default search action
Abhijit Das 0004
Person information
- affiliation: Indian Institute of Technology Kharagpur, India
Other persons with the same name
- Abhijit Das — disambiguation page
- Abhijit Das 0001 — Indian Statistical Institute, Kolkata, India (and 1 more)
- Abhijit Das 0002 — Indian Institute of Technology Guwahati, Assam, India
- Abhijit Das 0003 — AMRI Institute of Neurosciences Kolkata, India
- Abhijit Das 0005 — University of Texas at Arlington, Fort Worth, TX, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i8]Debranjan Pal, Vishal Pankaj Chandratreya, Abhijit Das, Dipanwita Roy Chowdhury:
Modeling Linear and Non-linear Layers: An MILP Approach Towards Finding Differential and Impossible Differential Propagations. CoRR abs/2405.00441 (2024) - 2023
- [j7]Debranjan Pal, Md Rasid Ali, Abhijit Das, Dipanwita Roy Chowdhury:
A cluster-based practical key recovery attack on reduced-round AES using impossible-differential cryptanalysis. J. Supercomput. 79(6): 6252-6289 (2023) - [c24]Bijoy Das, Abhijit Das, Dipanwita Roy Chowdhury:
Security Analysis of WAGE Against Division Property Based Cube Attack. ISPEC 2023: 492-506 - [i7]Bijoy Das, Abhijit Das, Dipanwita Roy Chowdhury:
Security Analysis of WG-7 Lightweight Stream Cipher against Cube Attack. CoRR abs/2306.04352 (2023) - [i6]Debranjan Pal, Upasana Mandal, Abhijit Das, Dipanwita Roy Chowdhury:
Deep Learning based Differential Classifier of PRIDE and RC5. IACR Cryptol. ePrint Arch. 2023: 461 (2023) - 2022
- [c23]Debranjan Pal, Upasana Mandal, Abhijit Das, Dipanwita Roy Chowdhury:
Deep Learning Based Differential Classifier of PRIDE and RC5. ATIS 2022: 46-58 - [c22]Rahul Roy, Abhijit Das, Dipanwita Roy Chowdhury:
Parallel and Distributed Implementations of the Wiedemann and the Block-Wiedemann Methods over GF(2). SECRYPT 2022: 540-547 - [i5]Md Rasid Ali, Debranjan Pal, Abhijit Das, Dipanwita Roy Chowdhury:
HARPOCRATES: An Approach Towards Efficient Encryption of Data-at-rest. IACR Cryptol. ePrint Arch. 2022: 519 (2022) - [i4]Debranjan Pal, Upasana Mandal, Mainak Chaudhury, Abhijit Das, Dipanwita Roy Chowdhury:
A Deep Neural Differential Distinguisher for ARX based Block Cipher. IACR Cryptol. ePrint Arch. 2022: 1195 (2022) - 2021
- [j6]Bijoy Das, Amit Sardar, Swapan Maiti, Abhijit Das, Dipanwita Roy Chowdhury:
An Attack on Linear Scan Chains for Stream Ciphers and the Impossibility of Simple Countermeasures. J. Hardw. Syst. Secur. 5(3): 191-207 (2021) - [c21]Souvik Sur, Abhijit Das, Dipanwita Roy Chowdhury:
CArrency: An Energy-Efficient Proof-of-Work Scheme for Crypto-Currencies. ICMC 2021: 23-38 - [c20]Pritam Pallab, Abhijit Das:
AVX-512-based Parallelization of Block Sieving and Bucket Sieving for the General Number Field Sieve Method. SECRYPT 2021: 653-658 - 2020
- [c19]Anindya Ganguly, Abhijit Das, Dipanwita Roy Chowdhury, Deval Mehta:
A Family of Subfield Hyperelliptic Curves for Use in Cryptography. ICICS 2020: 543-561
2010 – 2019
- 2019
- [c18]Debranjan Pal, Dishank Agrawal, Abhijit Das, Dipanwita Roy Chowdhury:
An Efficient Parallel Implementation of Impossible-Differential Cryptanalysis for Five-Round AES-128. SPACE 2019: 106-122 - 2017
- [j5]Binanda Sengupta, Abhijit Das:
Use of SIMD-based data parallelism to speed up sieving in integer-factoring algorithms. Appl. Math. Comput. 293: 204-217 (2017) - 2015
- [i3]Binanda Sengupta, Abhijit Das:
Use of SIMD-Based Data Parallelism to Speed up Sieving in Integer-Factoring Algorithms. IACR Cryptol. ePrint Arch. 2015: 44 (2015) - 2014
- [j4]Sabyasachi Karati, Abhijit Das, Dipanwita Roy Chowdhury, Bhargav Bellur, Debojyoti Bhattacharya, Aravind Iyer:
New algorithms for batch verification of standard ECDSA signatures. J. Cryptogr. Eng. 4(4): 237-258 (2014) - [c17]Sabyasachi Karati, Abhijit Das:
Faster Batch Verification of Standard ECDSA Signatures Using Summation Polynomials. ACNS 2014: 438-456 - [c16]Sabyasachi Karati, Abhijit Das, Dipanwita Roy Chowdhury:
Randomized Batch Verification of Standard ECDSA Signatures. SPACE 2014: 237-255 - [c15]Sabyasachi Karati, Abhijit Das:
Batch Verification of EdDSA Signatures. SPACE 2014: 256-271 - 2013
- [c14]Utsab Bose, Anup Kumar Bhattacharya, Abhijit Das:
GPU-Based Implementation of 128-Bit Secure Eta Pairing over a Binary Field. AFRICACRYPT 2013: 26-42 - [c13]Binanda Sengupta, Abhijit Das:
SIMD-Based Implementations of Sieving in Integer-Factoring Algorithms. SPACE 2013: 40-55 - 2012
- [c12]Sabyasachi Karati, Abhijit Das, Dipanwita Roy Chowdhury, Bhargav Bellur, Debojyoti Bhattacharya, Aravind Iyer:
Batch Verification of ECDSA Signatures. AFRICACRYPT 2012: 1-18 - [c11]Anup Kumar Bhattacharya, Sabyasachi Karati, Abhijit Das, Dipanwita Roy Chowdhury, Bhargav Bellur, Aravind Iyer:
Use of SIMD Features to Speed up Eta Pairing. ICETE (Selected Papers) 2012: 137-154 - [c10]Anup Kumar Bhattacharya, Abhijit Das, Dipanwita Roy Chowdhury, Aravind Iyer, Debojyoti Bhattacharya:
Autonomous Certification with List-Based Revocation for Secure V2V Communication. ICISS 2012: 208-222 - [c9]Anup Kumar Bhattacharya, Abhijit Das, Dipanwita Roy Chowdhury, Bhargav Bellur, Aravind Iyer:
SIMD-based Implementations of Eta Pairing Over Finite Fields of Small Characteristics. SECRYPT 2012: 94-101 - [c8]Arpan Mondal, Santosh Ghosh, Abhijit Das, Dipanwita Roy Chowdhury:
Efficient FPGA Implementation of Montgomery Multiplier Using DSP Blocks. VDAT 2012: 370-372 - [i2]Satrajit Ghosh, Abhijit Das:
Improvements of Algebraic Attacks Based on Structured Gaussian Elimination. IACR Cryptol. ePrint Arch. 2012: 176 (2012) - [i1]Sabyasachi Karati, Abhijit Das, Dipanwita Roy Chowdhury:
Using Randomizers for Batch Verification of ECDSA Signatures. IACR Cryptol. ePrint Arch. 2012: 582 (2012) - 2011
- [j3]Vivekananda Bhat K., Indranil Sengupta, Abhijit Das:
A New Audio Watermarking Scheme Based on Singular Value Decomposition and Quantization. Circuits Syst. Signal Process. 30(5): 915-927 (2011) - [j2]Vivekananda Bhat K., Indranil Sengupta, Abhijit Das:
An audio watermarking scheme using singular value decomposition and dither-modulation quantization. Multim. Tools Appl. 52(2-3): 369-383 (2011) - [c7]Santosh Ghosh, Dipanwita Roy Chowdhury, Abhijit Das:
High Speed Cryptoprocessor for η T Pairing on 128-bit Secure Supersingular Elliptic Curves over Characteristic Two Fields. CHES 2011: 442-458 - [c6]Satrajit Ghosh, Abhijit Das:
An Improvement of Linearization-Based Algebraic Attacks. InfoSecHiComNet 2011: 157-167 - 2010
- [j1]Vivekananda Bhat K., Indranil Sengupta, Abhijit Das:
An adaptive audio watermarking based on the singular value decomposition in the wavelet domain. Digit. Signal Process. 20(6): 1547-1558 (2010) - [c5]Souvik Bhattacherjee, Abhijit Das:
Parallelization of the Lanczos Algorithm on Multi-core Platforms. ICDCN 2010: 231-241
2000 – 2009
- 2008
- [c4]Vivekananda Bhat K., Indranil Sengupta, Abhijit Das:
Audio Watermarking Based on BCH Coding Using CT and DWT. ICIT 2008: 49-50 - [c3]Abhijit Das, Bimal K. Roy:
A New Key-Predistribution Scheme for Highly Mobile Sensor Networks. ICDCN 2008: 298-303 - [c2]Vivekananda Bhat K., Indranil Sengupta, Abhijit Das:
Audio Watermarking Based on Quantization in Wavelet Domain. ICISS 2008: 235-242 - [e1]Dipanwita Roy Chowdhury, Vincent Rijmen, Abhijit Das:
Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings. Lecture Notes in Computer Science 5365, Springer 2008, ISBN 978-3-540-89753-8 [contents] - 2005
- [c1]Ashok Kumar Das, Abhijit Das, Surjyakanta Mohapatra, Srihari Vavilapalli:
Key Forwarding: A Location-Adaptive Key-Establishment Scheme for Wireless Sensor Networks. IWDC 2005: 404-409
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-13 19:11 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint