The following pages link to Palash Sarkar (Q293720):
Displaying 50 items.
- Another look at normal approximations in cryptanalysis (Q293721) (← links)
- A note on the spectral characterization of correlation immune Boolean functions (Q294767) (← links)
- On modes of operations of a block cipher for authentication and authenticated encryption (Q301626) (← links)
- A new multi-linear universal hash family (Q369419) (← links)
- Practical hybrid (hierarchical) identity-based encryption schemes based on the decisional bilinear Diffie-Hellman assumption (Q381130) (← links)
- Tree based symmetric key broadcast encryption (Q491159) (← links)
- An inequality paradox: relative versus absolute indices? (Q824975) (← links)
- Variants of Wegman-Carter message authentication code supporting variable tag lengths (Q831162) (← links)
- Another look at XCB (Q892505) (← links)
- A general mixing strategy for the ECB-Mix-ECB mode of operation (Q975544) (← links)
- Domain extender for collision resistant hash functions: Improving upon Merkle-Damgård iteration (Q1028435) (← links)
- A combinatorial analysis of recent attacks on step reduced SHA-2 family (Q1032494) (← links)
- Minimal-axiom characterizations of the Coleman and Banzhaf indices of voting power (Q1038273) (← links)
- Construction of high degree resilient S-boxes with improved nonlinearity (Q1041800) (← links)
- Multidimensional \(\sigma\)-automata, \(\pi\)-polynomials and generalised S-matrices (Q1128666) (← links)
- Polynomial division using left shift register (Q1130425) (← links)
- The set of reversible \(90/150\) cellular automata is regular (Q1392576) (← links)
- Construction of symmetric balanced squares with blocksize more than one (Q1412252) (← links)
- (Q1597759) (redirect page) (← links)
- Cross-correlation analysis of cryptographically useful boolean functions and s-boxes (Q1597761) (← links)
- Spectral domain analysis of correlation immune and resilient Boolean functions (Q1604422) (← links)
- Cryptographically significant Boolean functions with five valued Walsh spectra (Q1605307) (← links)
- Hamming weights of correlation immune Boolean functions (Q1606982) (← links)
- Multiple (truncated) differential cryptanalysis: explicit upper bounds on data complexity (Q1667453) (← links)
- Rigorous upper bounds on data complexities of block cipher cryptanalysis (Q1676236) (← links)
- Kummer for genus one over prime order fields (Q1703913) (← links)
- Connecting Legendre with Kummer and Edwards (Q1726008) (← links)
- Evaluating Bernstein-Rabin-Winograd polynomials (Q1727367) (← links)
- Success probability of multiple/multidimensional linear cryptanalysis under general key randomisation hypotheses (Q1749795) (← links)
- An efficient algorithm for software generation of binary linear recurrences (Q1762549) (← links)
- Computing shifts in 90/150 cellular automata sequences (Q1870028) (← links)
- A characterization and some properties of the Banzhaf-Coleman-Dubey-Shapley sensitivity index (Q1886743) (← links)
- Complete tree subset difference broadcast encryption scheme and its analysis (Q1934221) (← links)
- Tweakable enciphering schemes using only the encryption function of a block cipher (Q1944173) (← links)
- Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector (Q2016427) (← links)
- Weighted voting procedure having a unique blocker (Q2021799) (← links)
- Verifying solutions to LWE with implications for concrete security (Q2025364) (← links)
- Breaking tweakable enciphering schemes using Simon's algorithm (Q2043415) (← links)
- \textsf{FAST}: disk encryption and beyond (Q2070266) (← links)
- Efficient arithmetic in (pseudo-)Mersenne prime order fields (Q2085714) (← links)
- On the ``majority is least stable'' conjecture (Q2094376) (← links)
- Separation results for Boolean function classes (Q2119852) (← links)
- Inequality minimising subsidy and taxation (Q2157283) (← links)
- Another look at success probability of linear cryptanalysis (Q2274241) (← links)
- Faster initial splitting for small characteristic composite extension degree fields (Q2302583) (← links)
- Kummer for genus one over prime-order fields (Q2303455) (← links)
- Construction of universal one-way hash functions: tree hashing revisited (Q2384401) (← links)
- Balancedness and correlation immunity of symmetric Boolean functions (Q2384416) (← links)
- Another look at tightness. II: Practical issues in cryptography (Q2412214) (← links)
- A new test statistic for key recovery attacks using multiple linear approximations (Q2412231) (← links)