Follow
Sabyasachi Dutta
Sabyasachi Dutta
SRM University - AP
Verified email at srmap.edu.in - Homepage
Title
Cited by
Cited by
Year
Constructions and analysis of some efficient --visual cryptographic schemes using linear algebraic techniques
S Dutta, RS Rohit, A Adhikari
Designs, Codes and Cryptography 80 (1), 165-196, 2016
212016
Neural networks-based cryptography: A survey
I Meraouche, S Dutta, H Tan, K Sakurai
IEEE Access 9, 124727-124740, 2021
192021
Maximal contrast color visual secret sharing schemes
S Dutta, A Adhikari, S Ruj
Designs, Codes and Cryptography 87, 1699-1711, 2019
192019
XOR Based Non-monotone t--Visual Cryptographic Schemes Using Linear Algebra
S Dutta, A Adhikari
International Conference on Information and Communications Security, 230-242, 2014
122014
3-party adversarial cryptography
I Meraouche, S Dutta, K Sakurai
Advances in Internet, Data and Web Technologies: The 8th International …, 2020
102020
Indistinguishability against chosen ciphertext verification attack revisited: The complete picture
A Das, S Dutta, A Adhikari
Provable Security: 7th International Conference, ProvSec 2013, Melaka …, 2013
102013
Secret sharing schemes on compartmental access structure in presence of cheaters
J Pramanik, PS Roy, S Dutta, A Adhikari, K Sakurai
International Conference on Information Systems Security, 171-188, 2018
92018
Contrast optimal XOR based visual cryptographic schemes
S Dutta, A Adhikari
Information Theoretic Security: 10th International Conference, ICITS 2017 …, 2017
82017
Color visual cryptography schemes using linear algebraic techniques over rings
S Dutta, MK Sardar, A Adhikari, S Ruj, K Sakurai
International Conference on Information Systems Security, 198-217, 2020
72020
Hierarchical secret sharing schemes secure against rushing adversary: Cheater identification and robustness
PS Roy, S Dutta, K Morozov, A Adhikari, K Fukushima, S Kiyomoto, ...
Information Security Practice and Experience: 14th International Conference …, 2018
72018
Password protected secret sharing from lattices
PS Roy, S Dutta, W Susilo, R Safavi-Naini
International Conference on Applied Cryptography and Network Security, 442-459, 2021
62021
Constructions of Secret Sharing Schemes – Accommodating New Parties
SS Chaudhury, S Dutta, K Sakurai
International Conference on Network and System Security, 292-308, 2020
62020
Secret sharing on evolving multi-level access structure
S Dutta, PS Roy, K Fukushima, S Kiyomoto, K Sakurai
International Workshop on Information Security Applications, 180-191, 2019
62019
Evolving perfect hash families: a combinatorial viewpoint of evolving secret sharing
Y Desmedt, S Dutta, K Morozov
Cryptology and Network Security: 18th International Conference, CANS 2019 …, 2019
62019
Perpetual secret sharing from dynamic data structures
SS Chaudhury, S Dutta, K Sakurai
2021 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2021
52021
Verifiable E-Voting with Resistance against Physical Forced Abstention Attack
MH Suwito, S Dutta
2019 International Workshop on Big Data and Information Security (IWBIS), 85-90, 2019
52019
On the robustness of visual cryptographic schemes
S Dutta, PS Roy, A Adhikari, K Sakurai
International Workshop on Digital Watermarking, 251-262, 2016
52016
Cheating detectable ramp secret sharing with optimal cheating resiliency
J Pramanik, S Dutta, PS Roy, A Adhikari
International Conference on Information Systems Security, 169-184, 2020
42020
3-party adversarial steganography
I Meraouche, S Dutta, K Sakurai
International Conference on Information Security Applications, 89-100, 2020
42020
Deniable secret handshake protocol-revisited
S Panja, S Dutta, K Sakurai
Advanced Information Networking and Applications: Proceedings of the 33rd …, 2020
42020
The system can't perform the operation now. Try again later.
Articles 1–20