Palash Sarkar

From MaRDI portal
(Redirected from Person:293720)


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Polynomial hashing over prime order fields
Advances in Mathematics of Communications
2024-12-03Paper
Construction of spectrally-null-constrained zero-correlation zone sequences with flexible support
Cryptography and Communications
2024-11-26Paper
Concrete time/memory trade-offs in generalised Stern's ISD algorithm
 
2024-10-23Paper
Correlation and inequality in weighted majority voting games
 
2024-09-11Paper
Concrete analysis of approximate ideal-SIVP to decision ring-LWE reduction
Advances in Mathematics of Communications
2024-08-06Paper
New correlation bound and construction of quasi-complementary sequence sets
IEEE Transactions on Information Theory
2024-07-22Paper
Computing square roots faster than the Tonelli-Shanks/Bernstein algorithm
Advances in Mathematics of Communications
2023-12-14Paper
Another look at key randomisation hypotheses
Designs, Codes and Cryptography
2023-11-20Paper
Notes on the postulate of the monotonicity in distance in inequality
Bulletin of Economic Research
2023-10-17Paper
Influence of a Set of Variables on a Boolean Function
SIAM Journal on Discrete Mathematics
2023-09-27Paper
Distinguishing error of nonlinear invariant attacks
Lecture Notes in Computer Science
2023-08-14Paper
Combining Montgomery multiplication with tag tracing for the Pollard rho algorithm in prime order fields
Security, Privacy, and Applied Cryptography Engineering
2023-08-04Paper
New perspectives on the Gini and Bonferroni indices of inequality
Social Choice and Welfare
2023-07-11Paper
Classical reduction of gap SVP to LWE: a concrete security analysis
Advances in Mathematics of Communications
2023-07-07Paper
A direct construction of even length ZCPs with large ZCZ ratio
Cryptography and Communications
2023-06-20Paper
Counting unate and balanced monotone Boolean functions
 
2023-04-27Paper
Kummer versus Montgomery Face-off over Prime Order Fields
ACM Transactions on Mathematical Software
2023-03-22Paper
On the ``majority is least stable conjecture
Information Processing Letters
2022-10-28Paper
Efficient arithmetic in (pseudo-)Mersenne prime order fields
Advances in Mathematics of Communications
2022-10-18Paper
Efficient 4-Way Vectorizations of the Montgomery Ladder
IEEE Transactions on Computers
2022-08-05Paper
Inequality minimising subsidy and taxation
Economic Theory Bulletin
2022-07-27Paper
Separation results for Boolean function classes
Cryptography and Communications
2022-03-30Paper
\textsf{FAST}: disk encryption and beyond
Advances in Mathematics of Communications
2022-01-24Paper
An inequality paradox: relative versus absolute indices?
Metron
2021-12-16Paper
Breaking tweakable enciphering schemes using Simon's algorithm
Designs, Codes and Cryptography
2021-08-02Paper
Verifying solutions to LWE with implications for concrete security
Advances in Mathematics of Communications
2021-05-12Paper
Variants of Wegman-Carter message authentication code supporting variable tag lengths
Designs, Codes and Cryptography
2021-05-10Paper
Weighted voting procedure having a unique blocker
International Journal of Game Theory
2021-04-27Paper
Simpson's Paradox: A Singularity of Statistical and Inductive Inference
 
2021-03-31Paper
Kummer for genus one over prime-order fields
Journal of Cryptology
2020-03-03Paper
Faster initial splitting for small characteristic composite extension degree fields
Finite Fields and their Applications
2020-02-26Paper
Another look at success probability of linear cryptanalysis
Advances in Mathematics of Communications
2019-09-19Paper
A Direct Construction of Z-Complementary Pairs Using Generalized Boolean Functions
 
2019-07-31Paper
A Direct Construction of Optimal ZCCS With Maximum Column Sequence PMEPR Two for MC-CDMA System
 
2019-07-02Paper
Evaluating Bernstein-Rabin-Winograd polynomials
Designs, Codes and Cryptography
2019-02-20Paper
Connecting Legendre with Kummer and Edwards
Advances in Mathematics of Communications
2019-02-15Paper
Multiple (truncated) differential cryptanalysis: explicit upper bounds on data complexity
Cryptography and Communications
2018-08-28Paper
Success probability of multiple/multidimensional linear cryptanalysis under general key randomisation hypotheses
Cryptography and Communications
2018-05-28Paper
Kummer for genus one over prime order fields
 
2018-03-08Paper
Rigorous upper bounds on data complexities of block cipher cryptanalysis
Journal of Mathematical Cryptology
2017-11-06Paper
A new test statistic for key recovery attacks using multiple linear approximations
 
2017-10-23Paper
Another look at tightness. II: Practical issues in cryptography
 
2017-10-23Paper
Efficient Tweakable Enciphering Schemes From (Block-Wise) Universal Hash Functions
IEEE Transactions on Information Theory
2017-08-08Paper
Computing Partial Walsh Transform From the Algebraic Normal Form of a Boolean Function
IEEE Transactions on Information Theory
2017-08-08Paper
Pseudo-Random Functions and Parallelizable Modes of Operations of a Block Cipher
IEEE Transactions on Information Theory
2017-07-27Paper
Efficient hardware implementations of brw polynomials and tweakable enciphering schemes
IEEE Transactions on Computers
2017-07-12Paper
On Quantifying the Resistance of Concrete Hash Functions to Generic Multicollision Attacks
IEEE Transactions on Information Theory
2017-07-12Paper
Concrete Analysis and Trade-Offs for the (Complete Tree) Layered Subset Difference Broadcast Encryption Scheme
IEEE Transactions on Computers
2017-06-20Paper
<monospace>STES</monospace>: A Stream Cipher Based Low Cost Scheme for Securing Stored Data
IEEE Transactions on Computers
2017-05-16Paper
Reducing Communication Overhead of the Subset Difference Scheme
IEEE Transactions on Computers
2017-05-16Paper
Efficient Adaptively Secure IBBE From the SXDH Assumption
IEEE Transactions on Information Theory
2017-04-28Paper
New complexity trade-offs for the (multiple) number field sieve algorithm in non-prime fields
Advances in Cryptology – EUROCRYPT 2016
2016-09-09Paper
On modes of operations of a block cipher for authentication and authenticated encryption
Cryptography and Communications
2016-07-01Paper
A note on the spectral characterization of correlation immune Boolean functions
Information Processing Letters
2016-06-16Paper
Another look at normal approximations in cryptanalysis
Journal of Mathematical Cryptology
2016-06-09Paper
On Irreducible Polynomials of the Form $b(x^d)$
 
2016-04-28Paper
Another look at XCB
Cryptography and Communications
2015-11-19Paper
Efficient (anonymous) compact HIBE from standard assumptions
Provable Security
2015-09-29Paper
Some randomness experiments on TRIVIUM
Security, Privacy, and Applied Cryptography Engineering
2015-09-18Paper
Tree based symmetric key broadcast encryption
Journal of Discrete Algorithms
2015-08-24Paper
A course on cooperative game theory
 
2014-11-20Paper
Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector
Cryptography and Communications
2014-06-20Paper
On some connections between statistics and cryptology
Journal of Statistical Planning and Inference
2014-03-13Paper
Anonymous constant-size ciphertext HIBE from asymmetric pairings
Cryptography and Coding
2014-01-17Paper
Practical hybrid (hierarchical) identity-based encryption schemes based on the decisional bilinear Diffie-Hellman assumption
International Journal of Applied Cryptography
2013-11-15Paper
A new multi-linear universal hash family
Designs, Codes and Cryptography
2013-09-24Paper
Tweakable enciphering schemes using only the encryption function of a block cipher
Information Processing Letters
2013-04-04Paper
Complete tree subset difference broadcast encryption scheme and its analysis
Designs, Codes and Cryptography
2013-01-28Paper
Variants of Waters' dual system primitives using asymmetric pairings. (Extended abstract)
Public Key Cryptography – PKC 2012
2012-07-20Paper
Another look at tightness
Selected Areas in Cryptography
2012-06-08Paper
Identity-based encryption
 
2011-04-07Paper
A trade-off between collision probability and key size in universal hashing using polynomials
Designs, Codes and Cryptography
2011-04-06Paper
A general mixing strategy for the ECB-Mix-ECB mode of operation
Information Processing Letters
2010-06-09Paper
PARSHA-256 -- a new parallelizable hash function and a multithreaded implementation.
Lecture Notes in Computer Science
2010-01-05Paper
Parallelizing explicit formula for arithmetic in the Jacobian of hyperelliptic curves
Lecture Notes in Computer Science
2010-01-05Paper
Construction of high degree resilient S-boxes with improved nonlinearity
Information Processing Letters
2009-12-04Paper
Minimal-axiom characterizations of the Coleman and Banzhaf indices of voting power
Mathematical Social Sciences
2009-11-17Paper
A combinatorial analysis of recent attacks on step reduced SHA-2 family
Cryptography and Communications
2009-10-26Paper
Domain extender for collision resistant hash functions: Improving upon Merkle-Damgård iteration
Discrete Applied Mathematics
2009-06-30Paper
Public Key Cryptography – PKC 2004
Lecture Notes in Computer Science
2009-05-14Paper
A New Mode of Encryption Providing a Tweakable Strong Pseudo-random Permutation
Fast Software Encryption
2009-04-02Paper
Identity-based encryption and hierarchical identity-based encryption
 
2009-03-24Paper
HCH: A New Tweakable Enciphering Scheme Using the Hash-Counter-Hash Approach
IEEE Transactions on Information Theory
2009-02-24Paper
A General Construction of Tweakable Block Ciphers and Different Modes of Operations
IEEE Transactions on Information Theory
2009-02-24Paper
Pairing Computation on Twisted Edwards Form Elliptic Curves
Pairing-Based Cryptography – Pairing 2008
2009-02-10Paper
Application of LFSRs for Parallel Sequence Generation in Cryptologic Algorithms
Computational Science and Its Applications - ICCSA 2006
2009-02-10Paper
New Collision Attacks against Up to 24-Step SHA-2
Progress in Cryptology - INDOCRYPT 2008
2009-01-22Paper
A General Construction of Tweakable Block Ciphers and Different Modes of Operations
Information Security and Cryptology
2009-01-15Paper
Improved construction of nonlinear resilient S-boxes
 
2008-12-21Paper
Toward a General Correlation Theorem
IEEE Transactions on Information Theory
2008-12-21Paper
Construction of Nonlinear Resilient Boolean Functions Using “Small” Affine Functions
IEEE Transactions on Information Theory
2008-12-21Paper
Construction of Perfect Nonlinear and Maximally Nonlinear Multiple-Output Boolean Functions Satisfying Higher Order Strict Avalanche Criteria
IEEE Transactions on Information Theory
2008-12-21Paper
Masking-Based Domain Extenders for UOWHFs: Bounds and Constructions
IEEE Transactions on Information Theory
2008-12-21Paper
Deterministic Constructions of 21-Step Collisions for the SHA-2 Hash Family
Lecture Notes in Computer Science
2008-11-20Paper
Non-linear Reduced Round Attacks against SHA-2 Hash Family
Information Security and Privacy
2008-07-08Paper
Attacking Reduced Round SHA-256
Applied Cryptography and Network Security
2008-06-13Paper
Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks
Provable Security
2008-06-10Paper
Generic Attacks on Symmetric Ciphers
Information Security and Cryptology – ICISC 2006
2008-05-06Paper
New Constructions of Constant Size Ciphertext HIBE Without Random Oracle
Information Security and Cryptology – ICISC 2006
2008-05-06Paper
HIBE With Short Public Parameters Without Random Oracle
Advances in Cryptology – ASIACRYPT 2006
2008-04-24Paper
Multi-receiver Identity-Based Key Encapsulation with Shortened Ciphertext
Progress in Cryptology - INDOCRYPT 2006
2008-04-11Paper
HCH: A New Tweakable Enciphering Scheme Using the Hash-Encrypt-Hash Approach
Progress in Cryptology - INDOCRYPT 2006
2008-04-11Paper
New Applications of Time Memory Data Tradeoffs
Lecture Notes in Computer Science
2008-03-18Paper
Efficient Computation of Tate Pairing in Projective Coordinate over General Characteristic Fields
Lecture Notes in Computer Science
2008-03-17Paper
Progress in Cryptology - INDOCRYPT 2003
Lecture Notes in Computer Science
2007-11-29Paper
Progress in Cryptology - INDOCRYPT 2003
Lecture Notes in Computer Science
2007-11-29Paper
Progress in Cryptology - INDOCRYPT 2003
Lecture Notes in Computer Science
2007-11-29Paper
Improved Time-Memory Trade-Offs with Multiple Data
Selected Areas in Cryptography
2007-11-15Paper
Balancedness and correlation immunity of symmetric Boolean functions
Discrete Mathematics
2007-09-21Paper
Construction of universal one-way hash functions: tree hashing revisited
Discrete Applied Mathematics
2007-09-21Paper
Computing Walsh Transform from the Algebraic Normal Form of a Boolean Function
Electronic Notes in Discrete Mathematics
2007-05-29Paper
Balancedness and Correlation Immunity of Symmetric Boolean Functions
Electronic Notes in Discrete Mathematics
2007-05-29Paper
Information Security and Cryptology - ICISC 2005
Lecture Notes in Computer Science
2007-05-02Paper
Public Key Cryptography - PKC 2006
Lecture Notes in Computer Science
2007-05-02Paper
Construction of nonlinear Boolean functions with important cryptographic properties
 
2006-03-01Paper
Progress in Cryptology - INDOCRYPT 2004
Lecture Notes in Computer Science
2005-12-22Paper
Information Security and Privacy
Lecture Notes in Computer Science
2005-09-07Paper
Information and Communications Security
Lecture Notes in Computer Science
2005-08-19Paper
Time-Memory Trade-Off Attacks on Multiplications and T-Functions
 
2005-08-12Paper
Masking Based Domain Extenders for UOWHFs: Bounds and Constructions
 
2005-08-12Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2005-06-13Paper
Maximum nonlinearity of symmetric Boolean functions on odd number of variables
IEEE Transactions on Information Theory
2005-05-11Paper
An efficient algorithm for software generation of binary linear recurrences
Applicable Algebra in Engineering, Communication and Computing
2005-02-09Paper
A characterization and some properties of the Banzhaf-Coleman-Dubey-Shapley sensitivity index
Games and Economic Behavior
2004-11-19Paper
Construction of symmetric balanced squares with blocksize more than one
Designs, Codes and Cryptography
2003-11-10Paper
Improved Construction of Nonlinear Resilient S-Boxes
Lecture Notes in Computer Science
2003-07-16Paper
scientific article; zbMATH DE number 1942442 (Why is no real title available?)
 
2003-06-30Paper
scientific article; zbMATH DE number 1857520 (Why is no real title available?)
 
2003-05-19Paper
Computing shifts in 90/150 cellular automata sequences
Finite Fields and their Applications
2003-05-04Paper
scientific article; zbMATH DE number 1885950 (Why is no real title available?)
 
2003-03-19Paper
scientific article; zbMATH DE number 1878340 (Why is no real title available?)
 
2003-03-09Paper
scientific article; zbMATH DE number 1857512 (Why is no real title available?)
 
2003-01-29Paper
scientific article; zbMATH DE number 1759799 (Why is no real title available?)
 
2002-10-07Paper
Modifications of Patterson-Wiedemann functions for cryptographic applications
IEEE Transactions on Information Theory
2002-08-04Paper
Hamming weights of correlation immune Boolean functions
Information Processing Letters
2002-07-25Paper
Cryptographically significant Boolean functions with five valued Walsh spectra
Theoretical Computer Science
2002-07-15Paper
Spectral domain analysis of correlation immune and resilient Boolean functions
Finite Fields and their Applications
2002-07-04Paper
Cross-correlation analysis of cryptographically useful boolean functions and s-boxes
Theory of Computing Systems
2002-05-30Paper
New constructions of resilient and correlation immune Boolean functions achieving upper bound on nonlinearity
 
2001-10-14Paper
scientific article; zbMATH DE number 1583948 (Why is no real title available?)
 
2001-09-03Paper
Ciphertext Only Attack on LFSR Based Encryption Scheme
Calcutta Statistical Association Bulletin
2000-11-14Paper
scientific article; zbMATH DE number 1303957 (Why is no real title available?)
 
1999-06-17Paper
Construction of Nearly Balanced Uniform Repeated Measurement Designs
Calcutta Statistical Association Bulletin
1999-04-26Paper
scientific article; zbMATH DE number 1418296 (Why is no real title available?)
 
1999-01-01Paper
Polynomial division using left shift register
Computers & Mathematics with Applications
1998-08-20Paper
Multidimensional \(\sigma\)-automata, \(\pi\)-polynomials and generalised S-matrices
Theoretical Computer Science
1998-08-13Paper
The set of reversible \(90/150\) cellular automata is regular
Discrete Applied Mathematics
1998-07-28Paper
scientific article; zbMATH DE number 1098621 (Why is no real title available?)
 
1997-12-18Paper
New Correlation Bound and Construction of Quasi-Complementary Code Sets
 
N/APaper


Research outcomes over time


This page was built for person: Palash Sarkar