Get my own profile
Public access
View all3 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Dhiman SahaIndian Institute of Technology BhilaiVerified email at iitbhilai.ac.in
Goutam PaulAssociate Professor, Cryptology & Security Research Unit (CSRU), Indian Statistical InstituteVerified email at ieee.org
Amit JanaSRF, Indian Statistical Institute, KolkataVerified email at isical.ac.in
Takanori IsobeUniversity of HyogoVerified email at ai.u-hyogo.ac.jp
Subhadeep BanikAmbizione Fellow, LASEC, EPFL SwitzerlandVerified email at epfl.ch
Eik ListChair of Media Security, Bauhaus-Universität WeimarVerified email at uni-weimar.de
Willi MeierFHNWVerified email at fhnw.ch
Fukang LiuTokyo Institute of TechnologyVerified email at m.titech.ac.jp
Kosei SakamotoMitsubishi Electric CorporationVerified email at dc.MitsubishiElectric.co.jp
Patrick DerbezUniversity of RennesVerified email at irisa.fr
Pierre-Alain FouqueProfessor of Computer Science, Rennes University, IRISA, Institut Universitaire de FranceVerified email at ens.fr
Dr Avishek AdhikariProfessor, Department of Mathematics, Presidency UniversityVerified email at presiuniv.ac.in
Ling SongJinan University, Guangzhou, ChinaVerified email at jnu.edu.cn
Libo WangUniversity of Hyogo, JapanVerified email at mails.ucas.edu.cn
Shibam GhoshUniversity Of HaifaVerified email at campus.haifa.ac.il
Rentaro ShibaMitsubishi Electric Corporation / Nagoya UniversityVerified email at dc.mitsubishielectric.co.jp
Santanu SarkarProfessor, IIT MadrasVerified email at iitm.ac.in