Sumit Kumar Pandey
Orcid: 0000-0003-2532-6587
According to our database1,
Sumit Kumar Pandey
authored at least 27 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
A resilient m-qubit quantum secret sharing scheme using quantum error correction code.
Quantum Inf. Process., February, 2024
2023
2022
Proceedings of the Progress in Cryptology, 2022
Proceedings of the Progress in Cryptology, 2022
2021
2019
Cryptographically significant mds matrices over finite fields: A brief survey and some generalized results.
Adv. Math. Commun., 2019
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2019
2018
Design of robust proportional-integral-derivative controller for generalized decoupled twin rotor multi-input-multi-output system with actuator non-linearity.
J. Syst. Control. Eng., 2018
Proceedings of the 2018 IEEE Intelligent Vehicles Symposium, 2018
On Diffusion Layers of SPN Based Format Preserving Encryption Schemes: Format Preserving Sets Revisited.
Proceedings of the Progress in Cryptology - INDOCRYPT 2018, 2018
2017
Applications of design theory for the constructions of MDS matrices for lightweight cryptography.
J. Math. Cryptol., 2017
Des. Codes Cryptogr., 2017
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017
2016
Attribute-Based Signcryption: Signer Privacy, Strong Unforgeability and IND-CCA Security in Adaptive-Predicates Model (Extended Version).
J. Internet Serv. Inf. Secur., 2016
Proceedings of the Progress in Cryptology - INDOCRYPT 2016, 2016
2015
Attribute-Based Signcryption : Signer Privacy, Strong Unforgeability and IND-CCA2 Security in Adaptive-Predicates Attack.
IACR Cryptol. ePrint Arch., 2015
2014
Proceedings of the Progress in Cryptology - LATINCRYPT 2014, 2014
2012
Relaxing IND-CCA: Indistinguishability against Chosen Ciphertext Verification Attack.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2012
2011
Efficient Construction of Identity Based Signcryption Schemes from Identity Based Encryption and Signature Schemes.
J. Internet Serv. Inf. Secur., 2011
2010
Proceedings of the Information Security Applications - 11th International Workshop, 2010
2007
Efficient Window-Based Scalar Multiplication on Elliptic Curves Using Double-Base Number System.
Proceedings of the Progress in Cryptology, 2007