Research Positions
  1. Associate Professor, Cryptology and Security Research Unit (CSRU), Indian Statistical Institute, Kolkata, India, August 2017 – to date.
  2. Visiting Professor, Centre for Quantum Engineering, Research and Education (CQuERE), The Chatterjee Group – Centres for Research and Education in Science and Technology (TCG CREST), Salt Lake, Kolkata 700091, India, January 2023 – to date.
  3. Assistant Professor,  Cryptology and Security Research Unit (CSRU), Indian Statistical Institute, Kolkata, India, August 2013 – July 2017.
  4. Visiting Scientist, Centre for Quantum Technologies (CQT), National University of Singapore (NUS), Singapore, May 2022.
  5. Visiting Scientist, Institute of Industrial Science (IIS), University of Tokyo, Japan, August 2016.
  6. Visiting Scientist, Department of Mathematics, Ruhr University Bochum, Germany, March 2016.
  7. Visiting Scientist, Department of Computer Science and Engineering, Indian Institute of Technology Roorkee, Oct 2015.
  8. Visiting Scientist, School of Computer Engineering, College of Engineering, Nanyang Technological University (NTU), Singapore, Sep – Oct 2015.
  9. Visiting Scientist, Department of Computer Science, University at Albany, State University of New York (SUNY), U.S.A., Jul 2014.
  10. Visiting Scientist, Department of Computer Science, University of Nevada, Las Vegas, U.S.A., July 2014.
  11. Visiting Scientist, Applied Mathematics Department, Naval Postgraduate School, Monterey, U.S.A., Jul 2014.
  12. Visiting Scientist, Multi-Processor System-on-Chip (MPSoC) Architectures Research Group, Ultra High-Speed Mobile Information and Communication (UMIC) Research Centre, RWTH Aachen University, Aachen, Germany, June 2012 – July 2013.
  13. Visiting Research Scientist, Crypto and Security group, Department of Electrical and Information Technology, Lund University, Sweden, March 2013.
  14. Visiting Research Scientist, Security and Cryptography Laboratory (LASEC), School of Computer and Communication Sciences (I &C), Ecole Polytechnique Federale de Lausanne (EPFL), Switzerland, February 2013.
  15. Visiting Research Scientist, Fachhochschule Nordwestschweiz (FHNW), Windisch, Switzerland, Oct 2012.
  16. Visiting Scientist, Centre of Excellence in Cryptology, Indian Statistical Institute, Kolkata, India, September 2011 – May 2012.
  17. Visiting Research Scientist, Research Center for Information Security (RCIS), National Institute of Advanced Industrial Science and Technology (AIST), Akihabara, Tokyo, Japan, June 2009 – July 2009, February 2010 – March 2010, February & November 2011.
  18. Visiting Research Scientist, Coding & Cryptography Research Group (CCRG), Division of Mathematical Sciences, School of Physical & Mathematical Sciences, Nanyang Technological University (NTU), Singapore, March 2010.
  19. Visiting Research Scientist, Information Technology and Security Laboratory (Sakurai Laboratory) of the Kyushu University and the Information Security Laboratory of the Institute of the Systems, Information Technologies and Nanotechnologies (ISIT), Fukuoka, Japan, July 2009.
  20. Visiting Researcher, Center of Applied Cryptographic Research (CACR), University of Waterloo, Ontario, Canada, July 2007 – August 2007.
  21. Research Fellow, Cryptology Research Group (CRG), Applied Statistics Unit (ASU), Indian Statistical Institute (ISI), Kolkata, India, September 2006 – December 2008.
  22. Research Associate, Brain-Computer Interface Lab, Wadsworth Center, New York State Department of Health, New York, U.S.A., July 2004 – December 2004.
  23. Research Assistant, State University of New York at Albany, U.S.A., July 2003 – August 2003, January 2004 – May 2004.
  24. Research Assistant, Electronics and Communication Science Unit, Indian Statistical Institute (ISI), Kolkata, India, August 2000 – December 2000.
  25. Summer Intern, Applied Statistics Unit, Indian Statistical Institute (ISI), Kolkata, India, June 2000 – July 2000.

Sponsored Projects
  1. Quantum Information using Continuous Variable State.
    Total Grant: INR 54.40 Lakhs, Duration: 3 years (2020-2023).
    Funding Agency: Department of Science and Technology (DST), Government of India through their Quantum Information Science and Technology (QuST) Scheme under the Interdisciplinary Cyber Physical Systems (ICPS) Program.
    Role: Co-Principal Investigator.
  2. Security Analysis of Real World Ciphers, Protocols and Systems.
    Total Grant: INR 898 Lakhs, Duration: 3 years (2019-2022).
    Funding Agency: National Technical Research Organisation (NTRO), under National Security Advisor in the Prime Minister’s Office, Government of India.
    Role: Member Secretary.
  3. Exploration of Suitable Metric for TRNG.
    Total Grant: INR 37.52 Lakhs, Duration: 2 years (2019-2021).
    Funding Agency: Defence Research & Development Organisation (DRDO), Delhi, Ministry of Defence, Government of India.
    Role: Principal Investigator.
  4. Post Quantum Digital Signatures for Document Signing [Project by Society for Electronic Transactions and Security (SETS), Chennai].
    Total Grant: INR 127.77 Lakhs, Duration: 2 years (2019-2021).
    Funding Agency: Ministry of Electronics and Information Technology (MeitY), Government of India.
    Role: Member of the Project Review and Steering Group (PRSG).
  5. Design and Development of Block Cipher.
    Total Grant: INR 24 Lakhs, Duration: 1 year (2018-2019).
    Funding Agency: Defence Weapons and Electronics Systems Engineering Establishment (WESEE) Indian Navy, Ministry of Defence, Government of India.
    Role: Consultant.
  6. Cryptanalysis of Symmetric Cipher Algorithms.
    Total Grant: INR 27.54 Lakhs, Duration: 3 years (2017-2020).
    Funding Agency: Bhabha Atomic Research Centre (BARC), Mumbai, Department of Atomic Energy (DAE), Government of India.
    Role: Principal Investigator.
  7. Development of frequency coded quantum key distribution solutions suitable for deployment on 25km fibre optic links. (Joint Project by Indian Institute of Technology Kanpur and Indian Institute of Technology Chennai.)
    Total Grant: INR 24.95 Lakhs, Duration: 3 years (2016-2019).
    Funding Agency: Bhabha Atomic Research Centre (BARC), Mumbai, Department of Atomic Energy (DAE), Government of India.
    Role: Member of the Evaluation Committee.
  8. Lightweight Encryption Techniques for Cyber Security Applications.
    Total Grant: INR 6.78 Lakhs (excluding JSPS part), Duration: 2 years (2016-2018).
    Funding Agency: Department of Science and Technology (DST), Government of India and Japan Society for the Promotion of Science (JSPS), Government of Japan.
    Role: Member of the Indian team of six scientists.
  9. Centre of Excellence in Cryptology.
    Total Grant: INR 10 Crores, Duration: 5 years (2011-2016).
    Funding Agency: Defence Research & Development Organisation (DRDO), Delhi, Ministry of Defence, Government of India.
    Role: Project Member.
  10. Threat and Attack Modeling of Heterogeneous Enterprise  Networks.
    Total Grant: INR 25 Lakhs, Duration: 18 months (2011-2013).Funding Agency: Scientific Analysis Group (SAG), Defence Research & Development Organisation (DRDO), Delhi, Ministry of Defence, Government of India.
    Role: Consultant.
  11. Development of Encryption Algorithm for BARC.
    Total Grant: INR 10 Lakhs, Duration: 24 months (2011-2013).
    Funding Agency: Bhabha Atomic Research Centre (BARC), Mumbai, India.
    Role: Project Member.
  12. Development of Tool and Design Aid for Developing Safeguards against Related Key and IV Attacks and Proactive Key Scheduling Scheme for Packet Encryption.
    Total Grant: INR 4.75 Lakhs, Duration: 15 months (2010-2012).
    Funding Agency: Defence Research & Development Organisation (DRDO), Ministry of Defence, Government of India.
    Role: Principal Investigator.
  13. Security Evaluation and Design of Components and Cryptographic Primitives for RFID and Sensor Networks.
    Total Grant: INR 29.28 Lakhs, Duration: 3 years (2009-2012).
    Funding Agency: Department of Science and Technology (DST), Government of India and Japan Science and Technology (JST) Agency, the National Organization in Japan for implementing the Science and Technology Policies of the Government of Japan.
    Role: Member of the Indian team of four scientists.
  14. Steganography using Machine Learning.
    Total Grant: INR 50 Thousand, Duration: 1 year (2006-2007).
    Funding Agency: Jadavpur University.
    Role: Principal Investigator.

Publications
   Refereed International Journal Papers
  1. Amit Jana and Goutam Paul. Differential Fault Attack on SPN-based Sponge and SIV-like AE Schemes. In Journal of Cryptographic Engineering (Springer), Accepted in April 2024.
  2. Nayan Ranjan Das, Ankur Konar, Imon Mukherjee and Goutam Paul. A Complex Network Analysis Approach to Compare the Performance of Batsmen Across Different Formats. In Knowledge-Based Systems (Elsevier), article 111269, vol. 284, January 2024.
  3. Soumya Das, Goutam Paul and Ritabrata Sengupta. Entanglement Monogamy in Indistinguishable Particle Systems. In Scientific Reports (Nature), Article number: 21972, vol. 13, December 2023.
  4. Nirupam Basak, Nayana Das, Goutam Paul, Kaushik Nandi and Nixon Patel. Quantum Secret Sharing Protocol Using GHZ State: Implementation on IBM Qiskit. In Quantum Information Processing (Springer), article 393, vol. 22, October 2023.
  5. Imon Mukherjee and Goutam Paul. High capacity secure dynamic multi-bit data hiding using Fibonacci Energetic pixels. Accepted in Multimedia tools and Applications journal (Springer), May 2023.
  6. Nayan Ranjan Das, Imon Mukherjee, Anubhav D. Patel and Goutam Paul. An intelligent clustering framework for substitute recommendations and player selections. Accepted in the Journal of Supercomputing (Springer), April 2023.
  7. Nayan Ranjan Das, Subhojit Ghosh, Imon Mukherjee and Goutam Paul. Adoption of a ranking based indexing method for the cricket teams. In Expert Systems with Applications (Elsevier), article 118796, vol.213, part A, March 2023.
  8. Amit Jana, Anirban Nath, Goutam Paul and Dhiman Saha. Differential fault analysis of NORX using variants of coupon collector problem. In Journal of Cryptographic Engineering (Springer), pages 433-459, vol. 12, issue 4, November 2022.
  9. Nanaya Das and Goutam Paul. Measurement-Device-Independent Quantum Secure Direct Communication with User Authentication. In Quantum Information Processing (Springer), article 260, vol. 21, issue 7, July 2022.
  10. Mostafizar Rahman and Goutam Paul. Grover on KATAN: Quantum Resources Estimation. In IEEE Transactions on Quantum Engineering (IEEE), article 3140376, pages1-9, vol. 3, January 2022.
  11. Nayana Das and Goutam Paul. Cryptanalysis of Quantum Secure Direct Communication Protocol with Mutual Authentication Based on Single Photons and Bell States. Accepted for publication in Europhysics Letters (EDP Sciences, IOP Publishing, Italian Physical Society), August 2021.
  12. Nayana Das, Ritajit Majumdar and Goutam Paul. Quantum Secure Direct Communication with Mutual Authentication using a Single Basis. In International Journal of Theoretical Physics (Springer), pages 4044-4065, vol. 60, issue 11-12, November 2021.
  13. Mostafizar Rahman, Dhiman Saha and Goutam Paul. Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos. Accepted for publication in IACR Transactions on Symmetric Cryptology (Ruhr University Bochum), vol. 2021, no. 3, 2021.
  14. Tanmoy Pandit, Pritam Chattopadhyay and Goutam Paul. Non-commutative space engine: a boost to thermodynamic processes. Accepted for publication in Modern Physics Letters A, July 2021.
  15. Atanu Acharyya and Goutam Paul. A complete characterization of the optimal unitary attacks in quantum cryptology with refined optimality criteria involving the attacker’s Hilbert space only. In The European Physical Journal D, section Quantum Information, vol. 75, article 215, July 2021.
  16. Soumya Das, Anindya Banerji and Goutam Paul. Maximum violation of monogamy of entanglement for indistinguishable particles by measures that are monogamous for indistinguishable particles. As a Letter in Physical Review A (American Physical Society), article L010402, vol. 104, July 2021.
  17. Ayan Mitra, Pritam Chattopadhyay, Vasilious Zarikas and Goutam Paul. Bound on the efficiency of heat engine from uncertainty relation viewpoint. In Entropy, article 439, vol. 23, issue 4, April 2021.
  18. Shankar K. Ghosh, Suvankar Ghosh, Raja Banerjee and Goutam Paul. A graph-theoretic model to understand the behavioral difference of PPCA among its paralogs towards recognition of DXCA. In Journal of Biosciences (Springer), article 35, vol. 46, April 2021.
  19.  Nabanita Mukherjee (Ganguly), Sanjoy Kumar Saha and Goutam Paul. Two-point FFT based high capacity image steganography using calender based message encoding. In Information Sciences (Elsevier), pages 278-290, vol. 552, April 2021.
  20. Nayana Das and Goutam Paul. Secure multi-party quantum conference and XOR computation. In Quantum Information and Computation (Rinton Press), pages 203-232, vol. 21, issues 3 & 4, March 2021.
  21. Ayan Mitra, Pritam Chattopadhyay Vasilious Zarikas and Goutam Paul. Binary Black Hole Information Loss Paradox and Future Prospects. In Entropy, article 1387, vol. 22, issue 12, December 2020.
  22. Nayana Das and Goutam Paul. Improving the security of “measurement-device-independent quantum communication without encryption”. In Science Bulletin (Elsevier), pages 2048-2049, vol. 65, issue 24, December 2020.
  23. Mostafizar Rahman and Goutam Paul. Quantum Attacks on HCTR and its Variants. In IEEE Transactions on Quantum Engineering (IEEE), article 3102408, pages 1-8, vol. 1, November 2020.
  24. Soumya Das, Anindya Banerji and Goutam Paul. Hyper-hybrid entanglement, indistinguishability, and two-particle entanglement swapping. In Physical Review A (American Physical Society), article 052401, vol. 102, November 2020.
  25. Soumya Das and Goutam Paul. A New Error-Modeling of Hardy’s Paradox for Superconducting Qubits and its Experimental Verification. In ACM Transactions on Quantum Computing (ACM publication board), article 4, vol. 1, issue 1, October 2020.
  26. Nayana Das and Goutam Paul. Two efficient measurement device independent quantum dialogue protocols. In International Journal of Quantum Information, article 2050038, vol. 18, issue 7, October 2020.
  27. Nabanita Mukherjee (Ganguly), Debanjan Burman, Sanjoy Kumar Saha and Goutam Paul. A PVD based high capacity steganography algorithm with embedding in non-sequential position. In Multimedia Tools and Applications journal (Springer), pages 13449–13479, vol. 79, January 2020.
  28. Pritam Chattopadhyay and Goutam Paul. Relativistic quantum heat engine from uncertainty relation standpoint. In Scientific Reports (Nature), Article number: 16967, vol. 9, 18 November 2019.
  29. Ayan Mitra, Pritam Chattopadhyay, and Goutam Paul. Probing Uncertainty Relations in Non-Commutative Space. In International Journal of Theoretical Physics (Springer), pages 2619–2631, vol. 58, issue 8, 2019.
  30. Nayana Das, Arpita Maitra and Goutam Paul. Dimensionality distinguishers. In Quantum Information Processing (Springer), article 171, vol. 18, issue 6, June 2019.
  31. Soumik Ghosh, Arnab Adhikary and Goutam Paul. Revisiting Integer Factorization using Closed Timelike Curves. In Quantum Information Processing (Springer), article 30, vol. 18, issue 1, January 2019.
  32. Soumik Ghosh, Arnab Adhikary and Goutam Paul. Revisiting Integer Factorization using Closed Timelike Curves. In Quantum Information Processing (Springer), article 30, vol. 18, issue 1, January 2019.
  33. Soumik Ghosh, Arnab Adhikary and Goutam Paul. Quantum signaling to the past using P-CTCS. In Quantum Information and Computation (Rinton Press), pages 965–974, volume 18, vol. 11 & 12, September 2018
  34. Dhiman Saha, Mostafizar Rahman and Goutam Paul. New Yoyo Tricks with AES-based Permutations. To appear in IACR Transactions on Symmetric Cryptology (Ruhr University Bochum), vol. 2018, no. 4, 2018.
  35. Nilanjan Datta, Avijit Dutta, Mridul Nandi and Goutam Paul. Double-block Hash-then-Sum: A Paradigm for Constructing BBB Secure PRF. To appear in IACR Transactions on Symmetric Cryptology (Ruhr University Bochum), vol. 2018, no. 3, 2018.
  36. Goutam Paul and Souvik Ray. Analysis of Burn-in period for RC4 State Transition. In Cryptography and Communications (Springer), pages 881–908, vol. 10, issue 5, September 2018.
  37. Amit Behera and Goutam Paul. Quantum to Classical One Way Function and Its Applications in Quantum Money Authentication. In Quantum Information Processing (Springer), article 200, vol. 17, issue 8, August 2018.
  38. Nabanita Mukherjee (Ganguly), Goutam Paul and Sanjoy Kumar Saha. An Efficient Multi-bit Steganography Algorithm in Spatial Domain with Two-layer Security. In Multimedia Tools and Applications journal (Springer), pages 18451–18481, vol. 77, issue 14, July 2018.
  39. Goutam Paul and Souvik Ray. On Data Complexity of Distinguishing Attacks vs. Message Recovery Attacks on Stream Ciphers. In Designs, Codes and Cryptography (Springer), pages 1211–1247, vol. 86, issue 6, June 2018.
  40. Amit Jana and Goutam Paul. Revisiting RC4 Key Collision: Faster Search Algorithm and New 22-byte Colliding Key Pairs. In Cryptography and Communications (Springer), pages 479–508, vol. 10, issue 3, May 2018.
  41. Indra Kundu, Goutam Paul and Raja Banerjee. A machine learning approach towards the prediction of protein-ligand binding affinity based on fundamental molecular properties. In RSC Advances journal (Royal Society of Chemistry), pages 12127–12137, vol. 2018, issue 8, 2018.
  42. Sugata Gangopadhyay, Goutam Paul, Nishant Sinha and Pantelimon Stănică. Generalized Nonlinearity of S-boxes. In Advances in Mathematics of Communications (American Institute of Mathematical Sciences, AIMS), pages 115–122, vol. 12, issue 1, February 2018.
  43. Nilanjan Datta, Avijit Dutta, Mridul Nandi, Goutam Paul and Liting Zhang. Single Key Variant of PMAC_Plus. In IACR Transactions on Symmetric Cryptology (Ruhr University Bochum), pages 268–305, vol. 2017, no. 4, 2017.
  44. Ashutosh Rai and Goutam Paul. Strong quantum solutions in conflicting-interest Bayesian games. In Physical Review A (American Physical Society), article 042340, volume 96, October 2017.
  45. Arpita Maitra, Goutam Paul and Sarbani Roy. Device-independent quantum private query. In Physical Review A (American Physical Society), article 042344, volume 95, issue 4, April 2017.
  46. Goutam Paul, Ian Davidson, Imon Mukherjee and S. S. Ravi. Keyless Dynamic Optimal Multi-bit Image Steganography using Energetic Pixels. In Multimedia Tools and Applications journal (Springer), vol. 76, issue 5, March 2017.
  47. Ayesha Khalid, Goutam Paul and Anupam Chattopadhyay. RC4-AccSuite: A Hardware Acceleration Suite for RC4-like Stream Ciphers. In IEEE Transactions on Very Large Scale Integration Systems (IEEE Circuits and Systems Society, IEEE Computer Society, and IEEE Solid-State Circuits Society), pages 1072–1084, vol. 25, issue 3, March 2017.
  48. Atanu Acharyya and Goutam Paul. Revisiting optimal eavesdropping in quantum cryptography: Optimal interaction is unique up to rotation of the underlying basis. In Physical Review A (American Physical Society), article 022326, volume 95, issue 2, February 2017.
  49. Ayesha Khalid, Muhammad Hassan, Goutam Paul and Anupam Chattopadhyay. RunFein: A rapid prototyping framework for Feistel and SPN based block ciphers. In Journal of Cryptographic Engineering (Springer), pages 299–323, vol. 6, issue 4, November 2016.
  50. Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay, Faezeh Abediostad, Syed Imad Ud Din, Muhammad Hassan, Baishik Biswas and Prasanna Ravi. RunStream: A High-level Rapid Prototyping Framework for Stream Ciphers. In ACM Transactions on Embedded Computing Systems (ACM publication board), article 61, vol. 15, issue 3, July 2016.
  51. Goutam Paul, Shashwat Raizada and Vineet Pandey. RVClose: Discovering Nearby-Friend Groups in Multi-user Environment. In IPSI BgD Transactions on Internet Research (IPSI Bgd Internet Research Society), pages 9–16, vol. 12, issue 2 (Special issue on Advances in Cryptology and Information Security), July 2016.
  52. Arpita Maitra and Goutam Paul. On Symmetric Incoherent Eavesdropping on BB84 and its Variants. In IPSI BgD Transactions on Advanced Research (IPSI Bgd Internet Research Society), pages 25–37, vol. 12, issue 2 (Special issue on Advances in Cryptology and Information Security), July 2016.
  53. Goutam Paul and Anupam Chattopadhyay. Three Snakes in One Hole: The First Systematic Hardware Accelerator Design for SOSEMANUK with Optional Serpent and SNOW 2.0 Modes. In IEEE Transactions on Computers (IEEE Computer Society), pages 640–653, vol. 65, issue 2, February 2016.
  54. Chithrabhanu Perumangatt, Aadhi Abdul Rahim, Salla Gangi Reddy, Shashi Prabhakar, Goutam Kumar Samanta, Goutam Paul and Ravindra Pratap Singh. Three particle Hyper-entanglement: Teleportation and Quantum Key Distribution. In Quantum Information Processing (Springer), pages 3813–3826, vol. 14, issue 10, October 2015.
  55. Santanu Sarkar, Sourav Sen Gupta, Goutam Paul and Subhamoy Maitra. Proving TLS-attack related open biases of RC4. In Designs, Codes and Cryptography (Springer), pages 231–253, vol. 77, issue 1, October 2015.
  56. Kaushik Nandi and Goutam Paul. Quantum Information Splitting Using a Pair of GHZ States. In Quantum Information and Computation (Rinton Press), pages 1041–1047, vol. 15, issue 11 & 12, September 2015.
  57. Arpita Maitra, Sourya Joyee De, Goutam Paul and Asim K. Pal. Proposal for Quantum Rational Secret Sharing. In Physical Review A (American Physical Society), article 022305, volume 92, issue 2, August 2015.
  58. Arpita Maitra and Goutam Paul. A Resilient Quantum Secret Sharing Scheme. In International Journal of Theoretical Physics (Springer), pages 398–408, vol. 54, issue 2, February 2015.
  59. Imon Mukherjee, Goutam Paul and Jarvis Altrin Jawahar. Defeating Steganography with Multibit Sterilization using Pixel Eccentricity. In IPSI BgD Transactions on Advanced Research (IPSI Bgd Internet Research Society), pages 25–34, vol. 11, issue 1, January 2015.
  60. Goutam Paul and Anupam Chattopadhyay. Designing Stream Ciphers with Scalable Data-widths: A Case Study with HC-128. In Journal of Cryptographic Engineering (Springer), pages 135–143, vol. 4, issue 2, June 2014.
  61. Sourav Sen Gupta, Subhamoy Maitra, Goutam Paul and Santanu Sarkar. (Non-)Random Sequences from (Non-)Random Permutations – Analysis of RC4 stream cipher. In Journal of Cryptology (Springer), pages 67–108, vol. 27, issue 1, January 2014.
  62. Tamaghna Acharya and Goutam Paul. Maximum Lifetime Broadcast Communications in Cooperative Multihop Wireless Ad Hoc Networks: Centralized and Distributed Approaches. In Ad Hoc Networks (Elsevier), pages 1667–1682, vol. 11, issue 6, August 2013.
  63. Arpita Maitra and Goutam Paul. Eavesdropping in Semiquantum Key Distribution Protocol. In Information Processing Letters (Elsevier), pages 418–422, vol. 113, issue 12, June 30, 2013.
  64. Miodrag Mihaljevic, Sugata Gangopadhyay, Goutam Paul, Hideki Imai. Generic Cryptographic Weakness of k-normal Boolean Functions in Certain Stream Ciphers and Cryptanalysis of Grain-128. In Periodica Mathematica Hungarica (Springer), pages 205–227, vol. 65, issue 2, December, 2012.
  65. Miodrag Mihaljevic, Sugata Gangopadhyay, Goutam Paul and Hideki Imai. Internal State Recovery of Keystream Generator LILI-128 Based on a Novel Weakness of the Employed Boolean Function. In Information Processing Letters (Elsevier), pages 805–810, vol.112, no. 21, November 15, 2012.
  66. Miodrag Mihaljevic, Sugata Gangopadhyay, Goutam Paul and Hideki Imai. Internal State Recovery of Grain-v1 Using Normality Order of the Filter Function. In IET Information Security (IET Research Journals), pages 55–64, vol. 6, no. 2, June, 2012.
  67. Subhamoy Maitra, Goutam Paul, Shashwat Raizada, Subhabrata Sen and Rudradev Sengupta. Some Observations on HC-128. In Designs, Codes and Cryptography (Springer), pages 231–245, vol. 59, no. 1–3, April, 2011.
  68. Sayan Bhattacharya, Goutam Paul and Swagato Sanyal. A Cops and Robber Game in Multidimensional Grids. In Discrete Applied Mathematics (Elsevier), pages 1745–1751, vol. 158, no. 16, August, 2010.
  69. Goutam Paul and Subhamoy Maitra. On Biases of Permutation and Keystream Bytes of RC4 towards the Secret Key. In Cryptography and Communications (Springer), pages 225–268, vol. 1, no. 2, September, 2009.
  70. Goutam Paul, Siddheshwar Rathi and Subhamoy Maitra. On Non-negligible Bias of the First Output Byte of RC4 towards the First Three Bytes of the Secret Key. In Designs, Codes and Cryptography (Springer), pages 123–134, vol. 49, no. 1–3, December, 2008.
  71. Riddhipratim Basu, Shirshendu Ganguly, Subhamoy Maitra, Goutam Paul. A Complete Characterization of the Evolution of RC4 Pseudo Random Generation Algorithm. In Journal of Mathematical Cryptology (de Gruyter), pages 257–289, vol. 2, no. 3, October, 2008.
    Refereed International Conference Papers
  72. Nabanita Mukherjee, Goutam Paul and Sanjoy Kumar Saha. A Novel Position Concealment Audio Steganography in Insensible Frequency. To appear in Proceedings of the 5th International Conference on Computational Intelligence in Data Mining (ICCIDM), December 15-16, 2018, Burla, Odisha, India, Lecture Notes in Computer Science (LNCS), Springer.
  73. Goutam Paul, Anupam Chattopadhyay and Chander Chandak. Designing Parity Preserving Reversible Circuits. In Proceedings of the 9th International Conference on Reversible Computation, July 6-7, 2017, Kolkata, India, pages 77–89, vol. 10301, Lecture Notes in Computer Science (LNCS), Springer.
  74. Suvradip Chakraborty, Goutam Paul and Chandrasekaran Pandu Rangan. Efficient Compilers for After-the-Fact Leakage: from CPA to CCA-2 secure PKE to AKE. In Proceedings of the 22nd Australasian Conference on Information Security and Privacy (ACISP), July 3-5, 2017, Auckland, New Zealand, pages 343–362, vol. 10342, LNCS, Springer.
  75. Sanat Ghoshal and Goutam Paul. Exploiting Block-Chain Data Structure for Auditorless Auditing on Cloud Data. In Proceedings of the 12th International Conference on Information Systems Security (ICISS), Dec 16-20, 2016, Jaipur, India, pages 359–371, vol. 10063, LNCS, Springer.
  76. Goutam Paul and Abhiroop Sanyal. Revisiting the Security Proof of QUAD Stream Cipher: Some Corrections and Tighter Bounds. In Proceedings of the 12th International Conference on Information Security and Cryptology (INSCRYPT), Nov 4-6, 2016, Beijing, China, pages 103–116, vol. 10143, LNCS, Springer.
  77. Avijit Dutta, Mridul Nandi and Goutam Paul. One-Key Compression Function Based MAC with Security beyond Birthday Bound. In Proceedings of the 21st Australasian Conference on Information Security and Privacy (ACISP), July 4-6, 2016, Melbourne, Australia, pages 343–358, vol. 9722, LNCS, Springer.
  78. Christina Boura, Avik Chakraborti, Gaëtan Leurent, Goutam Paul, Dhiman Saha, Hadi Soleimany and Valentin Suder. Key Recovery Attack against 2.5-round π-Cipher. In Proceedings of the 23rd International Workshop on Fast Software Encryption (FSE), March 20-23, 2016, Bochum, Germany, pages  535–553, vol. 9783, LNCS, Springer.
  79. Goutam Paul. Revisiting Democratic Mining in Bitcoins: Its Weakness and Possible Remedies. In Proceedings of the 11th International Conference on Information Systems Security (ICISS), Dec 16-20, 2015, Kolkata, India, pages 161–170, vol. 9478, LNCS, Springer.
  80. Suvradip Chakraborty, Goutam Paul and Chandrasekaran Pandu Rangan. Forward-Secure Authenticated Symmetric Key Exchange Protocols: New Security Models and Some Constructions. In Proceedings of the 9th International Conference on Provable Security (ProvSec), November 24-26, 2015, Kanazawa, Japan, pages 149–166, vol. 9451, LNCS, Springer.
  81. Subhamoy Maitra, Goutam Paul and Willi Meier. Salsa20 Cryptanalysis: New Moves and Revisiting Old Styles. In Proceedings of the 9th International Workshop on Coding and Cryptography (WCC), April 13-17, 2015, Paris, France.
  82. Goutam Paul, Pratik Sarkar and Sarbajit Mukherjee. Towards a More Democratic Mining in Bitcoins. In Proceedings of 10th International Conference on Information Systems Security (ICISS), Dec 16-20, 2014, Hyderabad, India, pages 185–203, vol. 8880, LNCS, Springer.
  83. Sumitra Biswal, Goutam Paul and Shashwat Raizada. Preserving Privacy in LocationBased Services Using Sudoku Structures. In Proceedings of the 10th International Conference on Information Systems Security (ICISS), Dec 16-20, 2014, Hyderabad, India, pages 448–463, vol. 8880, LNCS, Springer.
  84. Ayesha Khalid, Prasanna Ravi, Anupam Chattopadhyay and Goutam Paul. One Word/Cycle HC-128 Accelerator via State-Splitting Optimization. In Proceedings of the 15th International Conference on Cryptology in India (INDOCRYPT), December 14-17, 2014, New Delhi, India, pages 283–303, vol. 8885, LNCS, Springer.
  85. Avijit Dutta and Goutam Paul. Deterministic Hard Fault Attack on Trivium. In Proceedings of the 9th International Workshop on Security (IWSEC), August 27-29, 2014, Hirosaki, Japan, pages 134–145, vol. 8639, LNCS, Springer.
  86. Zheng Wang, Goutam Paul and Anupam Chattopadhyay. Processor Design with Asymmetric Reliability. In Proceedings of the 13th IEEE Computer Society Annual Symposium on VLSI (ISVLSI), July 9-11, 2014, Tampa, Florida, U.S.A., pages 565–570.
  87. Sourav Sen Gupta, Subhamoy Maitra, Willi Meier, Goutam Paul and Santanu Sarkar.Dependence in IV-related bytes of RC4 key enhances vulnerabilities in WPA. In Proceedings of the 21st International Workshop on Fast Software Encryption (FSE), March 3-5, 2014, London, pages 350-369, vol. 8540, LNCS, Springer.
  88. Imon Mukherjee and Goutam Paul. Efficient Multi-bit Image Steganography in Spatial Domain. In Proceedings of the 9th International Conference on Information Systems Security (ICISS), Dec 16-20, 2013, Kolkata, India, pages 270–284, vol. 8303, LNCS, Springer.
  89. Ayesha Khalid, Muhammad Hassan, Anupam Chattopadhyay and Goutam Paul.RAPID-FeinSPN: A Rapid Prototyping Framework for Feistel and SPN-Based Block Ciphers. In Proceedings of the 9th International Conference on Information Systems Security (ICISS), Dec 16-20, 2013, Kolkata, India, pages 169–190, vol. 8303, LNCS, Springer.
  90. Shubhajit Saha and Goutam Paul. On Effective Sharing of User Generated Content. In Proceedings of the 11th Asia Pacific Conference on Computer Human Interaction (APCHI), September 24-27, 2013, Bangalore, India, pages 114–118.
  91. Goutam Paul and Soumi Paul. Proposal for a Novel Computerized Menu-Presentation Interface for Restaurants. In Proceedings of the 11th Asia Pacific Conference on Computer Human Interaction (APCHI), September 24-27, 2013, Bangalore, India, pages 119–122.
  92. Ayesha Khalid, Goutam Paul and Anupam Chattopadhyay. New Speed Records for Salsa20 Stream Cipher using an Autotuning Framework on GPUs. In Proceedings of the 6th International Conference on Cryptology in Africa (AFRICACRYPT), June 22-24, 2013, Cairo, Egypt, pages 189–207, vol. 7918, LNCS, Springer.
  93. Subhamoy Maitra, Goutam Paul, Santanu Sarkar, Michael Lehmann and Willi Meier.New Results on Generalization of Roos-type Biases and Related Keystream of RC4.In Proceedings of the 6th International Conference on Cryptology in Africa (AFRICACRYPT), June 22-24, 2013, Cairo, Egypt, pages 222–239, vol. 7918, LNCS, Springer.
  94. Khawar Shahzad, Ayesha Khalid, Zolt´an Endre R´akossy, Goutam Paul and AnupamChattopadhyay. CoARX: A Coprocessor for ARX-based Cryptographic Algorithms. In Proceedings of the 50th ACM/IEEE Design Automation Conference (DAC), June 2-6,2013, Austin, U.S.A., Article No. 133, ACM.
  95. Arpita Maitra and Goutam Paul. Symmetric Incoherent Eavesdropping against MDIQKD. In Proceedings of the 8th International Workshop on Coding and Cryptography (WCC), April 15-19, 2013, Bergen, Norway, pages 413–426.
  96. Ayesha Khalid, Deblin Bagchi, Goutam Paul and Anupam Chattopadhyay. Optimized GPU Implementation and Performance Analysis of HC Series of Stream Ciphers. InProceedings of the 15th International Conference on Information Security and Cryptology (ICISC), November 28-30, 2012, Seoul, Korea, pages 293–308, vol. 7839, LNCS, Springer.
  97. Goutam Paul, Ian Davidson, Imon Mukherjee and S. S. Ravi. Keyless Steganography in Spatial Domain using Energetic Pixels. In Proceedings of the 8th International Conference on Information Systems Security (ICISS), Dec 15-19, 2012, Guwahati, India, pages 134–148, vol. 7671, LNCS, Springer.
  98. Arpita Maitra and Goutam Paul. Another Look at Symmetric Incoherent Optimal Eavesdropping against BB84. In Proceedings of the 13th International Conference on Cryptology in India (INDOCRYPT), December 9-12, 2012, Kolkata, India, pages 80–99, vol. 7668, LNCS, Springer.
  99. Goutam Paul and Shashwat Raizada. Impact of Extending Side Channel Attack on Cipher Variants: A Case Study with the HC Series of Stream Ciphers. In Proceedings of International Conference on Security, Privacy and Applied Cryptography Engineering (SPACE), November 2-3, 2012, Chennai, India, pages 32–44, vol. 7644, LNCS, Springer.
  100. Anupam Chattopadhyay and Goutam Paul. Exploring Security-Performance Tradeoffs during Hardware Accelerator Design of Stream Cipher RC4. In Proceedings of the 20th IFIP/IEEE International Conference on Very Large Scale Integration and System-on-Chip (VLSI-SoC), October 7-10, 2012, Santa Cruz, U.S.A., pages 251–254.
  101. Goutam Paul and Imon Mukherjee. Sterilization of Stego-images through Histogram Normalization. In Proceedings of the 11th International Conference on Security and Management (SAM), July 16-19, 2012, Las Vegas, U.S.A., pages 448–454.
  102. Apurba Das, Subhamoy Maitra, Goutam Paul and Santanu Sarkar. Some Combinatorial Results Towards State Recovery Attack on RC4. In Proceedings of the 7th International Conference on Information Systems Security (ICISS), Dec 15-19, 2011, Kolkata, India, pages 204–214, vol. 7093, LNCS, Springer.
  103. Goutam Paul, Subhamoy Maitra and Shashwat Raizada. A Theoretical Analysis of the Structure of HC-128. In Proceedings of the 6th International Workshop on Security (IWSEC), November 8-10, 2011, Tokyo, Japan, pages 161–177, vol. 7038, LNCS, Springer.
  104. Sourav Sen Gupta, Subhamoy Maitra, Goutam Paul and Santanu Sarkar. Proof of Empirical RC4 Biases and New Key Correlations. In Proceedings of the 18th Workshop on Selected Areas in Cryptography (SAC), August 11-12, 2011, Toronto, Canada, pages 151–168, vol. 7118, LNCS, Springer.
  105. Imon Mukherjee and Goutam Paul. Double Bit Sterilization of Stego-images. In Proceedings of the 10th International Conference on Security and Management (SAM),July 18-21, 2011, Las Vegas, U.S.A., pages 743–746.
  106. Miodrag Mihaljevic, Sugata Gangopadhyay, Goutam Paul, Hideki Imai. An Algorithm for the Internal State Recovery of Grain-v1. In 11th Central European Conference on Cryptology (CECC), June 30-July 2, 2011, Debrecen, Hungary.
  107. Subhamoy Maitra, Goutam Paul and Sourav Sen Gupta. Attack on Broadcast RC4 Revisited. In Proceedings of the 18th Fast Software Encryption (FSE) Workshop, February 13-16, 2011, Lyngby, Denmark, pages 199–217, vol. 6733, LNCS, Springer.
  108. Miodrag Mihaljevic, Sugata Gangopadhyay, Goutam Paul, Hideki Imai. A GenericWeakness of the k-normal Boolean Functions Exposed to Dedicated Algebraic Attack. In Proceedings of the 11th International Symposium on Information Theory and its Applications (ISITA), October 17-20, 2010, Taichung, Taiwan, pages 911–916.
  109. Shashwat Raizada, Goutam Paul and Vineet Pandey. Nearby-Friend Discovery Protocol for Multiple Users. In Proceedings of the 2009 IEEE International Conference onComputational Science and Engineering (CSE), vol. 3, Track: International Symposium on Secure Computing (SecureCom 2009), August 29-31, 2009, Vancouver, Canada, pages 238–243, IEEE Computer Society Press.
  110. Riddhipratim Basu, Subhamoy Maitra, Goutam Paul and Tanmoy Talukdar. On Some Sequences of the Secret Pseudo-random Index j in RC4 Key Scheduling. In Proceedings of the 18th International Symposium on Applied Algebra, Algebraic Algorithms and Error Correcting Codes (AAECC), June 8-12, 2009, Tarragona, Spain, pages 137–148, vol. 5527,LNCS, Springer.
  111. Subhamoy Maitra, Goutam Paul and Shashwat Raizada. Some Observations on HC-128. In Proceedings of the 6th International Workshop on Coding and Cryptography (WCC), May 10-15, 2009, Ullensvang, Norway, pages 527–539.
  112. Subhamoy Maitra and Goutam Paul. Analysis of RC4 and Proposal of Additional Layers for Better Security Margin. In Proceedings of the 9th International Conference on Cryptology in India (INDOCRYPT), December 14-17, 2008, Indian Institute of Technology, Kharagpur, India, pages 27–39, vol. 5365, LNCS, Springer.
  113. Subhamoy Maitra and Goutam Paul. Recovering RC4 Permutation from 2048 Keystream Bytes if j is Stuck. In Proceedings of the 13th Australasian Conference on Information Security and Privacy (ACISP), July 7-9, 2008, Wollongong, Australia, pages 306–320, vol. 5107, LNCS, Springer.
  114. Riddhipratim Basu, Shirshendu Ganguly, Subhamoy Maitra, Goutam Paul. RC4 Keystream Always Leaks Information about the Hidden Index j . In Proceedings of the State of the Art of Stream Ciphers (SASC), special Workshop hosted by ECRYPT, the European Network of Excellence in Cryptography, February 13-14, 2008, Lausanne, Switzerland, pages 233–247.
  115. Subhamoy Maitra and Goutam Paul. New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4. In Proceedings of the 15th Fast Software Encryption (FSE) Workshop, February 10-13, 2008, Lausanne, Switzerland, pages 253–269, vol. 5086, LNCS, Springer.
  116. Goutam Paul, Subhamoy Maitra and Rohit Srivastava. On Non-Randomness of the Permutation after RC4 Key Scheduling. In Proceedings of the 17th International Symposium on Applied Algebra, Algebraic Algorithms and Error Correcting Codes (AAECC), December 16-20, 2007, Bangalore, India, pages 100–109, vol. 4851, LNCS, Springer.
  117. Goutam Paul and Subhamoy Maitra. Permutation after RC4 Key Scheduling Reveals the Secret Key. In Proceedings of the 14th Workshop on Selected Areas in Cryptography (SAC), August 16-17, 2007, Ottawa, Canada, pages 360–377, vol. 4876, LNCS, Springer.
  118. Sayan Bhattacharya, Goutam Paul and Swagato Sanyal. On Necessary and Sufficient Number of Cops in the Game of Cops and Robber in Multidimensional Grids. In 8th Asian Symposium on Computer Mathematics (ASCM), December 15-17, 2007, Singapore.
  119. Goutam Paul, Siddheshwar Rathi and Subhamoy Maitra. On Non-negligible Bias of the First Output Byte of RC4 towards the First Three Bytes of the Secret Key. In Proceedings of the 5th International Workshop on Coding and Cryptography (WCC), April 16-20, 2007, Versailles, France, pages 285–294.
  120. Goutam Paul. Occam’s Razor and a Non-syntactic Measure of Decision Tree Complexity. In Proceedings of the 19th National Conference on Artificial Intelligence (AAAI), July 25-29, 2004, San Jose, California, U.S.A., pages 962–963.
  121. Ian Davidson and Goutam Paul. Locating Secret Messages in Images. In Proceedings of the 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), August 22-25, 2004, Seattle, Washington, U.S.A., pages 545–550.
  122. George Berg, Ian Davidson, Ming-Yuan Duan and Goutam Paul. Searching for Hidden Messages: Automatic Detection of Steganography. In Proceedings of the 15th Innovative Applications of Artificial Intelligence (IAAI) Conference, August 12-14, 2003, Acapulco, Mexico, pages 51–56.
  123. Somnath Pal, Tridib Kumar Saha, Goutam K. Paul, Chinmay Maiti and Ananda Mohan Ghosh. Multi-method Decision Tree Learning for Data Mining. In Proceedings of the 28th Annual Convention and Exhibition of IEEE India Council (IEEE-ACE), December 20-21, 2002, Science City, Kolkata, India, pages 238–242.
    Pre-Prints / Other Publications
  124. Madhuparna Das and Goutam Paul. Analysis of the Game “2048” and its Generalization in Higher Dimensions. In arXiv.org e-Print Archive, arXiv:1804.07393 [cs.DM], April 19, 2018.
  125. Pritam Chattopadhyay, Ayan Mitra and Goutam Paul. Probing Uncertainty Relations in Non-Commutative Space. In arXiv.org e-Print Archive, arXiv:1712.07748 [quant-ph], Dec 20, 2017.
  126. Soumya Das and Goutam Paul. Experimental test of Hardy’s paradox on a five-qubit quantum computer. In arXiv.org e-Print Archive, arXiv:1712.04925 [quant-ph], Dec 13, 2017.
  127. Atanu Acharyya and Goutam Paul. Revisiting optimal eavesdropping in quantum cryptography: Characterizing initial state and unitary evolution for optimal interaction. In arXiv.org e-Print Archive, arXiv:1610.07148 [quant-ph], Dec 12, 2017.
  128. Madhuparna Das and Goutam Paul. A Short Note on Prime Gaps. In arXiv.org e-Print Archive, arXiv:1710.09891 [math.NT], Oct 26, 2017.
  129. Shashanka Balakuntala and Goutam Paul. Quantum Error Correction using Hypergraph States. In arXiv.org e-Print Archive, arXiv:1708.03756 [qant-ph], Aug 12, 2017.
  130. Jyotirmoy Basak, Bappaditya Ghosh, Arpita Maitra and Goutam Paul. Device Independent Quantum Private Query with Finite Number of Entangled Qubits. In arXiv.org e-Print Archive, arXiv:1705.04570 [qant-ph], May 12, 2017.
  131. Goutam Paul. Can Quantum Physics be the Science of Both Matter and Spirit? In conference on Quantum Physics and Consciousness (QPC), Feb 4-5, 2017, Rabindra Tirtha, New Town, Kolkata, India.
  132. Arpita Maitra, Goutam Paul and Asim K. Pal. Revisiting Secure Two-Party Computation with Rational Players. In Cryptology ePrint Archive: Report 2015/1071, November 4, 2015.
  133. Arpita Maitra, Goutam Paul and Asim K. Pal. Secure two-party quantum computation for non-rational and rational settings. In arXiv.org e-Print Archive, arXiv:1504.01974 [cs.CR], April 8, 2015.
  134. Goutam Paul, Subhamoy Maitra and Anupam Chattopadhyay. Quad-RC4: Merging Four RC4 States towards a 32-bit Stream Cipher. In Cryptology ePrint Archive: Report 2013/572, September 6, 2013.
  135. Sounak Gupta and Goutam Paul. Revisiting Fermats Factorization for the RSA Modulus. In arXiv.org e-Print Archive, arXiv:0910.4179v1 [cs.CR], October 21, 2009.
  136. Adway Mitra, Goutam Paul and Ushnish Sarkar. Some Conjectures on the Number of Primes in Certain Intervals. In arXiv.org e-Print Archive, arXiv:0906.0104v1 [math.NT], May 30, 2009.
  137. Goutam Paul. Artificial Intelligence and Consciousness. In 2nd Human-E-Tech Conference, April 23-25, 2004, SUNY Albany, U.S.A.

Research Groups