Skip to Main content Skip to Navigation

hal-01801616v1  Conference papers
Jean-Daniel BoissonnatRamsay DyerArijit GhoshMathijs Wintraecken. Local Criteria for Triangulation of Manifolds
International Symposium on Computational Geometry, Jun 2018, Budapest, Hungary. ⟨10.4230/LIPIcs.SoCG.2018.9⟩
inria-00100455v1  Conference papers
Umapada PalAbdel BelaïdChristophe Choisy. Water Reservoir Based Approach for Touching Numeral Segmentation
International Conference on Document Analysis and Recognition, 2001, Seattle, USA, 6 p
inria-00100849v1  Conference papers
Umapada PalAbdel BelaïdB. B. Chaudury. A System for Bangla Handwritten Numeral Recognition
International Conference on Knowledge Based Computer Systems - KBCS 2002, 2002, Navi Mumbai, India
hal-02374286v1  Conference papers
Deng TangBimal MandalSubhamoy Maitra. Vectorial Boolean Functions with Very Low Differential-Linear Uniformity Using Maiorana-McFarland Type Construction
INDOCRYPT 2019 - The 20th International Conference on Cryptology in India, Dec 2019, Hyderabad, India. ⟨10.1007/978-3-030-35423-7_17⟩
inria-00435501v1  Journal articles
Szilárd VajdaKaushik RoyUmapada PalBidyut B ChaudhuriAbdel Belaïd. Automation of Indian Postal Documents written in Bangla and English
International Journal of Pattern Recognition and Artificial Intelligence, World Scientific Publishing, 2009, 23 (8), pp.1599-1632. ⟨10.1142/S0218001409007776⟩
inria-00110973v1  Journal articles
Umapada PalChaudhuri Bidyut B.Abdel Belaïd. A System for Bangla Handwritten Numeral Recognition
IETE Journal of Research, Institution of Electronics and Telecommunication Engineers, CDRAP Sharma, IN, 2006, 52 (1), pp.27-34
hal-01669884v1  Conference papers
J.-D BoissonnatKunal DuttaArijit GhoshSudeshna Kolay. Tight Kernels for Covering and Hitting: Point Hyperplane Cover and Polynomial Point Hitting Set
LATIN 2018 - 13th Latin American Theoretical INformatics Symposium, Apr 2018, Buenos Aires, Argentina
hal-01241075v1  Reports
Ritam BhaumikAvijit DuttaJian GuoJérémy JeanNicky Mouha et al.  More Rounds, Less Security?
[Research Report] Inria Paris Rocquencourt. 2015
hal-01360425v1  Conference papers
Kunal DuttaArijit Ghosh. On Subgraphs of Bounded Degeneracy in Hypergraphs
42nd International Workshop on Graph-Theoretic Concepts in Computer Science (WG 2016), Jun 2016, Istanbul, Turkey
inria-00000103v1  Conference papers
Kaushik RoySzilárd VajdaUmapada PalBidyut Baran ChaudhuriAbdel Belaïd. A System for Indian Postal Automation
International Workshop on Document Analysis, Umapada Pal, Mar 2005, Kolkata, India
inria-00000364v1  Conference papers
Kaushik RoySzilárd VajdaUmapada PalBidyut Baran ChaudhuriAbdel Belaïd. A System for Indian Postal Automation
International Conference on Document Analysis and Recognition, Sep 2005, Seoul, Korea
hal-01629946v1  Journal articles
Julien BensmailSoumen NandiSagnik Sen. On oriented cliques with respect to push operation
Discrete Applied Mathematics, Elsevier, 2017, 232, pp.50 - 63. ⟨10.1016/j.dam.2017.07.037⟩
hal-00932209v1  Journal articles
Jean-Daniel BoissonnatArijit Ghosh. Manifold reconstruction using tangential Delaunay complexes
Discrete and Computational Geometry, Springer Verlag, 2014, 51 (1), pp.221-267. ⟨10.1007/s00454-013-9557-2⟩
hal-01360460v1  Journal articles
Kunal DuttaEsther EzraArijit Ghosh. Two proofs for Shallow Packings
Discrete and Computational Geometry, Springer Verlag, 2016, Special Issue: 31st Annual Symposium on Computational Geometry, ⟨10.1007/s00454-016-9824-0⟩
hal-01275274v1  Conference papers
Kaushik ChakrabortySumanta SarkarSubhamoy MaitraBodhisatwa MazumdarDebdeep Mukhopadhyay et al.  Redefining the Transparency Order
WCC2015 - 9th International Workshop on Coding and Cryptography 2015, Anne Canteaut, Gaëtan Leurent, Maria Naya-Plasencia, Apr 2015, Paris, France
hal-00806107v2  Reports
Jean-Daniel BoissonnatRamsay DyerArijit Ghosh. Delaunay stability via perturbations
[Research Report] RR-8275, INRIA. 2013, pp.26
hal-02424957v1  Journal articles
Donghoon ChangNilanjan DattaAvijit DuttaBart MenninkMridul Nandi et al.  Release of Unverified Plaintext: Tight Unified Model and Application to ANYDAE
IACR Transactions on Symmetric Cryptology, Ruhr Universität Bochum, In press
hal-01404164v1  Conference papers
Christina BouraAvik ChakrabortiGaëtan LeurentGoutam PaulDhiman Saha et al.  Key Recovery Attack Against 2.5-Round Pi-Cipher
FSE 2016 - 23rd International Conference Fast Software Encryption, Mar 2016, Bochum, Germany. pp.535 - 553, ⟨10.1007/978-3-662-52993-5_27⟩
hal-01643498v1  Conference papers
Shweta AgrawalSanjay BhattacherjeeDuong Hieu PhanDamien StehléShota Yamada. Efficient Public Trace and Revoke from Standard Assumptions
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS'2017, Oct 2017, Dallas, United States
inria-00346019v1  Conference papers
Hatem HamzaYolande BelaïdAbdel BelaïdBidyut B. Chaudhuri. An end-to-end administrative document analysis system
The Eighth IAPR International Workshop on Document Analysis Systems - DAS 2008, Sep 2008, Nara, Japan. pp.175-182