Kunwar Singh
According to our database1,
Kunwar Singh
authored at least 41 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Updated delegated proof of stake and Nash equilibrium: A mining pool game model for blockchain network.
Concurr. Comput. Pract. Exp., October, 2024
Multim. Tools Appl., August, 2024
Multim. Tools Appl., May, 2024
A single operational amplifier-based grounded meminductor mutators and their applications.
Turkish J. Electr. Eng. Comput. Sci., 2024
CoRR, 2024
Comput. J., 2024
Privacy preserving decentralized swap derivative with deep learning based oracles leveraging blockchain technology and cryptographic primitives.
Comput. Electr. Eng., 2024
2023
Int. J. Ad Hoc Ubiquitous Comput., 2023
Secure proof of the sum of all the elements of a matrix of finite field elements in zero-knowledge.
Int. J. Ad Hoc Ubiquitous Comput., 2023
Cryptanalysis of stream cipher LIZARD using division property and MILP based cube attack.
Discret. Appl. Math., 2023
2022
IEEE Trans. Dependable Secur. Comput., 2022
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2022
CoRR, 2022
Comput. Secur., 2022
Proceedings of the Mobile Internet Security - 6th International Symposium, 2022
2021
Oblivious stable sorting protocol and oblivious binary search protocol for secure multi-party computation.
J. High Speed Networks, 2021
IET Inf. Secur., 2021
Secure Distributed Medical Record Storage using Blockchain and Emergency Sharing Using Multi-Party Computation.
Proceedings of the 11th IFIP International Conference on New Technologies, 2021
2020
A hierarchical identity-based security for delay tolerant networks using lattice-based cryptography.
Peer-to-Peer Netw. Appl., 2020
J. Inf. Secur. Appl., 2020
Securely solving privacy preserving minimum spanning tree algorithms in semi-honest model.
Int. J. Ad Hoc Ubiquitous Comput., 2020
2019
A closed-loop ASIC design approach based on logical effort theory and artificial neural networks.
Integr., 2019
2018
Optimum transistor sizing of CMOS logic circuits using logical effort theory and evolutionary algorithms.
Integr., 2018
2017
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017
2016
Int. J. Comput. Math., 2016
2015
Mob. Inf. Syst., 2015
An Efficient Multiple PKG Compatible Identity Based Key Agreement for Vehicular Networks.
IACR Cryptol. ePrint Arch., 2015
2014
J. Internet Serv. Inf. Secur., 2014
J. Internet Serv. Inf. Secur., 2014
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2014
Proceedings of the Information and Communication Technology, 2014
Proceedings of the Information and Communication Technology, 2014
2013
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013
J. Internet Serv. Inf. Secur., 2013
Lattice Based Forward-Secure Identity Based Encryption Scheme with Shorter Ciphertext.
J. Internet Serv. Inf. Secur., 2013
Int. J. Embed. Syst., 2013
2012
J. Internet Serv. Inf. Secur., 2012
Adaptively Secure Efficient Lattice (H)IBE in Standard Model with Short Public Parameters.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2012
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012
2009
Proceedings of the ARTCom 2009, 2009