Secure and efficient private set intersection cardinality using bloom filter SK Debnath, R Dutta International Conference on Information Security, 209-226, 2015 | 89 | 2015 |
Secure and efficient multiparty private set intersection cardinality SK Debnath, P Stănică, N Kundu, T Choudhury AMC, 2021 | 25 | 2021 |
Efficient private set intersection cardinality in the presence of malicious adversaries SK Debnath, R Dutta Provable Security: 9th International Conference, ProvSec 2015, Kanazawa …, 2015 | 20 | 2015 |
Post-quantum digital signature scheme based on multivariate cubic problem N Kundu, SK Debnath, D Mishra, T Choudhury Journal of Information Security and Applications 53, 102512, 2020 | 16 | 2020 |
A secure and efficient group signature scheme based on multivariate public key cryptography N Kundu, SK Debnath, D Mishra Journal of Information Security and Applications 58, 102776, 2021 | 14 | 2021 |
Blockchain-envisioned provably secure multivariate identity-based multi-signature scheme for Internet of Vehicles environment V Srivastava, SK Debnath, B Bera, AK Das, Y Park, P Lorenz IEEE Transactions on Vehicular Technology 71 (9), 9853-9867, 2022 | 12 | 2022 |
Feasible private set intersection in quantum domain SK Debnath, K Dey, N Kundu, T Choudhury Quantum Information Processing 20 (1), 41, 2021 | 12 | 2021 |
Towards fair mutual private set intersection with linear complexity SK Debnath, R Dutta Security and Communication Networks 9 (11), 1589-1612, 2016 | 12 | 2016 |
New realizations of efficient and secure private set intersection protocols preserving fairness SK Debnath, R Dutta International Conference on Information Security and Cryptology, 254-284, 2016 | 10 | 2016 |
An overview of hash based signatures V Srivastava, A Baksi, SK Debnath Cryptology ePrint Archive, 2023 | 9 | 2023 |
Provably secure fair mutual private set intersection cardinality utilizing bloom filter SK Debnath, R Dutta International Conference on Information Security and Cryptology, 505-525, 2016 | 9 | 2016 |
A post-quantum signcryption scheme using isogeny based cryptography K Dey, SK Debnath, P Stănică, V Srivastava Journal of Information Security and Applications 69, 103280, 2022 | 8 | 2022 |
Post-quantum secure multi-party private set-intersection in star network topology SK Debnath, T Choudhury, N Kundu, K Dey Journal of Information Security and Applications 58, 102731, 2021 | 8 | 2021 |
A fair and efficient mutual private set intersection protocol from a two-way oblivious pseudorandom function SK Debnath, R Dutta International Conference on Information Security and Cryptology, 343-359, 2014 | 8 | 2014 |
A multivariate identity-based broadcast encryption with applications to the internet of things V Srivastava, SK Debnath, P Stanica, SK Pal Advances in Mathematics of Communications, 2021 | 6 | 2021 |
Secure outsourced private set intersection with linear complexity SK Debnath, K Sakurai, K Dey, N Kundu 2021 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2021 | 5 | 2021 |
1-out-of-2: post-quantum oblivious transfer protocols based on multivariate public key cryptography N Kundu, SK Debnath, D Mishra Sādhanā 45 (1), 209, 2020 | 5 | 2020 |
How to meet big data when private set intersection realizes constant communication complexity SK Debnath, R Dutta Information and Communications Security: 18th International Conference …, 2016 | 5 | 2016 |
Cryptanalysis of LRainbow: The Lifted Rainbow Signature Scheme V Srivastava, SK Debnath International Conference on Provable Security, 296-308, 2021 | 4 | 2021 |
Post-quantum secure inner product functional encryption using multivariate public key cryptography SK Debnath, S Mesnager, K Dey, N Kundu Mediterranean Journal of Mathematics 18 (5), 204, 2021 | 4 | 2021 |