Palash Sarkar
TitleCited byYear
A brief history of cellular automata
P Sarkar
Acm computing surveys (csur) 32 (1), 80-107, 2000
4272000
Pairing-Based Cryptographic Protocols: A Survey.
R Dutta, R Barua, P Sarkar
IACR Cryptology ePrint Archive 2004, 64, 2004
292*2004
Nonlinearity bounds and constructions of resilient Boolean functions
P Sarkar, S Maitra
Annual International Cryptology Conference, 515-532, 2000
2352000
Construction of nonlinear Boolean functions with important cryptographic properties
P Sarkar, S Maitra
International Conference on the Theory and Applications of Cryptographic …, 2000
2062000
New applications of time memory data tradeoffs
J Hong, P Sarkar
International Conference on the Theory and Application of Cryptology and …, 2005
156*2005
Extending Joux’s protocol to multi party key agreement
R Barua, R Dutta, P Sarkar
International Conference on Cryptology in India, 205-217, 2003
1332003
New constructions of resilient and correlation immune Boolean functions achieving upper bound on nonlinearity
E Pasalic, S Maitra, T Johansson, P Sarkar
Electronic Notes in Discrete Mathematics 6, 158-167, 2001
1202001
Trading time for space: Towards an efficient IBE scheme with short (er) public parameters in the standard model
S Chatterjee, P Sarkar
International Conference on Information Security and Cryptology, 424-440, 2005
1032005
Spectral domain analysis of correlation immune and resilient Boolean functions
C Carlet, P Sarkar
Finite Fields and Their Applications 8 (1), 120-130, 2002
1002002
A simple and generic construction of authenticated encryption with associated data
P Sarkar
ACM Transactions on Information and System Security (TISSEC) 13 (4), 33, 2010
962010
HCH: A new tweakable enciphering scheme using the hash-counter-hash approach
D Chakraborty, P Sarkar
IEEE Transactions on Information Theory 54 (4), 1683-1699, 2008
96*2008
Improved time-memory trade-offs with multiple data
A Biryukov, S Mukhopadhyay, P Sarkar
International Workshop on Selected Areas in Cryptography, 110-127, 2005
962005
Efficient tweakable enciphering schemes from (block-wise) universal hash functions
P Sarkar
IEEE Transactions on Information Theory 55 (10), 4749-4760, 2009
91*2009
New collision attacks against up to 24-step SHA-2
SK Sanadhya, P Sarkar
International conference on cryptology in India, 91-103, 2008
742008
HIBE with short public parameters without random oracle
S Chatterjee, P Sarkar
International Conference on the Theory and Application of Cryptology and …, 2006
672006
A new mode of encryption providing a tweakable strong pseudo-random permutation
D Chakraborty, P Sarkar
International Workshop on Fast Software Encryption, 293-309, 2006
672006
Identity-based encryption
S Chatterjee, P Sarkar
Springer Science & Business Media, 2011
662011
Multi-receiver identity-based key encapsulation with shortened ciphertext
S Chatterjee, P Sarkar
International Conference on Cryptology in India, 394-408, 2006
602006
Another look at tightness
S Chatterjee, A Menezes, P Sarkar
International Workshop on Selected Areas in Cryptography, 293-319, 2011
582011
Maximum nonlinearity of symmetric Boolean functions on odd number of variables
S Maitra, P Sarkar
IEEE Transactions on Information Theory 48 (9), 2626-2630, 2002
582002
The system can't perform the operation now. Try again later.
Articles 1–20