Kunwar Singh

According to our database1, Kunwar Singh authored at least 41 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Updated delegated proof of stake and Nash equilibrium: A mining pool game model for blockchain network.
Concurr. Comput. Pract. Exp., October, 2024

The oblivious comparison sorting protocols for secure multi-party computation.
Multim. Tools Appl., August, 2024

Digital forensic framework for smart contract vulnerabilities using ensemble models.
Multim. Tools Appl., May, 2024

A single operational amplifier-based grounded meminductor mutators and their applications.
Turkish J. Electr. Eng. Comput. Sci., 2024

Dress-Me-Up: A Dataset & Method for Self-Supervised 3D Garment Retargeting.
CoRR, 2024

A Blockchain-Based Public Key Infrastructure For IoT-Based Healthcare Systems.
Comput. J., 2024

Privacy preserving decentralized swap derivative with deep learning based oracles leveraging blockchain technology and cryptographic primitives.
Comput. Electr. Eng., 2024

2023
Theoretical analysis of biases in TLS encryption scheme Chacha 128.
Int. J. Ad Hoc Ubiquitous Comput., 2023

Secure proof of the sum of all the elements of a matrix of finite field elements in zero-knowledge.
Int. J. Ad Hoc Ubiquitous Comput., 2023

Cryptanalysis of stream cipher LIZARD using division property and MILP based cube attack.
Discret. Appl. Math., 2023

2022
Design and Analysis of Adaptive Graph-Based Cancelable Multi-Biometrics Approach.
IEEE Trans. Dependable Secur. Comput., 2022

Efficient Lattice based (H)IB-DRE.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2022

An Investigation into Neuromorphic ICs using Memristor-CMOS Hybrid Circuits.
CoRR, 2022

A Privacy-Preserving Framework for Endorsement Process in Hyperledger Fabric.
Comput. Secur., 2022

Theoretical and Deep Learning Based Analysis of Biases in Salsa 128 Bits.
Proceedings of the Mobile Internet Security - 6th International Symposium, 2022

2021
Oblivious stable sorting protocol and oblivious binary search protocol for secure multi-party computation.
J. High Speed Networks, 2021

Lattice-based unidirectional Proxy Re-Encryption and Proxy Re-Encryption+ schemes.
IET Inf. Secur., 2021

Secure Distributed Medical Record Storage using Blockchain and Emergency Sharing Using Multi-Party Computation.
Proceedings of the 11th IFIP International Conference on New Technologies, 2021

2020
A hierarchical identity-based security for delay tolerant networks using lattice-based cryptography.
Peer-to-Peer Netw. Appl., 2020

Provably secure lattice based identity based unidirectional PRE and PRE+ schemes.
J. Inf. Secur. Appl., 2020

Securely solving privacy preserving minimum spanning tree algorithms in semi-honest model.
Int. J. Ad Hoc Ubiquitous Comput., 2020

2019
A closed-loop ASIC design approach based on logical effort theory and artificial neural networks.
Integr., 2019

Cryptanalysis for reduced round Salsa and ChaCha: revisited.
IET Inf. Secur., 2019

2018
Optimum transistor sizing of CMOS logic circuits using logical effort theory and evolutionary algorithms.
Integr., 2018

2017
Cryptanalysis of Salsa and ChaCha: Revisited.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017

2016
Lattice-based identity-based resplittable threshold public key encryption scheme.
Int. J. Comput. Math., 2016

2015
Lattice Based Mix Network for Location Privacy in Mobile System.
Mob. Inf. Syst., 2015

An Efficient Multiple PKG Compatible Identity Based Key Agreement for Vehicular Networks.
IACR Cryptol. ePrint Arch., 2015

2014
Guest Editorial: Special Issue on Cyber Security Protections and Applications.
J. Internet Serv. Inf. Secur., 2014

Lattice Based Universal Re-encryption for Mixnet.
J. Internet Serv. Inf. Secur., 2014

Lattice Based Identity Based Unidirectional Proxy Re-Encryption Scheme.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2014

Cryptanalysis of Unidirectional Proxy Re-Encryption Scheme.
Proceedings of the Information and Communication Technology, 2014

Efficient Lattice HIBE in the Standard Model with Shorter Public Parameters.
Proceedings of the Information and Communication Technology, 2014

2013
Lattice Based Efficient Threshold Public Key Encryption Scheme.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013

Lattice Based Identity Based Proxy Re-Encryption Scheme.
J. Internet Serv. Inf. Secur., 2013

Lattice Based Forward-Secure Identity Based Encryption Scheme with Shorter Ciphertext.
J. Internet Serv. Inf. Secur., 2013

Automated transistor width optimisation algorithms for digital circuits.
Int. J. Embed. Syst., 2013

2012
Lattice Forward-Secure Identity Based Encryption Scheme.
J. Internet Serv. Inf. Secur., 2012

Adaptively Secure Efficient Lattice (H)IBE in Standard Model with Short Public Parameters.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2012

ID-Based Threshold Signcryption and Group Unsigncryption.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012

2009
An Area and Power Efficient Design of Single Edge Triggered D-Flip Flop.
Proceedings of the ARTCom 2009, 2009


  Loading...