• Publications
  • Influence
A brief history of cellular automata
TLDR
A history of cellular automata from their beginnings with von Neumann to the present day is traced, mainly on topics closer to computer science and mathematics rather than physics, biology or other applications.
Nonlinearity Bounds and Constructions of Resilient Boolean Functions
TLDR
A sharper version of McEliece theorem for Reed-Muller codes as applied to resilient functions is proved, which also generalizes the well known Xiao-Massey characterization and leads to a nontrivial upper bound on the nonlinearity of resilient functions.
Construction of Nonlinear Boolean Functions with Important Cryptographic Properties
TLDR
It is shown that for each positive integer m, there are infinitely many integers n, such that it is possible to construct n-variable, m-resilient functions having nonlinearity greater than 2n-1 -2[n/2].
Trading Time for Space: Towards an Efficient IBE Scheme with Short(er) Public Parameters in the Standard Model
TLDR
There is an interesting trade-off between the tightness of the security reduction and smallness ofThe public parameter, and it is shown that if one reduces the number of elements in public parameter then there is a corresponding increase in the computational cost due to the increase in group size.
Spectral Domain Analysis of Correlation Immune and Resilient Boolean Functions
  • P. Sarkar
  • Mathematics
    IACR Cryptol. ePrint Arch.
  • 2000
TLDR
Improved upper bounds on the nonlinearity of these functions are obtained from the divisibility results, and a necessary condition on the algebraic normal form of correlation immune functions attaining the maximum possible non linearity is obtained.
Extending Joux's Protocol to Multi Party Key Agreement (Extended Abstract)
TLDR
A secure unauthenticated as well as an authenticated multi party key agreement protocol that uses ternary trees and is based on public IDs and Key Generation Centres.
Challenges with Assessing the Impact of NFS Advances on the Security of Pairing-Based Cryptography
TLDR
This article presents a concise overview of Number Field Sieve algorithms and discusses some of the challenges with assessing their impact on keylengths for pairing-based cryptosystems.
HIBE With Short Public Parameters Without Random Oracle
TLDR
This paper extends Waters' IBE protocol to a hierarchical IBE (HIBE) protocol which is secure in the full model without random oracle and improves upon Waters' HIBE by significantly reducing the number of public parameters.
Multi-receiver Identity-Based Key Encapsulation with Shortened Ciphertext
TLDR
Two identity based encryption (IBE) protocols in the multi-receiver setting are described, the first protocols to achieve sub-linear ciphertext sizes and the main interesting feature is that the ciphertext size is |S|/N.
Frameproof and IPP Codes
TLDR
A generalization of identifying parent property is introduced and studied in terms of a new class of hash families - the strong separating hash families, which are described asymptotic consequences of some recursive construction techniques.
...
...