Get my own profile
Public access
View all4 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Dhiman SahaIndian Institute of Technology BhilaiVerified email at iitbhilai.ac.in
Goutam PaulAssociate Professor, Cryptology & Security Research Unit (CSRU), Indian Statistical InstituteVerified email at ieee.org
Takanori IsobeUniversity of HyogoVerified email at ai.u-hyogo.ac.jp
Amit JanaSRF, Indian Statistical Institute, KolkataVerified email at isical.ac.in
Subhadeep BanikAmbizione Fellow, LASEC, EPFL SwitzerlandVerified email at epfl.ch
Kosei SakamotoMitsubishi Electric CorporationVerified email at dc.MitsubishiElectric.co.jp
Fukang LiuInstitute of Science TokyoVerified email at m.titech.ac.jp
Eik ListChair of Media Security, Bauhaus-Universität WeimarVerified email at uni-weimar.de
Willi MeierFHNWVerified email at fhnw.ch
Patrick DerbezUniversity of RennesVerified email at irisa.fr
Pierre-Alain FouqueProfessor of Computer Science, Rennes University, IRISA, Institut Universitaire de FranceVerified email at ens.fr
André SchrottenloherInriaVerified email at inria.fr
Kazuhiko MinematsuNEC CorporationVerified email at nec.com
Dr Avishek AdhikariProfessor, Department of Mathematics, Presidency UniversityVerified email at presiuniv.ac.in
Shibam GhoshInria ParisVerified email at inria.fr
Rentaro ShibaMitsubishi Electric Corporation / Nagoya UniversityVerified email at dc.mitsubishielectric.co.jp
Sandip Kumar MondalResearch ScholarVerified email at caluniv.ac.in
Ling SongJinan University, Guangzhou, ChinaVerified email at jnu.edu.cn
Libo WangUniversity of Hyogo, JapanVerified email at mails.ucas.edu.cn
Santanu SarkarProfessor, IIT MadrasVerified email at iitm.ac.in