Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Sumit Kumar Pandey
@article{DBLP:journals/ccds/GuptaPS24, author = {Kishan Chand Gupta and Sumit Kumar Pandey and Susanta Samanta}, title = {On the construction of near-MDS matrices}, journal = {Cryptogr. Commun.}, volume = {16}, number = {2}, pages = {249--283}, year = {2024}, url = {https://doi.org/10.1007/s12095-023-00667-x}, doi = {10.1007/S12095-023-00667-X}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/GuptaPS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/GuptaSP24, author = {Sachi Gupta and Aman Sinha and Sumit Kumar Pandey}, title = {A resilient m-qubit quantum secret sharing scheme using quantum error correction code}, journal = {Quantum Inf. Process.}, volume = {23}, number = {2}, pages = {58}, year = {2024}, url = {https://doi.org/10.1007/s11128-024-04265-5}, doi = {10.1007/S11128-024-04265-5}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/GuptaSP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-12791, author = {Kishan Chand Gupta and Sumit Kumar Pandey and Susanta Samanta}, title = {On the Construction of Near-MDS Matrices}, journal = {CoRR}, volume = {abs/2306.12791}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.12791}, doi = {10.48550/ARXIV.2306.12791}, eprinttype = {arXiv}, eprint = {2306.12791}, timestamp = {Tue, 27 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-12791.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-12848, author = {Kishan Chand Gupta and Sumit Kumar Pandey and Susanta Samanta}, title = {On the Direct Construction of {MDS} and Near-MDS Matrices}, journal = {CoRR}, volume = {abs/2306.12848}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.12848}, doi = {10.48550/ARXIV.2306.12848}, eprinttype = {arXiv}, eprint = {2306.12848}, timestamp = {Tue, 27 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-12848.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/GuptaPS22, author = {Kishan Chand Gupta and Sumit Kumar Pandey and Susanta Samanta}, editor = {Lejla Batina and Joan Daemen}, title = {Construction of Recursive {MDS} Matrices Using {DLS} Matrices}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2022: 13th International Conference on Cryptology in Africa, {AFRICACRYPT} 2022, Fes, Morocco, July 18-20, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13503}, pages = {3--27}, publisher = {Springer Nature Switzerland}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17433-9\_1}, doi = {10.1007/978-3-031-17433-9\_1}, timestamp = {Sun, 10 Dec 2023 00:28:26 +0100}, biburl = {https://dblp.org/rec/conf/africacrypt/GuptaPS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/GuptaPS22a, author = {Kishan Chand Gupta and Sumit Kumar Pandey and Susanta Samanta}, editor = {Lejla Batina and Joan Daemen}, title = {{FUTURE:} {A} Lightweight Block Cipher Using an Optimal Diffusion Matrix}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2022: 13th International Conference on Cryptology in Africa, {AFRICACRYPT} 2022, Fes, Morocco, July 18-20, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13503}, pages = {28--52}, publisher = {Springer Nature Switzerland}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17433-9\_2}, doi = {10.1007/978-3-031-17433-9\_2}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/africacrypt/GuptaPS22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dam/KesarwaniPSV21, author = {Abhishek Kesarwani and Sumit Kumar Pandey and Santanu Sarkar and Ayineedi Venkateswarlu}, title = {Recursive {MDS} matrices over finite commutative rings}, journal = {Discret. Appl. Math.}, volume = {304}, pages = {384--396}, year = {2021}, url = {https://doi.org/10.1016/j.dam.2021.08.016}, doi = {10.1016/J.DAM.2021.08.016}, timestamp = {Fri, 22 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dam/KesarwaniPSV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DeyPRS21, author = {Chandan Dey and Sumit Kumar Pandey and Tapabrata Roy and Santanu Sarkar}, title = {Differential fault attack on {DEFAULT}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1392}, year = {2021}, url = {https://eprint.iacr.org/2021/1392}, timestamp = {Fri, 12 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DeyPRS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amco/GuptaPRS19, author = {Kishan Chand Gupta and Sumit Kumar Pandey and Indranil Ghosh Ray and Susanta Samanta}, title = {Cryptographically significant mds matrices over finite fields: {A} brief survey and some generalized results}, journal = {Adv. Math. Commun.}, volume = {13}, number = {4}, pages = {779--843}, year = {2019}, url = {https://doi.org/10.3934/amc.2019045}, doi = {10.3934/AMC.2019045}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amco/GuptaPRS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GuptaPV19, author = {Kishan Chand Gupta and Sumit Kumar Pandey and Ayineedi Venkateswarlu}, title = {Almost involutory recursive {MDS} diffusion layers}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {2-3}, pages = {609--626}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0582-2}, doi = {10.1007/S10623-018-0582-2}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GuptaPV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/space/GuptaPS19, author = {Kishan Chand Gupta and Sumit Kumar Pandey and Susanta Samanta}, editor = {Shivam Bhasin and Avi Mendelson and Mridul Nandi}, title = {A Few Negative Results on Constructions of {MDS} Matrices Using Low {XOR} Matrices}, booktitle = {Security, Privacy, and Applied Cryptography Engineering - 9th International Conference, {SPACE} 2019, Gandhinagar, India, December 3-7, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11947}, pages = {195--213}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-35869-3\_14}, doi = {10.1007/978-3-030-35869-3\_14}, timestamp = {Fri, 22 Nov 2019 13:35:40 +0100}, biburl = {https://dblp.org/rec/conf/space/GuptaPS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsce/PandeyDB18, author = {Sumit Kumar Pandey and Jayati Dey and Subrata Banerjee}, title = {Design of robust proportional-integral-derivative controller for generalized decoupled twin rotor multi-input-multi-output system with actuator non-linearity}, journal = {J. Syst. Control. Eng.}, volume = {232}, number = {8}, pages = {971--982}, year = {2018}, url = {https://doi.org/10.1177/0959651818771487}, doi = {10.1177/0959651818771487}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsce/PandeyDB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/BaruaGPR18, author = {Rana Barua and Kishan Chand Gupta and Sumit Kumar Pandey and Indranil Ghosh Ray}, editor = {Debrup Chakraborty and Tetsu Iwata}, title = {On Diffusion Layers of {SPN} Based Format Preserving Encryption Schemes: Format Preserving Sets Revisited}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2018 - 19th International Conference on Cryptology in India, New Delhi, India, December 9-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11356}, pages = {91--104}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-05378-9\_5}, doi = {10.1007/978-3-030-05378-9\_5}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/BaruaGPR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivs/KumarJPC18, author = {Sachin Kumar and Sonu Jha and Sumit Kumar Pandey and Anupam Chattopadhyay}, title = {A Security Model for Intelligent Vehicles and Smart Traffic Infrastructure}, booktitle = {2018 {IEEE} Intelligent Vehicles Symposium, {IV} 2018, Changshu, Suzhou, China, June 26-30, 2018}, pages = {162--167}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/IVS.2018.8500423}, doi = {10.1109/IVS.2018.8500423}, timestamp = {Wed, 16 Oct 2019 14:14:57 +0200}, biburl = {https://dblp.org/rec/conf/ivs/KumarJPC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GuptaPV17, author = {Kishan Chand Gupta and Sumit Kumar Pandey and Ayineedi Venkateswarlu}, title = {On the direct construction of recursive {MDS} matrices}, journal = {Des. Codes Cryptogr.}, volume = {82}, number = {1-2}, pages = {77--94}, year = {2017}, url = {https://doi.org/10.1007/s10623-016-0233-4}, doi = {10.1007/S10623-016-0233-4}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GuptaPV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GuptaPV17a, author = {Kishan Chand Gupta and Sumit Kumar Pandey and Ayineedi Venkateswarlu}, title = {Towards a general construction of recursive {MDS} diffusion layers}, journal = {Des. Codes Cryptogr.}, volume = {82}, number = {1-2}, pages = {179--195}, year = {2017}, url = {https://doi.org/10.1007/s10623-016-0261-0}, doi = {10.1007/S10623-016-0261-0}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GuptaPV17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/GuptaPR17, author = {Kishan Chand Gupta and Sumit Kumar Pandey and Indranil Ghosh Ray}, title = {Applications of design theory for the constructions of {MDS} matrices for lightweight cryptography}, journal = {J. Math. Cryptol.}, volume = {11}, number = {2}, pages = {85}, year = {2017}, url = {https://doi.org/10.1515/jmc-2016-0013}, doi = {10.1515/JMC-2016-0013}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/GuptaPR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BanikPPSST17, author = {Subhadeep Banik and Sumit Kumar Pandey and Thomas Peyrin and Yu Sasaki and Siang Meng Sim and Yosuke Todo}, editor = {Wieland Fischer and Naofumi Homma}, title = {{GIFT:} {A} Small Present - Towards Reaching the Limit of Lightweight Encryption}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10529}, pages = {321--345}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66787-4\_16}, doi = {10.1007/978-3-319-66787-4\_16}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BanikPPSST17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BanikPPSTS17, author = {Subhadeep Banik and Sumit Kumar Pandey and Thomas Peyrin and Siang Meng Sim and Yosuke Todo and Yu Sasaki}, title = {{GIFT:} {A} Small Present}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {622}, year = {2017}, url = {http://eprint.iacr.org/2017/622}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BanikPPSTS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/PanditPB16, author = {Tapas Pandit and Sumit Kumar Pandey and Rana Barua}, title = {Attribute-Based Signcryption: Signer Privacy, Strong Unforgeability and {IND-CCA} Security in Adaptive-Predicates Model (Extended Version)}, journal = {J. Internet Serv. Inf. Secur.}, volume = {6}, number = {3}, pages = {61--113}, year = {2016}, url = {https://doi.org/10.22667/JISIS.2016.08.31.061}, doi = {10.22667/JISIS.2016.08.31.061}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/PanditPB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/GuptaPR16, author = {Kishan Chand Gupta and Sumit Kumar Pandey and Indranil Ghosh Ray}, editor = {Orr Dunkelman and Somitra Kumar Sanadhya}, title = {Format Preserving Sets: On Diffusion Layers of Format Preserving Encryption Schemes}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2016 - 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10095}, pages = {411--428}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49890-4\_23}, doi = {10.1007/978-3-319-49890-4\_23}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/GuptaPR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PanditPB15, author = {Tapas Pandit and Sumit Kumar Pandey and Rana Barua}, title = {Attribute-Based Signcryption : Signer Privacy, Strong Unforgeability and {IND-CCA2} Security in Adaptive-Predicates Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {555}, year = {2015}, url = {http://eprint.iacr.org/2015/555}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PanditPB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latincrypt/SaraswatP14, author = {Vishal Saraswat and Sumit Kumar Pandey}, editor = {Diego F. Aranha and Alfred Menezes}, title = {How to Leak a Secret and Reap the Rewards Too}, booktitle = {Progress in Cryptology - {LATINCRYPT} 2014 - Third International Conference on Cryptology and Information Security in Latin America, Florian{\'{o}}polis, Brazil, September 17-19, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8895}, pages = {348--367}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-16295-9\_19}, doi = {10.1007/978-3-319-16295-9\_19}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/latincrypt/SaraswatP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/PanditPB14, author = {Tapas Pandit and Sumit Kumar Pandey and Rana Barua}, editor = {Sherman S. M. Chow and Joseph K. Liu and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, title = {Attribute-Based Signcryption : Signer Privacy, Strong Unforgeability and {IND-CCA2} Security in Adaptive-Predicates Attack}, booktitle = {Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8782}, pages = {274--290}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12475-9\_19}, doi = {10.1007/978-3-319-12475-9\_19}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/PanditPB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/space/PandeySJ12, author = {Sumit Kumar Pandey and Santanu Sarkar and Mahabir Prasad Jhanwar}, editor = {Andrey Bogdanov and Somitra Kumar Sanadhya}, title = {Relaxing {IND-CCA:} Indistinguishability against Chosen Ciphertext Verification Attack}, booktitle = {Security, Privacy, and Applied Cryptography Engineering - Second International Conference, {SPACE} 2012, Chennai, India, November 3-4, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7644}, pages = {63--76}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34416-9\_5}, doi = {10.1007/978-3-642-34416-9\_5}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/space/PandeySJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/PandeyB11, author = {Sumit Kumar Pandey and Rana Barua}, title = {Efficient Construction of Identity Based Signcryption Schemes from Identity Based Encryption and Signature Schemes}, journal = {J. Internet Serv. Inf. Secur.}, volume = {1}, number = {2/3}, pages = {161--180}, year = {2011}, url = {https://doi.org/10.22667/JISIS.2011.08.31.161}, doi = {10.22667/JISIS.2011.08.31.161}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/PandeyB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/PandeyB10, author = {Sumit Kumar Pandey and Rana Barua}, editor = {Yongwha Chung and Moti Yung}, title = {Construction of Identity Based Signcryption Schemes}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {1--14}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_1}, doi = {10.1007/978-3-642-17955-6\_1}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/PandeyB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/BaruaPP07, author = {Rana Barua and Sumit Kumar Pandey and Ravi Pankaj}, editor = {K. Srinathan and C. Pandu Rangan and Moti Yung}, title = {Efficient Window-Based Scalar Multiplication on Elliptic Curves Using Double-Base Number System}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4859}, pages = {351--360}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77026-8\_27}, doi = {10.1007/978-3-540-77026-8\_27}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/BaruaPP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.