Avijit Dutta

787 total citations
39 papers, 378 citations indexed

About

Avijit Dutta is a scholar working on Artificial Intelligence, Electrical and Electronic Engineering and Hardware and Architecture. According to data from OpenAlex, Avijit Dutta has authored 39 papers receiving a total of 378 indexed citations (citations by other indexed papers that have themselves been cited), including 20 papers in Artificial Intelligence, 12 papers in Electrical and Electronic Engineering and 8 papers in Hardware and Architecture. Recurrent topics in Avijit Dutta's work include Cryptographic Implementations and Security (18 papers), Coding theory and cryptography (16 papers) and Cryptography and Data Security (10 papers). Avijit Dutta is often cited by papers focused on Cryptographic Implementations and Security (18 papers), Coding theory and cryptography (16 papers) and Cryptography and Data Security (10 papers). Avijit Dutta collaborates with scholars based in India, United States and China. Avijit Dutta's co-authors include Nur A. Touba, Mridul Nandi, Nilanjan Datta, Krishna Lal Baishnab, Arpita Biswas, Abhishek Majumdar, Donald W. White, Goutam Paul, Manish Sharma and Brady Benware and has published in prestigious journals such as SHILAP Revista de lepidopterología, IEEE Transactions on Information Theory and IEEE Transactions on Computers.

In The Last Decade

Avijit Dutta

34 papers receiving 362 citations

Peers

Avijit Dutta
Avijit Dutta
Citations per year, relative to Avijit Dutta Avijit Dutta (= 1×) peers Mohamed S. Abdelfattah

Countries citing papers authored by Avijit Dutta

Since Specialization
Citations

This map shows the geographic impact of Avijit Dutta's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Avijit Dutta with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Avijit Dutta more than expected).

Fields of papers citing papers by Avijit Dutta

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Avijit Dutta. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Avijit Dutta. The network helps show where Avijit Dutta may publish in the future.

Co-authorship network of co-authors of Avijit Dutta

This figure shows the co-authorship network connecting the top 25 collaborators of Avijit Dutta. A scholar is included among the top collaborators of Avijit Dutta based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Avijit Dutta. Avijit Dutta is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Dutta, Avijit. (2023). Professional Ethics and Values of Librarianship in view of College Librarian. 9(1). 2 indexed citations
2.
Dutta, Avijit, et al.. (2023). BBB security for 5-round even-Mansour-based key-alternating Feistel ciphers. Designs Codes and Cryptography. 92(1). 13–49.
3.
4.
Datta, Nilanjan, Avijit Dutta, & Cuauhtémoc Mancillas-López. (2023). $\textsf{LightMAC}$: Fork it and make it faster. Advances in Mathematics of Communications. 18(5). 1406–1441. 1 indexed citations
5.
Datta, Nilanjan, et al.. (2023). Cascading Four Round LRW1 is Beyond Birthday Bound Secure. IACR Transactions on Symmetric Cryptology. 2023(4). 365–390. 1 indexed citations
6.
Datta, Nilanjan, et al.. (2023). Tight Multi-User Security Bound of DbHtS. IACR Transactions on Symmetric Cryptology. 192–223. 1 indexed citations
7.
Dutta, Avijit, et al.. (2022). $$\mathsf {CENCPP}^*$$: beyond-birthday-secure encryption from public permutations. Designs Codes and Cryptography. 90(6). 1381–1425. 1 indexed citations
8.
Dutta, Avijit, et al.. (2022). Proof of Mirror Theory for ξ max = 2. IEEE Transactions on Information Theory. 68(9). 6218–6232. 2 indexed citations
9.
Dutta, Avijit, et al.. (2021). Permutation Based EDM: An Inverse Free BBB Secure PRF. IACR Transactions on Symmetric Cryptology. 31–70. 5 indexed citations
10.
Dutta, Avijit, et al.. (2020). Secure Proof of Ownership Using Merkle Tree for Deduplicated Storage. Automatic Control and Computer Sciences. 54(4). 358–370. 9 indexed citations
11.
Chang, Donghoon, Nilanjan Datta, Avijit Dutta, et al.. (2020). Release of Unverified Plaintext: Tight Unified Model and Application to ANYDAE. SHILAP Revista de lepidopterología. 1 indexed citations
12.
Datta, Nilanjan, Avijit Dutta, Mridul Nandi, & Goutam Paul. (2018). Double-block Hash-then-Sum: A Paradigm for Constructing BBB Secure PRF. SHILAP Revista de lepidopterología. 5 indexed citations
13.
Datta, Nilanjan, Avijit Dutta, Mridul Nandi, & Goutam Paul. (2018). Double-block Hash-then-Sum: A Paradigm for Constructing BBB Secure PRF. IACR Transactions on Symmetric Cryptology. 36–92. 13 indexed citations
14.
Dutta, Avijit, et al.. (2017). A New Look at Counters: Don’t Run Like Marathon in a Hundred Meter Race. IEEE Transactions on Computers. 66(11). 1851–1864. 2 indexed citations
15.
Dutta, Avijit, et al.. (2017). Tight Security Analysis of EHtM MAC. IACR Transactions on Symmetric Cryptology. 130–150. 5 indexed citations
16.
Dutta, Avijit & Vinay Kumar. (2012). MANAGING INFORMATION SECURITY IN DIGITAL AGE. 1(2). 205–212.
17.
Biswas, Atanu, et al.. (2012). Seizure, spinal schwannoma, peripheral neuropathy and pulmonary stenosis - A rare combination in a patient of Neurofibromatosis 1. Annals of Indian Academy of Neurology. 15(1). 51–51. 2 indexed citations
18.
Sharma, Manish, Avijit Dutta, Wu-Tung Cheng, Brady Benware, & Mark Kassab. (2011). A novel Test Access Mechanism for failure diagnosis of multiple isolated identical cores. 1–9. 20 indexed citations
19.
Dutta, Avijit & Abhijit Jas. (2008). Combinational Logic Circuit Protection Using Customized Error Detecting and Correcting Codes. 35. 68–73. 1 indexed citations
20.
Dutta, Avijit & Nur A. Touba. (2006). Using Limited Dependence Sequential Expansion for Decompressing Test Vectors. 1–9. 24 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026