Kishan Chand Gupta
According to our database1,
Kishan Chand Gupta
authored at least 47 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
2023
2022
Proceedings of the Progress in Cryptology, 2022
Proceedings of the Progress in Cryptology, 2022
2019
Cryptographically significant mds matrices over finite fields: A brief survey and some generalized results.
Adv. Math. Commun., 2019
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2019
2018
On Diffusion Layers of SPN Based Format Preserving Encryption Schemes: Format Preserving Sets Revisited.
Proceedings of the Progress in Cryptology - INDOCRYPT 2018, 2018
2017
Applications of design theory for the constructions of MDS matrices for lightweight cryptography.
J. Math. Cryptol., 2017
Des. Codes Cryptogr., 2017
2016
Proceedings of the Progress in Cryptology - INDOCRYPT 2016, 2016
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016
2015
IEEE Trans. Inf. Theory, 2015
Cryptographically significant MDS matrices based on circulant and circulant-like matrices for lightweight applications.
Cryptogr. Commun., 2015
2014
Proceedings of the Information Security Practice and Experience, 2014
2013
On Constructions of MDS Matrices from Companion Matrices for Lightweight Cryptography.
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Progress in Cryptology, 2013
Stream and block ciphers.
Proceedings of the Handbook of Finite Fields., 2013
2012
Proceedings of the Handbook of Finite State Based Models and Applications., 2012
2011
Upper bound for algebraic immunity on a subclass of Maiorana McFarland class of bent functions.
Inf. Process. Lett., 2011
2009
IEEE Trans. Inf. Theory, 2009
Computing Partial Walsh Transform From the Algebraic Normal Form of a Boolean Function.
IEEE Trans. Inf. Theory, 2009
2008
2006
Algebraic Immunity for Cryptographically Significant Boolean Functions: Analysis and Construction.
IEEE Trans. Inf. Theory, 2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Progress in Cryptology, 2006
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006
A General Methodology for Pipelining the Point Multiplication Operation in Curve Based Cryptography.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006
2005
Theor. Comput. Sci., 2005
Inf. Process. Lett., 2005
Cryptographically Significant Boolean Functions: Construction and Analysis in Terms of Algebraic Immunity.
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005
2004
Construction of Perfect Nonlinear and Maximally Nonlinear Multiple-Output Boolean Functions Satisfying Higher Order Strict Avalanche Criteria.
IEEE Trans. Inf. Theory, 2004
Efficient Representation and Software Implementation of Resilient Maiorana-McFarland S-boxes.
Proceedings of the Information Security Applications, 5th International Workshop, 2004
Proceedings of the Progress in Cryptology, 2004
2003
Construction of Perfect Nonlinear and Maximally Nonlinear Multi-Output Boolean Functions Satisfying Higher Order Strict Avalanche Criteria.
IACR Cryptol. ePrint Arch., 2003
Electron. Notes Discret. Math., 2003
Construction of Perfect Nonlinear and Maximally Nonlinear Multi-output Boolean Functions Satisfying Higher Order Strict Avalanche Criteria (Extended Abstract).
Proceedings of the Progress in Cryptology, 2003
2002
Proceedings of the Selected Areas in Cryptography, 2002
2001
Proceedings of the Progress in Cryptology, 2001
Proceedings of the Information and Communications Security, Third International Conference, 2001