ติดตาม
Palash Sarkar
Palash Sarkar
ยืนยันอีเมลแล้วที่ isical.ac.in - หน้าแรก
ชื่อ
อ้างโดย
อ้างโดย
ปี
A brief history of cellular automata
P Sarkar
Acm computing surveys (csur) 32 (1), 80-107, 2000
5772000
Pairing-based cryptography: A survey
R Dutta, R Barua, P Sarkar
Cryptology Research Group, Stat-Math and Applied Statistics Unit 203, 2004
350*2004
Nonlinearity bounds and constructions of resilient Boolean functions
P Sarkar, S Maitra
Advances in Cryptology—CRYPTO 2000: 20th Annual International Cryptology …, 2000
2722000
Construction of nonlinear Boolean functions with important cryptographic properties
P Sarkar, S Maitra
International Conference on the Theory and Applications of Cryptographic …, 2000
2432000
New applications of time memory data tradeoffs
J Hong, P Sarkar
Advances in Cryptology-ASIACRYPT 2005: 11th International Conference on the …, 2005
215*2005
Extending Joux’s protocol to multi party key agreement
R Barua, R Dutta, P Sarkar
Progress in Cryptology-INDOCRYPT 2003: 4th International Conference on …, 2003
1662003
A simple and generic construction of authenticated encryption with associated data
P Sarkar
ACM Transactions on Information and System Security (TISSEC) 13 (4), 1-16, 2010
1542010
New constructions of resilient and correlation immune Boolean functions achieving upper bound on nonlinearity
E Pasalic, S Maitra, T Johansson, P Sarkar
Electronic Notes in Discrete Mathematics 6, 158-167, 2001
1462001
Challenges with assessing the impact of NFS advances on the security of pairing-based cryptography
A Menezes, P Sarkar, S Singh
International Conference on Cryptology in Malaysia, 83-108, 2016
1282016
Improved time-memory trade-offs with multiple data
A Biryukov, S Mukhopadhyay, P Sarkar
International Workshop on Selected Areas in Cryptography, 110-127, 2005
1272005
HCH: A new tweakable enciphering scheme using the hash-counter-hash approach
D Chakraborty, P Sarkar
IEEE Transactions on Information Theory 54 (4), 1683-1699, 2008
125*2008
Trading time for space: Towards an efficient IBE scheme with short (er) public parameters in the standard model
S Chatterjee, P Sarkar
Information Security and Cryptology-ICISC 2005: 8th International Conference …, 2006
1192006
Efficient tweakable enciphering schemes from (block-wise) universal hash functions
P Sarkar
IEEE Transactions on Information Theory 55 (10), 4749-4760, 2009
118*2009
New collision attacks against up to 24-step SHA-2
SK Sanadhya, P Sarkar
Progress in Cryptology-INDOCRYPT 2008: 9th International Conference on …, 2008
1142008
Spectral domain analysis of correlation immune and resilient Boolean functions
C Carlet, P Sarkar
Finite Fields and Their Applications 8 (1), 120-130, 2002
1142002
Identity-based encryption
S Chatterjee, P Sarkar
Springer Science & Business Media, 2011
1062011
Another look at tightness
S Chatterjee, A Menezes, P Sarkar
International Workshop on Selected Areas in Cryptography, 293-319, 2011
902011
A new mode of encryption providing a tweakable strong pseudo-random permutation
D Chakraborty, P Sarkar
Fast Software Encryption: 13th International Workshop, FSE 2006, Graz …, 2006
842006
A course on cooperative game theory
SR Chakravarty, M Mitra, P Sarkar
Cambridge University Press, 2014
792014
Cross-correlation analysis of cryptographically useful Boolean functions and S-boxes
P Sarkar, S Maitra
Theory of Computing Systems 35 (1), 39-57, 2002
782002
ระบบไม่สามารถดำเนินการได้ในขณะนี้ โปรดลองใหม่อีกครั้งในภายหลัง
บทความ 1–20