Indranil Ghosh Ray

416 total citations
16 papers, 131 citations indexed

About

Indranil Ghosh Ray is a scholar working on Artificial Intelligence, Information Systems and Sociology and Political Science. According to data from OpenAlex, Indranil Ghosh Ray has authored 16 papers receiving a total of 131 indexed citations (citations by other indexed papers that have themselves been cited), including 14 papers in Artificial Intelligence, 6 papers in Information Systems and 3 papers in Sociology and Political Science. Recurrent topics in Indranil Ghosh Ray's work include Cryptography and Data Security (8 papers), Cryptographic Implementations and Security (5 papers) and Coding theory and cryptography (4 papers). Indranil Ghosh Ray is often cited by papers focused on Cryptography and Data Security (8 papers), Cryptographic Implementations and Security (5 papers) and Coding theory and cryptography (4 papers). Indranil Ghosh Ray collaborates with scholars based in United Kingdom, India and Pakistan. Indranil Ghosh Ray's co-authors include Muttukrishnan Rajarajan, Kishan Chand Gupta, Feng Hao, Samiran Bag, Waqar Asif, Siamak F. Shahandashti, Yogachandran Rahulamathavan, Sumit Pandey, Rongxing Lu and Susanta Kumar Samanta and has published in prestigious journals such as IEEE Transactions on Information Theory, IEEE Access and IEEE Transactions on Information Forensics and Security.

In The Last Decade

Indranil Ghosh Ray

16 papers receiving 125 citations

Peers

Indranil Ghosh Ray
Jennie Callas United States
HyungChul Kang South Korea
Kun Peng Singapore
Bertram Poettering United Kingdom
David Durham United States
Wilko Henecka Australia
Indranil Ghosh Ray
Citations per year, relative to Indranil Ghosh Ray Indranil Ghosh Ray (= 1×) peers Thibault Gisselbrecht

Countries citing papers authored by Indranil Ghosh Ray

Since Specialization
Citations

This map shows the geographic impact of Indranil Ghosh Ray's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Indranil Ghosh Ray with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Indranil Ghosh Ray more than expected).

Fields of papers citing papers by Indranil Ghosh Ray

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Indranil Ghosh Ray. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Indranil Ghosh Ray. The network helps show where Indranil Ghosh Ray may publish in the future.

Co-authorship network of co-authors of Indranil Ghosh Ray

This figure shows the co-authorship network connecting the top 25 collaborators of Indranil Ghosh Ray. A scholar is included among the top collaborators of Indranil Ghosh Ray based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Indranil Ghosh Ray. Indranil Ghosh Ray is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

16 of 16 papers shown
1.
Khalid, Ayesha, et al.. (2025). zk-DASTARK: A quantum-resistant, data authentication and zero-knowledge proof scheme for protecting data feed to smart contracts. Computers & Electrical Engineering. 123. 110089–110089. 2 indexed citations
2.
Bag, Samiran, Indranil Ghosh Ray, & Feng Hao. (2022). A New Leakage Resilient Symmetric Searchable Encryption Scheme for Phrase Search. Research Portal (Queen's University Belfast). 366–373. 1 indexed citations
3.
Ray, Indranil Ghosh, et al.. (2020). Role recommender-RBAC: Optimizing user-role assignments in RBAC. Computer Communications. 166. 140–153. 15 indexed citations
4.
Ray, Indranil Ghosh, et al.. (2019). R-PEKS: RBAC Enabled PEKS for Secure Access of Cloud Data. IEEE Access. 7. 133274–133289. 10 indexed citations
5.
Bag, Samiran, Feng Hao, Siamak F. Shahandashti, & Indranil Ghosh Ray. (2019). SEAL: Sealed-Bid Auction Without Auctioneers. IEEE Transactions on Information Forensics and Security. 15. 2042–2052. 25 indexed citations
6.
Gupta, Kishan Chand, Sumit Pandey, Indranil Ghosh Ray, & Susanta Kumar Samanta. (2019). Cryptographically significant mds matrices over finite fields: A brief survey and some generalized results. Advances in Mathematics of Communications. 13(4). 779–843. 13 indexed citations
7.
Rahulamathavan, Yogachandran, et al.. (2018). Privacy-Preserving iVector-Based Speaker Verification. IEEE/ACM Transactions on Audio Speech and Language Processing. 27(3). 496–506. 14 indexed citations
8.
Ray, Indranil Ghosh, et al.. (2018). A New Lightweight Symmetric Searchable Encryption Scheme for String Identification. IEEE Transactions on Cloud Computing. 1–1. 9 indexed citations
9.
Asif, Waqar, Indranil Ghosh Ray, & Muttukrishnan Rajarajan. (2018). An attack tree based risk evaluation approach for the internet of things. 1–8. 9 indexed citations
10.
Asif, Waqar, Indranil Ghosh Ray, Shahzaib Tahir, & Muttukrishnan Rajarajan. (2018). Privacy-preserving Anonymization with Restricted Search (PARS) on Social Network Data for Criminal Investigations. 329–334. 4 indexed citations
11.
Gupta, Kishan Chand, Sumit Pandey, & Indranil Ghosh Ray. (2017). Applications of design theory for the constructions of MDS matrices for lightweight cryptography. Journal of Mathematical Cryptology. 11(2). 85–116. 1 indexed citations
12.
Ray, Indranil Ghosh & Muttukrishnan Rajarajan. (2017). A Public Key Encryption Scheme for String Identification. City Research Online (City University London). 2014. 104–111. 1 indexed citations
13.
Wall, Julie, Cornelius Glackin, Gérard Chollet, et al.. (2016). A Roadmap for Privacy Preserving Speech Processing. UEL Research Repository (University of East London). 2 indexed citations
14.
Gupta, Kishan Chand & Indranil Ghosh Ray. (2014). Cryptographically significant MDS matrices based on circulant and circulant-like matrices for lightweight applications. Cryptography and Communications. 7(2). 257–287. 21 indexed citations
15.
Gupta, Kishan Chand & Indranil Ghosh Ray. (2014). Finding Biaffine and Quadratic Equations for S-Boxes Based on Power Mappings. IEEE Transactions on Information Theory. 61(4). 2200–2209. 2 indexed citations
16.
Gupta, Khushi & Indranil Ghosh Ray. (2013). On Constructions of MDS Matrices from Companion Matrices for Lightweight Cryptography. INRIA a CCSD electronic archive server. 2 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026