Sumit Kumar Pandey

Orcid: 0000-0003-2532-6587

According to our database1, Sumit Kumar Pandey authored at least 27 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
On the construction of near-MDS matrices.
Cryptogr. Commun., March, 2024

A resilient m-qubit quantum secret sharing scheme using quantum error correction code.
Quantum Inf. Process., February, 2024

Differential faultt attack on DEFAULT.
Adv. Math. Commun., 2024

2023
On the Direct Construction of MDS and Near-MDS Matrices.
CoRR, 2023

2022
FUTURE: A Lightweight Block Cipher Using an Optimal Diffusion Matrix.
Proceedings of the Progress in Cryptology, 2022

Construction of Recursive MDS Matrices Using DLS Matrices.
Proceedings of the Progress in Cryptology, 2022

2021
Differential fault attack on DEFAULT.
IACR Cryptol. ePrint Arch., 2021

Recursive MDS matrices over finite commutative rings.
Discret. Appl. Math., 2021

2019
Almost involutory recursive MDS diffusion layers.
Des. Codes Cryptogr., 2019

Cryptographically significant mds matrices over finite fields: A brief survey and some generalized results.
Adv. Math. Commun., 2019

A Few Negative Results on Constructions of MDS Matrices Using Low XOR Matrices.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2019

2018
Design of robust proportional-integral-derivative controller for generalized decoupled twin rotor multi-input-multi-output system with actuator non-linearity.
J. Syst. Control. Eng., 2018

A Security Model for Intelligent Vehicles and Smart Traffic Infrastructure.
Proceedings of the 2018 IEEE Intelligent Vehicles Symposium, 2018

On Diffusion Layers of SPN Based Format Preserving Encryption Schemes: Format Preserving Sets Revisited.
Proceedings of the Progress in Cryptology - INDOCRYPT 2018, 2018

2017
Applications of design theory for the constructions of MDS matrices for lightweight cryptography.
J. Math. Cryptol., 2017

GIFT: A Small Present.
IACR Cryptol. ePrint Arch., 2017

Towards a general construction of recursive MDS diffusion layers.
Des. Codes Cryptogr., 2017

On the direct construction of recursive MDS matrices.
Des. Codes Cryptogr., 2017

GIFT: A Small Present - Towards Reaching the Limit of Lightweight Encryption.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017

2016
Attribute-Based Signcryption: Signer Privacy, Strong Unforgeability and IND-CCA Security in Adaptive-Predicates Model (Extended Version).
J. Internet Serv. Inf. Secur., 2016

Format Preserving Sets: On Diffusion Layers of Format Preserving Encryption Schemes.
Proceedings of the Progress in Cryptology - INDOCRYPT 2016, 2016

2015
Attribute-Based Signcryption : Signer Privacy, Strong Unforgeability and IND-CCA2 Security in Adaptive-Predicates Attack.
IACR Cryptol. ePrint Arch., 2015

2014
How to Leak a Secret and Reap the Rewards Too.
Proceedings of the Progress in Cryptology - LATINCRYPT 2014, 2014

2012
Relaxing IND-CCA: Indistinguishability against Chosen Ciphertext Verification Attack.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2012

2011
Efficient Construction of Identity Based Signcryption Schemes from Identity Based Encryption and Signature Schemes.
J. Internet Serv. Inf. Secur., 2011

2010
Construction of Identity Based Signcryption Schemes.
Proceedings of the Information Security Applications - 11th International Workshop, 2010

2007
Efficient Window-Based Scalar Multiplication on Elliptic Curves Using Double-Base Number System.
Proceedings of the Progress in Cryptology, 2007


  Loading...