Skip to main content

Showing 1–4 of 4 results for author: Baidya, P

.
  1. arXiv:2312.16322  [pdf, other

    cs.CR

    Blockchain-Envisioned Post-Quantum Secure Sanitizable Signature for Audit Logs Management

    Authors: Vikas Srivastava, Paresh Baidya, Sihem Mesnager, Debasish Roy, Sumit Kumar Debnath

    Abstract: Audit logs are one of the most important tools for transparently tracking system events and maintaining continuous oversight in corporate organizations and enterprise business systems. There are many cases where the audit logs contain sensitive data, or the audit logs are enormous. In these situations, dealing with a subset of the data is more practical than the entire data set. To provide a secur… ▽ More

    Submitted 25 March, 2024; v1 submitted 26 December, 2023; originally announced December 2023.

  2. arXiv:2301.03473  [pdf, other

    cond-mat.supr-con cond-mat.mtrl-sci

    Correlated carrier dynamics in a superconducting van der Waals heterostructure

    Authors: Prakiran Baidya, Vivas Bagwe, Pratap Raychaudhuri, Aveek Bid

    Abstract: The study of Berezinskii-Kosterlitz-Thouless transitions in clean, layered two-dimensional superconductors promises to provide insight into a host of novel phenomena like re-entrant vortex-dynamics, underlying unconventional metallic phases, and topological superconductivity. In this letter, we report the study of charge carrier dynamics in a novel 2-dimensional superconducting van der Waals heter… ▽ More

    Submitted 9 January, 2023; originally announced January 2023.

    Comments: 24 pages

    Journal ref: Appl. Phys. Lett. 120, 183101 (2022)

  3. arXiv:2208.08093  [pdf, other

    cs.CR cs.AR

    Near Threshold Computation of Partitioned Ring Learning With Error (RLWE) Post Quantum Cryptography on Reconfigurable Architecture

    Authors: Paresh Baidya, Swagata Mondal, Rourab Paul

    Abstract: Ring Learning With Error (RLWE) algorithm is used in Post Quantum Cryptography (PQC) and Homomorphic Encryption (HE) algorithm. The existing classical crypto algorithms may be broken in quantum computers. The adversaries can store all encrypted data. While the quantum computer will be available, these encrypted data can be exposed by the quantum computer. Therefore, the PQC algorithms are an essen… ▽ More

    Submitted 14 May, 2024; v1 submitted 17 August, 2022; originally announced August 2022.

    Comments: Full Version of the manuscript is availble in IEEE Access DOI: 10.1109/access.2024.3401235. In IEEE Access, 2024

  4. arXiv:2111.06681  [pdf, other

    cond-mat.supr-con cond-mat.mes-hall

    Transition from three- to two-dimensional Ising superconductivity in few-layer NbSe2 by proximity effect from van der Waals heterostacking

    Authors: Prakiran Baidya, Divya Sahani, Hemanta Kumar Kundu, Simrandeep Kaur, Priya Tiwari, Vivas Bagwe, John Jesudasan, Awadhesh Narayan, Pratap Raychaudhuri, Aveek Bid

    Abstract: We report the experimental observation of Ising superconductivity in 3-dimensional NbSe2 stacked with single-layer MoS2. The angular dependence of the upper critical magnetic field and the temperature dependence of the upper parallel critical field confirm the appearance of two-dimensional Ising superconductivity in the 3-dimensional NbSe2 with single-layer MoS2 overlay. We show that the supercond… ▽ More

    Submitted 12 November, 2021; originally announced November 2021.

    Journal ref: Physical Review B, 104, 174510 (2021)