Follow
Mohona Ghosh
Mohona Ghosh
Assistant Professor, Indira Gandhi Delhi Technical University for Women
Verified email at igdtuw.ac.in
Title
Cited by
Cited by
Year
Security analysis of SKINNY under related-tweakey settings
G Liu, M Ghosh, L Song
Cryptology ePrint Archive, 2016
782016
FbHash: A new similarity hashing scheme for digital forensics
D Chang, M Ghosh, SK Sanadhya, M Singh, DR White
Digital Investigation 29, S113-S123, 2019
322019
Bicliques with minimal data and time complexity for AES
A Bogdanov, D Chang, M Ghosh, SK Sanadhya
Information Security and Cryptology-ICISC 2014: 17th International …, 2015
292015
BIOFUSE: A framework for multi-biometric fusion on biocryptosystem level
D Chang, S Garg, M Ghosh, M Hasan
Information Sciences 546, 481-511, 2021
282021
The paper slip should be there! Perceptions of transaction receipts in branchless banking
S Panjwani, M Ghosh, P Kumaraguru, SV Singh
Proceedings of the 15th international conference on Human-computer …, 2013
222013
SPF: A New Family of Efficient Format-Preserving Encryption Algorithms
D Chang, M Ghosh, KC Gupta, A Jati, A Kumar, D Moon, IG Ray, ...
Information Security and Cryptology: 12th International Conference, Inscrypt …, 2017
102017
Improved Meet-in-the-Middle Attacks on 7 and 8-Round ARIA-192 and ARIA-256
Akshima, D Chang, M Ghosh, A Goel, SK Sanadhya
International Conference on Cryptology in India, 198-217, 2015
102015
Single key recovery attacks on 9-round Kalyna-128/256 and Kalyna-256/512
Akshima, D Chang, M Ghosh, A Goel, SK Sanadhya
Information Security and Cryptology-ICISC 2015: 18th International …, 2016
82016
A study on characterizing the ecosystem of monetizing video spams on youtube platform
A Tripathi, KK Bharti, M Ghosh
Proceedings of the 21st International Conference on Information Integration …, 2019
72019
Analyzing the uncharted territory of monetizing scam Videos on YouTube
A Tripathi, M Ghosh, K Bharti
Social Network Analysis and Mining 12 (1), 119, 2022
62022
Bicliques with Minimal Data and Time Complexity for AES (extended version)
A Bogdanov, D Chang, M Ghosh, SK Sanadhya
Cryptology ePrint Archive, 2014
52014
A fusion of binary grey wolf optimization algorithm with opposition and weighted positioning for feature selection
A Tripathi, KK Bharti, M Ghosh
International Journal of Information Technology 15 (8), 4469-4479, 2023
42023
A novel two-level secure access control approach for blockchain platform in healthcare
S Mittal, M Ghosh
International Journal of Information Security 22 (4), 799-817, 2023
42023
eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices
D Chang, M Ghosh, A Jati, A Kumar, SK Sanadhya
Security, Privacy, and Applied Cryptography Engineering: 7th International …, 2017
42017
Biclique Cryptanalysis of full round AES-128 based hashing modes
D Chang, M Ghosh, SK Sanadhya
Information Security and Cryptology: 11th International Conference, Inscrypt …, 2016
42016
FbHash-E: A time and memory efficient version of FbHash similarity hashing algorithm
M Singh, A Khunteta, M Ghosh, D Chang, SK Sanadhya
Forensic Science International: Digital Investigation 41, 301375, 2022
32022
Collision attack on 4-branch, type-2 GFN based hash functions using sliced biclique cryptanalysis technique
M Agrawal, D Chang, M Ghosh, SK Sanadhya
International Conference on Information Security and Cryptology, 343-360, 2014
32014
A three-phase framework for secure storage and sharing of healthcare data based on blockchain, IPFS, proxy re-encryption and group communication
S Mittal, M Ghosh
The Journal of Supercomputing 80 (6), 7955-7992, 2024
22024
Efficient and effective static android malware detection using machine learning
V Bansal, M Ghosh, N Baliyan
International conference on information systems security, 103-118, 2022
22022
Dynamic Android Malware Detection Using Light Gradient Boosting Machine
V Bansal, N Baliyan, M Ghosh
2022 4th International Conference on Artificial Intelligence and Speech …, 2022
22022
The system can't perform the operation now. Try again later.
Articles 1–20