A brief history of cellular automata P Sarkar Acm computing surveys (csur) 32 (1), 80-107, 2000 | 515 | 2000 |
Nonlinearity bounds and constructions of resilient Boolean functions P Sarkar, S Maitra Advances in Cryptology—CRYPTO 2000: 20th Annual International Cryptology …, 2000 | 268 | 2000 |
Pairing-based cryptographic protocols: A survey R Dutta, R Barua, P Sarkar Cryptology ePrint Archive, 2004 | 254 | 2004 |
Construction of nonlinear Boolean functions with important cryptographic properties P Sarkar, S Maitra EUROCRYPT 1807, 485-506, 2000 | 228 | 2000 |
New applications of time memory data tradeoffs J Hong, P Sarkar Asiacrypt 3788, 353-372, 2005 | 190* | 2005 |
Extending Joux’s protocol to multi party key agreement R Barua, R Dutta, P Sarkar Progress in Cryptology-INDOCRYPT 2003: 4th International Conference on …, 2003 | 154 | 2003 |
New constructions of resilient and correlation immune Boolean functions achieving upper bound on nonlinearity E Pasalic, S Maitra, T Johansson, P Sarkar Electronic Notes in Discrete Mathematics 6, 158-167, 2001 | 140 | 2001 |
A simple and generic construction of authenticated encryption with associated data P Sarkar ACM Transactions on Information and System Security (TISSEC) 13 (4), 1-16, 2010 | 133 | 2010 |
Improved time-memory trade-offs with multiple data A Biryukov, S Mukhopadhyay, P Sarkar Selected Areas in Cryptography 3897, 110-127, 2005 | 114 | 2005 |
Trading time for space: Towards an efficient IBE scheme with short (er) public parameters in the standard model S Chatterjee, P Sarkar Information Security and Cryptology-ICISC 2005: 8th International Conference …, 2006 | 113 | 2006 |
HCH: A new tweakable enciphering scheme using the hash-counter-hash approach D Chakraborty, P Sarkar IEEE Transactions on Information Theory 54 (4), 1683-1699, 2008 | 110* | 2008 |
Spectral domain analysis of correlation immune and resilient Boolean functions C Carlet, P Sarkar Finite Fields and Their Applications 8 (1), 120-130, 2002 | 108 | 2002 |
Challenges with assessing the impact of NFS advances on the security of pairing-based cryptography A Menezes, P Sarkar, S Singh Paradigms in Cryptology–Mycrypt 2016. Malicious and Exploratory Cryptology …, 2017 | 105 | 2017 |
Efficient tweakable enciphering schemes from (block-wise) universal hash functions P Sarkar IEEE Transactions on Information Theory 55 (10), 4749-4760, 2009 | 102* | 2009 |
New collision attacks against up to 24-step SHA-2 SK Sanadhya, P Sarkar Progress in Cryptology-INDOCRYPT 2008: 9th International Conference on …, 2008 | 97 | 2008 |
Identity-based encryption S Chatterjee, P Sarkar Springer Science & Business Media, 2011 | 92 | 2011 |
Pairing-based cryptography: A survey R Dutta, R Barua, P Sarkar Cryptology Research Group, Stat-Math and Applied Statistics Unit 203, 2004 | 84 | 2004 |
Another look at tightness S Chatterjee, A Menezes, P Sarkar Selected Areas in Cryptography: 18th International Workshop, SAC 2011 …, 2012 | 76 | 2012 |
A new mode of encryption providing a tweakable strong pseudo-random permutation D Chakraborty, P Sarkar Fast Software Encryption: 13th International Workshop, FSE 2006, Graz …, 2006 | 76 | 2006 |
HIBE with short public parameters without random oracle S Chatterjee, P Sarkar Advances in Cryptology–ASIACRYPT 2006: 12th International Conference on the …, 2006 | 73 | 2006 |