Follow
Sabyasachi Dutta
Sabyasachi Dutta
SRM University - AP
Verified email at srmap.edu.in - Homepage
Title
Cited by
Cited by
Year
Neural networks-based cryptography: A survey
I Meraouche, S Dutta, H Tan, K Sakurai
IEEE Access 9, 124727-124740, 2021
372021
Constructions and analysis of some efficient --visual cryptographic schemes using linear algebraic techniques
S Dutta, RS Rohit, A Adhikari
Designs, Codes and Cryptography 80 (1), 165-196, 2016
252016
Maximal contrast color visual secret sharing schemes
S Dutta, A Adhikari, S Ruj
Designs, Codes and Cryptography 87, 1699-1711, 2019
222019
XOR Based Non-monotone t--Visual Cryptographic Schemes Using Linear Algebra
S Dutta, A Adhikari
International Conference on Information and Communications Security, 230-242, 2014
162014
3-party adversarial cryptography
I Meraouche, S Dutta, K Sakurai
Advances in Internet, Data and Web Technologies: The 8th International …, 2020
152020
Secret sharing schemes on compartmental access structure in presence of cheaters
J Pramanik, PS Roy, S Dutta, A Adhikari, K Sakurai
International Conference on Information Systems Security, 171-188, 2018
112018
Contrast optimal XOR based visual cryptographic schemes
S Dutta, A Adhikari
Information Theoretic Security: 10th International Conference, ICITS 2017 …, 2017
112017
Learning asymmetric encryption using adversarial neural networks
I Meraouche, S Dutta, H Tan, K Sakurai
Engineering Applications of Artificial Intelligence 123, 106220, 2023
102023
Secret sharing on evolving multi-level access structure
S Dutta, PS Roy, K Fukushima, S Kiyomoto, K Sakurai
International Workshop on Information Security Applications, 180-191, 2019
102019
Indistinguishability against chosen ciphertext verification attack revisited: The complete picture
A Das, S Dutta, A Adhikari
Provable Security: 7th International Conference, ProvSec 2013, Melaka …, 2013
102013
Evolving perfect hash families: a combinatorial viewpoint of evolving secret sharing
Y Desmedt, S Dutta, K Morozov
International Conference on Cryptology and Network Security, 291-307, 2019
92019
Hierarchical secret sharing schemes secure against rushing adversary: cheater identification and robustness
PS Roy, S Dutta, K Morozov, A Adhikari, K Fukushima, S Kiyomoto, ...
Information Security Practice and Experience: 14th International Conference …, 2018
82018
Password protected secret sharing from lattices
PS Roy, S Dutta, W Susilo, R Safavi-Naini
International Conference on Applied Cryptography and Network Security, 442-459, 2021
72021
Color visual cryptography schemes using linear algebraic techniques over rings
S Dutta, MK Sardar, A Adhikari, S Ruj, K Sakurai
International conference on information systems security, 198-217, 2020
72020
On the robustness of visual cryptographic schemes
S Dutta, PS Roy, A Adhikari, K Sakurai
International Workshop on Digital Watermarking, 251-262, 2016
72016
Learning multi-party adversarial encryption and its application to secret sharing
I Meraouche, S Dutta, SK Mohanty, I Agudo, K Sakurai
IEEE Access 10, 121329-121339, 2022
62022
Constructions of Secret Sharing Schemes – Accommodating New Parties
SS Chaudhury, S Dutta, K Sakurai
International Conference on Network and System Security, 292-308, 2020
62020
Verifiable e-voting with resistance against physical forced abstention attack
MH Suwito, S Dutta
2019 International Workshop on Big Data and Information Security (IWBIS), 85-90, 2019
62019
Quantum multi-secret sharing via trap codes and discrete quantum walks
S Samadder Chaudhury, S Dutta
Quantum Information Processing 21 (11), 380, 2022
52022
Deniable secret handshake protocol-revisited
S Panja, S Dutta, K Sakurai
Advanced Information Networking and Applications: Proceedings of the 33rd …, 2020
52020
The system can't perform the operation now. Try again later.
Articles 1–20