Basic theory in construction of Boolean functions with maximum possible annihilator immunity DK Dalai, S Maitra, S Sarkar Designs, Codes and Cryptography 40, 41-58, 2006 | 345 | 2006 |
Redefining the transparency order K Chakraborty, S Sarkar, S Maitra, B Mazumdar, D Mukhopadhyay, ... Designs, codes and cryptography 82 (1), 95-115, 2017 | 80 | 2017 |
Lightweight diffusion layer: Importance of Toeplitz matrices S Sarkar, H Syed Cryptology ePrint Archive, 2016 | 79 | 2016 |
Enumeration of 9-variable rotation symmetric Boolean functions having nonlinearity> 240 S Kavut, S Maitra, S Sarkar, MD Yücel Progress in Cryptology-INDOCRYPT 2006: 7th International Conference on …, 2006 | 74 | 2006 |
Results on rotation symmetric bent functions DK Dalai, S Maitra, S Sarkar Discrete Mathematics 309 (8), 2398-2409, 2009 | 71 | 2009 |
On the lower bounds of the second order nonlinearities of some Boolean functions S Gangopadhyay, S Sarkar, R Telang Information Sciences 180 (2), 266-273, 2010 | 64 | 2010 |
Involutions Over the Galois Field P Charpin, S Mesnager, S Sarkar IEEE Transactions on Information Theory 62 (4), 2266-2276, 2016 | 62 | 2016 |
Construction of rotation symmetric Boolean functions with optimal algebraic immunity S Sarkar, S Maitra Computación y Sistemas 12 (3), 267-284, 2009 | 46 | 2009 |
Construction of rotation symmetric Boolean functions with maximum algebraic immunity on odd number of variables S Sarkar, S Maitra Cryptology ePrint Archive, 2007 | 46 | 2007 |
LIGHTER-R: optimized reversible circuit implementation for sboxes VA Dasu, A Baksi, S Sarkar, A Chattopadhyay 2019 32nd IEEE International System-on-Chip Conference (SOCC), 260-265, 2019 | 43 | 2019 |
Misuse-free key-recovery and distinguishing attacks on 7-round ascon R Rohit, K Hu, S Sarkar, S Sun Cryptology ePrint Archive, 2021 | 36 | 2021 |
Analysis of Toeplitz MDS matrices S Sarkar, H Syed Australasian Conference on Information Security and Privacy, 3-18, 2017 | 36 | 2017 |
Construction of rotation symmetric Boolean functions on odd number of variables with maximum algebraic immunity S Sarkar, S Maitra Applied Algebra, Algebraic Algorithms and Error-Correcting Codes: 17th …, 2007 | 34 | 2007 |
Idempotents in the neighbourhood of Patterson-Wiedemann functions having Walsh spectra zeros S Sarkar, S Maitra Designs, Codes and Cryptography 49, 95-103, 2008 | 32 | 2008 |
DEFAULT: Cipher-Level Resistance Against Differential Fault Attack A Baksi, A Baksi Classical and Physical Security of Symmetric Key Cryptographic Algorithms …, 2022 | 29 | 2022 |
RSA cryptanalysis with increased bounds on the secret exponent using less lattice dimension S Sarkar, S Maitra, S Sarkar Cryptology ePrint Archive, 2008 | 27 | 2008 |
A deeper understanding of the XOR count distribution in the context of lightweight cryptography S Sarkar, SM Sim Progress in Cryptology–AFRICACRYPT 2016: 8th International Conference on …, 2016 | 25 | 2016 |
Bounds on differential and linear branch number of permutations S Sarkar, H Syed Australasian conference on information security and privacy, 207-224, 2018 | 21 | 2018 |
Dickson polynomials that are involutions P Charpin, S Mesnager, S Sarkar Contemporary developments in finite fields and applications, 22-47, 2016 | 21 | 2016 |
Polynomials with linear structure and Maiorana–McFarland construction P Charpin, S Sarkar IEEE transactions on information theory 57 (6), 3796-3804, 2011 | 21 | 2011 |