Sugata Gangopadhyay
Indian Institute of Technology Roorkee
H-index: 16
Asia-India
Top articles of Sugata Gangopadhyay
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
ULTRA: Exploring Team Recommendations in Two Geographies Using Open Data in Response to Call for Proposals | Siva Likitha Valluru Michael Widener Biplav Srivastava Sugata Gangopadhyay | 2024/1/4 | |
Rayleigh quotients of Dillon's functions | arXiv preprint arXiv:2304.03884 | Aditi Kar Gangopadhyay Bimal Mandal Aleksandr Kutsenko Sugata Gangopadhyay | 2023/4/8 |
Lattice attack on group ring NTRU: The case of the dihedral group | arXiv preprint arXiv:2309.08304 | Vikas Kumar Ali Raya Sugata Gangopadhyay Aditi Kar Gangopadhyay | 2023/9/15 |
Evolving bijective S-Boxes using hybrid adaptive genetic algorithm with optimal cryptographic properties | Journal of Ambient Intelligence and Humanized Computing | Pratap Kumar Behera Sugata Gangopadhyay | 2023/3 |
Stability of the Walsh–Hadamard spectrum of cryptographic Boolean functions with biased inputs | Journal of Applied Mathematics and Computing | Aditi Kar Gangopadhyay Vikas Kumar Pantelimon Stănică Sugata Gangopadhyay | 2023/8 |
Results on the Key Space of Group-Ring NTRU: The Case of the Dihedral Group | Ali Raya Vikas Kumar Sugata Gangopadhyay Aditi Kar Gangopadhyay | 2023/12/14 | |
Randomness Enhancement in a Quantum Dot-Based Quantum Random Number Generator by Correctors | Anvadya Khare CA Jothishwaran Yash Tiwari Sugata Gangopadhyay Vishvendra S Poonia | 2023/7/2 | |
An approach to occluded face recognition based on dynamic image-to-class warping using structural similarity index | Applied Intelligence | Shadab Naseem Santosh Singh Rathore Sandeep Kumar Sugata Gangopadhyay Ankita Jain | 2023/12 |
Computational Results on Gowers and Norms of Known S-Boxes | Vikas Kumar Bimal Mandal Aditi Kar Gangopadhyay Sugata Gangopadhyay | 2023/5/19 | |
Generating Adversarial Examples Using LAD | Sneha Chauhan Loreen Mahmoud Tanay Sheth Sugata Gangopadhyay Aditi Kar Gangopadhyay | 2023/11/15 | |
Study of Support Set Generation Techniques in LAD for Intrusion Detection | Sneha Chauhan Sugata Gangopadhyay Aditi Kar Gangopadhyay | 2023/5/11 | |
On Learning with LAD | arXiv preprint arXiv:2309.16630 | CA Jothishwaran Biplav Srivastava Jitin Singla Sugata Gangopadhyay | 2023/9/28 |
GOWERS U3 NORM OF CUBIC MMF BENT-NEGABENT FUNCTIONS CONSTRUCTED BY USING FEISTEL FUNCTIONS. | Journal of the Indian Mathematical Society | Saral Datta Sugata Gangopadhyay Sanjib Kumar Datta | 2022/7/1 |
Design of intrusion detection system based on logical analysis of data (LAD) using information gain ratio | Sneha Chauhan Sugata Gangopadhyay | 2022/6/23 | |
An improved hybrid genetic algorithm to construct balanced Boolean function with optimal cryptographic properties | Evolutionary Intelligence | Pratap Kumar Behera Sugata Gangopadhyay | 2022/3 |
Intrusion Detection System for IoT Using Logical Analysis of Data and Information Gain Ratio | Cryptography | Sneha Chauhan Sugata Gangopadhyay Aditi Kar Gangopadhyay | 2022/12/5 |
C-differential bent functions and perfect nonlinearity | Discrete Applied Mathematics | Pantelimon Stănică Sugata Gangopadhyay Aaron Geary Constanza Riera Anton Tkachenko | 2022/1/30 |
A quantum algorithm to estimate the closeness to the Strict Avalanche criterion in Boolean functions | arXiv preprint arXiv:2211.15356 | CA Jothishwaran Abhishek Chakraborty Vishvendra Singh Poonia Pantelimon Stanica Sugata Gangopadhyay | 2022/11/25 |
A comparative study of LAD, CNN and DNN for detecting intrusions | Sneha Chauhan Loreen Mahmoud Sugata Gangopadhyay Aditi Kar Gangopadhyay | 2022/11/21 | |
BSAT: A new tool for analyzing cryptographic strength of Boolean function and S-box of symmetric cryptosystem | Pratap Kumar Behera Sugata Gangopadhyay | 2021 |