default search action
Indranil Ghosh Ray
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c12]Praveen K, Gabriel Anand K. S, Indranil Ghosh Ray, Avishek Adhikari, Sabyasachi Datta, Arnab Kumar Biswas:
On the Design of a Searchable Encryption Protocol for Keyword Search using Proactive Secret Sharing. e-Science 2024: 1-8 - 2022
- [c11]Samiran Bag, Indranil Ghosh Ray, Feng Hao:
A New Leakage Resilient Symmetric Searchable Encryption Scheme for Phrase Search. SECRYPT 2022: 366-373 - 2021
- [j9]K. Rajesh Rao, Ashalatha Nayak, Indranil Ghosh Ray, Yogachandran Rahulamathavan, Muttukrishnan Rajarajan:
Role recommender-RBAC: Optimizing user-role assignments in RBAC. Comput. Commun. 166: 140-153 (2021) - 2020
- [j8]Indranil Ghosh Ray, Yogachandran Rahulamathavan, Muttukrishnan Rajarajan:
A New Lightweight Symmetric Searchable Encryption Scheme for String Identification. IEEE Trans. Cloud Comput. 8(3): 672-684 (2020) - [j7]Samiran Bag, Feng Hao, Siamak F. Shahandashti, Indranil Ghosh Ray:
SEAL: Sealed-Bid Auction Without Auctioneers. IEEE Trans. Inf. Forensics Secur. 15: 2042-2052 (2020)
2010 – 2019
- 2019
- [j6]K. Rajesh Rao, Indranil Ghosh Ray, Waqar Asif, Ashalatha Nayak, Muttukrishnan Rajarajan:
R-PEKS: RBAC Enabled PEKS for Secure Access of Cloud Data. IEEE Access 7: 133274-133289 (2019) - [j5]Kishan Chand Gupta, Sumit Kumar Pandey, Indranil Ghosh Ray, Susanta Samanta:
Cryptographically significant mds matrices over finite fields: A brief survey and some generalized results. Adv. Math. Commun. 13(4): 779-843 (2019) - [j4]Yogachandran Rahulamathavan, Kunaraj R. Sutharsini, Indranil Ghosh Ray, Rongxing Lu, Muttukrishnan Rajarajan:
Privacy-Preserving iVector-Based Speaker Verification. IEEE ACM Trans. Audio Speech Lang. Process. 27(3): 496-506 (2019) - [i2]Samiran Bag, Feng Hao, Siamak F. Shahandashti, Indranil Ghosh Ray:
SEAL: Sealed-Bid Auction Without Auctioneers. IACR Cryptol. ePrint Arch. 2019: 1332 (2019) - 2018
- [c10]Rana Barua, Kishan Chand Gupta, Sumit Kumar Pandey, Indranil Ghosh Ray:
On Diffusion Layers of SPN Based Format Preserving Encryption Schemes: Format Preserving Sets Revisited. INDOCRYPT 2018: 91-104 - [c9]Waqar Asif, Indranil Ghosh Ray, Muttukrishnan Rajarajan:
An attack tree based risk evaluation approach for the internet of things. IOT 2018: 6:1-6:8 - [c8]Waqar Asif, Indranil Ghosh Ray, Shahzaib Tahir, Muttukrishnan Rajarajan:
Privacy-preserving Anonymization with Restricted Search (PARS) on Social Network Data for Criminal Investigations. SNPD 2018: 329-334 - 2017
- [j3]Kishan Chand Gupta, Sumit Kumar Pandey, Indranil Ghosh Ray:
Applications of design theory for the constructions of MDS matrices for lightweight cryptography. J. Math. Cryptol. 11(2): 85 (2017) - [c7]Cornelius Glackin, Gérard Chollet, Nazim Dugan, Nigel Cannings, Julie A. Wall, Shahzaib Tahir, Indranil Ghosh Ray, Muttukrishnan Rajarajan:
Privacy preserving encrypted phonetic search of speech data. ICASSP 2017: 6414-6418 - [c6]Indranil Ghosh Ray, Muttukrishnan Rajarajan:
A Public Key Encryption Scheme for String Identification. TrustCom/BigDataSE/ICESS 2017: 104-111 - 2016
- [c5]Donghoon Chang, Mohona Ghosh, Kishan Chand Gupta, Arpan Jati, Abhishek Kumar, Dukjae Moon, Indranil Ghosh Ray, Somitra Kumar Sanadhya:
SPF: A New Family of Efficient Format-Preserving Encryption Algorithms. Inscrypt 2016: 64-83 - [c4]Kishan Chand Gupta, Sumit Kumar Pandey, Indranil Ghosh Ray:
Format Preserving Sets: On Diffusion Layers of Format Preserving Encryption Schemes. INDOCRYPT 2016: 411-428 - 2015
- [j2]Kishan Chand Gupta, Indranil Ghosh Ray:
Cryptographically significant MDS matrices based on circulant and circulant-like matrices for lightweight applications. Cryptogr. Commun. 7(2): 257-287 (2015) - [j1]Kishan Chand Gupta, Indranil Ghosh Ray:
Finding Biaffine and Quadratic Equations for S-Boxes Based on Power Mappings. IEEE Trans. Inf. Theory 61(4): 2200-2209 (2015) - 2014
- [c3]Kishan Chand Gupta, Indranil Ghosh Ray:
On Constructions of Circulant MDS Matrices for Lightweight Cryptography. ISPEC 2014: 564-576 - 2013
- [c2]Kishan Chand Gupta, Indranil Ghosh Ray:
On Constructions of MDS Matrices from Companion Matrices for Lightweight Cryptography. CD-ARES Workshops 2013: 29-43 - [c1]Kishan Chand Gupta, Indranil Ghosh Ray:
On Constructions of Involutory MDS Matrices. AFRICACRYPT 2013: 43-60 - [i1]Kishan Chand Gupta, Indranil Ghosh Ray:
On Constructions of MDS Matrices from Companion Matrices for Lightweight Cryptography. IACR Cryptol. ePrint Arch. 2013: 56 (2013)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint