Sumanta Sarkar
According to our database1,
Sumanta Sarkar
authored at least 49 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Multim. Tools Appl., February, 2024
IACR Trans. Symmetric Cryptol., 2024
Privacy-Preserving Data Deduplication for Enhancing Federated Learning of Language Models.
IACR Cryptol. ePrint Arch., 2024
2023
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023
2022
Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security, 2022
2021
IACR Trans. Symmetric Cryptol., 2021
IACR Cryptol. ePrint Arch., 2021
2020
J. Multiple Valued Log. Soft Comput., 2020
To infect or not to infect: a critical analysis of infective countermeasures in fault attacks.
J. Cryptogr. Eng., 2020
On the Design of Bit Permutation Based Ciphers - The Interplay Among S-box, Bit Permutation and Key-addition.
IACR Cryptol. ePrint Arch., 2020
2019
On the Relationship between Resilient Boolean Functions and Linear Branch Number of S-boxes.
IACR Cryptol. ePrint Arch., 2019
Proceedings of the 32nd IEEE International System-on-Chip Conference, 2019
2018
MaRSChain: Framework for a Fair Manuscript Review System Based on Permissioned Blockchain.
Proceedings of the Euro-Par 2018: Parallel Processing Workshops, 2018
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Des. Codes Cryptogr., 2017
2016
IACR Trans. Symmetric Cryptol., 2016
IEEE Trans. Inf. Theory, 2016
A deeper understanding of the XOR count distribution in the context of lightweight cryptography.
IACR Cryptol. ePrint Arch., 2016
2015
Proceedings of the Seventh International Workshop on Signal Design and its Applications in Communications, 2015
Proceedings of the IEEE International Symposium on Information Theory, 2015
2014
Differential Power Analysis in Hamming Weight Model: How to Choose among (Extended) Affine Equivalent S-boxes.
Proceedings of the Progress in Cryptology - INDOCRYPT 2014, 2014
2013
Proceedings of the 2013 International Workshop on Security in Cloud Computing, 2013
2012
On Some Permutation Binomials of the Form $x^{\frac{2^n-1}{k}+1} +ax$ over $\mathbb{F}_{2^n}$ : Existence and Count.
Proceedings of the Arithmetic of Finite Fields - 4th International Workshop, 2012
Proceedings of the Sequences and Their Applications - SETA 2012, 2012
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012
2011
IEEE Trans. Inf. Theory, 2011
Proceedings of the Cryptography and Coding - 13th IMA International Conference, 2011
2010
Inf. Sci., 2010
2009
IACR Cryptol. ePrint Arch., 2009
Construction of Rotation Symmetric Boolean Functions with optimal Algebraic Immunity.
Computación y Sistemas, 2009
Proceedings of the Progress in Cryptology, 2009
2008
RSA Cryptanalysis with Increased Bounds on the Secret Exponent using Less Lattice Dimension.
IACR Cryptol. ePrint Arch., 2008
Idempotents in the neighbourhood of Patterson-Wiedemann functions having Walsh spectra zeros.
Des. Codes Cryptogr., 2008
2007
Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity on Odd Number of Variables.
IACR Cryptol. ePrint Arch., 2007
Construction of Rotation Symmetric Boolean Functions on Odd Number of Variables with Maximum Algebraic Immunity.
Proceedings of the Applied Algebra, 2007
2006
Enumeration of 9-variable Rotation Symmetric Boolean Functions having Nonlinearity > 240.
IACR Cryptol. ePrint Arch., 2006
Basic Theory in Construction of Boolean Functions with Maximum Possible Annihilator Immunity.
Des. Codes Cryptogr., 2006