Palash Sarkar
#80,170
Most Influential Person Now
Mathematician
Palash Sarkar's AcademicInfluence.com Rankings
Palash Sarkarmathematics Degrees
Mathematics
#4971
World Rank
#7023
Historical Rank
Measure Theory
#2327
World Rank
#2783
Historical Rank

Download Badge
Mathematics
Palash Sarkar's Degrees
- Bachelors Mathematics University of Calcutta
Similar Degrees You Can Earn
Why Is Palash Sarkar Influential?
(Suggest an Edit or Addition)According to Wikipedia, Palash Sarkar is an Indian mathematician and a professor at the Applied Statistics Unit at the Indian Statistical Institute. His main research interest is Cryptology. He was awarded in 2011 Shanti Swarup Bhatnagar Prize for Science and Technology, the highest science award in India, in the mathematical sciences category.
Palash Sarkar's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- A brief history of cellular automata (2000) (383)
- Pairing-Based Cryptographic Protocols : A Survey (2004) (239)
- Nonlinearity Bounds and Constructions of Resilient Boolean Functions (2000) (218)
- Construction of Nonlinear Boolean Functions with Important Cryptographic Properties (2000) (193)
- A Simple and Generic Construction of Authenticated Encryption with Associated Data (2010) (133)
- New Applications of Time Memory Data Tradeoffs (2005) (117)
- Extending Joux's Protocol to Multi Party Key Agreement (Extended Abstract) (2003) (108)
- Improved Time-Memory Trade-Offs with Multiple Data (2005) (106)
- Trading Time for Space: Towards an Efficient IBE Scheme with Short(er) Public Parameters in the Standard Model (2005) (92)
- New Constructions of Resilient and Correlation Immune Boolean Functions Achieving Upper Bound on Nonlinearity (2001) (92)
- Challenges with Assessing the Impact of NFS Advances on the Security of Pairing-Based Cryptography (2016) (90)
- Identity-Based Encryption (2011) (85)
- New Collision Attacks against Up to 24-Step SHA-2 (2008) (77)
- Spectral Domain Analysis of Correlation Immune and Resilient Boolean Functions (2000) (77)
- Rediscovery of Time Memory Tradeoffs (2005) (71)
- Improved construction of nonlinear resilient S-boxes (2002) (68)
- Another Look at Tightness (2011) (66)
- Multi-receiver Identity-Based Key Encapsulation with Shortened Ciphertext (2006) (65)
- A General Construction of Tweakable Block Ciphers and Different Modes of Operations (2006) (64)
- A New Mode of Encryption Providing a Tweakable Strong Pseudo-random Permutation (2006) (64)
- HCH: A New Tweakable Enciphering Scheme Using the Hash-Encrypt-Hash Approach (2006) (62)
- Progress in Cryptology — INDOCRYPT 2002 (2002) (62)
- Pairing-based cryptography : A survey (2004) (59)
- HIBE With Short Public Parameters Without Random Oracle (2006) (56)
- VLSI architecture of a cellular automata machine (1997) (55)
- Provably Secure Authenticated Tree Based Group Key Agreement (2004) (55)
- Optimal $Z$ -Complementary Code Set From Generalized Reed-Muller Codes (2019) (55)
- Efficient Tweakable Enciphering Schemes From (Block-Wise) Universal Hash Functions (2009) (55)
- Efficient Computation of Tate Pairing in Projective Coordinate over General Characteristic Fields (2004) (53)
- Maximum nonlinearity of symmetric Boolean functions on odd number of variables (2002) (52)
- Cross-Correlation Analysis of Cryptographically Useful Boolean Functions and S-Boxes (2001) (48)
- HCH: A New Tweakable Enciphering Scheme Using the Hash-Counter-Hash Approach (2008) (48)
- Improving Upon the TET Mode of Operation (2007) (48)
- Modifications of Patterson-Wiedemann functions for cryptographic applications (2002) (47)
- Balancedness and correlation immunity of symmetric Boolean functions (2003) (44)
- Highly Nonlinear Resilient Functions Optimizing Siegenthaler's Inequality (1999) (43)
- Pairing Computation on Twisted Edwards Form Elliptic Curves (2008) (43)
- Frameproof and IPP Codes (2001) (39)
- Variants of Waters' Dual-System Primitives Using Asymmetric Pairings (2012) (39)
- New Complexity Trade-Offs for the (Multiple) Number Field Sieve Algorithm in Non-Prime Fields (2016) (38)
- Another Look at Tightness II: Practical Issues in Cryptography (2016) (34)
- A General Polynomial Selection Method and New Asymptotic Complexities for the Tower Number Field Sieve Algorithm (2016) (33)
- Generalization of the Selective-ID Security Model for HIBE Protocols (2006) (32)
- New Constructions of Resilent and Correlation Immune Boolean Functions achieving Upper Bounds on Nonlinearity (2000) (32)
- New Constructions of Constant Size Ciphertext HIBE Without Random Oracle (2006) (31)
- Cryptographically significant Boolean functions with five valued Walsh spectra (2002) (31)
- Hiji-bij-bij: A New Stream Cipher with a Self-synchronizing Mode of Operation (2003) (31)
- Construction of nonlinear resilient Boolean functions using "small" affine functions (2004) (29)
- A Course on Cooperative Game Theory (2014) (28)
- Pseudo-Random Functions and Parallelizable Modes of Operations of a Block Cipher (2010) (25)
- PARSHA-256- - A New Parallelizable Hash Function and a Multithreaded Implementation (2003) (24)
- A Direct Construction of $q$-ary Even Length Z-Complementary Pairs Using Generalized Boolean Functions (2020) (23)
- Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector (2014) (23)
- Efficient (Anonymous) Compact HIBE from Standard Assumptions (2014) (23)
- Tweakable enciphering schemes using only the encryption function of a block cipher (2011) (23)
- Non-linear Reduced Round Attacks against SHA-2 Hash Family (2008) (21)
- Application of LFSRs for Parallel Sequence Generation in Cryptologic Algorithms (2006) (21)
- Pushdown Automaton with the Ability to Flip its Stack (2001) (21)
- A Parallelizable Design Principle for Cryptographic Hash Functions (2002) (20)
- Enumeration of Correlation Immune Boolean Functions (1999) (20)
- On modes of operations of a block cipher for authentication and authenticated encryption (2016) (20)
- A Parallel Algorithm for Extending Cryptographic Hash Functions (2001) (19)
- Parallelizing Explicit Formula for Arithmetic in the Jacobian of Hyperelliptic Curves (2003) (19)
- Efficient hardware implementations of brw polynomials and tweakable enciphering schemes (2013) (19)
- A Direct Construction of Inter-Group Complementary Code Set (2018) (19)
- Time-Memory Trade-Off Attacks on Multiplications and T-Functions (2004) (19)
- Another look at normal approximations in cryptanalysis (2015) (18)
- Construction of Z-Complementary Code Sets With Non-Power-of-Two Lengths Based on Generalized Boolean Functions (2020) (18)
- Attacking Reduced Round SHA-256 (2008) (17)
- A new multi-linear universal hash family (2013) (16)
- New Local Collisions for the SHA-2 Hash Family (2007) (15)
- Construction of perfect nonlinear and maximally nonlinear multiple-output Boolean functions satisfying higher order strict avalanche criteria (2004) (15)
- Multidimenstional Sigma-Automata, Pi-Polynomials and Generalised S-Matrices (1998) (15)
- A note on the spectral characterization of correlation immune Boolean functions (2000) (15)
- STES: A Stream Cipher Based Low Cost Scheme for Securing Stored Data (2015) (15)
- The Filter-Combiner Model for Memoryless Synchronous Stream Ciphers (2002) (15)
- Efficient Adaptively Secure IBBE From the SXDH Assumption (2016) (15)
- Symmetrically Private Information Retrieval (Extended Abstract) (2000) (15)
- Application of Montgomery's Trick to Scalar Multiplication for Elliptic and Hyperelliptic Curves Using a Fixed Base Point (2004) (15)
- A Direct and Generalized Construction of Polyphase Complementary Sets With Low PMEPR and High Code-Rate for OFDM System (2019) (15)
- Masking-based domain extenders for UOWHFs: bounds and constructions (2004) (15)
- A Generalisation of the Conjugation Method for Polynomial Selection for the Extended Tower Number Field Sieve Algorithm (2016) (14)
- Rigorous upper bounds on data complexities of block cipher cryptanalysis (2015) (14)
- The Set of Reversible 90/150 Cellular Automata Is Regular (1998) (14)
- Hamming Weights of Correlation Immune Boolean Functions (1999) (13)
- A trade-off between collision probability and key size in universal hashing using polynomials (2011) (13)
- Pseudo-Boolean Functions for Optimal Z-Complementary Code Sets With Flexible Lengths (2021) (13)
- Direct Construction of Optimal Z-Complementary Code Sets With Even Lengths by Using Generalized Boolean Functions (2021) (13)
- Efficient Implementation of Cryptographically Useful 'Large' Boolean Functions (2003) (12)
- Kummer for Genus One Over Prime-Order Fields (2017) (12)
- A Fast Single-Key Two-Level Universal Hash Function (2017) (12)
- Advances in cryptology - ASIACRYPT 2013 : 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013 : proceedings (2013) (12)
- Construction of UOWHF: Tree Hashing Revisited (2002) (12)
- Disk encryption: do we need to preserve length? (2018) (12)
- A New Universal Hash Function and Other Cryptographic Algorithms Suitable for Resource Constrained Devices (2008) (12)
- Another look at XCB (2015) (12)
- Fine Tuning the Function Field Sieve Algorithm for the Medium Prime Case (2016) (12)
- A general mixing strategy for the ECB-Mix-ECB mode of operation (2008) (11)
- Domain Extender for Collision Resistant Hash Functions: Improving Upon Merkle-Damgaard Iteration (2009) (11)
- Multivariable Function for New Complete Complementary Codes With Arbitrary Lengths (2021) (11)
- Application of LFSRs in Time/Memory Trade-Off Cryptanalysis (2005) (11)
- New Directions in Design of Resilient Boolean Functions (2000) (11)
- A Direct Construction of Optimal ZCCS With Maximum Column Sequence PMEPR Two for MC-CDMA System (2019) (11)
- Efficient arithmetic in (pseudo-)mersenne prime order fields (2022) (10)
- Construction of Perfect Nonlinear and Maximally Nonlinear Multi-output Boolean Functions Satisfying Higher Order Strict Avalanche Criteria (Extended Abstract) (2003) (10)
- Practical hybrid (hierarchical) identity-based encryption schemes based on the decisional bilinear Diffie-Hellman assumption (2013) (10)
- HEAD: Hybrid Encryption with Delegated Decryption Capability (2004) (10)
- Computing Partial Walsh Transform From the Algebraic Normal Form of a Boolean Function (2009) (10)
- Efficient 4-Way Vectorizations of the Montgomery Ladder (2022) (10)
- A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model (2004) (9)
- New perspectives on the Gini and Bonferroni indices of inequality (2021) (9)
- A characterization and some properties of the Banzhaf-Coleman-Dubey-Shapley sensitivity index (2004) (9)
- Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks (2007) (9)
- Construction of high degree resilient S-boxes with improved nonlinearity (2005) (9)
- Construction of universal one-way hash functions: Tree hashing revisited (2007) (8)
- Tree based symmetric key broadcast encryption (2015) (8)
- Complete tree subset difference broadcast encryption scheme and its analysis (2011) (8)
- On (Hierarchical) Identity Based Encryption Protocols with Short Public Parameters (With an Exposition of Waters' Artificial Abort Technique) (2006) (8)
- Computing Shifts in 90/150 cellular automata sequences (2003) (8)
- Efficient Representation and Software Implementation of Resilient Maiorana-McFarland S-boxes (2004) (8)
- On Approximating Addition by Exclusive OR (2009) (7)
- Kummer for Genus One Over Prime-Order Fields (2019) (7)
- Tweakable Enciphering Schemes From Stream Ciphers With IV (2009) (7)
- PGV-Style Block-Cipher-Based Hash Families and Black-Box Analysis (2005) (7)
- FAST: Disk Encryption and Beyond (2017) (7)
- Anonymous Constant-Size Ciphertext HIBE from Asymmetric Pairings (2013) (7)
- Constant Size Ciphertext HIBE in the Augmented Selective-ID Model and its Extensions (2007) (7)
- A simple method for obtaining relations among factor basis elements for special hyperelliptic curves (2017) (7)
- Advances in Cryptology – ASIACRYPT 2014 (2014) (7)
- An n-party Key Agreement Scheme using Bilinear Map (2003) (7)
- Tower Number Field Sieve Variant of a Recent Polynomial Selection Method (2016) (7)
- New Table Look-Up Methods for Faster Frobenius Map Based Scalar Multiplication Over GF(pn) (2004) (6)
- Efficient Implementation of "Large" Stream Cipher Systems (2001) (6)
- Data-reconciliation based fault-tolerant model predictive control for a biomass boiler (2017) (6)
- Verifying Solutions to LWE with Implications for Concrete Security (2019) (6)
- Toward a general correlation theorem (2005) (6)
- A direct construction of even length ZCPs with large ZCZ ratio (2022) (6)
- A new hash family obtained by modifying the SHA-2 family (2009) (6)
- A Direct Construction of q-Ary 2-D Z-Complementary Array Pair Based on Generalized Boolean Functions (2021) (5)
- A new method for decomposition in the Jacobian of small genus hyperelliptic curves (2017) (5)
- Deterministic Constructions of 21-Step Collisions for the SHA-2 Hash Family (2008) (5)
- Another Look at Success Probability in Linear Cryptanalysis (2019) (5)
- Concrete Analysis and Trade-Offs for the (Complete Tree) Layered Subset Difference Broadcast Encryption Scheme (2014) (5)
- Success probability of multiple/multidimensional linear cryptanalysis under general key randomisation hypotheses (2018) (5)
- Breaking tweakable enciphering schemes using Simon’s algorithm (2021) (5)
- Results related to the upper bound on nonlinearity for resilient and correlation immune Boolean functions (2001) (5)
- Reduction Modulo 2 448 -2 224 -1. (2019) (5)
- Multi-Stage Proof-of-Work Blockchain (2019) (5)
- A Direct and Generalized Construction of Polyphase Complementary Set With Low PMEPR (2019) (5)
- A Direct Construction of Complete Complementary Codes With Arbitrary Lengths (2021) (5)
- On Quantifying the Resistance of Concrete Hash Functions to Generic Multicollision Attacks (2011) (4)
- A Direct Construction of Asymptotically Optimal Type-II ZCP for Every Possible Even Length (2021) (4)
- 22-Step Collisions for SHA-2 (2008) (4)
- On Authenticated Encryption Using Stream Ciphers Supporting an Initialisation Vector (2011) (4)
- A New Test Statistic for Key Recovery Attacks Using Multiple Linear Approximations (2016) (4)
- VLSI implementation of modulo multiplication using carry free addition (1997) (4)
- A combinatorial analysis of recent attacks on step reduced SHA-2 family (2009) (4)
- Can Large Deviation Theory be Used for Estimating Data Complexity? (2016) (4)
- Connecting Legendre with Kummer and Edwards (2017) (4)
- A sketch of modern cryptology (2000) (4)
- σ+-Automata on Square Grids (1996) (4)
- A Direct Construction of Prime-Power-Length Zero-Correlation Zone Sequences for QS-CDMA System (2021) (4)
- Domain Extenders for UOWHF: A Finite Binary Tree Algorithm (2005) (3)
- Computing Square Roots Faster than the Tonelli-Shanks/Bernstein Algorithm (2020) (3)
- Constant Time Montgomery Ladder (2020) (3)
- Advances in cryptology - ASIACRYPT 2014 : 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, December 7-11, 2014 : proceedings (2014) (3)
- Construction of Nearly Balanced Uniform Repeated Measurement Designs (1995) (3)
- Efficient Adaptively Secure IBBE from Standard Assumptions (2014) (3)
- An inequality paradox: relative versus absolute indices? (2021) (3)
- Construction of a Hybrid (Hierarchical) Identity-Based Encryption Protocol Secure Against Adaptive Attacks (2006) (3)
- Towards Minimizing Memory Requirement for Implementation of Hyperelliptic Curve Cryptosystems (2007) (3)
- Minimal-axiom characterizations of the Coleman and Banzhaf indices of voting power (2009) (3)
- Reducing Communication Overhead of the Subset Difference Scheme (2016) (3)
- Fast Multiplication of the Algebraic Normal Forms of Two Boolean Functions (2013) (3)
- (Anonymous) Compact HIBE From Standard Assumptions (2013) (3)
- A parallel algorithm for computing simultaneous inversions with application to elliptic curve scalar multiplication (2003) (3)
- Separation results for boolean function classes (2020) (3)
- A unified polynomial selection method for the (tower) number field sieve algorithm (2019) (3)
- Cryptocurrency Voting Games (2017) (3)
- Efficient Inversion In (Pseudo-)Mersenne Prime Order Fields (2018) (3)
- Polynomial division using left shift register (1998) (3)
- A General Correlation Theorem (2003) (3)
- On the Effectiveness of TMTO and Exhaustive Search Attacks (2006) (3)
- Reduction Modulo 2448-2224-1 (2019) (2)
- Avoiding Key Escrow (2011) (2)
- Advances in Cryptology - ASIACRYPT 2013 (2013) (2)
- "Nice" Curves (2019) (2)
- Hardware architecture and trade-offs for generic inversion of one-way functions (2006) (2)
- An Efficient Algorithm for Software Generation of Binary Linear Recurrences (2004) (2)
- A new blockchain proposal supporting multi-stage proof-of-work (2022) (2)
- Definitions and Notations (2011) (2)
- Prevalence of Multi-drug Resistance Pattern of Escherichia coli in Different Ages and Gender of Urinary Tract Infected Patients (2018) (2)
- Time memory tradeoff attacks on streamciphers (2004) (2)
- Efficient Elliptic Curve Diffie-Hellman Computation at the 256-bit Security Level (2020) (2)
- TMTO With Multiple Data: Analysis and New Single Table Trade-offs (2005) (2)
- An Analysis of the Naor-Naor-Lotspiech Subset Difference Algorithm (For Possibly Incomplete Binary Trees) (2011) (2)
- Weighted voting procedure having a unique blocker (2020) (2)
- Asymptotically Optimal Quasi-Complementary Code Sets from Multivariate Functions (2022) (2)
- Computing Walsh Transform from the Algebraic Normal Form of a Boolean Function (2003) (2)
- Designing income distributions with specified inequalities (2021) (2)
- Advances in Cryptology - ASIACRYPT 2013 (2013) (2)
- Inversion of Several Field Elements: A New Parallel Algorithm (2003) (2)
- Vulnerability of Nonlinear Filter Generators Based on Linear Finite State Machines (2004) (2)
- A New Mode of Encryption Secure Against Symmetric Nonce Respecting Adversaries (2006) (2)
- CCA-Secure Hierarchical Identity Based Encryption Without Random (2006) (1)
- Introduction to Blockchain (2020) (1)
- On some connections between statistics and cryptology (2014) (1)
- Multiple Differential Cryptanalysis: A Rigorous Analysis (2016) (1)
- Faster Initial Splitting for Small Characteristic Composite Extension Degree Fields (2020) (1)
- Security and efficiency trade-offs for elliptic curve Diffie–Hellman at the 128-bit and 224-bit security levels (2021) (1)
- ${\sf {FAST}}$: Disk encryption and beyond (2022) (1)
- Classical reduction of gap SVP to LWE: A concrete security analysis (2021) (1)
- Construction of Symmetric Balanced Squares with Blocksize More than One (2003) (1)
- Anonymous HIBE from Standard Assumptions over Type-3 Pairings using Dual System Encryption (2013) (1)
- Identity-Based Encryption and Hierarchical Identity-Based Encryption (2009) (1)
- Kummer versus Montgomery Face-off over Prime Order Fields (2022) (1)
- Ciphertext Only Attack on LFSR Based Encryption Scheme (1999) (1)
- A Brief Analytical Exposition of Markets for Options (2020) (1)
- Progress in cryptology - INDOCRYPT 2002 : Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002 : proceedings (2003) (1)
- Concrete Analysis of Approximate Ideal-SIVP to Decision Ring-LWE Reduction (2022) (1)
- New Discrete Logarithm Computation for the Medium Prime Case Using the Function Field Sieve (2020) (1)
- Evaluating Bernstein–Rabin–Winograd polynomials (2018) (1)
- Hiji-bij-bij : A New Stream Cipher with Self-Syn hronizing and MAC Modes of Operation (2003) (1)
- Security Against Adaptive Chosen Ciphertext Attacks (2011) (1)
- Advances in Cryptology -- ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information, Bengaluru, India, ... Computer Science / Security and Cryptology) (2013) (1)
- Inequality minimising subsidy and taxation (2022) (1)
- Multiple (Truncated) Differential Cryptanalysis: Explicit Upper Bounds on Data Complexity (2018) (1)
- Notes on the postulate of the monotonicity in distance in inequality (2022) (1)
- Cryptocurrency: Further Issues (2020) (1)
- Variable Tag Length Message Authentication Code Schemes (2019) (1)
- Boneh-Franklin IBE and its Variants (2011) (1)
- Valuation of Cash Flows and Fixed Income Securities: An Abridged Analysis (2020) (0)
- Data Reconciliation method for improving the performance of MPC control strategy developed for a BioGrate boiler (2015) (0)
- Another look at XCB (2015) (0)
- Success probability of multiple/multidimensional linear cryptanalysis under general key randomisation hypotheses (2017) (0)
- Online energy balance calculations for a BioGrate boiler (2014) (0)
- Effect of microwave pretreatment on the rheological properties of coal-water and coal-oil slurries (1998) (0)
- Searching for Low Weight Codewords in Linear Binary Codes (2008) (0)
- On Irreducible Polynomials of the Form $b(x^d)$ (2016) (0)
- Multiple (Truncated) Differential Cryptanalysis: Explicit Upper Bounds on Data Complexity (2017) (0)
- Option Pricing Using Finite Difference Method (2020) (0)
- CORR 2001-05 \ All-One " Blocks in a Binary String (2001) (0)
- Hardware Architecture and Cost/time/data Trade-off for Generic Inversion of One-Way Function (2009) (0)
- Products and Standards (2011) (0)
- Disk encryption: do we need to preserve length? (2017) (0)
- IBE in Adaptive-Identity Model Without Random Oracles (2011) (0)
- Multi-Stage Proof-of-Work (2019) (0)
- A Paradox for Inequality Indices (2020) (0)
- On The "Majority is Least Stable" Conjecture (2022) (0)
- Colliding Message Pairs for 23 and 24-step SHA-512 (2008) (0)
- On modes of operations of a block cipher for authentication and authenticated encryption (2015) (0)
- Improved SIMD Implementation of Poly1305 (2020) (0)
- A Direct Construction of Intergroup Complementary Code Set for CDMA (2019) (0)
- Security and efficiency trade-offs for elliptic curve Diffie–Hellman at the 128-bit and 224-bit security levels (2021) (0)
- Some Randomness Experiments on TRIVIUM Technical Report No (2014) (0)
- Correlations Between (Nonlinear) Combiners of Input and Output of Random Functions and Permutations (2017) (0)
- An inequality paradox: relative versus absolute indices? (2021) (0)
- Background Concepts for Blockchain (2020) (0)
- IBE Without Pairing (2011) (0)
- Distinguishing Error of Nonlinear Invariant Attacks (2018) (0)
- Fully Secure Constant-Size Ciphertext HIBE From Type-3 Pairings (2012) (0)
- Applications, Extensions and Related Primitives (2011) (0)
- Aspects of Inductive Inference in Statistics and Machine Learning (2021) (0)
- A Lower Bound on the Constant in the Fourier Min-Entropy/Influence Conjecture (2022) (0)
- Further IBE Constructions (2011) (0)
- Counting unate and balanced monotone Boolean functions (2023) (0)
- Complete tree subset difference broadcast encryption scheme and its analysis (2012) (0)
- Measures of Risk (2020) (0)
- Voting Games to Model Protocol Stability and Security of Proof-of-Work Cryptocurrencies (2022) (0)
- Another Look at Key Randomisation Hypotheses (2019) (0)
- A Direct Construction of Optimal ZCCS and IGC Code Set With Maximum Column Sequence PMEPR Two For MC-CDMA System (2019) (0)
- A Direct Construction of Z-Complementary Pairs Using Generalized Boolean Functions (2019) (0)
- Pseudorandomness of SPN-Type Transformations (2004) (0)
- Voting in the Goods and Service Tax Council of India (2018) (0)
- Domain Extender for Collision Resistant Hash Fun tions Using aDire (2003) (0)
- Exotic Options: An Illustrative Presentation (2020) (0)
- Trading: Background Notions and Market Microstructure (2020) (0)
- Portfolio Optimisation (2020) (0)
- Applications of Blockchain (2020) (0)
- Can Efficient Detection and Isolation Control an Epidemic (2020) (0)
- A simple method for obtaining relations among factor basis elements for special hyperelliptic curves (2016) (0)
- Asymptotically Optimal Quasi-Complementary Code Sets of Length $p_{1}^{m_{1}}p_{2}^{m_{2}}$ (2022) (0)
- Some Randomness Experiments on TRIVIUM (2014) (0)
- Background and Preliminaries (2020) (0)
- Combining Montgomery Multiplication with Tag Tracing for the Pollard's Rho Algorithm in Prime Order Fields (2021) (0)
- Cryptocurrency: Basics (2020) (0)
- Examples of Cryptocurrencies (2020) (0)
- Brownian Motion, Itô Lemma and the Black–Scholes–Merton Model (2020) (0)
- An Abbreviated Theoretical Treatment of Stochastic Dominance Relations (2020) (0)
- Variants of Wegman-Carter message authentication code supporting variable tag lengths (2021) (0)
- A new multi-linear universal hash family (2012) (0)
- On Using Proportional Representation Methods as Alternatives to Pro-Rata Based Order Matching Algorithms in Stock Exchanges (2023) (0)
- Constant-Size Ciphertext HIBE From Asymmetric Pairings Using the Dual-System Technique (2012) (0)
- Weighted voting procedure having a unique blocker (2021) (0)
- Determining Stochastic Dominance Relations (2020) (0)
- Evaluating Bernstein–Rabin–Winograd polynomials (2018) (0)
- Classical Reduction of SVP to LWE: A Concrete Security Analysis (2020) (0)
- Overview of Cryptographic Primitives for Secure Communication (2007) (0)
- Identity-Based Encryption: A 30-Minute Tour (2012) (0)
- High-frequency Trading (2020) (0)
- Generic Attacks on Symmetric Ciphers (2006) (0)
- The Binomial Model: A Simplified Analysis (2020) (0)
- Part I of the Proceedings of the 19th International Conference on Advances in Cryptology - ASIACRYPT 2013 - Volume 8269 (2013) (0)
- Influence of a Set of Variables on a Boolean Function (2021) (0)
- Selective-Identity Model (2011) (0)
- On Stateless Schemes for Message Authentication Using Pseudorandom Functions (2009) (0)
- Algorithmic Trading Strategies (2020) (0)
- Pseudo-Random Walk on Ideals: Practical Speed-Up in Relation Collection for Class Group Computation (2021) (0)
- Proceedings of the Third International Conference on Cryptology: Progress in Cryptology (2002) (0)
- New Correlation Bound and Construction of Quasi-Complementary Code Sets (2022) (0)
- A Sketch of Modern Cryptology The Art and Science of Secrecy Systems (2013) (0)
- A Brief Background on Elliptic Curves and Pairings (2011) (0)
- Correlation and Inequality in Weighted Majority Voting Games (2017) (0)
- Conditional Expectation and Martingales (2011) (0)
- Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector (2014) (0)
- Simpson's Paradox: A Singularity of Statistical and Inductive Inference (2021) (0)
- Functional Encryption Supporting Recursive Languages (2013) (0)
- Option Pricing Using Monte Carlo Methods (2020) (0)
- A New Cryptanalytic Time/Memory/Data Trade-off Algorithm (2006) (0)
- Attacks on Stream Ciphers: A Perspective (2011) (0)
- A new method for decomposition in the Jacobian of small genus hyperelliptic curves (2016) (0)
This paper list is powered by the following services:
Other Resources About Palash Sarkar
What Schools Are Affiliated With Palash Sarkar?
Palash Sarkar is affiliated with the following schools: