关注
Sumit Kumar Pandey
Sumit Kumar Pandey
未知所在单位机构
没有经过验证的电子邮件地址
标题
引用次数
引用次数
年份
GIFT: A Small Present (Full version)
S Banik, SK Pandey, T Peyrin, Y Sasaki, SM Sim, Y Todo
Cryptology ePrint Archive, 2017
607*2017
Cryptographically significant mds matrices over finite fields: a brief survey and some generalized results
KC Gupta, SK Pandey, IG Ray, S Samanta
Advances in Mathematics of Communications 13 (4), 779-843, 2019
412019
Towards a General Construction of Recursive MDS Diffusion Layers
KC Gupta, SK Pandey, A Venkateswarlu
The 9th International Workshop on Coding and Cryptography 2015 WCC2015, 2015
342015
Attribute-based signcryption: Signer privacy, strong unforgeability and ind-cca2 security in adaptive-predicates attack
T Pandit, SK Pandey, R Barua
International Conference on Provable Security, 274-290, 2014
342014
On the Direct Construction of Recursive MDS Matrices
KC Gupta, SK Pandey, A Venkateswarlu
The 9th International Workshop on Coding and Cryptography 2015 WCC2015, 2015
282015
Almost involutory recursive MDS diffusion layers
KC Gupta, SK Pandey, A Venkateswarlu
Designs, Codes and Cryptography 87 (2-3), 609-626, 2019
242019
Efficient window-based scalar multiplication on elliptic curves using double-base number system
R Barua, SK Pandey, R Pankaj
International Conference on Cryptology in India, 351-360, 2007
242007
FUTURE: A Lightweight Block Cipher Using an Optimal Diffusion Matrix
KC Gupta, SK Pandey, S Samanta
International Conference on Cryptology in Africa, 28-52, 2022
232022
Recursive MDS matrices over finite commutative rings
A Kesarwani, SK Pandey, S Sarkar, A Venkateswarlu
Discrete Applied Mathematics 304, 384-396, 2021
112021
Construction of Recursive MDS Matrices Using DLS Matrices
KC Gupta, SK Pandey, S Samanta
International Conference on Cryptology in Africa, 3-27, 2022
82022
How to Leak a Secret and Reap the Rewards Too
V Saraswat, SK Pandey
International Conference on Cryptology and Information Security in Latin …, 2014
82014
Gift: A small present towards reaching the limit of lightweight encryption (full version)
S Banik, SK Pandey, T Peyrin, Y Sasaki, S Sim, Y Todo
Tech. Rep., 2017.[Online]. Available: https://infoscience. epfl. ch/record …, 2007
82007
Construction of identity based signcryption schemes
SK Pandey, R Barua
International Workshop on Information Security Applications, 1-14, 2010
72010
Efficient Construction of Identity Based Signcryption Schemes from Identity Based Encryption and Signature Schemes
SK Pandey, R Barua
Journal of Internet Services and Information Security 1 (2/3), 161-180, 2011
62011
On the Direct Construction of MDS and Near-MDS Matrices
KC Gupta, SK Pandey, S Samanta
arXiv preprint arXiv:2306.12848, 2023
52023
Applications of design theory for the constructions of MDS matrices for lightweight cryptography
KC Gupta, SK Pandey, IG Ray
Journal of Mathematical Cryptology 11 (2), 85-116, 2017
52017
Format Preserving Sets: On Diffusion Layers of Format Preserving Encryption Schemes
KC Gupta, SK Pandey, IG Ray
Progress in Cryptology–INDOCRYPT 2016: 17th International Conference on …, 2016
52016
Relaxing IND-CCA: indistinguishability against chosen ciphertext verification attack
SK Pandey, S Sarkar, MP Jhanwar
Security, Privacy, and Applied Cryptography Engineering, 63-76, 2012
42012
A Few Negative Results on Constructions of MDS Matrices Using Low XOR Matrices
KC Gupta, SK Pandey, S Samanta
International Conference on Security, Privacy, and Applied Cryptography …, 2019
32019
A Security Model for Intelligent Vehicles and Smart Traffic Infrastructure
S Kumar, S Jha, SK Pandey, A Chattopadhyay
2018 IEEE Intelligent Vehicles Symposium (IV), 162-167, 2018
32018
系统目前无法执行此操作,请稍后再试。
文章 1–20