
Name

Dr. Avishek Adhikari

Position

Assistant Professor, Deptartment of Pure Mathematics, Calcutta University.

Photograph, office at Linkoping University, Sweden, 2007.


ISCA Young Scientist Awardee, 200708 (Mathematical Science Section, Including Statistics). The award was presented by
Dr M.S. Swaminathan, The Father of Green Revolution in India.


Highest Degree

Ph.D on Cryptography from Indian Statistical Institute under the supervison of Prof. Bimal Roy.

Email

avishek.adh@gmail.com

Research Interest

Combinatorial Cryptography, secret Sharing, PublicKey Cryptography, Abstract Algebra, DNA Cryptography, Sensor Network, Algebraic Graph Theory.

Associated with

Institute for Mathematics, Bioinfinormatics, Informationtechnology and Computerscience (IMBIC),
Secretary (Honorary).
Cryptology Research Society of India, (CRSI),
Treasurer (Honorary).
Calcutta Mathematical Society, (CMS),
Life Member
International Committee Member (Honorary),
International Electronic Engineering Mathematical Society (IEEMS), Egypt.

Academic Achievements

Editorial Board:
Managing Editor:
Journal of the Department of Pure Mathematics, Calcutta University.
Recipient of the NANUM 2014 Travel Grants to participate Seoul ICM 2014, Korea, 2014.
ISCA Young Scientist Awardee
in Mathematical Science Section (including Statistics) for the year 200708.
Visiting Scientist, Linkoping University, Sweden, April 2006 June 06.
Visiting Scientist, Indian Statistical
Institute, India, Dec 2005 March 06.
Post Doctoral Fellowship, INRIARocquencourt, Projet
Codes, France, 200405.
The President of India Medal for General Proficiency, 2002.
Junior Research Fellowship, Indian Statistical
Institute, 2001.
CSIRNET Junior Research Fellowship (Government of
India), 2001.
Ranked 1st in M.Sc., Calcutta University, 2001.
Ranked 2nd in B.Sc., Calcutta University, 1999.
National Scholar, Government of India, 199699.
National Scholar, Government of India, 199496.
National Scholar, Government of India, 1994.

Publicaion of Books

(jointly with M R Adhikari), Basic Modern Algebra with Applications, published by Springer. For more details, please visit the website
"http://www.springer.com/mathematics/algebra/book/9788132215981",
Edited Book: (jointly with M R Adhikari and Y P Chaubey), Contemporary Topics in Mathematics and Statistics with Applications, Asian Books Private Limited, 2012.
(jointly with M R Adhikari), Groups, Rings
and Modules with Applications, Universities Press, 2003.
(jointly with M R Adhikari), Text Book of
Linear Algebra : An Introduction to Modern Algebra, Allied Publishers,
2004.
(jointly with M R Adhikari), Introduction to Linear Algebra with Application to Basic Cryptography,
Asian Books Private Limited, 2007.

Editorial Work

Managing Editor:
Journal of the Department of Pure Mathematics, Calcutta University.
Volume Editor:
Proceedings of IMBIC, Volume 4, ISBN 9788192583235.
Proceedings of IMBIC, Volume 3, ISBN 9788192583228.
Proceedings of IMBIC, Volume 2, ISBN: 9788192583211.
Proceedings of IMBIC, Volume 1, ISBN: 9788192583204.
Proceedings of 5th International Conference of IMBIC, MSAST 2011.
Proceedings of 4th International Conference of IMBIC, MSAST 2010.
Proceedings of 3rd International Conference of IMBIC, MSAST 2009.
Proceedings of 2nd International Conference of IMBIC, MSAST 2008.
Proceedings of 1st International Conference of IMBIC, MSAST 2007.

Important Publications

(With Ushnish Sarkar), A new graph parameter and a construction of larger graph without increasing radio $k$chromatic number, to appear in Journal of Combinatorial Optimization, Springer Journal, 2016.
(with Rita SahaRay), Structural form of a minimal critical set for a latin square representing the elementary abelian 2group of order 8, Ars Combinatoria, 120, 181191, 2015.
(with Sabyasachi Dutta and Raghvendra Singh Rohit), Constructions and Analysis of Some Efficient $t$$(k,n)^*$Visual Cryptographic Schemes Using Linear Algebraic Techniques, Design, Codes and Cryptography, Springer Journal, 2015, DOI 10.1007/s1062301500755.
(With Ushnish Sarkar), On characterizing radio kcoloring problem by path covering problem, Discrete Mathematics, Elsevier Journal, 338 (2015), pp. 615620, DOI information: 10.1016/j.disc.2014.11.014.
(with Angusman Das and Kouichi Sakurai), Plaintext Checkable Encryption with Designated Checker, Journal of Advances in Mathematics of Communications, Volume 9, No. 1, 2015, 3753, doi:10.3934/amc.2015.9.37.
(with Angsuman Das), Plaintext Checkable Signcryption, ICISS 2015, Volume 9478, Lecture Notes in Computer Sciences, pp 324333, Springer.
(single author), Linear algebraic techniques to construct monochrome visual cryptographic schemes for general access structure and its applications to color images,
Design, Codes and Cryptography, Springer Journal, December 2014, Volume 73, Issue 3, pp 865895, DOI 10.1007/s1062301398325.
(with Prakash Dey, Abhishek Chakraborty and Debdeep Mukhopadhyay), Improved Practical Differential Fault Analysis of Grain128, Proceedings of DATE 2015 to be availableat IEEE Xplore Digital Library or ACM Digital Library. This year DATE 2015
received 1129 submissions, of which 915 went into the review process (214 were automatically rejected before review for various reasons). Out of the 915 reviewed submissions, 205 papers (= 22.4%) were selected for either
"long" or "short" presentation at the conference. Our paper is accepted for "long" presentation at the conference.
(with Partha Sarathi Roy), OneSided LeakageResilient Privacy Only TwoMessage Oblivious Transfer, Journal of Journal of Information Security and Applications, Elsevier Journal, Volume 19, Issues 45, November 2014, Pages 295300.
(with Prakash Dey), Improved MultiBit Differential Fault Analysis of Trivium, Progress in Cryptology, INDOCRYPT 2014,
Lecture Notes in Computer Science, 2014, pp 3752 Springer.
(with Partha Sarathi Roy, Rui Xu, Kirill Morozov and Kouichi Sakurai), An Efficient Robust Secret Sharing Scheme with Optimal Cheater Resiliency,(Space 2014), Lecture Notes in Computer Sciences, Springer, Volume 8804, 2014, pp 4758.
(with Sabyasachi Dutta), XOR Based Nonmonotone $t$$(k,n)^*$Visual Cryptographic Schemes Using Linear Algebra,(ICICS 2014), Lecture Notes in Computer Sciences, Springer, Volume 8958, pp 230242.
(with Angsuman Das and Partha Sarathi Roy), Computationally Secure Robust MultiSecret Sharing for General Access Structure,(ICMC 2015), Mathematics and Computing, Volume 139 of the series Springer Proceedings in Mathematics & Statistics, pp 123134, 2015.
(with Partha Sarathi Roy and Angsuman Das), Computationally Secure Cheating Identifiable MultiSecret Sharing for General Access Structure,(ICDCIT2015), to appear in in Lecture Notes in Computer Sciences, Springer.
(with Mrinal Nandi and Subrata Parui), Bounds on the Size of the Minimum Dominating Sets of Some Cylindrical Grid Graphs, International Journal of Combinatorics, Volume 2014, Article ID 348359, 13 pages, http://dx.doi.org/10.1155/2014/348359.
(with Angsuman Das), A note on “On ciphertext undetectability",
Tatra Mountains Mathematical Publications. Vol. 57, no. 4 (2013), p. 119121.
(with Angsuman Das), Signcryption with Delayed Identification,
Proceedings of the International Conference on Mathematics and Computing  2013, Springer Mathematics and Statistics Series, Volume 91, 2014, pp 2339.
(with Angsuman Das), Signcryption from Randomness Recoverable PKE Revisited,
to appear in the Proceedings of the 9th International Conference on Information Systems Security (ICISS 13), to be published in volume of the Lecture Notes in Computer Science series, Springer.
(with Angsuman Das and Sabyasachi Dutta), Indistinguishability against Chosen Ciphertext Verification Attack Revisited: The Complete Picture,
The Complete Picture, to appear in the Proceedings of the Seventh International Conference on Provable Security (ProvSec 2013), Melaka, Malaysia on 2325 October 2013, to be published in volume 8209 of the Lecture Notes in Computer Science series, Springer.
(with Dong Hao, Xiaojuan Liao, Kouichi Sakurai and Makoto Yokoo),
A repeated game approach for analyzing the collusion on selective forwarding in multihop wireless networks,
Computer Communications, Elsevier Journal, Volume 35, Issue 17, 1 October 2012, Pages 21252137.
(with Angsuman Das),
An efficient INDCCA2 secure Paillierbased cryptosystem,
Information Processing Letters, Elsevier Journal, Volume 112, Issue 22, 30 November 2012, Pages 885888, http://dx.doi.org/10.1016/j.ipl.2012.08.007
(with Liang Zhao, Di Xiao and Kouichi Sakurai),
On the security analysis of an image scrambling encryption of pixel bit and its improved scheme based on selfcorrelation encryption
, Communications in Nonlinear Science and Numerical Simulation, Elsevier Journal, http://dx.doi.org/10.1016/j.cnsns.2011.12.015.
Volume 17, Issue 8, August 2012, Pages 33033327.
(with Liang Zhao, Takashi Nishide, KyungHyune Rhee and Kouichi Sakurai),
Cryptanalysis of Randomized Arithmetic Codes Based on Markov Model
, Proceeding of The 7th International Conference, INSCRYPT 2011, published by Springer LNCS, November 30December 3, 2011, Beijing, China.
(with Dong Hao and Kouichi Sakurai), MixedStrategy Game Based
Trust Management for Clustered Wireless Sensor Networks
, Proceeding of The Third International Conference on Trusted Systems, INTRUST 2011, November 2729, 2011, Beijing, China, published by Springer LNCS, page 239257.
(with Mrinal Nandi and Subrata Parui), Domination Number of Cylindrical Grids
Applied Mathematics and Computation, Elsevier,
Volume 217, Issue 10, 15 January 2011, Pages 48794889.
(with Partha Sarathi Roy), MultiUse MultiSecret Sharing Scheme for General Access
Structure, Annals of the University of Craiova, Mathematics and Computer Science Series
Volume 37(4), 2010, Pages 50�57,
ISSN: 12236934
(with Liang Zhao, Di Xiao and Kouichi Sakurai), Security Improvement of a Pixel Bit
Based Image Scrambling Encryption Scheme Through the Selfcorrelation Method. (INSCRYPT 2010 (short paper), Shanghai, China, October 20 to 23, 2010)
(with Liang Zhao and Kouichi Sakurai), A New Scrambling Evaluation Scheme based on Spatial Distribution Entropy and Centroid Difference of Bitplane. (IWDW 2010, 1~3 Octorber 2010, Korea University, Seoul, Republic of Korea), Digital Watermarking, Lecture Notes in Computer Science, 2011, Volume 6526/2011, 2944, DOI: 10.1007/9783642184055_4.
(with Liang Zhao, Di Xiao, and Kouichi Sakurai), Cryptanalysis on an Image Scrambling Encryption Scheme Based on Pixel Bit. (IWDW 2010, 1~3 Octorber 2010, Korea University, Seoul, Republic of Korea), Digital Watermarking, Lecture Notes in Computer Science, 2011, Volume 6526/2011, 4559, DOI: 10.1007/9783642184055_5.
(with Angsuman Das), An efficient multiuse multisecret sharing scheme based on hash function,
Applied Mathematics Letters, Elsevier, Volume 23, Issue 9, September 2010, Pages 993996.
(with Chitradeep Dutta Roy, Neel Choudhury, Amrik Chatterjee (during their summer training in 2009)), Verifiable Secret Sharing Scheme on Images using Watermarking
, International Journal of Computer Science and Network Security, VOL.10 No.2, page 7681, February 2010.
(with Bimal Roy), On some constructions of monochrome visual cryptographic schemes
, Page(s): 16,
Digital Object Identifier 10.1109/INFTECH.2008.4621609, appeared in the IEEE Conference Proceedings,
1st International Conference on Information Technology, Faculty of Electronics, Telecommunications and Informatics
Gdansk University of Technology, Poland, May 1821, 2008.
(with M Bose and Bimal Roy),
Applications of Partially Balanced and Balanced IncompleteBlock Designs in developing Visual Cryptographic Schemes,
IEICE TRANS. FUNDAMENTALS, Japan, Vol. E90A, No. 5, pp. 949951, May 2007.
Avishek Adhikari, An overview of black and white Visual Cryptography using mathematics, J. Calcutta Math.
Soc. 2 (2006), no. 2, 2152.
DNA Secret Sharing,
IEEE World Congress on Computational Intelligence, Vancouver, Canada, July 1621, 2006.
(with M R Adhikar and Shibopriya Mitra), A generalization of Milnors result, J. Calcutta
Math. Soc. 2 (2006), no. 1, 5558.
(with Erik Trell),
Application of BIBD in DNA Secret Sharing,
ISRAMA Dec 1719, 2005.
(with M Bose), Construction of a Monocrome Visual Cryptography Using Latin Squares,
Twelfth Annual International Conference on Statistics, Mathematics and Applications, Auburn University,
December 24, 2005.
(with R SahaRay and Jennifer Seberry), Critical Sets for a Pair
of Mutually Orthogonal Cyclic Latin Squares of Odd Order Greater than 9,
The Journal of Combinatorial Mathematics and Combinatorial Computing, Vol. 55, 171185, 2005.
(with R SahaRay and Jennifer Seberry), Critical Sets in
Orthogonal Arrays with 7 and 9 Levels, The Australasian Journal of Combinatorics, Volume 33, 109123, 2005.
(with M Bose), A New Visual cryptographic Scheme Using Latin
Squares, IEICE TRANS. FUNDAMENTALS, VOL E87A, NO.5, MAY 2004.
(with Tridib Kumar Dutta and Bimal Roy), A New Black and White
Visual Cryptographic Scheme for General Access Structures, Lecture Notes In Computer Science, Vol 3348, SpringerVerlag, 399413, 2004.
(with Somnath Sikdar), A New (2,n)Color Visual Threshold Scheme
for Color Images, Lecture Notes In Computer Science, Vol 2904,
SpringerVerlag, 148161, 2003.
(with P K Rana), A Study of Functors Associated With Topological
Groups, Studia Universitatis BabesBolyai Mathematica, Vol XLVI (4),
314, 2001.

Foreign Academic Visits

(in 2014) Visited International Congress of Mathematicians (ICM 2014), Seoul, Korea August 1318, 2014 as a recipient of NANUM Travel Grant from ICM . The Title of the presentation:
Some efficient constructions of visual cryptographic schemes using linear algebraic techniques: some future research problems.
(in 2014) Visited University of Putra Malaysia (UPM), Malaysia May 2730, 2014, and presented the following talk at the International Conference and Workshop on Mathematical Analysis 2014 (ICWOMA2014), 2730, May 2014.
The Title of the talk:
COLOR VISUAL CRYPTOGRAPHIC SCHEMES USING STATISTICAL DESIGNS.
(in 2013) Visited Graduate School of Mathematical Sciences, University of Tokyo, Japan November 36, 2013 as an invited speaker of the JSPSDST Asian Academic Seminar 2013 on Discrete Mathematics & its Applications, Sunday November 3  Sunday November 10, 2013.
The Title of the three invited talk:
Design Theory and Visual Cryptographic Schemes.
(in 2013) Visited University of Kyushu, Japan August 2630, 2013 as an invited speaker of the International Conference entitled "Algebraic constructions as a fundamental keystone of a safe and secure society: Mathematics for guaranteeing the reliability of the cybersociety" organized by the Institute of Mathematics for Industry (IMI), Kyushu University during August 2630, 2013.
The Title of the three invited talks are:
1. Connections Among Algebra, Statistical Designs and Secret Sharing Schemes (on August 27, 2013).
2. Applications of Algebraic Structure in Visual Cryptography (on August 28, 2013).
3. Plaintext Checkable Encryption with Designated Checker (on August 29, 2013).
(in 2012) Visited University of Kyushu, Japan during May 19 to June 6, 2012 as one of the researcher in the Indian Research Team of the Joint Research Project
entitled
"Analysis of Cryptographic Algorithms and Evaluation on Enhancing Network Security Based on Mathematical Science".
(in 2012)
Invited and visited to the the Meijo University, Nagoya,
Japan during June 34, 2012 and delivered a lecture on Micro Array Based DNA Secret Sharing.
(in 2011) Visited University of Kyushu, Japan during August 5 to August 20, 2011 as one of the researcher in the Indian Research Team of the Joint Research Project
entitled
"Analysis of Cryptographic Algorithms and Evaluation on Enhancing Network Security Based on Mathematical Science".
(in 2010)
Invited and visited to the Tokyo Institute of
Technology, Japan on July 5, 2010 and delivered a lecture on
Interdisciplinary Secret Sharing Schemes.
(in 2010)
Invited and visited to the Institute of Industrial
Science, the University of Tokyo, Japan on July 7, 2010 and delivered
a lecture on On DNA Secret Sharing.
(in 2010) Visited University of Kyushu, Japan during June 20 to July 10, 2010 as one of the researcher in the Indian Research Team of the Joint Research Project
entitled
"Analysis of Cryptographic Algorithms and Evaluation on Enhancing Network Security Based on Mathematical Science".
(in 2010)
Invited and visited to the the Meijo University, Nagoya,
Japan on June 9, 2010 and delivered a lecture on Application of
Mathematics, Statistics and DNA computing in Secret Sharing Schemes.
(in 2010)
Invited and visited to the the
KDDI R&D Laboratories and had there fruitful discussions with Dr T
Tanaka, Senior Manager, Information Security Laboratory, KDDI,
(in 2009) Visited University of Kyushu, Japan during May 24 to June 9, 2009 as one of the researcher in the Indian Research Team of the Joint Research Project
entitled
"Analysis of Cryptographic Algorithms and Evaluation on Enhancing Network Security Based on Mathematical Science".
(in 2009) Visited National Institute of Advanced Industrial Science and Technology (AIST), Research center for information security (RCIS), Japan .
(in 2009) Visited KDDI R&D Laboratories
and had there fruitful discussions with Dr T Tanaka, Senior Manager, Information Security Laboratory, KDDI, Dr K Fukushima and J Kurihara, Associate Research Engineer, Information Security Laboratory, KDDI regarding the efficient implementation of our as well as their schemes of Secret Sharing Schemes.
(in 2009) Visited Institute of Industrial Science, the University of Tokyo, Japan .
(in 2009) Visited University of Nagoya, Japan.
(in 2007) Visited University of Linkoping, Sweden during July 21 to August 4,
2007 and attended a workshop on "DNA and its Related Topics" and delivered a series of
Lectures on "DNA Secret Sharing and its Application to Cryptography".
(in 2007) Visited ETH Zurich, Switzerland during July 1620, 2007 to attend the
"International Congress on Industrial and Applied Mathematics, ICIAM 07"
at ETH Zurich, Switzerland (The visit was fully supported by NBHM of the Department of Atomic Energy,
Govt. of India).
(in 2007) Visited on invitation to Paris, France to participate in the IndoFrench Workshop on
``Recent Advances in Cryptography'' organized and funded by IndoFrench Centre for Promotion of
Advanced Research during June 10June 15, 2007.
(in 2007) Visited University of Rajshahi, Bangladesh.
(in 2006) Visited University of Liverpool, UK .
(in 2006) Visited Lund University, Sweden.
(in 2006) Visited Linkoping University, Sweden .
(in 200506) Visited Institut National de Recherche en Informatique et en Automatique
INRIARocquencourt, Projet CODES, France .
(in 2005) Visited Ecole suprieure d'ElectriciteÃ© (Suplec)
Plateau de Moulon, 91192 GifsurYvette, France .
(in 2005) Visited Karlstad University,
Universitetgatan 2, 651 88 Karlstad, Sweden .
(in 2005) Visited University of Linkoping,
Se581 85 Linkoping, Sweden.

Research Projects

Principalinvestigator
of the Research Project
entitled
Constructions and Analysis of Some
Secret Sharing Schemes and Their Applications Using Mathematical and Statistical Tools, of amount
Rs. 11,51,500/,
for 3 years from January, 2014, funded by National Board of Higher Mathematics (NBHM), Department of Atomic Energy, Government of India.
Coinvestigator
of the Joint Research Project
entitled
“Computational Aspects of Mathematical Design and Analysis of Secure Communication Systems Based on Cryptographic Primitives”,
of amount
Rs. 6.16 lakhs,
20142016, IndiaJapan Science Council supported by DSTJSPS Science and Technology Program in collaboration with Indian Statistical Institute, Kolkata and Kyushu University, Japan.
Coinvestigator
of the Joint Research Project
entitled
"Analysis of Cryptographic Algorithms and Evaluation on Enhancing Network Security Based on Mathematical Science",
of amount
Rs. 23.00 lakhs
, December 2008 December 2011, under Strategic JapaneseIndian Cooperative Program supported by JSTDST project.
Principal Investigator
of the Research Project of Ministry of Communication and Information Technology, Govt. of India, entitled "Secret Sharing Schemes using DNA Cryptography",
of amount Rs. 22.94 lakhs at Department of Pure Mathematics, April 2007 March 2009.
Coinvestigator
of the Joint Research Project
entitled
Design and development of Pseudo Random Number Generators for use in Key Generation Systems,
of amount
Rs. 7.60 lakhs
for 180 days, 20102011, funded by MINISTRY OF DEFENCE, Govt of
India in collaboration with CRYPTOLOGY RESEARCH SOCIETY OF INDIA (CRSI), Applied
Statistics Unit, Indian Statistical Institute,
Coinvestigator
of the Joint Research Project
entitled
Design and development of Strong Boolean functions with Cryptographic properties,
of amount
Rs. 6.30 lakhs
for 180 days, 20102011, funded by MINISTRY OF DEFENCE, Govt of
India in collaboration with CRYPTOLOGY RESEARCH SOCIETY OF INDIA (CRSI), Applied
Statistics Unit, Indian Statistical Institute,
Coinvestigator
of the Joint Research Project
entitled
Design and development of Resilient Key Management for Secure Symmetric Implementation,
of amount
Rs. 8.75 lakhs
, for 180 days, 20102011, funded by MINISTRY OF DEFENCE, Govt of
India in collaboration with CRYPTOLOGY RESEARCH SOCIETY OF INDIA (CRSI), Applied
Statistics Unit, Indian Statistical Institute,
Coinvestigator
of the Joint Research Project
entitled
For Design and
Development of Test Suite for Statistical Analysis of Cipher and
Random Number Generators,
of amount
Rs. 9.50 lakhs,
for 180 days from October, 2009, funded by MINISTRY OF DEFENCE, Govt of
India, in collaboration with CRYPTOLOGY RESEARCH SOCIETY OF INDIA (CRSI), Applied
Statistics Unit, Indian Statistical Institute,

Research Group

Current Lab Members:
Ushnish Sarkar
Sabyasachi Dutta
Prakash Dey
Jyotirmoy Pramanik
Subarsha Banerjee
ExLab Members:
Arindam Roy
Indranil Banerjee
Bappaditya Roy
Partha Sarathi Roy
Angsuman Das

Tie ups and Collaborations

R C Bose Center for Cryptology and Security,
Indian Statistical Institute, Kolkata, India.
Applied Statistics Unit, Indian Statistical Institute, Kolkata, India,
Department of Primary Health Care, Linkoping University, Sweden,
Institute of Polymathematics, Meijo University, Nagoya, Japan,
Department of Computer Science and Communication Engineering, University of Kyushu, Japan.
Department of Engineering Mathematics
Faculty of Engineering
Zagazig University, Egypt.

