Research Positions
  1. Assistant Professor, Cryptology and Security Research Unit (CSRU), R. C. Bose Centre for Cryptology and Security, Indian Statistical Institute, Kolkata, India, August 2013 – to date.
  2. Visiting Scientist, Institute of Industrial Science (IIS), University of Tokyo, Japan, August 2016.
  3. Visiting Scientist, Department of Mathematics, Ruhr University Bochum, Germany, March 2016.
  4. Visiting Scientist, Department of Computer Science and Engineering, Indian Institute of Technology Roorkee, Oct 2015.
  5. Visiting Scientist, School of Computer Engineering, College of Engineering, Nanyang Technological University (NTU), Singapore, Sep – Oct 2015.
  6. Visiting Scientist, Department of Computer Science, University at Albany, State University of New York (SUNY), U.S.A., Jul 2014.
  7. Visiting Scientist, Department of Computer Science, University of Nevada, Las Vegas, U.S.A., Jul 2014.
  8. Visiting Scientist, Applied Mathematics Department, Naval Postgraduate School, Monterey, U.S.A., Jul 2014.
  9. Visiting Scientist, Multi-Processor System-on-Chip (MPSoC) Architectures Research Group, Ultra High-Speed Mobile Information and Communication (UMIC) Research Centre, RWTH Aachen University, Aachen, Germany, June 2012 – July 2013.
  10. Visiting Research Scientist, Crypto and Security group, Department of Electrical and Information Technology, Lund University, Sweden, March 2013.
  11. Visiting Research Scientist, Security and Cryptography Laboratory (LASEC), School of Computer and Communication Sciences (I &C), Ecole Polytechnique Federale de Lausanne (EPFL), Switzerland, Feb 2013.
  12. Visiting Research Scientist, Fachhochschule Nordwestschweiz (FHNW), Windisch, Switzerland, Oct 2012.
  13. Visiting Scientist, Centre of Excellence in Cryptology, Indian Statistical Institute, Kolkata, India, September 2011 – May 2012.
  14. Visiting Research Scientist, Research Center for Information Security (RCIS), National Institute of Advanced Industrial Science and Technology (AIST), Akihabara, Tokyo, Japan, June 2009 – July 2009, February 2010 – March 2010, February & November 2011.
  15. Visiting Research Scientist, Coding & Cryptography Research Group (CCRG), Division of Mathematical Sciences, School of Physical & Mathematical Sciences, Nanyang Technological University (NTU), Singapore, March 2010.
  16. Visiting Research Scientist, Information Technology and Security Laboratory (Sakurai Laboratory) of the Kyushu University and the Information Security Laboratory of the Institute of the Systems, Information Technologies and Nanotechnologies (ISIT), Fukuoka, Japan, July 2009.
  17. Visiting Researcher, Center of Applied Cryptographic Research (CACR), University of Waterloo, Ontario, Canada, July 2007 – August 2007.
  18. Research Fellow, Cryptology Research Group (CRG), Applied Statistics Unit (ASU), Indian Statistical Institute (ISI), Kolkata, India, Septeember 2006 – December 2008.
  19. Research Associate, Brain-Computer Interface Lab, Wadsworth Center, New York State Department of Health, New York, U.S.A., July 2004 – December 2004.
  20. Research Assistant, State University of New York at Albany, U.S.A., July 2003 – August 2003, January 2004 – May 2004.
  21. Research Assistant, Electronics and Communication Science Unit, Indian Statistical Institute (ISI), Kolkata, India, August 2000 – December 2000.
  22. Summer Intern, Applied Statistics Unit, Indian Statistical Institute (ISI), Kolkata, India, June 2000 – July 2000.

Student Supervision
Post-Doctoral Fellows Advised
  1. Bimal Mandal (Ph.D. from Indian Institute of Technology Roorkee, India), August 2017 – to date.
  2. Ram Soorat (Ph.D. from University of Hyderabad, India), July 2017 – to date.
  3. Ayan Mitra (Ph.D. from Université Pierre et Marie Curie, Paris, France), July 2016 – June 2017.
Doctoral Theses Advised
  1. Atanu Acharyya (Ph.D., Indian Statistical Institute, Expected 2018).
  2. Kaushik Nandi (Ph.D., Jadavpur University, 2016).
    Dissertation: Aspects of Quantum Information Processing.
    (Co-supervised with Chandan Mazumder).
  3. Imon Mukherjee (Ph.D., Jadavpur University, 2015).
    Dissertation: Design and Analysis of Steganographic Algorithms.
  4. Arpita Maitra (Ph.D., Jadavpur University, 2014).
    Dissertation: Study in the Field of Quantum Information: Hadamard and DFT type Operations.
Significant Doctoral Advisory Role
  1. Ayesha Khalid (Ph.D., Rheinisch-Westfälischen Technischen Hochschule Aachen, Germany, 2015).
    Advisor: Anupam Chattopadhyay.
    Dissertation: Domain Specific High-level Synthesis of Cryptographic Workloads.
  2. Shashwat Raizada (Ph.D., Indian Statistical Institute, 2015).
    Advisor: Subhamoy Maitra.
    Dissertation: Some Results on Analysis and Implementation of HC-128 Stream Cipher.
  3. Sourav Sen Gupta (Ph.D., Indian Statistical Institute, 2014).
    Advisor: Subhamoy Maitra.
    Dissertation: Analysis and Implementation of RC4 Stream Cipher.
Master’s Theses Advised
  1. Indra Kundu (M.Tech. in Bioinformatics, Maulana Abul Kalam Azad University of Technology, 2016).
    Dissertation: Prediction of Feasibility of Protein Ligand Interaction.
    (Co-supervised with Raja Banerjee)
    .
  2. Amit Jana (M.Tech. in Computer Science, Indian Statistical Institute, 2015).
    Dissertation: General Key Collisions in RC4.
  3. Sudip Ghosh (M.Sc. in Mathematics, Ramakrishna Mission Vidyamandira, Belur, 2015).
    Dissertation: Studies on Quantum Noise and Quantum Operations.
  4. Suman Ghosh (M.Sc. in Mathematics, Ramakrishna Mission Vidyamandira, Belur, 2015).
    Dissertation: Studies on Quantum Error Correction.
  5. Avijit Dutta (M.E. in Computer Science & Engineering, Jadavpur University, 2014).
    Dissertation: Deterministic Hard Fault Attack on Trivium.
  6. Arnab Krishna Mitra (M.E. in Computer Science & Engineering, Jadavpur University,2011).
    Dissertation: Code-based Cryptography.
  7. Subhrodip Roy Chowdhury (M.E. in Information Technology, Jadavpur University, 2010).
    Dissertation: Study and Implementation of State-of-the-Art Stream Ciphers.
  8. Ankita Ghosh (M.E. in Computer Science & Engineering, Jadavpur University, 2010).
    Dissertation: Study and Implementation of Primality Testing Algorithms.
  9. Shyamalendu Roy (M.E. in Computer Science & Engineering, Jadavpur University,2009).
    Dissertation: A Study on Quantum Computation.
Undergraduate Projects Advised

More than 20


Sponsored Projects
  1. Cryptanalysis of Symmetric Cipher Algorithms.
    Total Grant: INR 27.54 Lakhs, Duration: 3 years (2017-2020).
    Funding Agency: Bhabha Atomic Research Centre (BARC), Mumbai, Department of Atomic Energy (DAE), Government of India.
    Role: Principal Investigator.
  2. Development of frequency coded quantum key distribution solutions suitable for deployment on 25km fibre optic links. (Joint Project by Indian Institute of Technology Kanpur and Indian Institute of Technology Chennai.)
    Total Grant: INR 24.95 Lakhs, Duration: 3 years (2016-2019).
    Funding Agency: Bhabha Atomic Research Centre (BARC), Mumbai, Department of Atomic Energy (DAE), Government of India.
    Role: Member of the Evaluation Committee.
  3. Lightweight Encryption Techniques for Cyber Security Applications.
    Total Grant: INR 6.78 Lakhs (excluding JSPS part), Duration: 2 years (2016-2018).
    Funding Agency: Department of Science and Technology (DST), Government of India and Japan Society for the Promotion of Science (JSPS), Government of Japan.
    Role: Member of the Indian team of six scientists.
  4. Centre of Excellence in Cryptology.
    Total Grant: INR 10 Crores, Duration: 5 years (2011-2016).
    Funding Agency: Defence Research & Development Organisation (DRDO), Delhi, Ministry of Defence, Government of India.
    Role: Project Member.
  5. Threat and Attack Modeling of Heterogeneous Enterprise  Networks.
    Total Grant: INR 25 Lakhs, Duration: 18 months (2011-2013).Funding Agency: Sceintific Analysis Group (SAG), Defence Research & Development Organisation (DRDO), Delhi, Ministry of Defence, Government of India.
    Role: Consultant.
  6. Development of Encryption Algorithm for BARC.
    Total Grant: INR 10 Lakhs, Duration: 24 months (2011-2013).
    Funding Agency: Bhabha Atomic Research Centre (BARC), Mumbai, India.
    Role: Project Member.
  7. Development of Tool and Design Aid for Developing Safe Guards against Related Key and IV Attacks and Proactive Key Scheduling Scheme for Packet Encryption.
    Total Grant: INR 4.75 Lakhs, Duration: 15 months (2010-2012).
    Funding Agency: Defence Research & Development Organisation (DRDO), Ministry of Defence, Government of India.
    Role: Principal Investigator.
  8. Security Evaluation and Design of Components and Cryptographic Primitives for RFID and Sensor Networks.
    Total Grant: INR 29.28 Lakhs, Duration: 3 years (2009-2012).
    Funding Agency: Department of Science and Technology (DST), Government of India and Japan Science and Technology (JST) Agency, the National Organization in Japan forimplementing the Science and Technology Policies of the Government of Japan.
    Role: Member of the Indian team of four scientists.
  9. Steganography using Machine Learning.
    Total Grant: INR 50 Thousands, Duration: 1 year (2006-2007).
    Funding Agency: Jadavpur University.
    Role: Principal Investigator.

Publications
   Refereed International Journal Papers
  1. Goutam Paul and Souvik Ray. On Data Complexity of Distinguishing Attacks vs. Message Recovery Attacks on Stream Ciphers. To appear in Designs, Codes and Cryptography (Springer) 2017.
  2. Amit Jana and Goutam Paul. Revisiting RC4 Key Collision: Faster Search Algorithm and New 22-byte Colliding Key Pairs. To appear in Cryptography and Communications (Springer) 2017.
  3. Sugata Gangopadhyay, Goutam Paul, Nishant Sinha and Pantelimon Stănică. Generalized Nonlinearity of S-boxes. To appear in Advances in Mathematics of Communications (American Institute of Mathematical Sciences, AIMS), 2017.
  4. Arpita Maitra, Goutam Paul and Sarbani Roy. Device-independent quantum private query. In Physical Review A (American Physical Society), article 042344, volume 95, issue 4, April 2017.
  5. Goutam Paul, Ian Davidson, Imon Mukherjee and S. S. Ravi. Keyless Dynamic Optimal Multi-bit Image Steganography using Energetic Pixels. In Multimedia Tools and Applications journal (Springer), vol. 76, issue 5, March 2017.
  6. Ayesha Khalid, Goutam Paul and Anupam Chattopadhyay. RC4-AccSuite: A Hardware Acceleration Suite for RC4-like Stream Ciphers. In IEEE Transactions on Very Large Scale Integration Systems (IEEE Circuits and Systems Society, IEEE Computer Society, and IEEE Solid-State Circuits Society), pages 1072–1084, vol. 25, issue 3, March 2017.
  7. Atanu Acharyya and Goutam Paul. Revisiting optimal eavesdropping in quantum cryptography: Optimal interaction is unique up to rotation of the underlying basis. In Physical Review A (American Physical Society), article 022326, volume 95, issue 2, February 2017.
  8. Ayesha Khalid, Muhammad Hassan, Goutam Paul and Anupam Chattopadhyay. RunFein: A rapid prototyping framework for Feistel and SPN based block ciphers. In Journal of Cryptographic Engineering (Springer), pages 299–323, vol. 6, issue 4, November 2016.
  9. Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay, Faezeh Abediostad, Syed Imad Ud Din, Muhammad Hassan, Baishik Biswas and Prasanna Ravi. RunStream: A High-level Rapid Prototyping Framework for Stream Ciphers. In ACM Transactions on Embedded Computing Systems (ACM publication board), article 61, vol. 15, issue 3, July 2016.
  10. Goutam Paul, Shashwat Raizada and Vineet Pandey. RVClose: Discovering Nearby-Friend Groups in Multi-user Environment. In IPSI BgD Transactions on Internet Research (IPSI Bgd Internet Research Society), pages 9–16, vol. 12, issue 2 (Special issue on Advances in Cryptology and Information Security), July 2016.
  11. Arpita Maitra and Goutam Paul. On Symmetric Incoherent Eavesdropping on BB84 and its Variants. In IPSI BgD Transactions on Advanced Research (IPSI Bgd Internet Research Society), pages 25–37, vol. 12, issue 2 (Special issue on Advances in Cryptology and Information Security), July 2016.
  12. Goutam Paul and Anupam Chattopadhyay. Three Snakes in One Hole: The First Systematic Hardware Accelerator Design for SOSEMANUK with Optional Serpent and SNOW 2.0 Modes. In IEEE Transactions on Computers (IEEE Computer Society), pages 640–653, vol. 65, issue 2, February 2016.
  13. Chithrabhanu Perumangatt, Aadhi Abdul Rahim, Salla Gangi Reddy, Shashi Prabhakar, Goutam Kumar Samanta, Goutam Paul and Ravindra Pratap Singh. Three particle Hyper-entanglement: Teleportation and Quantum Key Distribution. In Quantum Information Processing (Springer), pages 3813–3826, vol. 14, issue 10, October 2015.
  14. Santanu Sarkar, Sourav Sen Gupta, Goutam Paul and Subhamoy Maitra. Proving TLS-attack related open biases of RC4. In Designs, Codes and Cryptography (Springer), pages 231–253, vol. 77, issue 1, October 2015.
  15. Kaushik Nandi and Goutam Paul. Quantum Information Splitting Using a Pair of GHZ States. In Quantum Information and Computation (Rinton Press), pages 1041–1047, vol. 15, issue 11 & 12, September 2015.
  16. Arpita Maitra, Sourya Joyee De, Goutam Paul and Asim K. Pal. Proposal for Quantum Rational Secret Sharing. In Physical Review A (American Physical Society), article 022305, volume 92, issue 2, August 2015.
  17. Arpita Maitra and Goutam Paul. A Resilient Quantum Secret Sharing Scheme. In International Journal of Theoretical Physics (Springer), pages 398–408, vol. 54, issue 2, February 2015.
  18. Imon Mukherjee, Goutam Paul and Jarvis Altrin Jawahar. Defeating Steganography with Multibit Sterilization using Pixel Eccentricity. In IPSI BgD Transactions on Advanced Research (IPSI Bgd Internet Research Society), pages 25–34, vol. 11, issue 1, January 2015.
  19. Goutam Paul and Anupam Chattopadhyay. Designing Stream Ciphers with Scalable Data-widths: A Case Study with HC-128. In Journal of Cryptographic Engineering (Springer), pages 135–143, vol. 4, issue 2, June 2014.
  20. Sourav Sen Gupta, Subhamoy Maitra, Goutam Paul and Santanu Sarkar. (Non-)Random Sequences from (Non-)Random Permutations – Analysis of RC4 stream cipher. In Journal of Cryptology (Springer), pages 67–108, vol. 27, issue 1, January 2014.
  21. Tamaghna Acharya and Goutam Paul. Maximum Lifetime Broadcast Communications in Cooperative Multihop Wireless Ad Hoc Networks: Centralized and Distributed Approaches. In Ad Hoc Networks (Elsevier), pages 1667–1682, vol. 11, issue 6, August 2013.
  22. Arpita Maitra and Goutam Paul. Eavesdropping in Semiquantum Key Distribution Protocol. In Information Processing Letters (Elsevier), pages 418–422, vol. 113, issue 12, June 30, 2013.
  23. Miodrag Mihaljevic, Sugata Gangopadhyay, Goutam Paul, Hideki Imai. Generic Cryptographic Weakness of k-normal Boolean Functions in Certain Stream Ciphers and Cryptanalysis of Grain-128. In Periodica Mathematica Hungarica (Springer), pages 205–227, vol. 65, issue 2, December, 2012.
  24. Miodrag Mihaljevic, Sugata Gangopadhyay, Goutam Paul and Hideki Imai. Internal State Recovery of Keystream Generator LILI-128 Based on a Novel Weakness of the Employed Boolean Function. In Information Processing Letters (Elsevier), pages 805–810, vol.112, no. 21, November 15, 2012.
  25. Miodrag Mihaljevic, Sugata Gangopadhyay, Goutam Paul and Hideki Imai. Internal State Recovery of Grain-v1 Using Normality Order of the Filter Function. In IET Information Security (IET Research Journals), pages 55–64, vol. 6, no. 2, June, 2012.
  26. Subhamoy Maitra, Goutam Paul, Shashwat Raizada, Subhabrata Sen and Rudradev Sengupta. Some Observations on HC-128. In Designs, Codes and Cryptography (Springer), pages 231–245, vol. 59, no. 1–3, April, 2011.
  27. Sayan Bhattacharya, Goutam Paul and Swagato Sanyal. A Cops and Robber Game in Multidimensional Grids. In Discrete Applied Mathematics (Elsevier), pages 1745–1751, vol. 158, no. 16, August, 2010.
  28. Goutam Paul and Subhamoy Maitra. On Biases of Permutation and Keystream Bytes of RC4 towards the Secret Key. In Cryptography and Communications (Springer), pages 225–268, vol. 1, no. 2, September, 2009.
  29. Goutam Paul, Siddheshwar Rathi and Subhamoy Maitra. On Non-negligible Bias of the First Output Byte of RC4 towards the First Three Bytes of the Secret Key. In Designs, Codes and Cryptography (Springer), pages 123–134, vol. 49, no. 1–3, December, 2008.
  30. Riddhipratim Basu, Shirshendu Ganguly, Subhamoy Maitra, Goutam Paul. A Complete Characterization of the Evolution of RC4 Pseudo Random Generation Algorithm. In Journal of Mathematical Cryptology (de Gruyter), pages 257–289, vol. 2, no. 3, October, 2008.
    Refereed International Conference Papers
  31. Goutam Paul, Anupam Chattopadhyay and Chander Chandak. Designing Parity Preserving Reversible Circuits. In Proceedings of the 9th International Conference on Reversible Computation, July 6-7, 2017, Kolkata, India, pages 77–89, vol. 10301, Lecture Notes in Computer Science (LNCS), Springer.
  32. Suvradip Chakraborty, Goutam Paul and Chandrasekaran Pandu Rangan. Efficient Compilers for After-the-Fact Leakage: from CPA to CCA-2 secure PKE to AKE. In Proceedings of the 22nd Australasian Conference on Information Security and Privacy (ACISP), July 3-5, 2017, Auckland, New Zealand, pages 343–362, vol. 10342, LNCS, Springer.
  33. Sanat Ghoshal and Goutam Paul. Exploiting Block-Chain Data Structure for Auditorless Auditing on Cloud Data. In Proceedings of the 12th International Conference on Information Systems Security (ICISS), Dec 16-20, 2016, Jaipur, India, pages 359–371, vol. 10063, LNCS, Springer.
  34. Goutam Paul and Abhiroop Sanyal. Revisiting the Security Proof of QUAD Stream Cipher: Some Corrections and Tighter Bounds. In Proceedings of the 12th International Conference on Information Security and Cryptology (INSCRYPT), Nov 4-6, 2016, Beijing, China, pages 103–116, vol. 10143, LNCS, Springer.
  35. Avijit Dutta, Mridul Nandi and Goutam Paul. One-Key Compression Function Based MAC with Security beyond Birthday Bound. In Proceedings of the 21st Australasian Conference on Information Security and Privacy (ACISP), July 4-6, 2016, Melbourne, Australia, pages 343–358, vol. 9722, LNCS, Springer.
  36. Christina Boura, Avik Chakraborti, Gaëtan Leurent, Goutam Paul, Dhiman Saha, Hadi Soleimany and Valentin Suder. Key Recovery Attack against 2.5-round π-Cipher. In Proceedings of the 23rd International Workshop on Fast Software Encryption (FSE), March 20-23, 2016, Bochum, Germany, pages  535–553, vol. 9783, LNCS, Springer.
  37. Goutam Paul. Revisiting Democratic Mining in Bitcoins: Its Weakness and Possible Remedies. In Proceedings of the 11th International Conference on Information Systems Security (ICISS), Dec 16-20, 2015, Kolkata, India, pages 161–170, vol. 9478, LNCS, Springer.
  38. Suvradip Chakraborty, Goutam Paul and Chandrasekaran Pandu Rangan. Forward-Secure Authenticated Symmetric Key Exchange Protocols: New Security Models and Some Constructions. In Proceedings of the 9th International Conference on Provable Security (ProvSec), November 24-26, 2015, Kanazawa, Japan, pages 149–166, vol. 9451, LNCS, Springer.
  39. Subhamoy Maitra, Goutam Paul and Willi Meier. Salsa20 Cryptanalysis: New Moves and Revisiting Old Styles. In Proceedings of the 9th International Workshop on Coding and Cryptography (WCC), April 13-17, 2015, Paris, France.
  40. Goutam Paul, Pratik Sarkar and Sarbajit Mukherjee. Towards a More Democratic Mining in Bitcoins. In Proceedings of 10th International Conference on Information Systems Security (ICISS), Dec 16-20, 2014, Hyderabad, India, pages 185–203, vol. 8880, LNCS, Springer.
  41. Sumitra Biswal, Goutam Paul and Shashwat Raizada. Preserving Privacy in LocationBased Services Using Sudoku Structures. In Proceedings of the 10th International Conference on Information Systems Security (ICISS), Dec 16-20, 2014, Hyderabad, India, pages 448–463, vol. 8880, LNCS, Springer.
  42. Ayesha Khalid, Prasanna Ravi, Anupam Chattopadhyay and Goutam Paul. One Word/Cycle HC-128 Accelerator via State-Splitting Optimization. In Proceedings of the 15th International Conference on Cryptology in India (INDOCRYPT), December 14-17, 2014, New Delhi, India, pages 283–303, vol. 8885, LNCS, Springer.
  43. Avijit Dutta and Goutam Paul. Deterministic Hard Fault Attack on Trivium. In Proceedings of the 9th International Workshop on Security (IWSEC), August 27-29, 2014, Hirosaki, Japan, pages 134–145, vol. 8639, LNCS, Springer.
  44. Zheng Wang, Goutam Paul and Anupam Chattopadhyay. Processor Design with Asymmetric Reliability. In Proceedings of the 13th IEEE Computer Society Annual Symposium on VLSI (ISVLSI), July 9-11, 2014, Tampa, Florida, U.S.A., pages 565–570.
  45. Sourav Sen Gupta, Subhamoy Maitra, Willi Meier, Goutam Paul and Santanu Sarkar.Dependence in IV-related bytes of RC4 key enhances vulnerabilities in WPA. In Proceedings of the 21st International Workshop on Fast Software Encryption (FSE), March 3-5, 2014, London, pages 350-369, vol. 8540, LNCS, Springer.
  46. Imon Mukherjee and Goutam Paul. Efficient Multi-bit Image Steganography in Spatial Domain. In Proceedings of the 9th International Conference on Information Systems Security (ICISS), Dec 16-20, 2013, Kolkata, India, pages 270–284, vol. 8303, LNCS, Springer.
  47. Ayesha Khalid, Muhammad Hassan, Anupam Chattopadhyay and Goutam Paul.RAPID-FeinSPN: A Rapid Prototyping Framework for Feistel and SPN-Based Block Ciphers. In Proceedings of the 9th International Conference on Information Systems Security (ICISS), Dec 16-20, 2013, Kolkata, India, pages 169–190, vol. 8303, LNCS, Springer.
  48. Shubhajit Saha and Goutam Paul. On Effective Sharing of User Generated Content. In Proceedings of the 11th Asia Pacific Conference on Computer Human Interaction (APCHI), September 24-27, 2013, Bangalore, India, pages 114–118.
  49. Goutam Paul and Soumi Paul. Proposal for a Novel Computerized Menu-Presentation Interface for Restaurants. In Proceedings of the 11th Asia Pacific Conference on Computer Human Interaction (APCHI), September 24-27, 2013, Bangalore, India, pages 119–122.
  50. Ayesha Khalid, Goutam Paul and Anupam Chattopadhyay. New Speed Records for Salsa20 Stream Cipher using an Autotuning Framework on GPUs. In Proceedings of the 6th International Conference on Cryptology in Africa (AFRICACRYPT), June 22-24, 2013, Cairo, Egypt, pages 189–207, vol. 7918, LNCS, Springer.
  51. Subhamoy Maitra, Goutam Paul, Santanu Sarkar, Michael Lehmann and Willi Meier.New Results on Generalization of Roos-type Biases and Related Keystream of RC4.In Proceedings of the 6th International Conference on Cryptology in Africa (AFRICACRYPT), June 22-24, 2013, Cairo, Egypt, pages 222–239, vol. 7918, LNCS, Springer.
  52. Khawar Shahzad, Ayesha Khalid, Zolt´an Endre R´akossy, Goutam Paul and AnupamChattopadhyay. CoARX: A Coprocessor for ARX-based Cryptographic Algorithms. In Proceedings of the 50th ACM/IEEE Design Automation Conference (DAC), June 2-6,2013, Austin, U.S.A., Article No. 133, ACM.
  53. Arpita Maitra and Goutam Paul. Symmetric Incoherent Eavesdropping against MDIQKD. In Proceedings of the 8th International Workshop on Coding and Cryptography (WCC), April 15-19, 2013, Bergen, Norway, pages 413–426.
  54. Ayesha Khalid, Deblin Bagchi, Goutam Paul and Anupam Chattopadhyay. Optimized GPU Implementation and Performance Analysis of HC Series of Stream Ciphers. InProceedings of the 15th International Conference on Information Security and Cryptology (ICISC), November 28-30, 2012, Seoul, Korea, pages 293–308, vol. 7839, LNCS, Springer.
  55. Goutam Paul, Ian Davidson, Imon Mukherjee and S. S. Ravi. Keyless Steganography in Spatial Domain using Energetic Pixels. In Proceedings of the 8th International Conference on Information Systems Security (ICISS), Dec 15-19, 2012, Guwahati, India, pages 134–148, vol. 7671, LNCS, Springer.
  56. Arpita Maitra and Goutam Paul. Another Look at Symmetric Incoherent Optimal Eavesdropping against BB84. In Proceedings of the 13th International Conference on Cryptology in India (INDOCRYPT), December 9-12, 2012, Kolkata, India, pages 80–99, vol. 7668, LNCS, Springer.
  57. Goutam Paul and Shashwat Raizada. Impact of Extending Side Channel Attack on Cipher Variants: A Case Study with the HC Series of Stream Ciphers. In Proceedings of International Conference on Security, Privacy and Applied Cryptography Engineering (SPACE), November 2-3, 2012, Chennai, India, pages 32–44, vol. 7644, LNCS, Springer.
  58. Anupam Chattopadhyay and Goutam Paul. Exploring Security-Performance Tradeoffs during Hardware Accelerator Design of Stream Cipher RC4. In Proceedings of the 20th IFIP/IEEE International Conference on Very Large Scale Integration and System-on-Chip (VLSI-SoC), October 7-10, 2012, Santa Cruz, U.S.A., pages 251–254.
  59. Goutam Paul and Imon Mukherjee. Sterilization of Stego-images through Histogram Normalization. In Proceedings of the 11th International Conference on Security and Management (SAM), July 16-19, 2012, Las Vegas, U.S.A., pages 448–454.
  60. Apurba Das, Subhamoy Maitra, Goutam Paul and Santanu Sarkar. Some Combinatorial Results Towards State Recovery Attack on RC4. In Proceedings of the 7th International Conference on Information Systems Security (ICISS), Dec 15-19, 2011, Kolkata, India, pages 204–214, vol. 7093, LNCS, Springer.
  61. Goutam Paul, Subhamoy Maitra and Shashwat Raizada. A Theoretical Analysis of the Structure of HC-128. In Proceedings of the 6th International Workshop on Security (IWSEC), November 8-10, 2011, Tokyo, Japan, pages 161–177, vol. 7038, LNCS, Springer.
  62. Sourav Sen Gupta, Subhamoy Maitra, Goutam Paul and Santanu Sarkar. Proof of Empirical RC4 Biases and New Key Correlations. In Proceedings of the 18th Workshop on Selected Areas in Cryptography (SAC), August 11-12, 2011, Toronto, Canada, pages 151–168, vol. 7118, LNCS, Springer.
  63. Imon Mukherjee and Goutam Paul. Double Bit Sterilization of Stego-images. In Proceedings of the 10th International Conference on Security and Management (SAM),July 18-21, 2011, Las Vegas, U.S.A., pages 743–746.
  64. Miodrag Mihaljevic, Sugata Gangopadhyay, Goutam Paul, Hideki Imai. An Algorithm for the Internal State Recovery of Grain-v1. In 11th Central European Conference on Cryptology (CECC), June 30-July 2, 2011, Debrecen, Hungary.
  65. Subhamoy Maitra, Goutam Paul and Sourav Sen Gupta. Attack on Broadcast RC4 Revisited. In Proceedings of the 18th Fast Software Encryption (FSE) Workshop, February 13-16, 2011, Lyngby, Denmark, pages 199–217, vol. 6733, LNCS, Springer.
  66. Miodrag Mihaljevic, Sugata Gangopadhyay, Goutam Paul, Hideki Imai. A GenericWeakness of the k-normal Boolean Functions Exposed to Dedicated Algebraic Attack. In Proceedings of the 11th International Symposium on Information Theory and its Applications (ISITA), October 17-20, 2010, Taichung, Taiwan, pages 911–916.
  67. Shashwat Raizada, Goutam Paul and Vineet Pandey. Nearby-Friend Discovery Protocol for Multiple Users. In Proceedings of the 2009 IEEE International Conference onComputational Science and Engineering (CSE), vol. 3, Track: International Symposium on Secure Computing (SecureCom 2009), August 29-31, 2009, Vancouver, Canada, pages 238–243, IEEE Computer Society Press.
  68. Riddhipratim Basu, Subhamoy Maitra, Goutam Paul and Tanmoy Talukdar. On Some Sequences of the Secret Pseudo-random Index j in RC4 Key Scheduling. In Proceedings of the 18th International Symposium on Applied Algebra, Algebraic Algorithms and Error Correcting Codes (AAECC), June 8-12, 2009, Tarragona, Spain, pages 137–148, vol. 5527,LNCS, Springer.
  69. Subhamoy Maitra, Goutam Paul and Shashwat Raizada. Some Observations on HC-128. In Proceedings of the 6th International Workshop on Coding and Cryptography (WCC), May 10-15, 2009, Ullensvang, Norway, pages 527–539.
  70. Subhamoy Maitra and Goutam Paul. Analysis of RC4 and Proposal of Additional Layers for Better Security Margin. In Proceedings of the 9th International Conference on Cryptology in India (INDOCRYPT), December 14-17, 2008, Indian Institute of Technology, Kharagpur, India, pages 27–39, vol. 5365, LNCS, Springer.
  71. Subhamoy Maitra and Goutam Paul. Recovering RC4 Permutation from 2048 Keystream Bytes if j is Stuck. In Proceedings of the 13th Australasian Conference on Information Security and Privacy (ACISP), July 7-9, 2008, Wollongong, Australia, pages 306–320, vol. 5107, LNCS, Springer.
  72. Riddhipratim Basu, Shirshendu Ganguly, Subhamoy Maitra, Goutam Paul. RC4 Keystream Always Leaks Information about the Hidden Index j . In Proceedings of the State of the Art of Stream Ciphers (SASC), special Workshop hosted by ECRYPT, the European Network of Excellence in Cryptography, February 13-14, 2008, Lausanne, Switzerland, pages 233–247.
  73. Subhamoy Maitra and Goutam Paul. New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4. In Proceedings of the 15th Fast Software Encryption (FSE) Workshop, February 10-13, 2008, Lausanne, Switzerland, pages 253–269, vol. 5086, LNCS, Springer.
  74. Goutam Paul, Subhamoy Maitra and Rohit Srivastava. On Non-Randomness of the Permutation after RC4 Key Scheduling. In Proceedings of the 17th International Symposium on Applied Algebra, Algebraic Algorithms and Error Correcting Codes (AAECC), December 16-20, 2007, Bangalore, India, pages 100–109, vol. 4851, LNCS, Springer.
  75. Goutam Paul and Subhamoy Maitra. Permutation after RC4 Key Scheduling Reveals the Secret Key. In Proceedings of the 14th Workshop on Selected Areas in Cryptography (SAC), August 16-17, 2007, Ottawa, Canada, pages 360–377, vol. 4876, LNCS, Springer.
  76. Sayan Bhattacharya, Goutam Paul and Swagato Sanyal. On Necessary and Sufficient Number of Cops in the Game of Cops and Robber in Multidimensional Grids. In 8th Asian Symposium on Computer Mathematics (ASCM), December 15-17, 2007, Singapore.
  77. Goutam Paul, Siddheshwar Rathi and Subhamoy Maitra. On Non-negligible Bias of the First Output Byte of RC4 towards the First Three Bytes of the Secret Key. In Proceedings of the 5th International Workshop on Coding and Cryptography (WCC), April 16-20, 2007, Versailles, France, pages 285–294.
  78. Goutam Paul. Occam’s Razor and a Non-syntactic Measure of Decision Tree Complexity. In Proceedings of the 19th National Conference on Artificial Intelligence (AAAI), July 25-29, 2004, San Jose, California, U.S.A., pages 962–963.
  79. Ian Davidson and Goutam Paul. Locating Secret Messages in Images. In Proceedings of the 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), August 22-25, 2004, Seattle, Washington, U.S.A., pages 545–550.
  80. George Berg, Ian Davidson, Ming-Yuan Duan and Goutam Paul. Searching for Hidden Messages: Automatic Detection of Steganography. In Proceedings of the 15th Innovative Applications of Artificial Intelligence (IAAI) Conference, August 12-14, 2003, Acapulco, Mexico, pages 51–56.
  81. Somnath Pal, Tridib Kumar Saha, Goutam K. Paul, Chinmay Maiti and Ananda Mohan Ghosh. Multi-method Decision Tree Learning for Data Mining. In Proceedings of the 28th Annual Convention and Exhibition of IEEE India Council (IEEE-ACE), December 20-21, 2002, Science City, Kolkata, India, pages 238–242.
    Pre-Prints / Other Publications
  82. Shashanka Balakuntala and Goutam Paul. Quantum Error Correction using Hypergraph States. In arXiv.org e-Print Archive, arXiv:1708.03756 [qant-ph], Aug 12, 2017.
  83. Soumik Ghosh, Arnab Adhikary and Goutam Paul. Harnessing closed timelike curves for cryptographic protocols. In arXiv.org e-Print Archive, arXiv:1708.03521 [qant-ph], Aug 11, 2017.
  84. Soumik Ghosh, Arnab Adhikary and Goutam Paul. Revisiting Integer Factorization using Closed Timelike Curves. In arXiv.org e-Print Archive, arXiv:1708.03508 [qant-ph], Aug 11, 2017.
  85. Ashutosh Rai and Goutam Paul. Strong Quantum Solutions in Conflicting Interest Bayesian Games. In arXiv.org e-Print Archive, arXiv:1705.04639 [qant-ph], May 12, 2017.
  86. Jyotirmoy Basak, Bappaditya Ghosh, Arpita Maitra and Goutam Paul. Device Independent Quantum Private Query with Finite Number of Entangled Qubits. In arXiv.org e-Print Archive, arXiv:1705.04570 [qant-ph], May 12, 2017.
  87. Goutam Paul and Souvik Ray. Analysis of Burn-in period for RC4 State Transition. In Cryptology ePrint Archive: Report 2017/175, February 21, 2017.
  88. Goutam Paul. Can Quantum Physics be the Science of Both Matter and Spirit? In conference on Quantum Physics and Consciousness (QPC), Feb 4-5, 2017, Rabindra Tirtha, New Town, Kolkata, India.
  89. Arpita Maitra, Goutam Paul and Asim K. Pal. Revisiting Secure Two-Party Computation with Rational Players. In Cryptology ePrint Archive: Report 2015/1071, November 4, 2015.
  90. Nilanjan Datta, Avijit Dutta, Mridul Nandi, Goutam Paul and Liting Zhang. One-key Double-Sum MAC with Beyond-Birthday Security. In Cryptology ePrint Archive: Report 2015/958, October 3, 2015.
  91. Arpita Maitra, Goutam Paul and Asim K. Pal. Secure two-party quantum computation for non-rational and rational settings. In arXiv.org e-Print Archive, arXiv:1504.01974 [cs.CR], April 8, 2015.
  92. Goutam Paul, Subhamoy Maitra and Anupam Chattopadhyay. Quad-RC4: Merging Four RC4 States towards a 32-bit Stream Cipher. In Cryptology ePrint Archive: Report 2013/572, September 6, 2013.
  93. Sounak Gupta and Goutam Paul. Revisiting Fermats Factorization for the RSA Modulus. In arXiv.org e-Print Archive, arXiv:0910.4179v1 [cs.CR], October 21, 2009.
  94. Adway Mitra, Goutam Paul and Ushnish Sarkar. Some Conjectures on the Number of Primes in Certain Intervals. In arXiv.org e-Print Archive, arXiv:0906.0104v1 [math.NT], May 30, 2009.
  95. Goutam Paul. Artificial Intelligence and Consciousness. In 2nd Human-E-Tech Conference, April 23-25, 2004, SUNY Albany, U.S.A.