Indivar Gupta

Orcid: 0000-0003-2801-0254

According to our database1, Indivar Gupta authored at least 20 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
An ultra-lightweight block cipher with string transformations.
Cryptologia, September, 2024

New classes of permutation trinomials of F22m.
Finite Fields Their Appl., 2024

Symmetric Encryption Scheme Based on Quasigroup Using Chained Mode of Operation.
CoRR, 2024

On the Comparative Study of Recent Information Set Decoding (ISD) Attacks for QC-LDPC Code-Based McEliece Cryptosystem.
Proceedings of the IEEE International Conference on Public Key Infrastructure and its Applications, 2024

2023
A study of public key cryptosystems based on quasigroups.
Cryptologia, November, 2023

On the security of DLCSP over $GL_n(\mathbb {F}_q[S_r])$.
Appl. Algebra Eng. Commun. Comput., July, 2023

On the symbol-pair distance of some classes of repeated-root constacyclic codes over Galois ring.
Appl. Algebra Eng. Commun. Comput., 2023

2022
Construction of cryptographically strong S-boxes from ternary quasigroups of order 4.
Cryptologia, 2022

2021
Improved cryptanalysis of a ElGamal Cryptosystem Based on Matrices Over Group Rings.
J. Math. Cryptol., 2021

Quasigroups and their applications in cryptography.
Cryptologia, 2021

2020
SMT Solver-Based Cryptanalysis of Block Ciphers.
SN Comput. Sci., 2020

Survey on SAP and its application in public-key cryptography.
J. Math. Cryptol., 2020

Hamming distance of repeated-root constacyclic codes of length 2p<sup>s</sup> over ${\mathbb {F}}_{p^m}+u{\mathbb {F}}_{p^m}$.
Appl. Algebra Eng. Commun. Comput., 2020

2017
BDD-based cryptanalysis of stream cipher: a practical approach.
IET Inf. Secur., 2017

2016
Undeniable signature scheme based over group ring.
Appl. Algebra Eng. Commun. Comput., 2016

2011
Generalized Avalanche Test for Stream Cipher Analysis.
Proceedings of the Security Aspects in Information Technology, 2011

Distributed Signcryption Schemes with Formal Proof of Security.
Proceedings of the Security Aspects in Information Technology, 2011

Distributed Signcryption from Pairings.
Proceedings of the Information Systems Security - 7th International Conference, 2011

2007
Cryptanalysis of an Extension of the Hill Cipher.
Cryptologia, 2007

2003
Cryptological Applications of Permutation Polynomials.
Electron. Notes Discret. Math., 2003


  Loading...