关注
Palash Sarkar
Palash Sarkar
在 isical.ac.in 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
A brief history of cellular automata
P Sarkar
Acm computing surveys (csur) 32 (1), 80-107, 2000
5582000
Pairing-based cryptography: A survey
R Dutta, R Barua, P Sarkar
Cryptology Research Group, Stat-Math and Applied Statistics Unit 203, 2004
348*2004
Nonlinearity bounds and constructions of resilient Boolean functions
P Sarkar, S Maitra
Advances in Cryptology—CRYPTO 2000: 20th Annual International Cryptology …, 2000
2692000
Construction of nonlinear Boolean functions with important cryptographic properties
P Sarkar, S Maitra
International Conference on the Theory and Applications of Cryptographic …, 2000
2362000
New applications of time memory data tradeoffs
J Hong, P Sarkar
Advances in Cryptology-ASIACRYPT 2005: 11th International Conference on the …, 2005
208*2005
Extending Joux’s protocol to multi party key agreement
R Barua, R Dutta, P Sarkar
Progress in Cryptology-INDOCRYPT 2003: 4th International Conference on …, 2003
1652003
New constructions of resilient and correlation immune Boolean functions achieving upper bound on nonlinearity
E Pasalic, S Maitra, T Johansson, P Sarkar
Electronic Notes in Discrete Mathematics 6, 158-167, 2001
1492001
A simple and generic construction of authenticated encryption with associated data
P Sarkar
ACM Transactions on Information and System Security (TISSEC) 13 (4), 1-16, 2010
1432010
Improved time-memory trade-offs with multiple data
A Biryukov, S Mukhopadhyay, P Sarkar
Selected Areas in Cryptography: 12th International Workshop, SAC 2005 …, 2006
1212006
Challenges with assessing the impact of NFS advances on the security of pairing-based cryptography
A Menezes, P Sarkar, S Singh
International Conference on Cryptology in Malaysia, 83-108, 2016
1182016
HCH: A new tweakable enciphering scheme using the hash-counter-hash approach
D Chakraborty, P Sarkar
IEEE Transactions on Information Theory 54 (4), 1683-1699, 2008
118*2008
Trading time for space: Towards an efficient IBE scheme with short (er) public parameters in the standard model
S Chatterjee, P Sarkar
Information Security and Cryptology-ICISC 2005: 8th International Conference …, 2006
1172006
Spectral domain analysis of correlation immune and resilient Boolean functions
C Carlet, P Sarkar
Finite Fields and Their Applications 8 (1), 120-130, 2002
1162002
Efficient tweakable enciphering schemes from (block-wise) universal hash functions
P Sarkar
IEEE Transactions on Information Theory 55 (10), 4749-4760, 2009
111*2009
New collision attacks against up to 24-step SHA-2
SK Sanadhya, P Sarkar
Progress in Cryptology-INDOCRYPT 2008: 9th International Conference on …, 2008
1082008
Identity-based encryption
S Chatterjee, P Sarkar
Springer Science & Business Media, 2011
1042011
Another look at tightness
S Chatterjee, A Menezes, P Sarkar
Selected Areas in Cryptography: 18th International Workshop, SAC 2011 …, 2012
832012
A new mode of encryption providing a tweakable strong pseudo-random permutation
D Chakraborty, P Sarkar
Fast Software Encryption: 13th International Workshop, FSE 2006, Graz …, 2006
782006
Cross-correlation analysis of cryptographically useful Boolean functions and S-boxes
P Sarkar, S Maitra
Theory of Computing Systems 35 (1), 39-57, 2002
772002
Maximum nonlinearity of symmetric Boolean functions on odd number of variables
S Maitra, P Sarkar
IEEE Transactions on Information Theory 48 (9), 2626-2630, 2002
762002
系统目前无法执行此操作,请稍后再试。
文章 1–20