NUK - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov NUK. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 341
1.
  • Another look at key randomi... Another look at key randomisation hypotheses
    Samajder, Subhabrata; Sarkar, Palash Designs, codes, and cryptography, 12/2023, Letnik: 91, Številka: 12
    Journal Article
    Recenzirano

    In the context of linear cryptanalysis of block ciphers, let p 0 (resp. p 1 ) be the probability that a particular linear approximation holds for the right (resp. a wrong) key choice. The standard ...
Celotno besedilo
2.
  • A brief history of cellular... A brief history of cellular automata
    SARKAR, Palash ACM computing surveys, 03/2000, Letnik: 32, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    Cellular automata are simple models of computation which exhibit fascinatingly complex behavior. They have captured the attention of several generations of researchers, leading to an extensive body ...
Celotno besedilo
3.
  • A Direct Construction of q-... A Direct Construction of q-ary Even Length Z-Complementary Pairs Using Generalized Boolean Functions
    Adhikary, Avik Ranjan; Sarkar, Palash; Majhi, Sudhan IEEE signal processing letters, 2020, Letnik: 27
    Journal Article
    Recenzirano

    The zero correlation zone (ZCZ) ratio, i.e., the ratio of the width of the ZCZ and the length of the sequence plays a major role in reducing interference in an asynchronous environment of ...
Celotno besedilo
4.
  • Breaking tweakable encipher... Breaking tweakable enciphering schemes using Simon’s algorithm
    Ghosh, Sebati; Sarkar, Palash Designs, codes, and cryptography, 08/2021, Letnik: 89, Številka: 8
    Journal Article
    Recenzirano

    We show the applicability of Simon’s period finding quantum algorithm to the cryptanalysis of several tweakable enciphering schemes (TESs), namely, CMC, EME, XCB, TET and FAST. For all of the five ...
Celotno besedilo
5.
  • Kummer for Genus One Over P... Kummer for Genus One Over Prime-Order Fields
    Karati, Sabyasachi; Sarkar, Palash Journal of cryptology, 2020/1, Letnik: 33, Številka: 1
    Journal Article
    Recenzirano

    This work considers the problem of fast and secure scalar multiplication using curves of genus one defined over a field of prime order. Previous work by Gaudry and Lubicz (Finite Fields Appl ...
Celotno besedilo
6.
  • Variants of Wegman-Carter m... Variants of Wegman-Carter message authentication code supporting variable tag lengths
    Ghosh, Sebati; Sarkar, Palash Designs, codes, and cryptography, 04/2021, Letnik: 89, Številka: 4
    Journal Article
    Recenzirano

    In this work, we study message authentication code (MAC) schemes supporting variable tag lengths. We provide a formalisation of such a scheme. Several variants of the classical Wegman-Carter MAC ...
Celotno besedilo
7.
  • A Direct Construction of As... A Direct Construction of Asymptotically Optimal Type-II ZCP for Every Possible Even Length
    Kumar, Rajen; Sarkar, Palash; Srivastava, Prashant Kumar ... IEEE signal processing letters, 2021, Letnik: 28
    Journal Article
    Recenzirano

    A pair of the complex-valued sequences is called a <inline-formula><tex-math notation="LaTeX">Z</tex-math></inline-formula>-complementary pair (ZCP) if it has zero aperiodic auto-correlation sum ...
Celotno besedilo
8.
  • Weighted voting procedure h... Weighted voting procedure having a unique blocker
    Bhattacherjee, Sanjay; Sarkar, Palash International journal of game theory, 03/2021, Letnik: 50, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    The Goods and Services Tax (GST) Council of India has a non-conventional weighted voting procedure having a primary player who is a blocker and a set of secondary players. The voting weights are not ...
Celotno besedilo

PDF
9.
  • Modes of operations for enc... Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector
    Sarkar, Palash Cryptography and communications, 09/2014, Letnik: 6, Številka: 3
    Journal Article
    Recenzirano

    We describe a systematic framework for using a stream cipher supporting an initialisation vector ( IV ) to perform various tasks of authentication and authenticated encryption. These include message ...
Celotno besedilo

PDF
10.
  • Security and efficiency tra... Security and efficiency trade-offs for elliptic curve Diffie–Hellman at the 128-bit and 224-bit security levels
    Nath, Kaushik; Sarkar, Palash Journal of cryptographic engineering, 04/2022, Letnik: 12, Številka: 1
    Journal Article
    Recenzirano

    Within the transport layer security (TLS) protocol version 1.3, RFC 7748 specifies elliptic curves targeted at the 128-bit and the 224-bit security levels. For the 128-bit security level, the ...
Celotno besedilo
1 2 3 4 5
zadetkov: 341

Nalaganje filtrov