Palash Sarkar

From MaRDI portal


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Polynomial hashing over prime order fields
Advances in Mathematics of Communications
2024-12-03Paper
Construction of spectrally-null-constrained zero-correlation zone sequences with flexible support
Cryptography and Communications
2024-11-26Paper
Concrete time/memory trade-offs in generalised Stern's ISD algorithm
 
2024-10-23Paper
Correlation and inequality in weighted majority voting games
 
2024-09-11Paper
Concrete analysis of approximate ideal-SIVP to decision ring-LWE reduction
Advances in Mathematics of Communications
2024-08-06Paper
New correlation bound and construction of quasi-complementary sequence sets
IEEE Transactions on Information Theory
2024-07-22Paper
Computing square roots faster than the Tonelli-Shanks/Bernstein algorithm
Advances in Mathematics of Communications
2023-12-14Paper
Another look at key randomisation hypotheses
Designs, Codes and Cryptography
2023-11-20Paper
Notes on the postulate of the monotonicity in distance in inequality
Bulletin of Economic Research
2023-10-17Paper
Influence of a Set of Variables on a Boolean Function
SIAM Journal on Discrete Mathematics
2023-09-27Paper
Distinguishing error of nonlinear invariant attacks
Lecture Notes in Computer Science
2023-08-14Paper
Combining Montgomery multiplication with tag tracing for the Pollard rho algorithm in prime order fields
Security, Privacy, and Applied Cryptography Engineering
2023-08-04Paper
New perspectives on the Gini and Bonferroni indices of inequality
Social Choice and Welfare
2023-07-11Paper
Classical reduction of gap SVP to LWE: a concrete security analysis
Advances in Mathematics of Communications
2023-07-07Paper
A direct construction of even length ZCPs with large ZCZ ratio
Cryptography and Communications
2023-06-20Paper
Counting unate and balanced monotone Boolean functions
 
2023-04-27Paper
Kummer versus Montgomery Face-off over Prime Order Fields
ACM Transactions on Mathematical Software
2023-03-22Paper
On the ``majority is least stable conjecture
Information Processing Letters
2022-10-28Paper
Efficient arithmetic in (pseudo-)Mersenne prime order fields
Advances in Mathematics of Communications
2022-10-18Paper
Efficient 4-Way Vectorizations of the Montgomery Ladder
IEEE Transactions on Computers
2022-08-05Paper
Inequality minimising subsidy and taxation
Economic Theory Bulletin
2022-07-27Paper
Separation results for Boolean function classes
Cryptography and Communications
2022-03-30Paper
\textsf{FAST}: disk encryption and beyond
Advances in Mathematics of Communications
2022-01-24Paper
An inequality paradox: relative versus absolute indices?
Metron
2021-12-16Paper
Breaking tweakable enciphering schemes using Simon's algorithm
Designs, Codes and Cryptography
2021-08-02Paper
Verifying solutions to LWE with implications for concrete security
Advances in Mathematics of Communications
2021-05-12Paper
Variants of Wegman-Carter message authentication code supporting variable tag lengths
Designs, Codes and Cryptography
2021-05-10Paper
Weighted voting procedure having a unique blocker
International Journal of Game Theory
2021-04-27Paper
Simpson's Paradox: A Singularity of Statistical and Inductive Inference
 
2021-03-31Paper
Kummer for genus one over prime-order fields
Journal of Cryptology
2020-03-03Paper
Faster initial splitting for small characteristic composite extension degree fields
Finite Fields and their Applications
2020-02-26Paper
Another look at success probability of linear cryptanalysis
Advances in Mathematics of Communications
2019-09-19Paper
A Direct Construction of Z-Complementary Pairs Using Generalized Boolean Functions
 
2019-07-31Paper
A Direct Construction of Optimal ZCCS With Maximum Column Sequence PMEPR Two for MC-CDMA System
 
2019-07-02Paper
Evaluating Bernstein-Rabin-Winograd polynomials
Designs, Codes and Cryptography
2019-02-20Paper
Connecting Legendre with Kummer and Edwards
Advances in Mathematics of Communications
2019-02-15Paper
Multiple (truncated) differential cryptanalysis: explicit upper bounds on data complexity
Cryptography and Communications
2018-08-28Paper
Success probability of multiple/multidimensional linear cryptanalysis under general key randomisation hypotheses
Cryptography and Communications
2018-05-28Paper
Kummer for genus one over prime order fields
 
2018-03-08Paper
Rigorous upper bounds on data complexities of block cipher cryptanalysis
Journal of Mathematical Cryptology
2017-11-06Paper
A new test statistic for key recovery attacks using multiple linear approximations
 
2017-10-23Paper
Another look at tightness. II: Practical issues in cryptography
 
2017-10-23Paper
Efficient Tweakable Enciphering Schemes From (Block-Wise) Universal Hash Functions
IEEE Transactions on Information Theory
2017-08-08Paper
Computing Partial Walsh Transform From the Algebraic Normal Form of a Boolean Function
IEEE Transactions on Information Theory
2017-08-08Paper
Pseudo-Random Functions and Parallelizable Modes of Operations of a Block Cipher
IEEE Transactions on Information Theory
2017-07-27Paper
On Quantifying the Resistance of Concrete Hash Functions to Generic Multicollision Attacks
IEEE Transactions on Information Theory
2017-07-12Paper
Efficient hardware implementations of brw polynomials and tweakable enciphering schemes
IEEE Transactions on Computers
2017-07-12Paper
Concrete Analysis and Trade-Offs for the (Complete Tree) Layered Subset Difference Broadcast Encryption Scheme
IEEE Transactions on Computers
2017-06-20Paper
Reducing Communication Overhead of the Subset Difference Scheme
IEEE Transactions on Computers
2017-05-16Paper
<monospace>STES</monospace>: A Stream Cipher Based Low Cost Scheme for Securing Stored Data
IEEE Transactions on Computers
2017-05-16Paper
Efficient Adaptively Secure IBBE From the SXDH Assumption
IEEE Transactions on Information Theory
2017-04-28Paper
New complexity trade-offs for the (multiple) number field sieve algorithm in non-prime fields
Advances in Cryptology – EUROCRYPT 2016
2016-09-09Paper
On modes of operations of a block cipher for authentication and authenticated encryption
Cryptography and Communications
2016-07-01Paper
A note on the spectral characterization of correlation immune Boolean functions
Information Processing Letters
2016-06-16Paper
Another look at normal approximations in cryptanalysis
Journal of Mathematical Cryptology
2016-06-09Paper
On Irreducible Polynomials of the Form $b(x^d)$
 
2016-04-28Paper
Another look at XCB
Cryptography and Communications
2015-11-19Paper
Efficient (anonymous) compact HIBE from standard assumptions
Provable Security
2015-09-29Paper
Some randomness experiments on TRIVIUM
Security, Privacy, and Applied Cryptography Engineering
2015-09-18Paper
Tree based symmetric key broadcast encryption
Journal of Discrete Algorithms
2015-08-24Paper
A course on cooperative game theory
 
2014-11-20Paper
Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector
Cryptography and Communications
2014-06-20Paper
On some connections between statistics and cryptology
Journal of Statistical Planning and Inference
2014-03-13Paper
Anonymous constant-size ciphertext HIBE from asymmetric pairings
Cryptography and Coding
2014-01-17Paper
Practical hybrid (hierarchical) identity-based encryption schemes based on the decisional bilinear Diffie-Hellman assumption
International Journal of Applied Cryptography
2013-11-15Paper
A new multi-linear universal hash family
Designs, Codes and Cryptography
2013-09-24Paper
Tweakable enciphering schemes using only the encryption function of a block cipher
Information Processing Letters
2013-04-04Paper
Complete tree subset difference broadcast encryption scheme and its analysis
Designs, Codes and Cryptography
2013-01-28Paper
Variants of Waters' dual system primitives using asymmetric pairings. (Extended abstract)
Public Key Cryptography – PKC 2012
2012-07-20Paper
Another look at tightness
Selected Areas in Cryptography
2012-06-08Paper
Identity-based encryption
 
2011-04-07Paper
A trade-off between collision probability and key size in universal hashing using polynomials
Designs, Codes and Cryptography
2011-04-06Paper
A general mixing strategy for the ECB-Mix-ECB mode of operation
Information Processing Letters
2010-06-09Paper
PARSHA-256 -- a new parallelizable hash function and a multithreaded implementation.
Lecture Notes in Computer Science
2010-01-05Paper
Parallelizing explicit formula for arithmetic in the Jacobian of hyperelliptic curves
Lecture Notes in Computer Science
2010-01-05Paper
Construction of high degree resilient S-boxes with improved nonlinearity
Information Processing Letters
2009-12-04Paper
Minimal-axiom characterizations of the Coleman and Banzhaf indices of voting power
Mathematical Social Sciences
2009-11-17Paper
A combinatorial analysis of recent attacks on step reduced SHA-2 family
Cryptography and Communications
2009-10-26Paper
Domain extender for collision resistant hash functions: Improving upon Merkle-Damgård iteration
Discrete Applied Mathematics
2009-06-30Paper
Public Key Cryptography – PKC 2004
Lecture Notes in Computer Science
2009-05-14Paper
A New Mode of Encryption Providing a Tweakable Strong Pseudo-random Permutation
Fast Software Encryption
2009-04-02Paper
Identity-based encryption and hierarchical identity-based encryption
 
2009-03-24Paper
HCH: A New Tweakable Enciphering Scheme Using the Hash-Counter-Hash Approach
IEEE Transactions on Information Theory
2009-02-24Paper
A General Construction of Tweakable Block Ciphers and Different Modes of Operations
IEEE Transactions on Information Theory
2009-02-24Paper
Pairing Computation on Twisted Edwards Form Elliptic Curves
Pairing-Based Cryptography – Pairing 2008
2009-02-10Paper
Application of LFSRs for Parallel Sequence Generation in Cryptologic Algorithms
Computational Science and Its Applications - ICCSA 2006
2009-02-10Paper
New Collision Attacks against Up to 24-Step SHA-2
Progress in Cryptology - INDOCRYPT 2008
2009-01-22Paper
A General Construction of Tweakable Block Ciphers and Different Modes of Operations
Information Security and Cryptology
2009-01-15Paper
Construction of Perfect Nonlinear and Maximally Nonlinear Multiple-Output Boolean Functions Satisfying Higher Order Strict Avalanche Criteria
IEEE Transactions on Information Theory
2008-12-21Paper
Masking-Based Domain Extenders for UOWHFs: Bounds and Constructions
IEEE Transactions on Information Theory
2008-12-21Paper
Improved construction of nonlinear resilient S-boxes
 
2008-12-21Paper
Toward a General Correlation Theorem
IEEE Transactions on Information Theory
2008-12-21Paper
Construction of Nonlinear Resilient Boolean Functions Using “Small” Affine Functions
IEEE Transactions on Information Theory
2008-12-21Paper
Deterministic Constructions of 21-Step Collisions for the SHA-2 Hash Family
Lecture Notes in Computer Science
2008-11-20Paper
Non-linear Reduced Round Attacks against SHA-2 Hash Family
Information Security and Privacy
2008-07-08Paper
Attacking Reduced Round SHA-256
Applied Cryptography and Network Security
2008-06-13Paper
Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks
Provable Security
2008-06-10Paper
Generic Attacks on Symmetric Ciphers
Information Security and Cryptology – ICISC 2006
2008-05-06Paper
New Constructions of Constant Size Ciphertext HIBE Without Random Oracle
Information Security and Cryptology – ICISC 2006
2008-05-06Paper
HIBE With Short Public Parameters Without Random Oracle
Advances in Cryptology – ASIACRYPT 2006
2008-04-24Paper
Multi-receiver Identity-Based Key Encapsulation with Shortened Ciphertext
Progress in Cryptology - INDOCRYPT 2006
2008-04-11Paper
HCH: A New Tweakable Enciphering Scheme Using the Hash-Encrypt-Hash Approach
Progress in Cryptology - INDOCRYPT 2006
2008-04-11Paper
New Applications of Time Memory Data Tradeoffs
Lecture Notes in Computer Science
2008-03-18Paper
Efficient Computation of Tate Pairing in Projective Coordinate over General Characteristic Fields
Lecture Notes in Computer Science
2008-03-17Paper
Progress in Cryptology - INDOCRYPT 2003
Lecture Notes in Computer Science
2007-11-29Paper
Progress in Cryptology - INDOCRYPT 2003
Lecture Notes in Computer Science
2007-11-29Paper
Progress in Cryptology - INDOCRYPT 2003
Lecture Notes in Computer Science
2007-11-29Paper
Improved Time-Memory Trade-Offs with Multiple Data
Selected Areas in Cryptography
2007-11-15Paper
Balancedness and correlation immunity of symmetric Boolean functions
Discrete Mathematics
2007-09-21Paper
Construction of universal one-way hash functions: tree hashing revisited
Discrete Applied Mathematics
2007-09-21Paper
Computing Walsh Transform from the Algebraic Normal Form of a Boolean Function
Electronic Notes in Discrete Mathematics
2007-05-29Paper
Balancedness and Correlation Immunity of Symmetric Boolean Functions
Electronic Notes in Discrete Mathematics
2007-05-29Paper
Public Key Cryptography - PKC 2006
Lecture Notes in Computer Science
2007-05-02Paper
Information Security and Cryptology - ICISC 2005
Lecture Notes in Computer Science
2007-05-02Paper
Construction of nonlinear Boolean functions with important cryptographic properties
 
2006-03-01Paper
Progress in Cryptology - INDOCRYPT 2004
Lecture Notes in Computer Science
2005-12-22Paper
Information Security and Privacy
Lecture Notes in Computer Science
2005-09-07Paper
Information and Communications Security
Lecture Notes in Computer Science
2005-08-19Paper
Masking Based Domain Extenders for UOWHFs: Bounds and Constructions
 
2005-08-12Paper
Time-Memory Trade-Off Attacks on Multiplications and T-Functions
 
2005-08-12Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2005-06-13Paper
Maximum nonlinearity of symmetric Boolean functions on odd number of variables
IEEE Transactions on Information Theory
2005-05-11Paper
An efficient algorithm for software generation of binary linear recurrences
Applicable Algebra in Engineering, Communication and Computing
2005-02-09Paper
A characterization and some properties of the Banzhaf-Coleman-Dubey-Shapley sensitivity index
Games and Economic Behavior
2004-11-19Paper
Construction of symmetric balanced squares with blocksize more than one
Designs, Codes and Cryptography
2003-11-10Paper
Improved Construction of Nonlinear Resilient S-Boxes
Lecture Notes in Computer Science
2003-07-16Paper
scientific article; zbMATH DE number 1942442 (Why is no real title available?)
 
2003-06-30Paper
scientific article; zbMATH DE number 1857520 (Why is no real title available?)
 
2003-05-19Paper
Computing shifts in 90/150 cellular automata sequences
Finite Fields and their Applications
2003-05-04Paper
scientific article; zbMATH DE number 1885950 (Why is no real title available?)
 
2003-03-19Paper
scientific article; zbMATH DE number 1878340 (Why is no real title available?)
 
2003-03-09Paper
scientific article; zbMATH DE number 1857512 (Why is no real title available?)
 
2003-01-29Paper
scientific article; zbMATH DE number 1759799 (Why is no real title available?)
 
2002-10-07Paper
Modifications of Patterson-Wiedemann functions for cryptographic applications
IEEE Transactions on Information Theory
2002-08-04Paper
Hamming weights of correlation immune Boolean functions
Information Processing Letters
2002-07-25Paper
Cryptographically significant Boolean functions with five valued Walsh spectra
Theoretical Computer Science
2002-07-15Paper
Spectral domain analysis of correlation immune and resilient Boolean functions
Finite Fields and their Applications
2002-07-04Paper
Cross-correlation analysis of cryptographically useful boolean functions and s-boxes
Theory of Computing Systems
2002-05-30Paper
New constructions of resilient and correlation immune Boolean functions achieving upper bound on nonlinearity
 
2001-10-14Paper
scientific article; zbMATH DE number 1583948 (Why is no real title available?)
 
2001-09-03Paper
Ciphertext Only Attack on LFSR Based Encryption Scheme
Calcutta Statistical Association Bulletin
2000-11-14Paper
scientific article; zbMATH DE number 1303957 (Why is no real title available?)
 
1999-06-17Paper
Construction of Nearly Balanced Uniform Repeated Measurement Designs
Calcutta Statistical Association Bulletin
1999-04-26Paper
scientific article; zbMATH DE number 1418296 (Why is no real title available?)
 
1999-01-01Paper
Polynomial division using left shift register
Computers & Mathematics with Applications
1998-08-20Paper
Multidimensional \(\sigma\)-automata, \(\pi\)-polynomials and generalised S-matrices
Theoretical Computer Science
1998-08-13Paper
The set of reversible \(90/150\) cellular automata is regular
Discrete Applied Mathematics
1998-07-28Paper
scientific article; zbMATH DE number 1098621 (Why is no real title available?)
 
1997-12-18Paper
New Correlation Bound and Construction of Quasi-Complementary Code Sets
 
N/APaper


Research outcomes over time


This page was built for person: Palash Sarkar