Menu

Souradyuti Paul

Publications

Indra Deep Mastan and Souradyuti Paul
A New Approach to Deanonymization of Unreachable Bitcoin Nodes
Cryptography and Network Security (CANS) 2017, Springer, LNCS [Accepted]
doi: ??


Sudhakar Kumawat and Souradyuti Paul
A New Constant-size Accountable Ring Signature Without Random Oracles
Inscrypt 2017, Springer, LNCS [Accepted]
doi: ??


Dustin Moody, Souradyuti Paul, and Daniel Smith-Tone
Improved Indifferentiability Security for the JH Hash Mode
Design, Codes and Cryptography, vol. 79, no.2, pp. 237-259, 2016
doi:10.1007/s10623-015-0047-9


Dustin Moody, Souradyuti Paul, and Daniel Smith-Tone
Indifferentiability Security of the Fast Widepipe Hash Mode: Breaking the Birthday Barrier
Journal of Mathematical Cryptology, vol. 10, no. 2, pp. 101-133, 2016
doi:10.1515/jmc-2014-0044


Shu-jen Chang, Ray Perlner, William Burr, Meltem Sönmez Turan, John M. Kelsey, Souradyuti Paul, and Lawrence E. Bassham
Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition
NIST IR, vol. 7896. Department Of Commerce, Govt. of US, 2012.
doi: 10.6028/NIST.IR.7896


Souradyuti Paul, Ekawat Homsirikamol, and Kris Gaj
A Novel Permutation-based Hash Mode of Operation FP, and The Hash Function SAMOSA
Indocrypt 2012 Springer, LNCS.
link bib Slide


Dustin Moody, Souradyuti Paul, and Daniel Smith-Tone
Improved Indifferentiability Security for the JH Hash Mode (Extended Abstract)
3rd SHA-3 Candidate Conference, 2012
link bib Slide


Meltem Sönmez Turan, Ray Perlner, Lawrence E. Bassham, William Burr, Donghoon Chang, Shu-jen Chang, Morris J. Dworkin, John M. Kelsey, Souradyuti Paul, and Rene Peralta
Status Report on the Second Round of the SHA-3 Cryptographic Hash Algorithm Competition
NIST IR, vol. 7764. Department Of Commerce, Govt. of US, 2011
doi: 10.6028/NIST.IR.7764


Mridul Nandi and Souradyuti Paul
Speeding Up the Wide-pipe: Secure and Fast Hashing
Indocrypt 2010, Springer, LNCS.
link bib Slide


Andrew Regenscheid, Ray Perlner, Shu jen Chang, John Kelsey, Mridul Nandi, and Souradyuti Paul
Status Report on the First Round of the SHA-3 Cryptographic Hash Algorithm Competition
NIST IR, vol. 7620. Department Of Commerce, Govt. of US, 2009
doi: 10.6028/NIST.IR.7620


Gautham Sekar, Souradyuti Paul, and Bart Preneel
Related-key Attacks on the Py-family of Ciphers and an Approach to Repair the Weaknesses
Indocrypt 2007, Springer, LNCS.
link bib Slide


Gautham Sekar, Souradyuti Paul, and  Bart Preneel
Weaknesses in the Pseudorandom Bit Generation Algorithms of the Stream Ciphers TPypy and TPy
IACR ePrint 2007/075. 

link   bib    Slide 


Gautham Sekar, Souradyuti Paul, and  Bart Preneel
Attacks on the Stream Ciphers TPy6 and Py6 and Design of New Ciphers TPy6-A and TPy6-B
WEWoRC 2007, Springer, LNCS.
 
link
   bib   Slide  


Gautham Sekar, Souradyuti Paul, and Bart Preneel
New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py
ISC 2007, Springer, LNCS.
 
link
    bib    Slide  


Souradyuti Paul, and Bart Preneel
On the (In)security of Stream Ciphers Based on Arrays and Modular Addition
Asiacrypt 2006, Springer, LNCS.
 
link  bib  slide


Souradyuti Paul, Bart Preneel and Gautham Sekar
Distinguishing Attack on the Stream Cipher Py
FSE 2006, Springer, LNCS. 

link    bib   slide 


Souradyuti Paul, and Bart Preneel 
Near Optimal Algorithms for Solving Differential Equations of Addition with Batch Queries
Indocrypt 2005, Springer, LNCS. 

link    bib   slide 


Souradyuti Paul
Cryptology: A Mathematician's Quest for Making and Breaking the Code
Point, A Methematical Journal of the Department of Mathematucs, Sree Chaitanya College, 2005.
link


Souradyuti Paul, and Bart Preneel 
Solving Systems of Differential Equations of Addition
                           and
Cryptanalysis of the Helix Cipher

ACISP 2005, Springer, LNCS. 

link   bib   slide 


Souradyuti Paul, and Bart Preneel 
A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher
FSE 2004, Springer, LNCS.
 
link
  bib  slide 
  


Souradyuti Paul, and Bart Preneel 
Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator
Indocrypt 2003, Springer, LNCS.

link   bib   slide 


Souradyuti Paul
Cryptanalysis of Stream Ciphers Based on Arrays and Modular Addition (PhD Thesis)
K.U. Leuven, 2006
link bib Slide