• Publications
  • Influence
Nonlinearity Bounds and Constructions of Resilient Boolean Functions
TLDR
We first prove a sharper version of McEliece theorem for Reed-Muller codes as applied to resilient functions, which also generalizes Xiao-Massey characterization. Expand
  • 205
  • 21
  • PDF
A brief history of cellular automata
TLDR
We trace the history of cellular automata from their beginnings with von Neumann to the present day. Expand
  • 351
  • 20
  • PDF
Construction of Nonlinear Boolean Functions with Important Cryptographic Properties
TLDR
We obtain better results than all published works on the construction of n-variable, m-resilient functions, including cases where the constructed functions have the maximum possible algebraic degree n - m - 1. Expand
  • 187
  • 14
  • PDF
Spectral Domain Analysis of Correlation Immune and Resilient Boolean Functions
  • P. Sarkar
  • Mathematics, Computer Science
  • IACR Cryptol. ePrint Arch.
  • 2000
TLDR
We use a general property of Fourier transform to obtain direct proofs of recent divisibility results on the Walsh transform of correlation immune and resilient functions. Expand
  • 76
  • 11
  • PDF
HIBE With Short Public Parameters Without Random Oracle
TLDR
We extend Waters' IBE protocol to a hierarchical IBE (HIBE) protocol which is secure in the full model without random oracle. Expand
  • 56
  • 10
  • PDF
Extending Joux's Protocol to Multi Party Key Agreement (Extended Abstract)
TLDR
We present a secure unauthenticated as well as an authenticated multi party key agreement protocol that is more efficient than all previously known authenticated key agreement protocols. Expand
  • 104
  • 9
Trading Time for Space: Towards an Efficient IBE Scheme with Short(er) Public Parameters in the Standard Model
TLDR
We show that if one tries to reduce the number of elements in the public parameter then there is a corresponding degradation in the security reduction and smallness of public parameter. Expand
  • 89
  • 9
Pairing-Based Cryptographic Protocols : A Survey
TLDR
We have tried to cover different cryptographic protocols based on bilinear pairings which possess, to the best of our knowledge, proper security proofs in the existing security models. Expand
  • 230
  • 6
  • PDF
Multi-receiver Identity-Based Key Encapsulation with Shortened Ciphertext
TLDR
This paper describes two identity based encryption (IBE) protocols in the multi-receiver setting. Expand
  • 58
  • 6
New Constructions of Constant Size Ciphertext HIBE Without Random Oracle
TLDR
We present two variants of the BBG-HIBE secure in a generalization of the selective-ID model while the second variant is proved to be secure in the full security model. Expand
  • 30
  • 6
...
1
2
3
4
5
...