default search action
Sabyasachi Dutta
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Jina Varghese, Praveen K, Sabyasachi Dutta, Avishek Adhikari:
A novel approach for long-term secure storage of domain independent videos. J. Vis. Commun. Image Represent. 104: 104279 (2024) - [i5]Sabyasachi Dutta, Partha Sarathi Roy, Reihaneh Safavi-Naini, Willy Susilo:
Password Protected Universal Thresholdizer. IACR Cryptol. ePrint Arch. 2024: 7 (2024) - 2023
- [j8]Ishak Meraouche, Sabyasachi Dutta, Haowen Tan, Kouichi Sakurai:
Learning asymmetric encryption using adversarial neural networks. Eng. Appl. Artif. Intell. 123(Part B): 106220 (2023) - [j7]Praveen K, Sabyasachi Dutta, Avishek Adhikari, M. Sethumadhavan:
Proactive visual cryptographic schemes for general access structures. Multim. Tools Appl. 82(27): 41987-42019 (2023) - [c25]Sabyasachi Dutta, Shaoquan Jiang, Reihaneh Safavi-Naini:
Lower Bounds on the Share Size of Leakage Resilient Cheating Detectable Secret Sharing. CANS 2023: 468-493 - [i4]Snehasis Addy, Sabyasachi Dutta, Somnath Panja, Kunal Dey, Reihaneh Safavi-Naini, Daniel Oblak:
Flexible polar encoding for information reconciliation in QKD. CoRR abs/2312.03100 (2023) - 2022
- [j6]Ishak Meraouche, Sabyasachi Dutta, Sraban Kumar Mohanty, Isaac Agudo, Kouichi Sakurai:
Learning Multi-Party Adversarial Encryption and Its Application to Secret Sharing. IEEE Access 10: 121329-121339 (2022) - [j5]Suraj Kumar Sahoo, Avishek Adhikari, Sabyasachi Dutta:
Practical attacks on a class of secret image sharing schemes based on Chinese Remainder Theorem. Comput. Electr. Eng. 100: 107924 (2022) - [j4]Shion Samadder Chaudhury, Sabyasachi Dutta:
Quantum multi-secret sharing via trap codes and discrete quantum walks. Quantum Inf. Process. 21(11): 380 (2022) - [c24]Misni Harjo Suwito, Bayu Adhi Tama, Bagus Santoso, Sabyasachi Dutta, Haowen Tan, Yoshifumi Ueshige, Kouichi Sakurai:
A Systematic Study of Bulletin Board and Its Application. AsiaCCS 2022: 1213-1215 - 2021
- [j3]Ishak Meraouche, Sabyasachi Dutta, Haowen Tan, Kouichi Sakurai:
Neural Networks-Based Cryptography: A Survey. IEEE Access 9: 124727-124740 (2021) - [c23]Sabyasachi Dutta, Reihaneh Safavi-Naini:
Leakage Resilient Cheating Detectable Secret Sharing Schemes. ACISP 2021: 3-23 - [c22]Partha Sarathi Roy, Sabyasachi Dutta, Willy Susilo, Reihaneh Safavi-Naini:
Password Protected Secret Sharing from Lattices. ACNS (1) 2021: 442-459 - [c21]Shion Samadder Chaudhury, Sabyasachi Dutta, Kouichi Sakurai:
Perpetual Secret Sharing from Dynamic Data Structures. DSC 2021: 1-8 - [c20]Sabyasachi Dutta, Arinjita Paul, Rocki H. Ozaki, C. Pandu Rangan, Kouichi Sakurai:
A Distributed Ledger Management Mechanism for Storing and Selling Private Data. DSC 2021: 1-8 - 2020
- [c19]Ishak Meraouche, Sabyasachi Dutta, Kouichi Sakurai:
3-Party Adversarial Cryptography. EIDWT 2020: 247-258 - [c18]Jyotirmoy Pramanik, Sabyasachi Dutta, Partha Sarathi Roy, Avishek Adhikari:
Cheating Detectable Ramp Secret Sharing with Optimal Cheating Resiliency. ICISS 2020: 169-184 - [c17]Sabyasachi Dutta, Md Kutubuddin Sardar, Avishek Adhikari, Sushmita Ruj, Kouichi Sakurai:
Color Visual Cryptography Schemes Using Linear Algebraic Techniques over Rings. ICISS 2020: 198-217 - [c16]Shion Samadder Chaudhury, Sabyasachi Dutta, Kouichi Sakurai:
AC0 Constructions of Secret Sharing Schemes - Accommodating New Parties. NSS 2020: 292-308 - [c15]Ishak Meraouche, Sabyasachi Dutta, Kouichi Sakurai:
3-Party Adversarial Steganography. WISA 2020: 89-100 - [i3]Shion Samadder Chaudhury, Sabyasachi Dutta, Kouichi Sakurai:
Hypercube and Cascading-based Algorithms for Secret Sharing Schemes. IACR Cryptol. ePrint Arch. 2020: 719 (2020)
2010 – 2019
- 2019
- [j2]Sabyasachi Dutta, Avishek Adhikari, Sushmita Ruj:
Maximal contrast color visual secret sharing schemes. Des. Codes Cryptogr. 87(7): 1699-1711 (2019) - [c14]Somnath Panja, Sabyasachi Dutta, Kouichi Sakurai:
Deniable Secret Handshake Protocol - Revisited. AINA 2019: 1266-1278 - [c13]Yvo Desmedt, Sabyasachi Dutta, Kirill Morozov:
Evolving Perfect Hash Families: A Combinatorial Viewpoint of Evolving Secret Sharing. CANS 2019: 291-307 - [c12]Sabyasachi Dutta, Tamal Bhore, Md Kutubuddin Sardar, Avishek Adhikari, Kouichi Sakurai:
Visual Secret Sharing Scheme with Distributed Levels of Importance of Shadows. ICMC 2019: 19-32 - [c11]Sabyasachi Dutta, Kouichi Sakurai:
Theory and Application of Computationally-Independent One-Way Functions: Interactive Proof of Ability - Revisited. ICMC 2019: 97-109 - [c10]Misni Harjo Suwito, Sabyasachi Dutta:
Verifiable E-Voting with Resistance against Physical Forced Abstention Attack. IWBIS 2019: 85-90 - [c9]Sabyasachi Dutta, Partha Sarathi Roy, Kazuhide Fukushima, Shinsaku Kiyomoto, Kouichi Sakurai:
Secret Sharing on Evolving Multi-level Access Structure. WISA 2019: 180-191 - [i2]Sabyasachi Dutta, Kouichi Sakurai:
Theory and application of computationally independent one-way functions: Interactive proof of ability - Revisited. IACR Cryptol. ePrint Arch. 2019: 323 (2019) - 2018
- [c8]Jyotirmoy Pramanik, Partha Sarathi Roy, Sabyasachi Dutta, Avishek Adhikari, Kouichi Sakurai:
Secret Sharing Schemes on Compartmental Access Structure in Presence of Cheaters. ICISS 2018: 171-188 - [c7]Sabyasachi Dutta, Nishant Nikam, Sushmita Ruj:
Secure Computation of Inner Product of Vectors with Distributed Entries and Its Applications to SVM. ISPEC 2018: 533-543 - [c6]Partha Sarathi Roy, Sabyasachi Dutta, Kirill Morozov, Avishek Adhikari, Kazuhide Fukushima, Shinsaku Kiyomoto, Kouichi Sakurai:
Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness. ISPEC 2018: 578-594 - 2017
- [c5]Sabyasachi Dutta, Avishek Adhikari:
Contrast Optimal XOR Based Visual Cryptographic Schemes. ICITS 2017: 58-72 - 2016
- [j1]Sabyasachi Dutta, Raghvendra Singh Rohit, Avishek Adhikari:
Constructions and analysis of some efficient t - (k, n)∗-visual cryptographic schemes using linear algebraic techniques. Des. Codes Cryptogr. 80(1): 165-196 (2016) - [c4]Sabyasachi Dutta, Partha Sarathi Roy, Avishek Adhikari, Kouichi Sakurai:
On the Robustness of Visual Cryptographic Schemes. IWDW 2016: 251-262 - [i1]Sabyasachi Dutta, Tamal Bhore, Avishek Adhikari:
Efficient Construction of Visual Cryptographic Scheme for Compartmented Access Structures. IACR Cryptol. ePrint Arch. 2016: 1113 (2016) - 2014
- [c3]Sabyasachi Dutta, Avishek Adhikari:
XOR Based Non-monotone t- (k, n)^* -Visual Cryptographic Schemes Using Linear Algebra. ICICS 2014: 230-242 - 2013
- [c2]Angsuman Das, Sabyasachi Dutta, Avishek Adhikari:
Indistinguishability against Chosen Ciphertext Verification Attack Revisited: The Complete Picture. ProvSec 2013: 104-120
2000 – 2009
- 2007
- [c1]Swapan Kumar Ray, Sabyasachi Dutta, Abhik Kumar Saha:
A Low-Cost Pipelineed Multi-Lingual E-Dictionary Using a Pipelined CTAM. ICCTA 2007: 158-164
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint