Cellular automata based encrypted ECG-hash code generation: an application in inter human biometric authentication system S Nandi, S Roy, J Dansana, WBA Karaa, R Ray, SR Chowdhury, ...
International Journal of Computer Network and Information Security 6 (11), 1, 2014
36 2014 Application of cellular automata in symmetric key cryptography S Roy, S Nandi, J Dansana, PK Pattnaik
2014 International Conference on Communication and Signal Processing, 572-576, 2014
33 2014 1-D group cellular automata based image encryption technique S Nandi, S Roy, S Nath, S Chakraborty, WBA Karaa, N Dey
2014 International Conference on Control, Instrumentation, Communication and …, 2014
24 2014 Key-Dependent Feedback Configuration Matrix of Primitive σ –LFSR and Resistance to Some Known Plaintext Attacks S Nandi, S Krishnaswamy, B Zolfaghari, P Mitra
Ieee Access 10, 44840-44854, 2022
12 2022 The application of -LFSR in Key-Dependent Feedback Configuration for Word-Oriented Stream Ciphers S Nandi, S Krishnaswamy, B Zolfaghari, P Mitra
arXiv preprint arXiv:2003.09381, 2020
3 2020 Recent Results on Some Word Oriented Stream Ciphers: SNOW 1.0, SNOW 2.0 and SNOW 3G S Nandi, S Krishnaswamy, P Mitra
Information Security and Privacy in the Digital World-Some Selected Topics, 2022
1 2022 IEMS3: An Image Encryption Scheme Using Modified SNOW 3G Algorithm SKPM Subrata Nandi, Satyabrata Roy
Proceedings of International Conference on Network Security and Blockchain …, 2023
2023 A Scheme to resist Fast Correlation Attack for Word Oriented LFSR based Stream Cipher S Nandi, S Krishnaswamy, P Mitra
arXiv preprint arXiv:2307.02182, 2023
2023