Neural networks-based cryptography: A survey I Meraouche, S Dutta, H Tan, K Sakurai IEEE Access 9, 124727-124740, 2021 | 31 | 2021 |
Constructions and analysis of some efficient --visual cryptographic schemes using linear algebraic techniques S Dutta, RS Rohit, A Adhikari Designs, Codes and Cryptography 80 (1), 165-196, 2016 | 22 | 2016 |
Maximal contrast color visual secret sharing schemes S Dutta, A Adhikari, S Ruj Designs, Codes and Cryptography 87, 1699-1711, 2019 | 20 | 2019 |
3-party adversarial cryptography I Meraouche, S Dutta, K Sakurai Advances in Internet, Data and Web Technologies: The 8th International …, 2020 | 14 | 2020 |
XOR Based Non-monotone t--Visual Cryptographic Schemes Using Linear Algebra S Dutta, A Adhikari International Conference on Information and Communications Security, 230-242, 2014 | 13 | 2014 |
Secret sharing schemes on compartmental access structure in presence of cheaters J Pramanik, PS Roy, S Dutta, A Adhikari, K Sakurai International Conference on Information Systems Security, 171-188, 2018 | 11 | 2018 |
Indistinguishability against chosen ciphertext verification attack revisited: The complete picture A Das, S Dutta, A Adhikari Provable Security: 7th International Conference, ProvSec 2013, Melaka …, 2013 | 10 | 2013 |
Contrast optimal XOR based visual cryptographic schemes S Dutta, A Adhikari Information Theoretic Security: 10th International Conference, ICITS 2017 …, 2017 | 9 | 2017 |
Secret sharing on evolving multi-level access structure S Dutta, PS Roy, K Fukushima, S Kiyomoto, K Sakurai International Workshop on Information Security Applications, 180-191, 2019 | 8 | 2019 |
Evolving perfect hash families: a combinatorial viewpoint of evolving secret sharing Y Desmedt, S Dutta, K Morozov Cryptology and Network Security: 18th International Conference, CANS 2019 …, 2019 | 8 | 2019 |
Password protected secret sharing from lattices PS Roy, S Dutta, W Susilo, R Safavi-Naini International Conference on Applied Cryptography and Network Security, 442-459, 2021 | 7 | 2021 |
Color visual cryptography schemes using linear algebraic techniques over rings S Dutta, MK Sardar, A Adhikari, S Ruj, K Sakurai International Conference on Information Systems Security, 198-217, 2020 | 7 | 2020 |
Hierarchical secret sharing schemes secure against rushing adversary: cheater identification and robustness PS Roy, S Dutta, K Morozov, A Adhikari, K Fukushima, S Kiyomoto, ... Information Security Practice and Experience: 14th International Conference …, 2018 | 7 | 2018 |
On the robustness of visual cryptographic schemes S Dutta, PS Roy, A Adhikari, K Sakurai International Workshop on Digital Watermarking, 251-262, 2016 | 7 | 2016 |
Constructions of Secret Sharing Schemes – Accommodating New Parties SS Chaudhury, S Dutta, K Sakurai International Conference on Network and System Security, 292-308, 2020 | 6 | 2020 |
Verifiable E-Voting with Resistance against Physical Forced Abstention Attack MH Suwito, S Dutta 2019 International Workshop on Big Data and Information Security (IWBIS), 85-90, 2019 | 6 | 2019 |
Learning multi-party adversarial encryption and its application to secret sharing I Meraouche, S Dutta, SK Mohanty, I Agudo, K Sakurai IEEE Access 10, 121329-121339, 2022 | 5 | 2022 |
Perpetual secret sharing from dynamic data structures SS Chaudhury, S Dutta, K Sakurai 2021 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2021 | 5 | 2021 |
Quantum multi-secret sharing via trap codes and discrete quantum walks S Samadder Chaudhury, S Dutta Quantum Information Processing 21 (11), 380, 2022 | 4 | 2022 |
Cheating detectable ramp secret sharing with optimal cheating resiliency J Pramanik, S Dutta, PS Roy, A Adhikari International Conference on Information Systems Security, 169-184, 2020 | 4 | 2020 |