1. Generating hard instances of lattice problems (extended abstract);Ajtai,1996
2. New directions in cryptography;Diffie;IEEE Trans. Inf. Theory,1976
3. Public-key cryptosystems from lattice reduction problems;Goldreich,1997
4. Identity-based/attribute-based cryptosystem using threshold value without Shamir's secret sharing;Gupta,2015
5. Securing voice call transmission over cellular communication;Gupta;Proc. Comp. Sci.,2015