: Report 2015/1071, November 4, 2015.
  129. Arpita Maitra, Goutam Paul and Asim K. Pal. Secure two-party quantum computation for non-rational and rational settings. In arXiv.org e-Print Archive, arXiv:1504.01974 [cs.CR], April 8, 2015.
  130. Goutam Paul, Subhamoy Maitra and Anupam Chattopadhyay. Quad-RC4: Merging Four RC4 States towards a 32-bit Stream Cipher. In Cryptology ePrint Archive: Report 2013/572, September 6, 2013.
  131. Sounak Gupta and Goutam Paul. Revisiting Fermats Factorization for the RSA Modulus. In arXiv.org e-Print Archive, arXiv:0910.4179v1 [cs.CR], October 21, 2009.
  132. Adway Mitra, Goutam Paul and Ushnish Sarkar. Some Conjectures on the Number of Primes in Certain Intervals. In arXiv.org e-Print Archive, arXiv:0906.0104v1 [math.NT], May 30, 2009.
  133. Goutam Paul. Artificial Intelligence and Consciousness. In 2nd Human-E-Tech Conference, April 23-25, 2004, SUNY Albany, U.S.A.