Publications

   Refereed International Journal Papers
  1. Amit Jana and Goutam Paul. Revisiting RC4 Key Collision: Faster Search Algorithm and New 22-byte Colliding Key Pairs. To appear in Cryptography and Communications (Springer) 2017.
  2. Sugata Gangopadhyay, Goutam Paul, Nishant Sinha and Pantelimon Stănică. Generalized Nonlinearity of S-boxes. To appear in Advances in Mathematics of Communications (American Institute of Mathematical Sciences, AIMS), 2017.
  3. Arpita Maitra, Goutam Paul and Sarbani Roy. Device-independent quantum private query. In Physical Review A (American Physical Society), article 042344, volume 95, issue 4, April 2017.
  4. Goutam Paul, Ian Davidson, Imon Mukherjee and S. S. Ravi. Keyless Dynamic Optimal Multi-bit Image Steganography using Energetic Pixels. In Multimedia Tools and Applications journal (Springer), vol. 76, issue 5, March 2017.
  5. Ayesha Khalid, Goutam Paul and Anupam Chattopadhyay. RC4-AccSuite: A Hardware Acceleration Suite for RC4-like Stream Ciphers. In IEEE Transactions on Very Large Scale Integration Systems (IEEE Circuits and Systems Society, IEEE Computer Society, and IEEE Solid-State Circuits Society), pages 1072–1084, vol. 25, issue 3, March 2017.
  6. Atanu Acharyya and Goutam Paul. Revisiting optimal eavesdropping in quantum cryptography: Optimal interaction is unique up to rotation of the underlying basis. In Physical Review A (American Physical Society), article 022326, volume 95, issue 2, February 2017.
  7. Ayesha Khalid, Muhammad Hassan, Goutam Paul and Anupam Chattopadhyay. RunFein: A rapid prototyping framework for Feistel and SPN based block ciphers. In Journal of Cryptographic Engineering (Springer), pages 299–323, vol. 6, issue 4, November 2016.
  8. Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay, Faezeh Abediostad, Syed Imad Ud Din, Muhammad Hassan, Baishik Biswas and Prasanna Ravi. RunStream: A High-level Rapid Prototyping Framework for Stream Ciphers. In ACM Transactions on Embedded Computing Systems (ACM publication board), article 61, vol. 15, issue 3, July 2016.
  9. Goutam Paul, Shashwat Raizada and Vineet Pandey. RVClose: Discovering Nearby-Friend Groups in Multi-user Environment. In IPSI BgD Transactions on Internet Research (IPSI Bgd Internet Research Society), pages 9–16, vol. 12, issue 2 (Special issue on Advances in Cryptology and Information Security), July 2016.
  10. Arpita Maitra and Goutam Paul. On Symmetric Incoherent Eavesdropping on BB84 and its Variants. In IPSI BgD Transactions on Advanced Research (IPSI Bgd Internet Research Society), pages 25–37, vol. 12, issue 2 (Special issue on Advances in Cryptology and Information Security), July 2016.
  11. Goutam Paul and Anupam Chattopadhyay. Three Snakes in One Hole: The First Systematic Hardware Accelerator Design for SOSEMANUK with Optional Serpent and SNOW 2.0 Modes. In IEEE Transactions on Computers (IEEE Computer Society), pages 640–653, vol. 65, issue 2, February 2016.
  12. Chithrabhanu Perumangatt, Aadhi Abdul Rahim, Salla Gangi Reddy, Shashi Prabhakar, Goutam Kumar Samanta, Goutam Paul and Ravindra Pratap Singh. Three particle Hyper-entanglement: Teleportation and Quantum Key Distribution. In Quantum Information Processing (Springer), pages 3813–3826, vol. 14, issue 10, October 2015.
  13. Santanu Sarkar, Sourav Sen Gupta, Goutam Paul and Subhamoy Maitra. Proving TLS-attack related open biases of RC4. In Designs, Codes and Cryptography (Springer), pages 231–253, vol. 77, issue 1, October 2015.
  14. Kaushik Nandi and Goutam Paul. Quantum Information Splitting Using a Pair of GHZ States. In Quantum Information and Computation (Rinton Press), pages 1041–1047, vol. 15, issue 11 & 12, September 2015.
  15. Arpita Maitra, Sourya Joyee De, Goutam Paul and Asim K. Pal. Proposal for Quantum Rational Secret Sharing. In Physical Review A (American Physical Society), article 022305, volume 92, issue 2, August 2015.
  16. Arpita Maitra and Goutam Paul. A Resilient Quantum Secret Sharing Scheme. In International Journal of Theoretical Physics (Springer), pages 398–408, vol. 54, issue 2, February 2015.
  17. Imon Mukherjee, Goutam Paul and Jarvis Altrin Jawahar. Defeating Steganography with Multibit Sterilization using Pixel Eccentricity. In IPSI BgD Transactions on Advanced Research (IPSI Bgd Internet Research Society), pages 25–34, vol. 11, issue 1, January 2015.
  18. Goutam Paul and Anupam Chattopadhyay. Designing Stream Ciphers with Scalable Data-widths: A Case Study with HC-128. In Journal of Cryptographic Engineering (Springer), pages 135–143, vol. 4, issue 2, June 2014.
  19. Sourav Sen Gupta, Subhamoy Maitra, Goutam Paul and Santanu Sarkar. (Non-)Random Sequences from (Non-)Random Permutations – Analysis of RC4 stream cipher. In Journal of Cryptology (Springer), pages 67–108, vol. 27, issue 1, January 2014.
  20. Tamaghna Acharya and Goutam Paul. Maximum Lifetime Broadcast Communications in Cooperative Multihop Wireless Ad Hoc Networks: Centralized and Distributed Approaches. In Ad Hoc Networks (Elsevier), pages 1667–1682, vol. 11, issue 6, August 2013.
  21. Arpita Maitra and Goutam Paul. Eavesdropping in Semiquantum Key Distribution Protocol. In Information Processing Letters (Elsevier), pages 418–422, vol. 113, issue 12, June 30, 2013.
  22. Miodrag Mihaljevic, Sugata Gangopadhyay, Goutam Paul, Hideki Imai. Generic Cryptographic Weakness of k-normal Boolean Functions in Certain Stream Ciphers and Cryptanalysis of Grain-128. In Periodica Mathematica Hungarica (Springer), pages 205–227, vol. 65, issue 2, December, 2012.
  23. Miodrag Mihaljevic, Sugata Gangopadhyay, Goutam Paul and Hideki Imai. Internal State Recovery of Keystream Generator LILI-128 Based on a Novel Weakness of the Employed Boolean Function. In Information Processing Letters (Elsevier), pages 805–810, vol.112, no. 21, November 15, 2012.
  24. Miodrag Mihaljevic, Sugata Gangopadhyay, Goutam Paul and Hideki Imai. Internal State Recovery of Grain-v1 Using Normality Order of the Filter Function. In IET Information Security (IET Research Journals), pages 55–64, vol. 6, no. 2, June, 2012.
  25. Subhamoy Maitra, Goutam Paul, Shashwat Raizada, Subhabrata Sen and Rudradev Sengupta. Some Observations on HC-128. In Designs, Codes and Cryptography (Springer), pages 231–245, vol. 59, no. 1–3, April, 2011.
  26. Sayan Bhattacharya, Goutam Paul and Swagato Sanyal. A Cops and Robber Game in Multidimensional Grids. In Discrete Applied Mathematics (Elsevier), pages 1745–1751, vol. 158, no. 16, August, 2010.
  27. Goutam Paul and Subhamoy Maitra. On Biases of Permutation and Keystream Bytes of RC4 towards the Secret Key. In Cryptography and Communications (Springer), pages 225–268, vol. 1, no. 2, September, 2009.
  28. Goutam Paul, Siddheshwar Rathi and Subhamoy Maitra. On Non-negligible Bias of the First Output Byte of RC4 towards the First Three Bytes of the Secret Key. In Designs, Codes and Cryptography (Springer), pages 123–134, vol. 49, no. 1–3, December, 2008.
  29. Riddhipratim Basu, Shirshendu Ganguly, Subhamoy Maitra, Goutam Paul. A Complete Characterization of the Evolution of RC4 Pseudo Random Generation Algorithm. In Journal of Mathematical Cryptology (de Gruyter), pages 257–289, vol. 2, no. 3, October, 2008.
    Refereed International Conference Papers
  30. Goutam Paul, Anupam Chattopadhyay and Chander Chandak. Designing Parity Preserving Reversible Circuits. To appear in the 9th International Conference on Reversible Computation, July 6-7, 2017, Kolkata, India, Lecture Notes in Computer Science (LNCS), Springer.
  31. Suvradip Chakraborty, Goutam Paul and Chandrasekaran Pandu Rangan. Efficient Compilers for After-the-Fact Leakage: from CPA to CCA-2 secure PKE to AKE. In Proceedings of the 22nd Australasian Conference on Information Security and Privacy (ACISP), July 3-5, 2017, Auckland, New Zealand, LNCS, Springer.
  32. Sanat Ghoshal and Goutam Paul. Exploiting Block-Chain Data Structure for Auditorless Auditing on Cloud Data. In Proceedings of the 12th International Conference on Information Systems Security (ICISS), Dec 16-20, 2016, Jaipur, India, pages 359–371, vol. 10063, LNCS, Springer.
  33. Goutam Paul and Abhiroop Sanyal. Revisiting the Security Proof of QUAD Stream Cipher: Some Corrections and Tighter Bounds. In Proceedings of the 12th International Conference on Information Security and Cryptology (INSCRYPT), Nov 4-6, 2016, Beijing, China, pages 103–116, vol. 10143, LNCS, Springer.
  34. Avijit Dutta, Mridul Nandi and Goutam Paul. One-Key Compression Function Based MAC with Security beyond Birthday Bound. In Proceedings of the 21st Australasian Conference on Information Security and Privacy (ACISP), July 4-6, 2016, Melbourne, Australia, pages 343–358, vol. 9722, LNCS, Springer.
  35. Christina Boura, Avik Chakraborti, Gaëtan Leurent, Goutam Paul, Dhiman Saha, Hadi Soleimany and Valentin Suder. Key Recovery Attack against 2.5-round π-Cipher. In Proceedings of the 23rd International Workshop on Fast Software Encryption (FSE), March 20-23, 2016, Bochum, Germany, pages  535–553, vol. 9783, LNCS, Springer.
  36. Goutam Paul. Revisiting Democratic Mining in Bitcoins: Its Weakness and Possible Remedies. In Proceedings of the 11th International Conference on Information Systems Security (ICISS), Dec 16-20, 2015, Kolkata, India, pages 161–170, vol. 9478, LNCS, Springer.
  37. Suvradip Chakraborty, Goutam Paul and Chandrasekaran Pandu Rangan. Forward-Secure Authenticated Symmetric Key Exchange Protocols: New Security Models and Some Constructions. In Proceedings of the 9th International Conference on Provable Security (ProvSec), November 24-26, 2015, Kanazawa, Japan, pages 149–166, vol. 9451, LNCS, Springer.
  38. Subhamoy Maitra, Goutam Paul and Willi Meier. Salsa20 Cryptanalysis: New Moves and Revisiting Old Styles. In Proceedings of the 9th International Workshop on Coding and Cryptography (WCC), April 13-17, 2015, Paris, France.
  39. Goutam Paul, Pratik Sarkar and Sarbajit Mukherjee. Towards a More Democratic Mining in Bitcoins. In Proceedings of 10th International Conference on Information Systems Security (ICISS), Dec 16-20, 2014, Hyderabad, India, pages 185–203, vol. 8880, LNCS, Springer.
  40. Sumitra Biswal, Goutam Paul and Shashwat Raizada. Preserving Privacy in LocationBased Services Using Sudoku Structures. In Proceedings of the 10th International Conference on Information Systems Security (ICISS), Dec 16-20, 2014, Hyderabad, India, pages 448–463, vol. 8880, LNCS, Springer.
  41. Ayesha Khalid, Prasanna Ravi, Anupam Chattopadhyay and Goutam Paul. One Word/Cycle HC-128 Accelerator via State-Splitting Optimization. In Proceedings of the 15th International Conference on Cryptology in India (INDOCRYPT), December 14-17, 2014, New Delhi, India, pages 283–303, vol. 8885, LNCS, Springer.
  42. Avijit Dutta and Goutam Paul. Deterministic Hard Fault Attack on Trivium. In Proceedings of the 9th International Workshop on Security (IWSEC), August 27-29, 2014, Hirosaki, Japan, pages 134–145, vol. 8639, LNCS, Springer.
  43. Zheng Wang, Goutam Paul and Anupam Chattopadhyay. Processor Design with Asymmetric Reliability. In Proceedings of the 13th IEEE Computer Society Annual Symposium on VLSI (ISVLSI), July 9-11, 2014, Tampa, Florida, U.S.A., pages 565–570.
  44. Sourav Sen Gupta, Subhamoy Maitra, Willi Meier, Goutam Paul and Santanu Sarkar.Dependence in IV-related bytes of RC4 key enhances vulnerabilities in WPA. In Proceedings of the 21st International Workshop on Fast Software Encryption (FSE), March 3-5, 2014, London, pages 350-369, vol. 8540, LNCS, Springer.
  45. Imon Mukherjee and Goutam Paul. Efficient Multi-bit Image Steganography in Spatial Domain. In Proceedings of the 9th International Conference on Information Systems Security (ICISS), Dec 16-20, 2013, Kolkata, India, pages 270–284, vol. 8303, LNCS, Springer.
  46. Ayesha Khalid, Muhammad Hassan, Anupam Chattopadhyay and Goutam Paul.RAPID-FeinSPN: A Rapid Prototyping Framework for Feistel and SPN-Based Block Ciphers. In Proceedings of the 9th International Conference on Information Systems Security (ICISS), Dec 16-20, 2013, Kolkata, India, pages 169–190, vol. 8303, LNCS, Springer.
  47. Shubhajit Saha and Goutam Paul. On Effective Sharing of User Generated Content. In Proceedings of the 11th Asia Pacific Conference on Computer Human Interaction (APCHI), September 24-27, 2013, Bangalore, India, pages 114–118.
  48. Goutam Paul and Soumi Paul. Proposal for a Novel Computerized Menu-Presentation Interface for Restaurants. In Proceedings of the 11th Asia Pacific Conference on Computer Human Interaction (APCHI), September 24-27, 2013, Bangalore, India, pages 119–122.
  49. Ayesha Khalid, Goutam Paul and Anupam Chattopadhyay. New Speed Records for Salsa20 Stream Cipher using an Autotuning Framework on GPUs. In Proceedings of the 6th International Conference on Cryptology in Africa (AFRICACRYPT), June 22-24, 2013, Cairo, Egypt, pages 189–207, vol. 7918, LNCS, Springer.
  50. Subhamoy Maitra, Goutam Paul, Santanu Sarkar, Michael Lehmann and Willi Meier.New Results on Generalization of Roos-type Biases and Related Keystream of RC4.In Proceedings of the 6th International Conference on Cryptology in Africa (AFRICACRYPT), June 22-24, 2013, Cairo, Egypt, pages 222–239, vol. 7918, LNCS, Springer.
  51. Khawar Shahzad, Ayesha Khalid, Zolt´an Endre R´akossy, Goutam Paul and AnupamChattopadhyay. CoARX: A Coprocessor for ARX-based Cryptographic Algorithms. In Proceedings of the 50th ACM/IEEE Design Automation Conference (DAC), June 2-6,2013, Austin, U.S.A., Article No. 133, ACM.
  52. Arpita Maitra and Goutam Paul. Symmetric Incoherent Eavesdropping against MDIQKD. In Proceedings of the 8th International Workshop on Coding and Cryptography (WCC), April 15-19, 2013, Bergen, Norway, pages 413–426.
  53. Ayesha Khalid, Deblin Bagchi, Goutam Paul and Anupam Chattopadhyay. Optimized GPU Implementation and Performance Analysis of HC Series of Stream Ciphers. InProceedings of the 15th International Conference on Information Security and Cryptology (ICISC), November 28-30, 2012, Seoul, Korea, pages 293–308, vol. 7839, LNCS, Springer.
  54. Goutam Paul, Ian Davidson, Imon Mukherjee and S. S. Ravi. Keyless Steganography in Spatial Domain using Energetic Pixels. In Proceedings of the 8th International Conference on Information Systems Security (ICISS), Dec 15-19, 2012, Guwahati, India, pages 134–148, vol. 7671, LNCS, Springer.
  55. Arpita Maitra and Goutam Paul. Another Look at Symmetric Incoherent Optimal Eavesdropping against BB84. In Proceedings of the 13th International Conference on Cryptology in India (INDOCRYPT), December 9-12, 2012, Kolkata, India, pages 80–99, vol. 7668, LNCS, Springer.
  56. Goutam Paul and Shashwat Raizada. Impact of Extending Side Channel Attack on Cipher Variants: A Case Study with the HC Series of Stream Ciphers. In Proceedings of International Conference on Security, Privacy and Applied Cryptography Engineering (SPACE), November 2-3, 2012, Chennai, India, pages 32–44, vol. 7644, LNCS, Springer.
  57. Anupam Chattopadhyay and Goutam Paul. Exploring Security-Performance Tradeoffs during Hardware Accelerator Design of Stream Cipher RC4. In Proceedings of the 20th IFIP/IEEE International Conference on Very Large Scale Integration and System-on-Chip (VLSI-SoC), October 7-10, 2012, Santa Cruz, U.S.A., pages 251–254.
  58. Goutam Paul and Imon Mukherjee. Sterilization of Stego-images through Histogram Normalization. In Proceedings of the 11th International Conference on Security and Management (SAM), July 16-19, 2012, Las Vegas, U.S.A., pages 448–454.
  59. Apurba Das, Subhamoy Maitra, Goutam Paul and Santanu Sarkar. Some Combinatorial Results Towards State Recovery Attack on RC4. In Proceedings of the 7th International Conference on Information Systems Security (ICISS), Dec 15-19, 2011, Kolkata, India, pages 204–214, vol. 7093, LNCS, Springer.
  60. Goutam Paul, Subhamoy Maitra and Shashwat Raizada. A Theoretical Analysis of the Structure of HC-128. In Proceedings of the 6th International Workshop on Security (IWSEC), November 8-10, 2011, Tokyo, Japan, pages 161–177, vol. 7038, LNCS, Springer.
  61. Sourav Sen Gupta, Subhamoy Maitra, Goutam Paul and Santanu Sarkar. Proof of Empirical RC4 Biases and New Key Correlations. In Proceedings of the 18th Workshop on Selected Areas in Cryptography (SAC), August 11-12, 2011, Toronto, Canada, pages 151–168, vol. 7118, LNCS, Springer.
  62. Imon Mukherjee and Goutam Paul. Double Bit Sterilization of Stego-images. In Proceedings of the 10th International Conference on Security and Management (SAM),July 18-21, 2011, Las Vegas, U.S.A., pages 743–746.
  63. Miodrag Mihaljevic, Sugata Gangopadhyay, Goutam Paul, Hideki Imai. An Algorithm for the Internal State Recovery of Grain-v1. In 11th Central European Conference on Cryptology (CECC), June 30-July 2, 2011, Debrecen, Hungary.
  64. Subhamoy Maitra, Goutam Paul and Sourav Sen Gupta. Attack on Broadcast RC4 Revisited. In Proceedings of the 18th Fast Software Encryption (FSE) Workshop, February 13-16, 2011, Lyngby, Denmark, pages 199–217, vol. 6733, LNCS, Springer.
  65. Miodrag Mihaljevic, Sugata Gangopadhyay, Goutam Paul, Hideki Imai. A GenericWeakness of the k-normal Boolean Functions Exposed to Dedicated Algebraic Attack. In Proceedings of the 11th International Symposium on Information Theory and its Applications (ISITA), October 17-20, 2010, Taichung, Taiwan, pages 911–916.
  66. Shashwat Raizada, Goutam Paul and Vineet Pandey. Nearby-Friend Discovery Protocol for Multiple Users. In Proceedings of the 2009 IEEE International Conference onComputational Science and Engineering (CSE), vol. 3, Track: International Symposium on Secure Computing (SecureCom 2009), August 29-31, 2009, Vancouver, Canada, pages 238–243, IEEE Computer Society Press.
  67. Riddhipratim Basu, Subhamoy Maitra, Goutam Paul and Tanmoy Talukdar. On Some Sequences of the Secret Pseudo-random Index j in RC4 Key Scheduling. In Proceedings of the 18th International Symposium on Applied Algebra, Algebraic Algorithms and Error Correcting Codes (AAECC), June 8-12, 2009, Tarragona, Spain, pages 137–148, vol. 5527,LNCS, Springer.
  68. Subhamoy Maitra, Goutam Paul and Shashwat Raizada. Some Observations on HC-128. In Proceedings of the 6th International Workshop on Coding and Cryptography (WCC), May 10-15, 2009, Ullensvang, Norway, pages 527–539.
  69. Subhamoy Maitra and Goutam Paul. Analysis of RC4 and Proposal of Additional Layers for Better Security Margin. In Proceedings of the 9th International Conference on Cryptology in India (INDOCRYPT), December 14-17, 2008, Indian Institute of Technology, Kharagpur, India, pages 27–39, vol. 5365, LNCS, Springer.
  70. Subhamoy Maitra and Goutam Paul. Recovering RC4 Permutation from 2048 Keystream Bytes if j is Stuck. In Proceedings of the 13th Australasian Conference on Information Security and Privacy (ACISP), July 7-9, 2008, Wollongong, Australia, pages 306–320, vol. 5107, LNCS, Springer.
  71. Riddhipratim Basu, Shirshendu Ganguly, Subhamoy Maitra, Goutam Paul. RC4 Keystream Always Leaks Information about the Hidden Index j . In Proceedings of the State of the Art of Stream Ciphers (SASC), special Workshop hosted by ECRYPT, the European Network of Excellence in Cryptography, February 13-14, 2008, Lausanne, Switzerland, pages 233–247.
  72. Subhamoy Maitra and Goutam Paul. New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4. In Proceedings of the 15th Fast Software Encryption (FSE) Workshop, February 10-13, 2008, Lausanne, Switzerland, pages 253–269, vol. 5086, LNCS, Springer.
  73. Goutam Paul, Subhamoy Maitra and Rohit Srivastava. On Non-Randomness of the Permutation after RC4 Key Scheduling. In Proceedings of the 17th International Symposium on Applied Algebra, Algebraic Algorithms and Error Correcting Codes (AAECC), December 16-20, 2007, Bangalore, India, pages 100–109, vol. 4851, LNCS, Springer.
  74. Goutam Paul and Subhamoy Maitra. Permutation after RC4 Key Scheduling Reveals the Secret Key. In Proceedings of the 14th Workshop on Selected Areas in Cryptography (SAC), August 16-17, 2007, Ottawa, Canada, pages 360–377, vol. 4876, LNCS, Springer.
  75. Sayan Bhattacharya, Goutam Paul and Swagato Sanyal. On Necessary and Sufficient Number of Cops in the Game of Cops and Robber in Multidimensional Grids. In 8th Asian Symposium on Computer Mathematics (ASCM), December 15-17, 2007, Singapore.
  76. Goutam Paul, Siddheshwar Rathi and Subhamoy Maitra. On Non-negligible Bias of the First Output Byte of RC4 towards the First Three Bytes of the Secret Key. In Proceedings of the 5th International Workshop on Coding and Cryptography (WCC), April 16-20, 2007, Versailles, France, pages 285–294.
  77. Goutam Paul. Occam’s Razor and a Non-syntactic Measure of Decision Tree Complexity. In Proceedings of the 19th National Conference on Artificial Intelligence (AAAI), July 25-29, 2004, San Jose, California, U.S.A., pages 962–963.
  78. Ian Davidson and Goutam Paul. Locating Secret Messages in Images. In Proceedings of the 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), August 22-25, 2004, Seattle, Washington, U.S.A., pages 545–550.
  79. George Berg, Ian Davidson, Ming-Yuan Duan and Goutam Paul. Searching for Hidden Messages: Automatic Detection of Steganography. In Proceedings of the 15th Innovative Applications of Artificial Intelligence (IAAI) Conference, August 12-14, 2003, Acapulco, Mexico, pages 51–56.
  80. Somnath Pal, Tridib Kumar Saha, Goutam K. Paul, Chinmay Maiti and Ananda Mohan Ghosh. Multi-method Decision Tree Learning for Data Mining. In Proceedings of the 28th Annual Convention and Exhibition of IEEE India Council (IEEE-ACE), December 20-21, 2002, Science City, Kolkata, India, pages 238–242.
    Pre-Prints / Other Publications
  81. Goutam Paul. Can Quantum Physics be the Science of Both Matter and Spirit? In conference on Quantum Physics and Consciousness (QPC), Feb 4-5, 2017, Rabindra Tirtha, New Town, Kolkata, India.
  82. Goutam Paul and Souvik Ray. On Data Complexity of Distinguishing Attacks vs. Message Recovery Attacks on Stream Ciphers. In Cryptology ePrint Archive: Report 2015/1175, December 6, 2015.
  83. Arpita Maitra, Goutam Paul and Asim K. Pal. Revisiting Secure Two-Party Computation with Rational Players. In Cryptology ePrint Archive: Report 2015/1071, November 4, 2015.
  84. Nilanjan Datta, Avijit Dutta, Mridul Nandi, Goutam Paul and Liting Zhang. One-key Double-Sum MAC with Beyond-Birthday Security. In Cryptology ePrint Archive: Report 2015/958, October 3, 2015.
  85. Arpita Maitra, Goutam Paul and Asim K. Pal. Secure two-party quantum computation for non-rational and rational settings. In arXiv.org e-Print Archive, arXiv:1504.01974 [cs.CR], April 8, 2015.
  86. Goutam Paul, Subhamoy Maitra and Anupam Chattopadhyay. Quad-RC4: Merging Four RC4 States towards a 32-bit Stream Cipher. In Cryptology ePrint Archive: Report 2013/572, September 6, 2013.
  87. Sounak Gupta and Goutam Paul. Revisiting Fermats Factorization for the RSA Modulus. In arXiv.org e-Print Archive, arXiv:0910.4179v1 [cs.CR], October 21, 2009.
  88. Adway Mitra, Goutam Paul and Ushnish Sarkar. Some Conjectures on the Number of Primes in Certain Intervals. In arXiv.org e-Print Archive, arXiv:0906.0104v1 [math.NT], May 30, 2009.
  89. Goutam Paul. Artificial Intelligence and Consciousness. In 2nd Human-E-Tech Conference, April 23-25, 2004, SUNY Albany, U.S.A.