What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Palash Sarkar
Google Scholar
42
publications in security and cryptology related venues
Year
Venue
Title
2020
journals/joc
Kummer for Genus One Over Prime-Order Fields.
Sabyasachi Karati
Palash Sarkar
2017
journals/tosc
A Fast Single-Key Two-Level Universal Hash Function.
Debrup Chakraborty
Sebati Ghosh
Palash Sarkar
2017
conf/asiacrypt
Kummer for Genus One over Prime Order Fields.
Sabyasachi Karati
Palash Sarkar
2016
conf/eurocrypt
New Complexity Trade-Offs for the (Multiple) Number Field Sieve Algorithm in Non-Prime Fields.
Palash Sarkar
Shashank Singh
2016
conf/asiacrypt
A General Polynomial Selection Method and New Asymptotic Complexities for the Tower Number Field Sieve Algorithm.
Palash Sarkar
Shashank Singh
2014
conf/provsec
Efficient (Anonymous) Compact HIBE from Standard Assumptions.
Somindu C. Ramanna
Palash Sarkar
2012
conf/pkc
Variants of Waters' Dual System Primitives Using Asymmetric Pairings - (Extended Abstract).
Somindu C. Ramanna
Sanjit Chatterjee
Palash Sarkar
2011
conf/sacrypt
Another Look at Tightness.
Sanjit Chatterjee
Alfred Menezes
Palash Sarkar
2009
conf/ccs
A new hash family obtained by modifying the SHA-2 family.
Somitra Kumar Sanadhya
Palash Sarkar
2008
conf/acisp
Non-linear Reduced Round Attacks against SHA-2 Hash Family.
Somitra Kumar Sanadhya
Palash Sarkar
2008
conf/acns
Attacking Reduced Round SHA-256.
Somitra Kumar Sanadhya
Palash Sarkar
2007
conf/icisc
New Local Collisions for the SHA-2 Hash Family.
Somitra Kumar Sanadhya
Palash Sarkar
2007
conf/icisc
Improving Upon the TET Mode of Operation.
Palash Sarkar
2007
conf/provsec
Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks.
Palash Sarkar
Sanjit Chatterjee
2006
conf/fse
A New Mode of Encryption Providing a Tweakable Strong Pseudo-random Permutation.
Debrup Chakraborty
Palash Sarkar
2006
conf/icisc
Generic Attacks on Symmetric Ciphers.
Palash Sarkar
2006
conf/icisc
New Constructions of Constant Size Ciphertext HIBE Without Random Oracle.
Sanjit Chatterjee
Palash Sarkar
2006
conf/pkc
Generalization of the Selective-ID Security Model for HIBE Protocols.
Sanjit Chatterjee
Palash Sarkar
2006
conf/iwsec
On the Effectiveness of TMTO and Exhaustive Search Attacks.
Sourav Mukhopadhyay
Palash Sarkar
2006
conf/asiacrypt
HIBE With Short Public Parameters Without Random Oracle.
Sanjit Chatterjee
Palash Sarkar
2005
conf/icisc
Trading Time for Space: Towards an Efficient IBE Scheme with Short(er) Public Parameters in the Standard Model.
Sanjit Chatterjee
Palash Sarkar
2005
conf/wisa
Application of LFSRs in Time/Memory Trade-Off Cryptanalysis.
Sourav Mukhopadhyay
Palash Sarkar
2005
conf/asiacrypt
New Applications of Time Memory Data Tradeoffs.
Jin Hong
Palash Sarkar
2005
conf/sacrypt
Improved Time-Memory Trade-Offs with Multiple Data.
Alex Biryukov
Sourav Mukhopadhyay
Palash Sarkar
2004
conf/fse
Vulnerability of Nonlinear Filter Generators Based on Linear Finite State Machines.
Jin Hong
Dong Hoon Lee
Seongtaek Chee
Palash Sarkar
2004
conf/acisp
Pseudorandomness of SPN-Type Transformations.
Wonil Lee
Mridul Nandi
Palash Sarkar
Donghoon Chang
Sangjin Lee
Kouichi Sakurai
2004
conf/acns
New Table Look-Up Methods for Faster Frobenius Map Based Scalar Multiplication Over GF(p<sup>n</sup>).
Palash Sarkar
Pradeep Kumar Mishra
Rana Barua
2004
conf/icisc
Efficient Computation of Tate Pairing in Projective Coordinate over General Characteristic Fields.
Sanjit Chatterjee
Palash Sarkar
Rana Barua
2004
conf/wisa
Efficient Representation and Software Implementation of Resilient Maiorana-McFarland S-boxes.
Kishan Chand Gupta
Palash Sarkar
2004
conf/pkc
Application of Montgomery's Trick to Scalar Multiplication for Elliptic and Hyperelliptic Curves Using a Fixed Base Point.
Pradeep Kumar Mishra
Palash Sarkar
2004
conf/icics
Provably Secure Authenticated Tree Based Group Key Agreement.
Ratna Dutta
Rana Barua
Palash Sarkar
2004
conf/asiacrypt
Time-Memory Trade-Off Attacks on Multiplications and T-Functions.
Joydip Mitra
Palash Sarkar
2004
conf/asiacrypt
Masking Based Domain Extenders for UOWHFs: Bounds and Constructions.
Palash Sarkar
2003
conf/fse
PARSHA-256- - A New Parallelizable Hash Function and a Multithreaded Implementation.
Pinakpani Pal
Palash Sarkar
2003
conf/asiacrypt
Parallelizing Explicit Formula for Arithmetic in the Jacobian of Hyperelliptic Curves.
Pradeep Kumar Mishra
Palash Sarkar
2002
conf/crypto
The Filter-Combiner Model for Memoryless Synchronous Stream Ciphers.
Palash Sarkar
2002
conf/asiacrypt
Improved Construction of Nonlinear Resilient S-Boxes.
Kishan Chand Gupta
Palash Sarkar
2001
conf/ches
Efficient Implementation of "Large" Stream Cipher Systems.
Palash Sarkar
Subhamoy Maitra
2000
conf/crypto
Nonlinearity Bounds and Constructions of Resilient Boolean Functions.
Palash Sarkar
Subhamoy Maitra
2000
conf/eurocrypt
Construction of Nonlinear Boolean Functions with Important Cryptographic Properties.
Palash Sarkar
Subhamoy Maitra
1999
conf/acisp
Enumeration of Correlation Immune Boolean Functions.
Subhamoy Maitra
Palash Sarkar
1999
conf/crypto
Highly Nonlinear Resilient Functions Optimizing Siegenthaler's Inequality.
Subhamoy Maitra
Palash Sarkar
Coauthors
Alex Biryukov
(1)
Alfred Menezes
(1)
Debrup Chakraborty
(2)
Dong Hoon Lee
(1)
Donghoon Chang
(1)
Jin Hong
(2)
Joydip Mitra
(1)
Kishan Chand Gupta
(2)
Kouichi Sakurai
(1)
Mridul Nandi
(1)
Palash Sarkar
(42)
Pinakpani Pal
(1)
Pradeep Kumar Mishra
(3)
Rana Barua
(3)
Ratna Dutta
(1)
Sabyasachi Karati
(2)
Sangjin Lee
(1)
Sanjit Chatterjee
(8)
Sebati Ghosh
(1)
Seongtaek Chee
(1)
Shashank Singh
(2)
Somindu C. Ramanna
(2)
Somitra Kumar Sanadhya
(4)
Sourav Mukhopadhyay
(3)
Subhamoy Maitra
(5)
Wonil Lee
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to