GIFT: A Small Present (Full version) S Banik, SK Pandey, T Peyrin, Y Sasaki, SM Sim, Y Todo Cryptology ePrint Archive, 2017 | 607* | 2017 |
Cryptographically significant mds matrices over finite fields: a brief survey and some generalized results KC Gupta, SK Pandey, IG Ray, S Samanta Advances in Mathematics of Communications 13 (4), 779-843, 2019 | 41 | 2019 |
Towards a General Construction of Recursive MDS Diffusion Layers KC Gupta, SK Pandey, A Venkateswarlu The 9th International Workshop on Coding and Cryptography 2015 WCC2015, 2015 | 34 | 2015 |
Attribute-based signcryption: Signer privacy, strong unforgeability and ind-cca2 security in adaptive-predicates attack T Pandit, SK Pandey, R Barua International Conference on Provable Security, 274-290, 2014 | 34 | 2014 |
On the Direct Construction of Recursive MDS Matrices KC Gupta, SK Pandey, A Venkateswarlu The 9th International Workshop on Coding and Cryptography 2015 WCC2015, 2015 | 28 | 2015 |
Almost involutory recursive MDS diffusion layers KC Gupta, SK Pandey, A Venkateswarlu Designs, Codes and Cryptography 87 (2-3), 609-626, 2019 | 24 | 2019 |
Efficient window-based scalar multiplication on elliptic curves using double-base number system R Barua, SK Pandey, R Pankaj International Conference on Cryptology in India, 351-360, 2007 | 24 | 2007 |
FUTURE: A Lightweight Block Cipher Using an Optimal Diffusion Matrix KC Gupta, SK Pandey, S Samanta International Conference on Cryptology in Africa, 28-52, 2022 | 23 | 2022 |
Recursive MDS matrices over finite commutative rings A Kesarwani, SK Pandey, S Sarkar, A Venkateswarlu Discrete Applied Mathematics 304, 384-396, 2021 | 11 | 2021 |
Construction of Recursive MDS Matrices Using DLS Matrices KC Gupta, SK Pandey, S Samanta International Conference on Cryptology in Africa, 3-27, 2022 | 8 | 2022 |
How to Leak a Secret and Reap the Rewards Too V Saraswat, SK Pandey International Conference on Cryptology and Information Security in Latin …, 2014 | 8 | 2014 |
Gift: A small present towards reaching the limit of lightweight encryption (full version) S Banik, SK Pandey, T Peyrin, Y Sasaki, S Sim, Y Todo Tech. Rep., 2017.[Online]. Available: https://infoscience. epfl. ch/record …, 2007 | 8 | 2007 |
Construction of identity based signcryption schemes SK Pandey, R Barua International Workshop on Information Security Applications, 1-14, 2010 | 7 | 2010 |
Efficient Construction of Identity Based Signcryption Schemes from Identity Based Encryption and Signature Schemes SK Pandey, R Barua Journal of Internet Services and Information Security 1 (2/3), 161-180, 2011 | 6 | 2011 |
On the Direct Construction of MDS and Near-MDS Matrices KC Gupta, SK Pandey, S Samanta arXiv preprint arXiv:2306.12848, 2023 | 5 | 2023 |
Applications of design theory for the constructions of MDS matrices for lightweight cryptography KC Gupta, SK Pandey, IG Ray Journal of Mathematical Cryptology 11 (2), 85-116, 2017 | 5 | 2017 |
Format Preserving Sets: On Diffusion Layers of Format Preserving Encryption Schemes KC Gupta, SK Pandey, IG Ray Progress in Cryptology–INDOCRYPT 2016: 17th International Conference on …, 2016 | 5 | 2016 |
Relaxing IND-CCA: indistinguishability against chosen ciphertext verification attack SK Pandey, S Sarkar, MP Jhanwar Security, Privacy, and Applied Cryptography Engineering, 63-76, 2012 | 4 | 2012 |
A Few Negative Results on Constructions of MDS Matrices Using Low XOR Matrices KC Gupta, SK Pandey, S Samanta International Conference on Security, Privacy, and Applied Cryptography …, 2019 | 3 | 2019 |
A Security Model for Intelligent Vehicles and Smart Traffic Infrastructure S Kumar, S Jha, SK Pandey, A Chattopadhyay 2018 IEEE Intelligent Vehicles Symposium (IV), 162-167, 2018 | 3 | 2018 |