Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Palash Sarkar
Search web for home page
Program Committees
1
2012
Eurocrypt
pc
2
2012
Crypto
pc
3
2011
Asiacrypt
pc
4
2010
FSE
pc
5
2010
Crypto
pc
6
2008
Asiacrypt
pc
7
2007
Crypto
pc
8
2007
Asiacrypt
pc
9
2007
FSE
pc
10
2005
Eurocrypt
pc
11
2005
FSE
pc
Publications
year
title
booktitle
pages
1
2012
Variants of Waters' Dual System Primitives Using Asymmetric Pairings - (Extended Abstract)
pkc
298-315
2
2009
On Approximating Addition by Exclusive OR
eprint
online
3
2009
Trade-Off Between Key Size and Efficiency in Universal Hashing Using Polynomials
eprint
online
4
2009
On Stateless Schemes for Message Authentication Using Pseudorandom Functions
eprint
online
5
2008
Efficient Tweakable Enciphering Schemes from (Block-Wise) Universal Hash Functions
eprint
online
6
2008
Searching for Low Weight Codewords in Linear Binary Codes
eprint
online
7
2008
Collision attacks against 22-step SHA-512
eprint
online
8
2008
Attacking Step Reduced SHA-2 Family in a Unified Framework
eprint
online
9
2008
Some Observations on Strengthening the SHA-2 Family
eprint
online
10
2008
Attacking Reduced Round SHA-256
eprint
online
11
2008
Non-Linear Reduced Round Attacks Against SHA-2 Hash family
eprint
online
12
2008
A Combinatorial Analysis of Recent Attacks on Step Reduced SHA-2 Family
eprint
online
13
2008
A New Universal Hash Function and Other Cryptographic Algorithms Suitable for Resource Constrained Devices
eprint
online
14
2008
New Collision attacks Against Up To 24-step SHA-2
eprint
online
15
2007
Improving Upon the TET Mode of Operation
eprint
online
16
2007
Constant Size Ciphertext HIBE in the Augmented Selective-ID Model and its Extensions
eprint
online
17
2007
New Local Collisions for the SHA-2 Hash Family
eprint
online
18
2007
HCH: A New Tweakable Enciphering Scheme Using the Hash-Counter-Hash Approach
eprint
online
19
2007
A General Construction of Tweakable Block Ciphers and Different Modes of Operations
eprint
online
20
2006
A New Mode of Encryption Providing A Tweakable Strong Pseudo-Random
eprint
online
21
2006
On (Hierarchical) Identity Based Encryption Protocols with Short Public Parameters \\ (With an Exposition of Waters' Artificial Abort Technique)
eprint
online
22
2006
Application of LFSRs for Parallel Sequence Generation in Cryptologic Algorithms
eprint
online
23
2006
A New Mode of Encryption Secure Against Symmetric Nonce Respecting Adversaries
eprint
online
24
2006
Generalization of the Selective-ID Security Model for HIBE Protocols
pkc
online
25
2006
Construction of a Hybrid (Hierarchical) Identity-Based Encryption Protocol Secure Against Adaptive Attacks
eprint
online
26
2006
A New Cryptanalytic Time/Memory/Data Trade-off Algorithm
eprint
online
27
2006
HIBE With Short Public Parameters Without Random Oracle
asiacrypt
online
28
2006
A New Mode of Encryption Providing a Tweakable Strong Pseudo-random Permutation
fse
online
29
2006
Generalization of the Selective-ID Security Model for HIBE Protocols
eprint
online
30
2006
Towards Minimizing Memory Requirement for Implementation of Hyperelliptic Curve Crytosystems
eprint
online
31
2005
TMTO With Multiple Data: Analysis and New Single Table Trade-offs
eprint
online
32
2005
New Applications of Time Memory Data Tradeoffs
asiacrypt
online
33
2005
Rediscovery of Time Memory Tradeoffs
eprint
online
34
2004
Pairing-Based Cryptographic Protocols : A Survey
eprint
online
35
2004
A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model
eprint
online
36
2004
Provably Secure Authenticated Tree Based Group Key Agreement Protocol
eprint
online
37
2004
Vulnerability of Nonlinear Filter Generators Based on Linear Finite State Machines
fse
193-209
38
2004
Application of Montgomery's Trick to Scalar Multiplication for Elliptic and Hyperelliptic Curves Using a Fixed Base Point
pkc
online
39
2004
Time-Memory Trade-Off Attacks on Multiplications and T-Functions
asiacrypt
online
40
2004
Masking Based Domain Extenders for UOWHFs: Bounds and Constructions
asiacrypt
online
41
2003
Extending Joux's Protocol to Multi Party Key Agreement
eprint
online
42
2003
A General Correlation Theorem
eprint
online
43
2003
PARSHA-256- - A New Parallelizable Hash Function and a Multithreaded Implementation
fse
online
44
2003
Domain Extender for Collision Resistant Hash Functions: Improving Upon Merkle-Damgaard Iteration
eprint
online
45
2003
Parallelizing Explicit Formula for Arithmetic in the Jacobian of Hyperelliptic Curves
eprint
online
46
2003
Construction of Perfect Nonlinear and Maximally Nonlinear Multi-Output Boolean Functions Satisfying Higher Order Strict Avalanche Criteria
eprint
online
47
2003
Parallelizing Explicit Formula for Arithmetic in the Jacobian of Hyperelliptic Curves
asiacrypt
online
48
2003
Masking Based Domain Extenders for UOWHFs: Bounds and Constructions
eprint
online
49
2003
Inversion of Several Field Elements: A New Parallel Algorithm
eprint
online
50
2003
Domain Extenders for UOWHF: A Finite Binary Tree Algorithm
eprint
online
51
2003
Hiji-bij-bij: A New Stream Cipher with a Self-Synchronizing Mode of Operation
eprint
online
52
2002
A Parallelizable Design Principle for Cryptographic Hash Functions
eprint
online
53
2002
Construction of UOWHF: Tree Hashing Revisited
eprint
online
54
2002
The Filter-Combiner Model for Memoryless Synchronous Stream Ciphers
crypto
online
55
2002
Improved Construction of Nonlinear Resilient S-Boxes
asiacrypt
online
56
2001
Efficient Implementation of "Large" Stream Cipher Systems
ches
319-332
57
2000
New Directions in Design of Resilient Boolean Functions
eprint
online
58
2000
New Constructions of Resilent and Correlation Immune Boolean Functions achieving Upper Bounds on Nonlinearity
eprint
online
59
2000
Spectral Domain Analysis of Correlation Immune and Resilient Boolean Functions
eprint
online
60
2000
Nonlinearity Bounds and Constructions of Resilient Boolean Functions
crypto
515-532
61
2000
Construction of Nonlinear Boolean Functions with Important Cryptographic Properties
eurocrypt
485-506
62
1999
Highly Nonlinear Resilient Functions Optimizing Siegenthaler's Inequality
crypto
198-215
Coauthors of Palash Sarkar
Rana Barua
Debrup Chakraborty
Donghoon Chang
Sanjit Chatterjee
Seongtaek Chee
Ratna Dutta
Kishan Chand Gupta
Jin Hong
Thomas Johansson
Sangjin Lee
Wonil Lee
Dong Hoon Lee
Subhamoy Maitra
Pradeep Kumar Mishra
Joydip Mitra
Sourav Mukhopadhyay
Mridul Nandi
Pinakpani Pal
Enes Pasalic
Somindu C. Ramanna
Kouichi Sakurai
Somitra Kumar Sanadhya
Paul J. Schellenberg