ଜାତୀୟ ବିଜ୍ଞାନ ଶିକ୍ଷା ଏବଂ ଗବେଷଣା ପ୍ରତିଷ୍ଠାନ
ପରମାଣୁ ଶକ୍ତି ବିଭାଗ, ଭାରତ ସରକାରଙ୍କ ଏକ ସ୍ବୟଂଶାସିତ ପ୍ରତିଷ୍ଠାନ

राष्ट्रीय विज्ञान शिक्षा एवं अनुसंधान संस्थान
परमाणु ऊर्जा विभाग, भारत सरकार का एक स्वयंशासित संस्थान

National Institute of Science Education and Research
AN AUTONOMOUS INSTITUTE UNDER DAE, GOVT. OF INDIA

 

Deepak Kumar Dalai

Associate Professor
 
 

deepakniser.ac.in
+91-674-2494088

  • Mathematical Sciences
  • IRINS Profile
  • Since: 08-Apr-2009
  • Office: -

PhD | Computer Science (Cryptology) from Indian Statistical Institute, 2006.

M.Tech | Computer Science from Indian Statistical Institute, 2003.

MSc | Mathematics from Utkal University, Bhubaneswar, India, 2001.

BSc | Mathematics (Honors) from Utkal University, Bhubaneswar, India, 1999.

Theoretical Computer Sciences, Coding Theory, Cryptology, Discrete Mathematics.

  1. Deepak Kumar Dalai, Pinaki Sarkar. Bidirectional hash chains generically enhances resilience of key predistribution schemes. IET Wireless Sensor Systems, 10 (4):154-165, 2020.
  2. Deepak Kumar Dalai, Subhamoy Maitra, Santu Pal, Dibyendu Roy. Distinguisher and non-randomness of Grain-v1 for 112, 114 and 116 initialisation rounds with multiple-bit difference in IVs. IET Information Security 13 (6):603-613, 2019.
  3. Deepak Kumar Dalai. A Basic Theory of Lightweight Hierarchical Key Predistribution Scheme. In CyberICPS 2019, SECPRE 2019, SPOSE 2019, ADIoT 2019: Computer Security, number 11980 in LNCS, pages 325-340, Springer-verlag 2019.
  4. Deepak Kumar Dalai, Santu Pal. Wip: Degree Evaluation of Grain-v1. In International Conference on Information Systems Security, ICISS 2019, number 11952 in LNCS, pages 239-251, Springer-verlag 2019.
  5. Deepak Kumar Dalai, Santu Pal. Recovering Internal States of Grain-v1. In International Conference on Information Security Practice and Experience, ISPEC 2019, number 11879 in LNCS, pages 325-337, Springer-verlag 2019.
  6. Deepak Kumar Dalai, Dibyendu Roy. An Observation of Non-randomness in the Grain Family of Stream Ciphers with Reduced Initialization Round. In International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2018, number 11348 in LNCS, pages 1-20, Springer-verlag 2018.
  7. Deepak Kumar Dalai, Dibyendu Roy. A State Recovery Attack on ACORN-v1 and ACORN-v2. In 11th International Conference on Network and System Security, NSS 2017, number 10394 in LNCS, pages 332-345, Springer-verlag 2017.
  8. Deepak Kumar Dalai, Pinaki Sarkar. Enhancing Resilience of KPS Using Bidirectional Hash Chains and Application on Sensornet. In 11th International Conference on Network and System Security, NSS 2017, number 10394 in LNCS, pages 683-693, Springer-verlag 2017.
  9. Deepak Kumar Dalai, Pinaki Sarkar. Hash Chains Sensornet: A Key Predistribution Scheme for Distributed Sensor Networks Using Nets and Hash Chains. Sensors & Transducers 212 (5):39-49.
  10. Deepak Kumar Dalai, Pinaki Sarkar. Key Predistribution Schemes Using Bent Functions in Distributed Sensor Networks. In International Conference on Information Security and Cryptology, Inscrypt 2016, number 10143 in LNCS, pages 367-385, Springer-verlag 2017.
  11. Deepak Kumar Dalai. On the Lower Block Triangular Nature of the Incidence Matrices to Compute the Algebraic Immunity of Boolean Functions. In Conference in Algebraic Informatics, CAI 2015, number 9270 in LNCS, pages 79-89, Springer-verlag 2015.
  12. Deepak Kumar Dalai, Subhamoy Maitra and Sumanta SarkarResults on Rotation Symmetric Bent Functions. Discrete Mathematics, 309(8):2398-2409, April 2009.
  13. Deepak Kumar Dalai and Subhamoy MaitraAlgebraic Immunity of Boolean Functions: Analysis and Constructions. Special Issue on Applied Cryptography and Data Security, Journal of Computacion y Sistemas, 12(3):297-321, 2009.
  14. Deepak Kumar Dalai. On 3-to-1 and Power APN S-boxes. In Sequences and Their Applications, SETA 2008, number 5203 in LNCS, pages 377–389, Springer-verlag 2008.
  15. Deepak Kumar Dalai, Subhamoy Maitra and Sumanta SarkarBasic Theory in Construction of Boolean Functions with Maximum Possible Annihilator Immunity. Design, Codes and Cryptography, 40(1):41–58, July 2006.
  16. Deepak Kumar Dalai and Subhamoy MaitraReducing the Number of Homogeneous Linear Equations in Finding Annihilators. In Sequences and Their Applications, SETA 2006, number 4086 in LNCS, pages 376–390, Springer-verlag 2006.
  17. Claude Carlet, Deepak Kumar Dalai, Kishan Chand Gupta and Subhamoy MaitraAlgebraic Immunity for Cryptographically Significant Boolean Functions: Analysis and Construction. IEEE Transactions on Information Theory, IT-52(7):3105–3121, 2006.
  18. Deepak Kumar Dalai, Kishan Chand Gupta and Subhamoy Maitra. Algebraic Immunity for Cryptographically Significant Boolean Functions: Construction and Analysis in terms of Algebraic Immunity. In Fast Software EncryptionsFSE 2005, number 3557 in LNCS, pages 98–111. Springer-Verlag 2005.
  19. Deepak Kumar Dalai, Kishan Chand Gupta and Subhamoy MaitraResults on Algebraic Immunity for Cryptographically Significant Boolean Functions. In Progress in Cryptology - Indocrypt 2004, number 3348 in LNCS, pages 92–106. Springer -Verlag, 2004.

Symmetric ciphers, Algebraic Attack, Boolean Functions, Combinatorics.