What if someone tampered with your special letter to Juliet? How would you ensure its integrity? Have no worry as you have your favorite cryptographic hash function to the rescue. So one must toil hard make it efficient and robust. While I am trying to be one of them. BTW all the best with Juliet :-)
What if there is a fault (While no one knows it could be injected by your roommate Mike) in the cryptosystem and your secret gift idea for Juliet is revealed? How would the system behave and adapt in such situations? This needs to addressed, right? While, I am trying to study the behavior of ciphers in the presence of faults. Hope together we can stop Mike and you can give that secret gift to Juliet on the next date.
While this topic is not directly related to me saving you and Juliet but nonetheless it is highly interesting. So lets hope I can study this very ineteresting topic and may be someday (probably by the time you and Juliet get married) contribute to make it more interesting.
Dhiman Saha, Dipanwita Roy Chowdhury
To Appear in Proceedings of the 22nd Conference on Selected Areas in Cryptography.
Shamit Ghosh, Dhiman Saha, Abhrajit Sengupta, Dipanwita Roy Chowdhury
In Proceedings of the 20th Australasian Conference on Information Security and Privacy.
Dhiman Saha, Dipanwita Roy Chowdhury
In Proceedings of IEEE Int. Symposium on Hardware-Oriented Security and Trust.
Dhiman Saha, Sukhendu Kuila, Dipanwita Roy Chowdhury
In Proceedings of 15th International Conference on Cryptology in India.
Dhiman Saha, Sukhendu Kuila, Dipanwita Roy Chowdhury
Presented at Directions in Authenticated Ciphers.
Sukhendu Kuila, Dhiman Saha, Dipanwita Roy Chowdhury
In Proceedings of Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, SPACE 2014.
Abhrajit Sengupta, Dhiman Saha, Shamit Ghosh, Deval Mehta, Dipanwita Roy Chowdhury
In Proceedings of Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, SPACE 2014.
Shamit Ghosh, Abhrajit Sengupta, Dhiman Saha, Dipanwita Roy Chowdhury
In Proceedings of Cellular Automata - 11th International Conference on Cellular Automata for Research and Industry, ACRI 2014.
Sukhendu Kuila, Dhiman Saha, Madhumangal Pal, Dipanwita Roy Chowdhury
In Proceedings of 7th International Conference on Cryptology in Africa.
Dhiman Saha, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury
In Proceedings of 12th International Conference on Cryptology in India.
Dhiman Saha, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury
Mukesh Agrawal, Sandip Karmakar, Dhiman Saha, Debdeep Mukhopadhyay
In Proceedings of 9th International Conference on Cryptology in India
Debojyoti Bhattacharya, Debdeep Mukhopadhyay, Dhiman Saha, Dipanwita Roy Chowdhury
In Proceedings of 12th Australasian Conference.