A brief history of cellular automata P Sarkar Acm computing surveys (csur) 32 (1), 80-107, 2000 | 558 | 2000 |
Pairing-based cryptography: A survey R Dutta, R Barua, P Sarkar Cryptology Research Group, Stat-Math and Applied Statistics Unit 203, 2004 | 348* | 2004 |
Nonlinearity bounds and constructions of resilient Boolean functions P Sarkar, S Maitra Advances in Cryptology—CRYPTO 2000: 20th Annual International Cryptology …, 2000 | 269 | 2000 |
Construction of nonlinear Boolean functions with important cryptographic properties P Sarkar, S Maitra International Conference on the Theory and Applications of Cryptographic …, 2000 | 236 | 2000 |
New applications of time memory data tradeoffs J Hong, P Sarkar Advances in Cryptology-ASIACRYPT 2005: 11th International Conference on the …, 2005 | 208* | 2005 |
Extending Joux’s protocol to multi party key agreement R Barua, R Dutta, P Sarkar Progress in Cryptology-INDOCRYPT 2003: 4th International Conference on …, 2003 | 165 | 2003 |
New constructions of resilient and correlation immune Boolean functions achieving upper bound on nonlinearity E Pasalic, S Maitra, T Johansson, P Sarkar Electronic Notes in Discrete Mathematics 6, 158-167, 2001 | 149 | 2001 |
A simple and generic construction of authenticated encryption with associated data P Sarkar ACM Transactions on Information and System Security (TISSEC) 13 (4), 1-16, 2010 | 143 | 2010 |
Improved time-memory trade-offs with multiple data A Biryukov, S Mukhopadhyay, P Sarkar Selected Areas in Cryptography: 12th International Workshop, SAC 2005 …, 2006 | 121 | 2006 |
Challenges with assessing the impact of NFS advances on the security of pairing-based cryptography A Menezes, P Sarkar, S Singh International Conference on Cryptology in Malaysia, 83-108, 2016 | 118 | 2016 |
HCH: A new tweakable enciphering scheme using the hash-counter-hash approach D Chakraborty, P Sarkar IEEE Transactions on Information Theory 54 (4), 1683-1699, 2008 | 118* | 2008 |
Trading time for space: Towards an efficient IBE scheme with short (er) public parameters in the standard model S Chatterjee, P Sarkar Information Security and Cryptology-ICISC 2005: 8th International Conference …, 2006 | 117 | 2006 |
Spectral domain analysis of correlation immune and resilient Boolean functions C Carlet, P Sarkar Finite Fields and Their Applications 8 (1), 120-130, 2002 | 116 | 2002 |
Efficient tweakable enciphering schemes from (block-wise) universal hash functions P Sarkar IEEE Transactions on Information Theory 55 (10), 4749-4760, 2009 | 111* | 2009 |
New collision attacks against up to 24-step SHA-2 SK Sanadhya, P Sarkar Progress in Cryptology-INDOCRYPT 2008: 9th International Conference on …, 2008 | 108 | 2008 |
Identity-based encryption S Chatterjee, P Sarkar Springer Science & Business Media, 2011 | 104 | 2011 |
Another look at tightness S Chatterjee, A Menezes, P Sarkar Selected Areas in Cryptography: 18th International Workshop, SAC 2011 …, 2012 | 83 | 2012 |
A new mode of encryption providing a tweakable strong pseudo-random permutation D Chakraborty, P Sarkar Fast Software Encryption: 13th International Workshop, FSE 2006, Graz …, 2006 | 78 | 2006 |
Cross-correlation analysis of cryptographically useful Boolean functions and S-boxes P Sarkar, S Maitra Theory of Computing Systems 35 (1), 39-57, 2002 | 77 | 2002 |
Maximum nonlinearity of symmetric Boolean functions on odd number of variables S Maitra, P Sarkar IEEE Transactions on Information Theory 48 (9), 2626-2630, 2002 | 76 | 2002 |