Vishal Saraswat
Vishal Saraswat
Robert Bosch Engineering Solutions, Bangalore, India
Verified email at - Homepage
TitleCited byYear
Public key encryption with searchable keywords based on Jacobi symbols
G Di Crescenzo, V Saraswat
International Conference on Cryptology in India, 282-296, 2007
Analysis-Preserving Protection of User Privacy against Information Leakage of Social-Network Likes
F Buccafurri, L Fotia, G Lax, V Saraswat
Information Sciences, 2015
Anonymous signatures revisited
V Saraswat, A Yun
International Conference on Provable Security, 140-153, 2009
Differential fault attack on Simeck
V Nalla, RA Sahu, V Saraswat
Proceedings of the Third Workshop on Cryptography and Security in Computing …, 2016
Practical and secure integrated PKE+ PEKS with keyword privacy
F Buccafurri, G Lax, RA Sahu, V Saraswat
2015 12th International Joint Conference on e-Business and …, 2015
An evaluation of lightweight block ciphers for resource-constrained applications: Area, performance, and security
R Sadhukhan, S Patranabis, A Ghoshal, D Mukhopadhyay, V Saraswat, ...
Journal of Hardware and Systems Security 1 (3), 203-218, 2017
Anonymous yet traceable strong designated verifier signature
V Kuchta, RA Sahu, V Saraswat, G Sharma, N Sharma, O Markowitch
International Conference on Information Security, 403-421, 2018
A Secure Anonymous Proxy Multi-signature Scheme
V Saraswat, RA Sahu
SECRYPT 2014 -- Proceedings of the 11th International Conference on Security …, 2014
Short integrated PKE+ PEKS in standard model
V Saraswat, RA Sahu
International Conference on Security, Privacy, and Applied Cryptography …, 2017
Security, Privacy, and Applied Cryptography Engineering: 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings
C Carlet, MA Hasan, V Saraswat
Springer, 2016
Remote cache-timing attacks against AES
V Saraswat, D Feldman, DF Kune, S Das
Proceedings of the First Workshop on Cryptography and Security in Computing …, 2014
Introduction to Cryptography
S Padhye, RA Sahu, V Saraswat
CRC Press, 2018
A secure anonymous proxy signcryption scheme
V Saraswat, RA Sahu, AK Awasthi
Journal of Mathematical Cryptology 11 (2), 63-84, 2017
How to Leak a Secret and Reap the Rewards too
V Saraswat, SK Pandey
LATINCRYPT 2014 - 3nd International Conference on Cryptology and Information …, 2014
Adaptively secure strong designated signature
N Sharma, RA Sahu, V Saraswat, BK Sharma
International Conference on Cryptology in India, 43-60, 2016
Secure and Efficient Scheme for Delegation of Signing Rights
RA Sahu, V Saraswat
ICICS: 15th International Conference on Information and Communications Security, 2014
Ripping the Fabric: Attacks and Mitigations on Hyperledger Fabric
A Dabholkar, V Saraswat
International Conference on Applications and Techniques in Information …, 2019
Smart Wallets on Blockchain—Attacks and Their Costs
A Pillai, V Saraswat, VR Arunkumar
International Conference on Smart City and Informatization, 649-660, 2019
Secret Sharing Using Near-MDS Codes
S Mehta, V Saraswat, S Sen
International Conference on Codes, Cryptology, and Information Security, 195-214, 2019
Public-Key Encryption with Integrated Keyword Search
V Saraswat, RA Sahu, G Sharma, V Kuchta, O Markowitch
Journal of Hardware and Systems Security 3 (1), 12-25, 2019
The system can't perform the operation now. Try again later.
Articles 1–20