BibTeX records: Sumit Kumar Pandey

download as .bib file

@article{DBLP:journals/ccds/GuptaPS24,
  author       = {Kishan Chand Gupta and
                  Sumit Kumar Pandey and
                  Susanta Samanta},
  title        = {On the construction of near-MDS matrices},
  journal      = {Cryptogr. Commun.},
  volume       = {16},
  number       = {2},
  pages        = {249--283},
  year         = {2024},
  url          = {https://doi.org/10.1007/s12095-023-00667-x},
  doi          = {10.1007/S12095-023-00667-X},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ccds/GuptaPS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/GuptaSP24,
  author       = {Sachi Gupta and
                  Aman Sinha and
                  Sumit Kumar Pandey},
  title        = {A resilient m-qubit quantum secret sharing scheme using quantum error
                  correction code},
  journal      = {Quantum Inf. Process.},
  volume       = {23},
  number       = {2},
  pages        = {58},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11128-024-04265-5},
  doi          = {10.1007/S11128-024-04265-5},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/GuptaSP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-12791,
  author       = {Kishan Chand Gupta and
                  Sumit Kumar Pandey and
                  Susanta Samanta},
  title        = {On the Construction of Near-MDS Matrices},
  journal      = {CoRR},
  volume       = {abs/2306.12791},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.12791},
  doi          = {10.48550/ARXIV.2306.12791},
  eprinttype    = {arXiv},
  eprint       = {2306.12791},
  timestamp    = {Tue, 27 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-12791.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-12848,
  author       = {Kishan Chand Gupta and
                  Sumit Kumar Pandey and
                  Susanta Samanta},
  title        = {On the Direct Construction of {MDS} and Near-MDS Matrices},
  journal      = {CoRR},
  volume       = {abs/2306.12848},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.12848},
  doi          = {10.48550/ARXIV.2306.12848},
  eprinttype    = {arXiv},
  eprint       = {2306.12848},
  timestamp    = {Tue, 27 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-12848.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/GuptaPS22,
  author       = {Kishan Chand Gupta and
                  Sumit Kumar Pandey and
                  Susanta Samanta},
  editor       = {Lejla Batina and
                  Joan Daemen},
  title        = {Construction of Recursive {MDS} Matrices Using {DLS} Matrices},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2022: 13th International Conference
                  on Cryptology in Africa, {AFRICACRYPT} 2022, Fes, Morocco, July 18-20,
                  2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13503},
  pages        = {3--27},
  publisher    = {Springer Nature Switzerland},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17433-9\_1},
  doi          = {10.1007/978-3-031-17433-9\_1},
  timestamp    = {Sun, 10 Dec 2023 00:28:26 +0100},
  biburl       = {https://dblp.org/rec/conf/africacrypt/GuptaPS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/GuptaPS22a,
  author       = {Kishan Chand Gupta and
                  Sumit Kumar Pandey and
                  Susanta Samanta},
  editor       = {Lejla Batina and
                  Joan Daemen},
  title        = {{FUTURE:} {A} Lightweight Block Cipher Using an Optimal Diffusion
                  Matrix},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2022: 13th International Conference
                  on Cryptology in Africa, {AFRICACRYPT} 2022, Fes, Morocco, July 18-20,
                  2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13503},
  pages        = {28--52},
  publisher    = {Springer Nature Switzerland},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17433-9\_2},
  doi          = {10.1007/978-3-031-17433-9\_2},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/africacrypt/GuptaPS22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dam/KesarwaniPSV21,
  author       = {Abhishek Kesarwani and
                  Sumit Kumar Pandey and
                  Santanu Sarkar and
                  Ayineedi Venkateswarlu},
  title        = {Recursive {MDS} matrices over finite commutative rings},
  journal      = {Discret. Appl. Math.},
  volume       = {304},
  pages        = {384--396},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.dam.2021.08.016},
  doi          = {10.1016/J.DAM.2021.08.016},
  timestamp    = {Fri, 22 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dam/KesarwaniPSV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DeyPRS21,
  author       = {Chandan Dey and
                  Sumit Kumar Pandey and
                  Tapabrata Roy and
                  Santanu Sarkar},
  title        = {Differential fault attack on {DEFAULT}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1392},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1392},
  timestamp    = {Fri, 12 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DeyPRS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amco/GuptaPRS19,
  author       = {Kishan Chand Gupta and
                  Sumit Kumar Pandey and
                  Indranil Ghosh Ray and
                  Susanta Samanta},
  title        = {Cryptographically significant mds matrices over finite fields: {A}
                  brief survey and some generalized results},
  journal      = {Adv. Math. Commun.},
  volume       = {13},
  number       = {4},
  pages        = {779--843},
  year         = {2019},
  url          = {https://doi.org/10.3934/amc.2019045},
  doi          = {10.3934/AMC.2019045},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amco/GuptaPRS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GuptaPV19,
  author       = {Kishan Chand Gupta and
                  Sumit Kumar Pandey and
                  Ayineedi Venkateswarlu},
  title        = {Almost involutory recursive {MDS} diffusion layers},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {2-3},
  pages        = {609--626},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0582-2},
  doi          = {10.1007/S10623-018-0582-2},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GuptaPV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/space/GuptaPS19,
  author       = {Kishan Chand Gupta and
                  Sumit Kumar Pandey and
                  Susanta Samanta},
  editor       = {Shivam Bhasin and
                  Avi Mendelson and
                  Mridul Nandi},
  title        = {A Few Negative Results on Constructions of {MDS} Matrices Using Low
                  {XOR} Matrices},
  booktitle    = {Security, Privacy, and Applied Cryptography Engineering - 9th International
                  Conference, {SPACE} 2019, Gandhinagar, India, December 3-7, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11947},
  pages        = {195--213},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-35869-3\_14},
  doi          = {10.1007/978-3-030-35869-3\_14},
  timestamp    = {Fri, 22 Nov 2019 13:35:40 +0100},
  biburl       = {https://dblp.org/rec/conf/space/GuptaPS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsce/PandeyDB18,
  author       = {Sumit Kumar Pandey and
                  Jayati Dey and
                  Subrata Banerjee},
  title        = {Design of robust proportional-integral-derivative controller for generalized
                  decoupled twin rotor multi-input-multi-output system with actuator
                  non-linearity},
  journal      = {J. Syst. Control. Eng.},
  volume       = {232},
  number       = {8},
  pages        = {971--982},
  year         = {2018},
  url          = {https://doi.org/10.1177/0959651818771487},
  doi          = {10.1177/0959651818771487},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsce/PandeyDB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/BaruaGPR18,
  author       = {Rana Barua and
                  Kishan Chand Gupta and
                  Sumit Kumar Pandey and
                  Indranil Ghosh Ray},
  editor       = {Debrup Chakraborty and
                  Tetsu Iwata},
  title        = {On Diffusion Layers of {SPN} Based Format Preserving Encryption Schemes:
                  Format Preserving Sets Revisited},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2018 - 19th International Conference
                  on Cryptology in India, New Delhi, India, December 9-12, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11356},
  pages        = {91--104},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-05378-9\_5},
  doi          = {10.1007/978-3-030-05378-9\_5},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/BaruaGPR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivs/KumarJPC18,
  author       = {Sachin Kumar and
                  Sonu Jha and
                  Sumit Kumar Pandey and
                  Anupam Chattopadhyay},
  title        = {A Security Model for Intelligent Vehicles and Smart Traffic Infrastructure},
  booktitle    = {2018 {IEEE} Intelligent Vehicles Symposium, {IV} 2018, Changshu, Suzhou,
                  China, June 26-30, 2018},
  pages        = {162--167},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/IVS.2018.8500423},
  doi          = {10.1109/IVS.2018.8500423},
  timestamp    = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl       = {https://dblp.org/rec/conf/ivs/KumarJPC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GuptaPV17,
  author       = {Kishan Chand Gupta and
                  Sumit Kumar Pandey and
                  Ayineedi Venkateswarlu},
  title        = {On the direct construction of recursive {MDS} matrices},
  journal      = {Des. Codes Cryptogr.},
  volume       = {82},
  number       = {1-2},
  pages        = {77--94},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-016-0233-4},
  doi          = {10.1007/S10623-016-0233-4},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GuptaPV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GuptaPV17a,
  author       = {Kishan Chand Gupta and
                  Sumit Kumar Pandey and
                  Ayineedi Venkateswarlu},
  title        = {Towards a general construction of recursive {MDS} diffusion layers},
  journal      = {Des. Codes Cryptogr.},
  volume       = {82},
  number       = {1-2},
  pages        = {179--195},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-016-0261-0},
  doi          = {10.1007/S10623-016-0261-0},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GuptaPV17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/GuptaPR17,
  author       = {Kishan Chand Gupta and
                  Sumit Kumar Pandey and
                  Indranil Ghosh Ray},
  title        = {Applications of design theory for the constructions of {MDS} matrices
                  for lightweight cryptography},
  journal      = {J. Math. Cryptol.},
  volume       = {11},
  number       = {2},
  pages        = {85},
  year         = {2017},
  url          = {https://doi.org/10.1515/jmc-2016-0013},
  doi          = {10.1515/JMC-2016-0013},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/GuptaPR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BanikPPSST17,
  author       = {Subhadeep Banik and
                  Sumit Kumar Pandey and
                  Thomas Peyrin and
                  Yu Sasaki and
                  Siang Meng Sim and
                  Yosuke Todo},
  editor       = {Wieland Fischer and
                  Naofumi Homma},
  title        = {{GIFT:} {A} Small Present - Towards Reaching the Limit of Lightweight
                  Encryption},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International
                  Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10529},
  pages        = {321--345},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66787-4\_16},
  doi          = {10.1007/978-3-319-66787-4\_16},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BanikPPSST17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BanikPPSTS17,
  author       = {Subhadeep Banik and
                  Sumit Kumar Pandey and
                  Thomas Peyrin and
                  Siang Meng Sim and
                  Yosuke Todo and
                  Yu Sasaki},
  title        = {{GIFT:} {A} Small Present},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {622},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/622},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BanikPPSTS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/PanditPB16,
  author       = {Tapas Pandit and
                  Sumit Kumar Pandey and
                  Rana Barua},
  title        = {Attribute-Based Signcryption: Signer Privacy, Strong Unforgeability
                  and {IND-CCA} Security in Adaptive-Predicates Model (Extended Version)},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {6},
  number       = {3},
  pages        = {61--113},
  year         = {2016},
  url          = {https://doi.org/10.22667/JISIS.2016.08.31.061},
  doi          = {10.22667/JISIS.2016.08.31.061},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/PanditPB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/GuptaPR16,
  author       = {Kishan Chand Gupta and
                  Sumit Kumar Pandey and
                  Indranil Ghosh Ray},
  editor       = {Orr Dunkelman and
                  Somitra Kumar Sanadhya},
  title        = {Format Preserving Sets: On Diffusion Layers of Format Preserving Encryption
                  Schemes},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2016 - 17th International Conference
                  on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10095},
  pages        = {411--428},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49890-4\_23},
  doi          = {10.1007/978-3-319-49890-4\_23},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/GuptaPR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PanditPB15,
  author       = {Tapas Pandit and
                  Sumit Kumar Pandey and
                  Rana Barua},
  title        = {Attribute-Based Signcryption : Signer Privacy, Strong Unforgeability
                  and {IND-CCA2} Security in Adaptive-Predicates Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {555},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/555},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PanditPB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincrypt/SaraswatP14,
  author       = {Vishal Saraswat and
                  Sumit Kumar Pandey},
  editor       = {Diego F. Aranha and
                  Alfred Menezes},
  title        = {How to Leak a Secret and Reap the Rewards Too},
  booktitle    = {Progress in Cryptology - {LATINCRYPT} 2014 - Third International Conference
                  on Cryptology and Information Security in Latin America, Florian{\'{o}}polis,
                  Brazil, September 17-19, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8895},
  pages        = {348--367},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-16295-9\_19},
  doi          = {10.1007/978-3-319-16295-9\_19},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/latincrypt/SaraswatP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/PanditPB14,
  author       = {Tapas Pandit and
                  Sumit Kumar Pandey and
                  Rana Barua},
  editor       = {Sherman S. M. Chow and
                  Joseph K. Liu and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Attribute-Based Signcryption : Signer Privacy, Strong Unforgeability
                  and {IND-CCA2} Security in Adaptive-Predicates Attack},
  booktitle    = {Provable Security - 8th International Conference, ProvSec 2014, Hong
                  Kong, China, October 9-10, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8782},
  pages        = {274--290},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12475-9\_19},
  doi          = {10.1007/978-3-319-12475-9\_19},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/PanditPB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/space/PandeySJ12,
  author       = {Sumit Kumar Pandey and
                  Santanu Sarkar and
                  Mahabir Prasad Jhanwar},
  editor       = {Andrey Bogdanov and
                  Somitra Kumar Sanadhya},
  title        = {Relaxing {IND-CCA:} Indistinguishability against Chosen Ciphertext
                  Verification Attack},
  booktitle    = {Security, Privacy, and Applied Cryptography Engineering - Second International
                  Conference, {SPACE} 2012, Chennai, India, November 3-4, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7644},
  pages        = {63--76},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34416-9\_5},
  doi          = {10.1007/978-3-642-34416-9\_5},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/space/PandeySJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/PandeyB11,
  author       = {Sumit Kumar Pandey and
                  Rana Barua},
  title        = {Efficient Construction of Identity Based Signcryption Schemes from
                  Identity Based Encryption and Signature Schemes},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {1},
  number       = {2/3},
  pages        = {161--180},
  year         = {2011},
  url          = {https://doi.org/10.22667/JISIS.2011.08.31.161},
  doi          = {10.22667/JISIS.2011.08.31.161},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/PandeyB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/PandeyB10,
  author       = {Sumit Kumar Pandey and
                  Rana Barua},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Construction of Identity Based Signcryption Schemes},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {1--14},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_1},
  doi          = {10.1007/978-3-642-17955-6\_1},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/PandeyB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/BaruaPP07,
  author       = {Rana Barua and
                  Sumit Kumar Pandey and
                  Ravi Pankaj},
  editor       = {K. Srinathan and
                  C. Pandu Rangan and
                  Moti Yung},
  title        = {Efficient Window-Based Scalar Multiplication on Elliptic Curves Using
                  Double-Base Number System},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2007, 8th International Conference
                  on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4859},
  pages        = {351--360},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77026-8\_27},
  doi          = {10.1007/978-3-540-77026-8\_27},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/BaruaPP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics