Publications
Souradyuti
Paul and Ananya Shrivastava
Efficient
Fair Multiparty Protocols using Blockchain and Trusted Hardware
Latincrypt
2019, Springer, LNCS
(Accepted!)
Suyash
Kandele and Souradyuti Paul
Key
Assignment Scheme with Authenticated Encryption
IACR
Transactions on Symmetric Cryptology, Vol. 2018, Issue 4.
doi:
https://doi.org/10.13154/tosc.v2018.i4.150-196
Souradyuti
Paul and Ananya Shrivastava
Robust Multiparty Computation with Faster Verification Time
23rd Australasian Conference on Information Security and Privacy
(ACISP 2018), Springer, LNCS
doi: https://doi.org/10.1007/978-3-319-93638-3_8
Suyash
Kandele and Souradyuti Paul
Message-locked Encryption with File Update
Applied Cryptography and Network Security (ACNS) 2018, Springer, LNCS
doi: https://doi.org/10.1007/978-3-319-93387-0_35
Indradeep
Mastan and Souradyuti Paul
A
New Approach to Deanonymization of Unreachable Bitcoin
Nodes
Cryptography
and Network Security (CANS) 2017, Springer, LNCS
doi: https://doi.org/10.1007/978-3-030-02641-7_13
Sudhakar
Kumawat and Souradyuti Paul
A
New Constant-size Accountable Ring Signature Without Random Oracles
Inscrypt
2017, Springer, LNCS
doi: 10.1007/978-3-319-75160-3_11
Dustin
Moody, Souradyuti Paul, and Daniel Smith-Tone
Improved Indifferentiability Security for the JH Hash Mode
Design, Codes and Cryptography, vol. 79, no.2, pp. 237-259, 2016
doi:10.1007/s10623-015-0047-9
Dustin
Moody, Souradyuti Paul, and Daniel Smith-Tone
Indifferentiability Security of the Fast Widepipe Hash Mode:
Breaking the Birthday Barrier
Journal of Mathematical Cryptology, vol. 10, no. 2, pp. 101-133, 2016
doi:10.1515/jmc-2014-0044
Shu-jen
Chang, Ray Perlner, William Burr, Meltem Sönmez Turan, John M. Kelsey,
Souradyuti Paul, and Lawrence E. Bassham
Third-Round Report of the SHA-3 Cryptographic Hash Algorithm
Competition
NIST IR, vol. 7896. Department Of Commerce, Govt. of US, 2012.
doi: 10.6028/NIST.IR.7896
Souradyuti
Paul, Ekawat Homsirikamol, and Kris Gaj
A Novel Permutation-based Hash Mode of Operation FP, and The
Hash Function SAMOSA
Indocrypt 2012 Springer, LNCS.
link bib Slide
Dustin
Moody, Souradyuti Paul, and Daniel Smith-Tone
Improved Indifferentiability Security for the JH Hash Mode
(Extended Abstract)
3rd SHA-3 Candidate Conference, 2012
link bib Slide
Meltem
Sönmez Turan, Ray Perlner, Lawrence E. Bassham, William Burr, Donghoon
Chang, Shu-jen Chang, Morris J. Dworkin, John M. Kelsey, Souradyuti
Paul, and Rene Peralta
Status Report on the Second Round of the SHA-3 Cryptographic
Hash Algorithm Competition
NIST IR, vol. 7764. Department Of Commerce, Govt. of US, 2011
doi: 10.6028/NIST.IR.7764
Mridul
Nandi and Souradyuti Paul
Speeding Up the Wide-pipe: Secure and Fast Hashing
Indocrypt 2010, Springer, LNCS.
link bib Slide
Andrew
Regenscheid, Ray Perlner, Shu jen Chang, John Kelsey, Mridul Nandi, and
Souradyuti Paul
Status Report on the First Round of the SHA-3 Cryptographic Hash
Algorithm Competition
NIST IR, vol. 7620. Department Of Commerce, Govt. of US, 2009
doi: 10.6028/NIST.IR.7620
Gautham
Sekar, Souradyuti Paul, and Bart Preneel
Related-key Attacks on the Py-family of Ciphers and an Approach
to Repair the Weaknesses
Indocrypt 2007, Springer, LNCS.
link bib Slide
Gautham
Sekar, Souradyuti Paul, and Bart Preneel
Weaknesses in the Pseudorandom Bit Generation Algorithms of
the Stream Ciphers TPypy and TPy
IACR ePrint 2007/075.
link bib Slide
Gautham
Sekar, Souradyuti Paul, and Bart Preneel
Attacks on the Stream Ciphers TPy6 and Py6 and Design of New
Ciphers TPy6-A and TPy6-B
WEWoRC 2007, Springer, LNCS.
link bib
Slide
Gautham
Sekar, Souradyuti Paul, and Bart Preneel
New Weaknesses in the Keystream Generation Algorithms of the
Stream Ciphers TPy and Py
ISC 2007, Springer, LNCS.
link bib
Slide
Souradyuti
Paul, and Bart Preneel
On the (In)security of Stream Ciphers Based on Arrays and
Modular Addition
Asiacrypt 2006, Springer, LNCS.
link
bib slide
Souradyuti
Paul, Bart Preneel and Gautham Sekar
Distinguishing Attack on the Stream Cipher Py
FSE 2006, Springer, LNCS.
link bib
slide
Souradyuti
Paul, and Bart Preneel
Near Optimal Algorithms for Solving Differential Equations
of Addition with Batch Queries
Indocrypt 2005, Springer, LNCS.
link bib
slide
Souradyuti
Paul
Cryptology: A Mathematician's Quest for Making and Breaking the
Code
Point, A Methematical Journal of the Department of Mathematucs, Sree
Chaitanya College, 2005.
link
Souradyuti
Paul, and Bart Preneel
Solving Systems of Differential Equations of Addition
and
Cryptanalysis of the Helix Cipher
ACISP 2005, Springer, LNCS.
link bib
slide
Souradyuti
Paul, and Bart Preneel
A New Weakness in the RC4 Keystream Generator and an
Approach to Improve the Security of the Cipher
FSE 2004, Springer, LNCS.
link bib
slide
Souradyuti
Paul, and Bart Preneel
Analysis of Non-fortuitous Predictive States of the RC4
Keystream Generator
Indocrypt 2003, Springer, LNCS.
link bib slide
Souradyuti
Paul
Cryptanalysis of Stream Ciphers Based on Arrays and Modular Addition (PhD
Thesis)
K.U. Leuven, 2006
link bib Slide