Efficient weighted threshold ECDSA for securing bitcoin wallet P Dikshit, K Singh 2017 ISEA Asia Security and Privacy (ISEASP), 1-9, 2017 | 48 | 2017 |
Lattice Based Identity Based Proxy Re-Encryption Scheme. K Singh, CP Rangan, AK Banerjee J. Internet Serv. Inf. Secur. 3 (3/4), 38-51, 2013 | 36 | 2013 |
Lattice based identity based unidirectional proxy re-encryption scheme K Singh, CP Rangan, AK Banerjee Security, Privacy, and Applied Cryptography Engineering: 4th International …, 2014 | 27 | 2014 |
Cryptanalysis of unidirectional proxy re-encryption scheme K Singh, CP Rangan, AK Banerjee Information and Communication Technology: Second IFIP TC5/8 International …, 2014 | 25 | 2014 |
Adaptively secure efficient lattice (H) IBE in standard model with short public parameters K Singh, C Pandurangan, AK Banerjee International Conference on Security, Privacy, and Applied Cryptography …, 2012 | 23 | 2012 |
Cryptanalysis of Salsa and ChaCha: revisited KKC Deepthi, K Singh International Conference on Mobile Networks and Management, 324-338, 2017 | 22 | 2017 |
Lattice-based identity-based resplittable threshold public key encryption scheme K Singh, CP Rangan, AK Banerjee International Journal of Computer Mathematics 93 (2), 289-307, 2016 | 18 | 2016 |
Lattice Based Forward-Secure Identity Based Encryption Scheme with Shorter Ciphertext. K Singh, C Pandurangan, AK Banerjee J. Internet Serv. Inf. Secur. 3 (1/2), 5-19, 2013 | 16 | 2013 |
Digital forensic framework for smart contract vulnerabilities using ensemble models L JJ, K Singh, B Chakravarthi Multimedia Tools and Applications 83 (17), 51469-51512, 2024 | 14 | 2024 |
Secure distributed medical record storage using blockchain and emergency sharing using multi-party computation S Parthasarathy, A Harikrishnan, G Narayanan, K Singh 2021 11th IFIP International conference on new technologies, mobility and …, 2021 | 13 | 2021 |
Provably secure lattice based identity based unidirectional PRE and PRE+ schemes K Singh, CP Rangan, R Agrawal, S Sheshank Journal of Information Security and Applications 54, 102569, 2020 | 13 | 2020 |
A privacy-preserving framework for endorsement process in hyperledger fabric J Dharani, K Sundarakantham, K Singh Computers & Security 116, 102637, 2022 | 12 | 2022 |
A hierarchical identity-based security for delay tolerant networks using lattice-based cryptography G Srivastava, R Agrawal, K Singh, R Tripathi, K Naik Peer-to-Peer Networking and Applications 13, 348-367, 2020 | 10 | 2020 |
Lattice Based Universal Re-encryption for Mixnet. K Singh, CP Rangan, AK Banerjee J. Internet Serv. Inf. Secur. 4 (1), 1-11, 2014 | 10 | 2014 |
Privacy based decentralized public key infrastructure (PKI) implementation using smart contract in blockchain P Sivakumar, K Singh National Institute of Technology, 6, 2017 | 9 | 2017 |
Lattice Based Efficient Threshold Public Key Encryption Scheme. K Singh, CP Rangan, AK Banerjee J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 4 (4), 93-107, 2013 | 9 | 2013 |
Improved related-cipher attack on Salsa and ChaCha: revisited KC Deepthi Kakumani, K Singh, SK Karthika International Journal of Information Technology 14 (3), 1535-1542, 2022 | 7 | 2022 |
Cryptanalysis for reduced round Salsa and ChaCha: revisited KKC Deepthi, K Singh IET Information Security 13 (6), 591-602, 2019 | 7 | 2019 |
Lattice based mix network for location privacy in mobile system K Singh, CP Rangan, AK Banerjee Mobile Information Systems 2015 (1), 963628, 2015 | 7 | 2015 |
Efficient lattice HIBE in the standard model with shorter public parameters K Singh, CP Rangan, AK Banerjee Information and Communication Technology: Second IFIP TC5/8 International …, 2014 | 7 | 2014 |