Publications in 2024


  • E. Andreeva, A. Bogdanov, N. Datta, A. Luykx, B. Mennink, M. Nandi, E. Tischhauser, K. Yasuda: The COLM Authenticated Encryption Scheme. Journal of Cryptology, 2024.

  • S. S. Chaudhury, P. Sadhukhan, K. Sengupta: Explainable AI using the Wasserstein Distance. IEEE Access 2024.

  • S. Palit, P. Sadhukhan: Parameter-free Undersampling for Multi-label Data. ICAART 2024 (Nominated for the Best Industrial Paper Award).

Publications in 2023


  • S. Goswami, S. Mishra, G. Mukherjee: AUTOMORPHISMS OF EXTENSIONS OF LIE-YAMAGUTI ALGEBRAS AND INDUCIBILITY PROBLEM. Journal of Algebra, 2023 (Manuscript No. JALGEBRA-D-23-00697).

  • N. Datta, S. Dey, A. Dutta, S. Mandal: Cascading Four Round LRW1 is Beyond Birthday Bound Secure. IACR Transactions of Symmetric Cryptology (ToSC) 2023.

  • H.-j. Shim, R. Gonzalez Hautamäki, M. Sahidullah, T. Kinnunen (2023) How to construct perfect and worse-than-coin-flip spoofing countermeasures: A word of warning on shortcut learning. In Proc. INTERSPEECH 2023, 785-789. doi: 10.21437/Interspeech.2023-1901

  • V.P. Singh, M. Sahidullah, T. Kinnunen (2023) Speaker verification across ages: Investigating deep speaker embedding sensitivity to age mismatch in enrollment and test speech. In Proc. INTERSPEECH 2023, 1948-1952. doi: 10.21437/Interspeech.2023-2052

  • X. Liu, M. Sahidullah, K.A. Lee, T. Kinnunen (2023) Speaker-aware anti-spoofing. In Proc. INTERSPEECH 2023, 2498-2502. doi: 10.21437/Interspeech.2023-1323

  • S.H. Mun, H.-j. Shim, H. Tak, X. Wang, X. Liu, M. Sahidullah, M. Jeong, M.H. Han, M. Todisco, K.A. Lee, J. Yamagishi, N. Evans, T. Kinnunen, N.S. Kim, J.-w. Jung (2023) Towards single integrated spoofing-aware speaker verification embeddings. In Proc. INTERSPEECH 2023, 3989-3993. doi: 10.21437/Interspeech.2023-1402

  • X. Liu, X. Wang, M. Sahidullah, J. Patino, H. Delgado, T. Kinnunen, M. Todisco, J. Yamagishi, N. Evans, A. Nautsch, K.A. Lee (2023) ASVspoof 2021: Towards spoofed and deepfake speech detection in the wild. IEEE/ACM Transactions on Audio, Speech, and Language Processing. doi: 10.1109/TASLP.2023.3285283

  • S.A. Sheikh, M. Sahidullah, F. Hirsch, S. Ouni (2023) Stuttering detection using speaker representations and self-supervised contextual embeddings. International Journal of Speech Technology. doi: 10.1007/s10772-023-10032-1 

  • P. Sadhukhan, L. Halder, S. Palit: Approximate DBSCAN on obfuscated data. Journal of Information Security and Applications 2023.

  • P. Sadhukhan, S. Palit: Be Infomed of the known to Catch the unknown. PRICAI 2023.

  • P. Sadhukhan, A. Pakrashi, S. Palit, B. Mac Namee: Integrating Unsupervised Clustering and Label-Specific Oversampling to Tackle Imbalanced Multi-Label Data. ICAART 2023 (Nominated for the Best Paper Award). 

  • S. Basu, S. Pal: Existence of Ulrich bundles on some surfaces of general type. Journal of Algebra, 640, 2024.

  • S. Basu, S. Pal: Stability of Sysyzy bundles corresponding to stable vector bundles on algebraic surfaces. Bulletin Des Sciences Mathematique, 189 (2023).

  • N. Datta, A. Dutta, E. List, S. Mandal: On the Security of Triplex- and Multiplex-type Constructions with Smaller Tweaks. INDOCRYPT 2023.

  • N. Datta, A. Dutta, S. Kundu: Tight Security Bound of 2k-LightMAC Plus. INDOCRYPT 2023.

  • B. Chakraborty, N. Datta, M. Nandi: Designing Full-Rate Sponge based AEAD Modes. INDOCRYPT 2023.

  • S. S. Chaudhury, A. Samanta, A. Maitra: Quantum Attribute-based Encryption – A Comprehensive Study. Quantum Information Processing 2023.

  • N. Datta, A. Dutta, C. Mancilias Lopez: LightMAC: Fork it and make it faster. Advances in Mathematics of Communications 2023.

  • A. Bhattacharjee, R. Bhaumik, A. Dutta, M. Nandi, A. Ray Chaudhuri: BBB Security for 5-Round Even-Mansour-Based Key-Alternating Feistel Ciphers. Design Codes and Cryptography, 2023.

  • A. Bhattacharjee, R. Bhaumik, A. Dutta, E. List: Beyond Birthday Bound Secure Permutation Based AE in Faulty Nonce Model. ICICS’23.
     
  • A. Dutta, M. Nandi, S. Talnikar: Tight Security Analysis of the Public Permutation-Based PMAC Plus. Advances in Mathematics of Communications 2023.

  • S. Chakraborty: Symmetrized non-commutative tori revisited. Journal of Noncommutative Geometry 2023. [arXiv]

  • L. Sardar and S. Mazumdar: Fidelis: Verifiable Keyword Search with No Trust Assumption. Proceedings of the 20th International Conference on Security and Cryptography, ISBN 978-989-758-666-8, ISSN 2184-7711, pages 698-703. DOI: 10.5220/0012082700003555.

  • B. Cogliati, A. Dutta, M. Nandi, J. Patarin, A. Saha: Proof of Mirror Theory for a Wide Range of \xi_max. Eurocrypt 2023.

  • S. Datta, S. Mullick, A. Chakrabarty, S. Das: Interval Bound Interpolation for Few-shot Learning with Few Tasks. 40th International Conference on Machine Learning (ICML 2023).

  • C. Chakraborty, S. Paul, S. Chakraborty, S. Das: Clustering High-dimensional Data with Ordered Weighted $\ell_1$ Regularization. International Conference on Artificial Intelligence and Statistics (2023), 7176-7189.

  • A. Chakraborty, A. Mondal, S. Mukherjee, and K. Saha: On Elser’s conjecture and the topology of U-nucleus complex. Journal of Combinatorial Theory, Series A, 2023. Doi: https://doi.org/10.1016/j.jcta.2023.105748


  • R. TAGUELMIMT, S. Aknine, D. BOUKREDERA, N. Changder, and T. Sandholm: Optimal Anytime Coalition Structure Generation Utilizing Com-pact Solution Space Representation. THE 32nd INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE (IJCAI-2023).

  • R. TAGUELMIMT, S. Aknine, D. BOUKREDERA, and N. Changder: Parallel Index-based Search Algorithm for Coalition Structure Generation (Student Abstract). Thirty-Seventh AAAI Conference on Artificial Intelligence (AAAI-23).

  • J. Mukherjee, T. Saha: Connected Feedback Vertex Set on AT-free Graphs. International Workshop on Combinatorial Algorithms. 

  • A. Das, S.K.Hazra, S. N. Mishra: Non-abelian extensions of Rota-Baxter Lie Algebras and inducibility of automorphisms. Linear Algebra and Its Application. Doi: https://doi.org/10.1016/j.laa.2023.04.005

  • N. Datta, A. Dutta, M. Nandi, S. Talnikar: Tight Multi-user Security of DbHtS. Transactions on Symmetric Cryptology,  2023(1), 192–223. Doi: https://doi.org/10.46586/tosc.v2023.i1.192-223

  • R. TAGUELMIMT, S. Aknine, D. BOUKREDERA, N. Changder, and T. Sandholm: A Multiagent Path Search Algorithm for Large-Scale Coalition Structure Generation. 14th Workshop on Optimization and Learning in Multiagent Systems at AAMAS 2023.

  • R. TAGUELMIMT, S. Aknine, D. BOUKREDERA, N. Changder, and T. Sandholm: Faster Optimal Coalition Structure Generation via Offline Coalition Selection and Graph-Based Search. 14th Workshop on Optimization and Learning in Multiagent Systems at AAMAS 2023.

  • R. TAGUELMIMT, S. Aknine, D. BOUKREDERA, N. Changder, and T. Sandholm: Efficient Size-based Hybrid Algorithm for Optimal Coalition Structure Generation. 14th Workshop on Optimization and Learning in Multiagent Systems at AAMAS 2023.

  • L. Sardar,  B. Sengupta, S. Ruj: Efficient Keyword Search on Encrypted Dynamic Cloud Data. American Institute of Mathematical Sciences. Doi: 10.3934/amc.2022101



Publications in 2022 


  • N. Datta, A. Dutta, S. Ghosh: INT-RUP Security of SAEB and TinyJAMBU. INDOCRYPT 2022.

  • S. S. Chaudhury, S. Dutta: Quantum Multi-Secret Sharing via Trap Codes and Discrete Quantum Walks. Quantum Information Processing (2022).

  • A. Bhattacharjee, A. Chakraborti, N. Datta, C. Mancillas-López, M. Nandi: ISAP+: ISAP with Fast Authentication. INDOCRYPT 2022.

  • A. Kumar, O. Ajani, S. Das, R. Mallipeddi: GridShift: A Faster Mode-seeking Algorithm for Image Segmentation and Object Tracking, Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 8131-8139.

  • J. Basak, K. Chakraborty, A. Maitra, S. Maitra: A Proposal for Device Independent Probabilistic Quantum Oblivious Transfer. INDOCRYPT 2022.

  • B. Chatterjee, R. Parikh, A. Maitra, S. Maitra, A. Roy: Revisiting BoolTest – On Randomness testing using Boolean functions. To appear at INDOCRYPT 2022.

  • A. Kumar, S. Das, and R. Mallipeddi: An Efficient Differential Grouping Algorithm for Large-Scale Global Optimization. IEEE Transactions on Evolutionary Computation, Accepted for publication. (ISSN: 1089-778X).
  • A. Kumar, B. K. Sethi, A. Kumar, D. Singh, and R. K. Misra: Three-Level Hierarchical Management of Active Distribution System With Multimicrogrid. IEEE Systems Journal, Accepted for publication. (ISSN: 1932-8184).
  • A. Kumar, S. Das, and V. Snášel: Improved Spherical Search with Local Distribution induced Self-Adaptation for Hard Non-convex Optimization with and without Constraints. Information Sciences, Accepted for Publication. (ISSN: 1872-6291).

  • A. Ghanwat, A. Nath, K. Saha: Relative LF embeddings of 4-Manifolds, Proc Math Sci 132, 52 (2022).
    Url: https://doi.org/10.1007/s12044-022-00686-3

  • A. Das, S. K. Mishra: Bimodules over Relative Rota-Baxter Algebras and Cohomologies,Algebras and Representation Theory
    Url: https://doi.org/10.1007/s10468-022-10161-2
  • P. Sadhukhan, A.Pakrashi, B. Mac Namee: Random Walk-steered Majority Undersampling, IEEE SMC 2022
  • K. Saha, A. Nath: Open books and embeddings of smooth and contact manifolds, Advances in Geometry 2022

  • A. Das, S. K. Mishra: The L∞-deformations of associative Rota–Baxter algebras and homotopy Rota–Baxter operators, Journal of Mathematical Physics 2022

  • J. Ray, R. Sujatha: SELMER GROUPS OF ELLIPTIC CURVES OVER THE PGL(2) EXTENSION, Nagoya Mathematical Journal 2022

  • R. TAGUELMIMT, S. Aknine, D. BOUKREDERA, and N. Changder: PICS: Parallel Index-based Search Algorithm for Coalition Structure Generation. IEEE 34th International Conference on Tools with Artificial Intelligence (ICTAI). DOI: https://doi.org/10.1109/ICTAI56018.2022.00114

  • R. TAGUELMIMT, S. Aknine, D. BOUKREDERA, and N. Changder: Subspace-Focused Search Method for Optimal Coalition Structure Generation. IEEE 34th International Conference on Tools with Arti€cial Intelligence (ICTAI). DOI: https://doi.ieeecomputersociety.org/10.1109/ ICTAI56018.2022.00217

  • A. Dutta, M. Nandi, A. Saha: Proof of Mirror Theory for \xi_max=2, IEEE Transactions of Information Theory 2022.

  • P. Sadhukhan: Exploring the Pertinence of Distance Functions for Nominal Multi-label Data, AIAI 2022. URL: https://doi.org/10.1007/978-3-031-08337-2_18

  • A. Bhattacharjee, A. Dutta, E. List, M. Nandi: CENCPP* – Beyond-birthday-secure Encryption from Public Permutations, Design Codes and Cryptography 2022.

  • Y. L. Chen, A. Dutta, M. Nandi: Multi-User BBB Security of Public Permutation Based MAC, Cryptography and Communications 2022.

  • S. Chattopadhyay: Improving Performance of High Throughput Wireless Access Networks – An Experience in Learning, 23rd International Conference on Distributed Computing and Networking, January 2022 Pages 229–231, https://doi.org/10.1145/3491003.3493331

  • A. Mondal, A. Mukhopadhyay, S. Chattopadhyay: Machine learning-driven automatic storage space recommendation for object-based cloud storage system. Complex Intelligent. System. 8, 489–505 (2022). https://doi.org/10.1007/s40747-021-00517-4

  • A. Banerjee, S. De, K. Majumder, D. Dash and S. Chattopadhyay. Construction of energy minimized WSN using GA-SAMP-MWPSO and K-mean clustering algorithm with LDCF deployment strategy. J Supercomput (2022). https://doi.org/10.1007/s11227-021-04265-7


Publications in 2021


  • N. Datta, A. Dutta, K. Dutta: Improved Security Bound of (E/D)WCDM, IACR Transactions on Symmetric Cryptology 2021 (4): 138 – 176. [Link]

  • S. S. Chaudhury: On Quantum Evolving Secret Sharing Schemes – Further Studies and Improvements, Quantum Information and Computation (2021).

  • T. SAPV, D. Bera, A. Maitra, S. Maitra: Quantum Algorithms for Cryptographically Significant Boolean Functions, Springer Briefs in Computer Science, Springer, 2021, ISSN 2191-5768, ISBN 978-981-16-3060-6. [Link]

  • A. Dutta, M. Nandi, S. Talnikar: Permutation Based EDM: An Inverse Free BBB Secure PRF. IACR Trans. Symmetric Cryptol. 2021(2): 31-70 (2021).

  • A. Chakraborty, J. B. Etnyre, H. Min: Cabling Legendrian and transverse knots. Journal of Differential Geometry (to appear).

  • A. Ghanwat, K. Saha: On Embedding of 4-manifolds. Indian Journal of Pure and Applied Math (2021). [Link]

  • A. Chakraborti, N. Datta, A.Jha, C.M. Lopez, M. Nandi: tHyENA: Making HyENA Even Smaller. INDOCRYPT 2021: 26 – 48. [Link]

  • R. Anand, A. Maitra, S. Maitra, C. S. Mukherjee, S. Mukhopadhyay: Quantum Resource Estimation for FSR based Symmetric Ciphers & Related Grovers Attacks. INDOCRYPT 2021: 179 – 198. [Link]

  • A. Chakraborti, N. Datta, A.Jha, C.M. Lopez, M. Nandi, Y. Sasaki: Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher. INDOCRYPT 2021: 114 – 137. [Link]

  • P. Sadhukhan, S. Palit: Oversampling the minority class using a dedicated fitness function and genetic algorithmic progression. Concurrency Computat Pract Exper. 2021; e6648. [Link]

  • A. Pakrashi, P. Sadhukhan, B. Mac NameeML-NCA: Multi-label Neighbourhood Component Analysis. LIDTA@PKDD/ECML 2021


Publications in 2020


  • A. Dutta: Minimizing the Two-Round Tweakable Even-Mansour Cipher. ASIACRYPT (1) 2020: 601-629
  • R. Anand, A. Maitra, S. Mukhopadhyay: Grover on SIMON, Quantum Information Processing, Vol-19, number-340, (2020), (SCIE, Impact Factor 2.283). https://link.springer.com/article/10.1007/s11128-020-02844-w.

  • A. Dutta, M. Nandi: BBB Secure Nonce Based MAC Using Public Permutations. AFRICACRYPT 2020, pp 172-191 (2020).

  • R. Anand, A. Maitra, S. Mukhopadhyay: Evaluation of Quantum Cryptanalysis on SPECK, Progress in Cryptology INDOCRYPT 2020, pp 395-413. Lecture Notes in Computer Science 12578, Springer.

  • J. Dave, A. Dutta, P. Faruki, V. Laxmi, M. S. Gaur: Secure Proof of Ownership Using Merkle Tree for Deduplicated Storage. Autom. Control. Comput. Sci. 54(4): 358-370 (2020).


Covid Update Summary


K. Sengupta, P. K. Das: COVID-19_R_Zero_Estimation_India (Last Updated on 29 March 2022)