Palash Sarkar
Orcid: 0000-0002-5346-2650Affiliations:
- Indian Statistical Institute, India
According to our database1,
Palash Sarkar
authored at least 208 papers
between 1996 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
-
on isical.ac.in
On csauthors.net:
Bibliography
2024
Constructions of Efficiently Implementable Boolean functions Possessing High Nonlinearity and Good Resistance to Algebraic Attacks.
IACR Cryptol. ePrint Arch., 2024
Adv. Math. Commun., 2024
2023
Soc. Choice Welf., January, 2023
IACR Cryptol. ePrint Arch., 2023
Adv. Math. Commun., 2023
2022
ACM Trans. Math. Softw., 2022
Security and efficiency trade-offs for elliptic curve Diffie-Hellman at the 128-bit and 224-bit security levels.
J. Cryptogr. Eng., 2022
IACR Cryptol. ePrint Arch., 2022
Electron. Colloquium Comput. Complex., 2022
New discrete logarithm computation for the medium prime case using the function field sieve.
Adv. Math. Commun., 2022
Adv. Math. Commun., 2022
Combining Montgomery Multiplication with Tag Tracing for the Pollard Rho Algorithm in Prime Order Fields.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2022
Voting Games to Model Protocol Stability and Security of Proof-of-Work Cryptocurrencies.
Proceedings of the Decision and Game Theory for Security - 13th International Conference, 2022
2021
Pseudo-Random Walk on Ideals: Practical Speed-Up in Relation Collection for Class Group Computation.
IACR Cryptol. ePrint Arch., 2021
Combining Montgomery Multiplication with Tag Tracing for the Pollard's Rho Algorithm in Prime Order Fields.
IACR Cryptol. ePrint Arch., 2021
Electron. Colloquium Comput. Complex., 2021
Des. Codes Cryptogr., 2021
Variants of Wegman-Carter message authentication code supporting variable tag lengths.
Des. Codes Cryptogr., 2021
Adv. Math. Commun., 2021
2020
IET Inf. Secur., 2020
IACR Cryptol. ePrint Arch., 2020
Finite Fields Their Appl., 2020
2019
IACR Cryptol. ePrint Arch., 2019
Adv. Math. Commun., 2019
Adv. Math. Commun., 2019
2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Multiple (Truncated) Differential Cryptanalysis: Explicit Upper Bounds on Data Complexity.
Cryptogr. Commun., 2018
Success probability of multiple/multidimensional linear cryptanalysis under general key randomisation hypotheses.
Cryptogr. Commun., 2018
2017
IACR Trans. Symmetric Cryptol., 2017
J. Math. Cryptol., 2017
Correlations Between (Nonlinear) Combiners of Input and Output of Random Functions and Permutations.
IACR Cryptol. ePrint Arch., 2017
Des. Codes Cryptogr., 2017
A simple method for obtaining relations among factor basis elements for special hyperelliptic curves.
Appl. Algebra Eng. Commun. Comput., 2017
2016
IEEE Trans. Inf. Theory, 2016
IEEE Trans. Inf. Theory, 2016
IEEE Trans. Computers, 2016
A Generalisation of the Conjugation Method for Polynomial Selection for the Extended Tower Number Field Sieve Algorithm.
IACR Cryptol. ePrint Arch., 2016
A General Polynomial Selection Method and New Asymptotic Complexities for the Tower Number Field Sieve Algorithm.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Challenges with Assessing the Impact of NFS Advances on the Security of Pairing-based Cryptography.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
On modes of operations of a block cipher for authentication and authenticated encryption.
Cryptogr. Commun., 2016
2015
IEEE Trans. Computers, 2015
New Complexity Trade-Offs for the (Multiple) Number Field Sieve Algorithm in Non-Prime Fields.
IACR Cryptol. ePrint Arch., 2015
2014
Concrete Analysis and Trade-Offs for the (Complete Tree) Layered Subset Difference Broadcast Encryption Scheme.
IEEE Trans. Computers, 2014
IACR Cryptol. ePrint Arch., 2014
Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector.
Cryptogr. Commun., 2014
Proceedings of the Provable Security - 8th International Conference, 2014
2013
Efficient Hardware Implementations of BRW Polynomials and Tweakable Enciphering Schemes.
IEEE Trans. Computers, 2013
Practical hybrid (hierarchical) identity-based encryption schemes based on the decisional bilinear Diffie-Hellman assumption.
Int. J. Appl. Cryptogr., 2013
Anonymous HIBE from Standard Assumptions over Type-3 Pairings using Dual System Encryption.
IACR Cryptol. ePrint Arch., 2013
Des. Codes Cryptogr., 2013
Proceedings of the Cryptography and Coding - 14th IMA International Conference, 2013
2012
Constant-Size Ciphertext HIBE From Asymmetric Pairings Using the Dual-System Technique.
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Analysis and Trade-Offs for the (Complete Tree) Layered Subset Difference Broadcast Encryption Scheme.
IACR Cryptol. ePrint Arch., 2012
Variants of Waters' Dual System Primitives Using Asymmetric Pairings - (Extended Abstract).
Proceedings of the Public Key Cryptography - PKC 2012, 2012
2011
On Quantifying the Resistance of Concrete Hash Functions to Generic Multicollision Attacks.
IEEE Trans. Inf. Theory, 2011
Inf. Process. Lett., 2011
On Authenticated Encryption Using Stream Ciphers Supporting an Initialisation Vector.
IACR Cryptol. ePrint Arch., 2011
A trade-off between collision probability and key size in universal hashing using polynomials.
Des. Codes Cryptogr., 2011
2010
IEEE Trans. Inf. Theory, 2010
ACM Trans. Inf. Syst. Secur., 2010
2009
Proceedings of the Identity-Based Cryptography, 2009
IEEE Trans. Inf. Theory, 2009
Computing Partial Walsh Transform From the Algebraic Normal Form of a Boolean Function.
IEEE Trans. Inf. Theory, 2009
Math. Soc. Sci., 2009
IACR Cryptol. ePrint Arch., 2009
On Quantifying the Resistance of Concrete Hash Functions to Generic Multi-Collision Attacks.
IACR Cryptol. ePrint Arch., 2009
Domain extender for collision resistant hash functions: Improving upon Merkle-Damgård iteration.
Discret. Appl. Math., 2009
Hardware Architecture and Cost/time/data Trade-off for Generic Inversion of One-Way Function.
Computación y Sistemas, 2009
Cryptogr. Commun., 2009
2008
IEEE Trans. Inf. Theory, 2008
IEEE Trans. Inf. Theory, 2008
Inf. Process. Lett., 2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Pairing-Based Cryptography, 2008
Proceedings of the Information Security, 11th International Conference, 2008
2007
Constant Size Ciphertext HIBE in the Augmented Selective-ID Model and its Extensions.
J. Univers. Comput. Sci., 2007
Discret. Appl. Math., 2007
Proceedings of the Provable Security, 2007
Towards Minimizing Memory Requirement for Implementation of Hyperelliptic Curve Cryptosystems.
Proceedings of the Information Security Practice and Experience, 2007
2006
Construction of a Hybrid (Hierarchical) Identity-Based Encryption Protocol Secure Against Adaptive Attacks.
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
Towards Minimizing Memory Requirement for Implementation of Hyperelliptic Curve Crytosystems.
IACR Cryptol. ePrint Arch., 2006
On (Hierarchical) Identity Based Encryption Protocols with Short Public Parameters (With an Exposition of Waters' Artificial Abort Technique).
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Advances in Information and Computer Security, 2006
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2006), 2006
Proceedings of the Progress in Cryptology, 2006
Proceedings of the Progress in Cryptology, 2006
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006
Proceedings of the Advances in Cryptology, 2006
2005
IEEE Trans. Inf. Theory, 2005
J. Univers. Comput. Sci., 2005
Inf. Process. Lett., 2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the Information Security Applications, 6th International Workshop, 2005
Proceedings of the Selected Areas in Cryptography, 12th International Workshop, 2005
Trading Time for Space: Towards an Efficient IBE Scheme with Short(er) Public Parameters in the Standard Model.
Proceedings of the Information Security and Cryptology, 2005
Proceedings of the Advances in Cryptology, 2005
2004
Construction of Nonlinear Resilient Boolean Functions Using "Small" Affine Functions.
IEEE Trans. Inf. Theory, 2004
Construction of Perfect Nonlinear and Maximally Nonlinear Multiple-Output Boolean Functions Satisfying Higher Order Strict Avalanche Criteria.
IEEE Trans. Inf. Theory, 2004
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
A characterization and some properties of the Banzhaf-Coleman-Dubey-Shapley sensitivity index.
Games Econ. Behav., 2004
Appl. Algebra Eng. Commun. Comput., 2004
Efficient Representation and Software Implementation of Resilient Maiorana-McFarland S-boxes.
Proceedings of the Information Security Applications, 5th International Workshop, 2004
Application of Montgomery's Trick to Scalar Multiplication for Elliptic and Hyperelliptic Curves Using a Fixed Base Point.
Proceedings of the Public Key Cryptography, 2004
Proceedings of the Progress in Cryptology, 2004
Efficient Computation of Tate Pairing in Projective Coordinate over General Characteristic Fields.
Proceedings of the Information Security and Cryptology, 2004
Proceedings of the Information and Communications Security, 6th International Conference, 2004
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004
Proceedings of the Advances in Cryptology, 2004
New Table Look-Up Methods for Faster Frobenius Map Based Scalar Multiplication Over GF(p<sup>n</sup>).
Proceedings of the Applied Cryptography and Network Security, 2004
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
2003
IEEE Trans. Computers, 2003
Domain Extender for Collision Resistant Hash Functions: Improving Upon Merkle-Damgaard Iteration.
IACR Cryptol. ePrint Arch., 2003
IACR Cryptol. ePrint Arch., 2003
IACR Cryptol. ePrint Arch., 2003
Parallelizing Explicit Formula for Arithmetic in the Jacobian of Hyperelliptic Curves.
IACR Cryptol. ePrint Arch., 2003
Construction of Perfect Nonlinear and Maximally Nonlinear Multi-Output Boolean Functions Satisfying Higher Order Strict Avalanche Criteria.
IACR Cryptol. ePrint Arch., 2003
IACR Cryptol. ePrint Arch., 2003
Electron. Notes Discret. Math., 2003
Electron. Notes Discret. Math., 2003
Des. Codes Cryptogr., 2003
Construction of Perfect Nonlinear and Maximally Nonlinear Multi-output Boolean Functions Satisfying Higher Order Strict Avalanche Criteria (Extended Abstract).
Proceedings of the Progress in Cryptology, 2003
Proceedings of the Progress in Cryptology, 2003
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003
2002
IEEE Trans. Inf. Theory, 2002
IEEE Trans. Inf. Theory, 2002
Theor. Comput. Sci., 2002
Cross-Correlation Analysis of Cryptographically Useful Boolean Functions and S-Boxes.
Theory Comput. Syst., 2002
IACR Cryptol. ePrint Arch., 2002
Proceedings of the Advances in Cryptology, 2002
2001
New Constructions of Resilient and Correlation Immune Boolean Functions Achieving Upper Bound on Nonlinearity.
Electron. Notes Discret. Math., 2001
Electron. Colloquium Comput. Complex., 2001
Proceedings of the Progress in Cryptology, 2001
Proceedings of the Cryptographic Hardware and Embedded Systems, 2001
2000
Inf. Process. Lett., 2000
IACR Cryptol. ePrint Arch., 2000
IACR Cryptol. ePrint Arch., 2000
New Constructions of Resilent and Correlation Immune Boolean Functions achieving Upper Bounds on Nonlinearity.
IACR Cryptol. ePrint Arch., 2000
Proceedings of the Progress in Cryptology, 2000
Proceedings of the Advances in Cryptology, 2000
Proceedings of the Advances in Cryptology, 2000
1999
Proceedings of the Advances in Cryptology, 1999
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999
1998
Theor. Comput. Sci., 1998
Discret. Appl. Math., 1998
1997
Proceedings of the 10th International Conference on VLSI Design (VLSI Design 1997), 1997
1996