Security analysis of SKINNY under related-tweakey settings G Liu, M Ghosh, L Song Cryptology ePrint Archive, 2016 | 84 | 2016 |
FbHash: A new similarity hashing scheme for digital forensics D Chang, M Ghosh, SK Sanadhya, M Singh, DR White Digital Investigation 29, S113-S123, 2019 | 32 | 2019 |
BIOFUSE: A framework for multi-biometric fusion on biocryptosystem level D Chang, S Garg, M Ghosh, M Hasan Information Sciences 546, 481-511, 2021 | 30 | 2021 |
Bicliques with minimal data and time complexity for AES A Bogdanov, D Chang, M Ghosh, SK Sanadhya Information Security and Cryptology-ICISC 2014: 17th International …, 2015 | 28 | 2015 |
The paper slip should be there! Perceptions of transaction receipts in branchless banking S Panjwani, M Ghosh, P Kumaraguru, SV Singh Proceedings of the 15th international conference on Human-computer …, 2013 | 23 | 2013 |
SPF: A New Family of Efficient Format-Preserving Encryption Algorithms D Chang, M Ghosh, KC Gupta, A Jati, A Kumar, D Moon, IG Ray, ... Information Security and Cryptology: 12th International Conference, Inscrypt …, 2017 | 11 | 2017 |
Improved Meet-in-the-Middle Attacks on 7 and 8-Round ARIA-192 and ARIA-256 Akshima, D Chang, M Ghosh, A Goel, SK Sanadhya International Conference on Cryptology in India, 198-217, 2015 | 10 | 2015 |
A novel two-level secure access control approach for blockchain platform in healthcare S Mittal, M Ghosh International Journal of Information Security 22 (4), 799-817, 2023 | 9 | 2023 |
Analyzing the uncharted territory of monetizing scam Videos on YouTube A Tripathi, M Ghosh, K Bharti Social Network Analysis and Mining 12 (1), 119, 2022 | 8 | 2022 |
A study on characterizing the ecosystem of monetizing video spams on youtube platform A Tripathi, KK Bharti, M Ghosh Proceedings of the 21st International Conference on Information Integration …, 2019 | 8 | 2019 |
Single key recovery attacks on 9-round Kalyna-128/256 and Kalyna-256/512 Akshima, D Chang, M Ghosh, A Goel, SK Sanadhya Information Security and Cryptology-ICISC 2015: 18th International …, 2016 | 8 | 2016 |
Leveraging LSTM and GAN for Modern Malware Detection I Gupta, S Kumari, P Jha, M Ghosh arXiv preprint arXiv:2405.04373, 2024 | 6 | 2024 |
A three-phase framework for secure storage and sharing of healthcare data based on blockchain, IPFS, proxy re-encryption and group communication S Mittal, M Ghosh The Journal of Supercomputing 80 (6), 7955-7992, 2024 | 6 | 2024 |
A fusion of binary grey wolf optimization algorithm with opposition and weighted positioning for feature selection A Tripathi, KK Bharti, M Ghosh International Journal of Information Technology 15 (8), 4469-4479, 2023 | 6 | 2023 |
A Lightweight Blockchain Framework for secure transaction in resource constrained IoT devices R Raj, M Ghosh 2023 5th International Conference on Recent Advances in Information …, 2023 | 5 | 2023 |
eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices D Chang, M Ghosh, A Jati, A Kumar, SK Sanadhya Security, Privacy, and Applied Cryptography Engineering: 7th International …, 2017 | 5 | 2017 |
Bicliques with Minimal Data and Time Complexity for AES (extended version) A Bogdanov, D Chang, M Ghosh, SK Sanadhya Cryptology ePrint Archive, 2014 | 5 | 2014 |
Archaeozoological remains from West-Bengal, India M Ghosh, KD Saha, V Saha, S Ray, B Talukdar Kolkata: State fauna series 3, 349-381, 1992 | 5 | 1992 |
FbHash-E: A time and memory efficient version of FbHash similarity hashing algorithm M Singh, A Khunteta, M Ghosh, D Chang, SK Sanadhya Forensic Science International: Digital Investigation 41, 301375, 2022 | 4 | 2022 |
Cryptanalysis of Kalyna block cipher using impossible differential technique S Kumar Gupta, M Ghosh, SK Mohanty Proceedings of the Sixth International Conference on Mathematics and …, 2020 | 4 | 2020 |