default search action
Sumit Kumar Pandey
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Chandan Dey, Sumit Kumar Pandey, Tapabrata Roy, Santanu Sarkar:
Differential faultt attack on DEFAULT. Adv. Math. Commun. 18(4): 909-921 (2024) - [j11]Kishan Chand Gupta, Sumit Kumar Pandey, Susanta Samanta:
On the construction of near-MDS matrices. Cryptogr. Commun. 16(2): 249-283 (2024) - [j10]Sachi Gupta, Aman Sinha, Sumit Kumar Pandey:
A resilient m-qubit quantum secret sharing scheme using quantum error correction code. Quantum Inf. Process. 23(2): 58 (2024) - 2023
- [i5]Kishan Chand Gupta, Sumit Kumar Pandey, Susanta Samanta:
On the Construction of Near-MDS Matrices. CoRR abs/2306.12791 (2023) - [i4]Kishan Chand Gupta, Sumit Kumar Pandey, Susanta Samanta:
On the Direct Construction of MDS and Near-MDS Matrices. CoRR abs/2306.12848 (2023) - 2022
- [c12]Kishan Chand Gupta, Sumit Kumar Pandey, Susanta Samanta:
Construction of Recursive MDS Matrices Using DLS Matrices. AFRICACRYPT 2022: 3-27 - [c11]Kishan Chand Gupta, Sumit Kumar Pandey, Susanta Samanta:
FUTURE: A Lightweight Block Cipher Using an Optimal Diffusion Matrix. AFRICACRYPT 2022: 28-52 - 2021
- [j9]Abhishek Kesarwani, Sumit Kumar Pandey, Santanu Sarkar, Ayineedi Venkateswarlu:
Recursive MDS matrices over finite commutative rings. Discret. Appl. Math. 304: 384-396 (2021) - [i3]Chandan Dey, Sumit Kumar Pandey, Tapabrata Roy, Santanu Sarkar:
Differential fault attack on DEFAULT. IACR Cryptol. ePrint Arch. 2021: 1392 (2021)
2010 – 2019
- 2019
- [j8]Kishan Chand Gupta, Sumit Kumar Pandey, Indranil Ghosh Ray, Susanta Samanta:
Cryptographically significant mds matrices over finite fields: A brief survey and some generalized results. Adv. Math. Commun. 13(4): 779-843 (2019) - [j7]Kishan Chand Gupta, Sumit Kumar Pandey, Ayineedi Venkateswarlu:
Almost involutory recursive MDS diffusion layers. Des. Codes Cryptogr. 87(2-3): 609-626 (2019) - [c10]Kishan Chand Gupta, Sumit Kumar Pandey, Susanta Samanta:
A Few Negative Results on Constructions of MDS Matrices Using Low XOR Matrices. SPACE 2019: 195-213 - 2018
- [j6]Sumit Kumar Pandey, Jayati Dey, Subrata Banerjee:
Design of robust proportional-integral-derivative controller for generalized decoupled twin rotor multi-input-multi-output system with actuator non-linearity. J. Syst. Control. Eng. 232(8): 971-982 (2018) - [c9]Rana Barua, Kishan Chand Gupta, Sumit Kumar Pandey, Indranil Ghosh Ray:
On Diffusion Layers of SPN Based Format Preserving Encryption Schemes: Format Preserving Sets Revisited. INDOCRYPT 2018: 91-104 - [c8]Sachin Kumar, Sonu Jha, Sumit Kumar Pandey, Anupam Chattopadhyay:
A Security Model for Intelligent Vehicles and Smart Traffic Infrastructure. Intelligent Vehicles Symposium 2018: 162-167 - 2017
- [j5]Kishan Chand Gupta, Sumit Kumar Pandey, Ayineedi Venkateswarlu:
On the direct construction of recursive MDS matrices. Des. Codes Cryptogr. 82(1-2): 77-94 (2017) - [j4]Kishan Chand Gupta, Sumit Kumar Pandey, Ayineedi Venkateswarlu:
Towards a general construction of recursive MDS diffusion layers. Des. Codes Cryptogr. 82(1-2): 179-195 (2017) - [j3]Kishan Chand Gupta, Sumit Kumar Pandey, Indranil Ghosh Ray:
Applications of design theory for the constructions of MDS matrices for lightweight cryptography. J. Math. Cryptol. 11(2): 85 (2017) - [c7]Subhadeep Banik, Sumit Kumar Pandey, Thomas Peyrin, Yu Sasaki, Siang Meng Sim, Yosuke Todo:
GIFT: A Small Present - Towards Reaching the Limit of Lightweight Encryption. CHES 2017: 321-345 - [i2]Subhadeep Banik, Sumit Kumar Pandey, Thomas Peyrin, Siang Meng Sim, Yosuke Todo, Yu Sasaki:
GIFT: A Small Present. IACR Cryptol. ePrint Arch. 2017: 622 (2017) - 2016
- [j2]Tapas Pandit, Sumit Kumar Pandey, Rana Barua:
Attribute-Based Signcryption: Signer Privacy, Strong Unforgeability and IND-CCA Security in Adaptive-Predicates Model (Extended Version). J. Internet Serv. Inf. Secur. 6(3): 61-113 (2016) - [c6]Kishan Chand Gupta, Sumit Kumar Pandey, Indranil Ghosh Ray:
Format Preserving Sets: On Diffusion Layers of Format Preserving Encryption Schemes. INDOCRYPT 2016: 411-428 - 2015
- [i1]Tapas Pandit, Sumit Kumar Pandey, Rana Barua:
Attribute-Based Signcryption : Signer Privacy, Strong Unforgeability and IND-CCA2 Security in Adaptive-Predicates Attack. IACR Cryptol. ePrint Arch. 2015: 555 (2015) - 2014
- [c5]Vishal Saraswat, Sumit Kumar Pandey:
How to Leak a Secret and Reap the Rewards Too. LATINCRYPT 2014: 348-367 - [c4]Tapas Pandit, Sumit Kumar Pandey, Rana Barua:
Attribute-Based Signcryption : Signer Privacy, Strong Unforgeability and IND-CCA2 Security in Adaptive-Predicates Attack. ProvSec 2014: 274-290 - 2012
- [c3]Sumit Kumar Pandey, Santanu Sarkar, Mahabir Prasad Jhanwar:
Relaxing IND-CCA: Indistinguishability against Chosen Ciphertext Verification Attack. SPACE 2012: 63-76 - 2011
- [j1]Sumit Kumar Pandey, Rana Barua:
Efficient Construction of Identity Based Signcryption Schemes from Identity Based Encryption and Signature Schemes. J. Internet Serv. Inf. Secur. 1(2/3): 161-180 (2011) - 2010
- [c2]Sumit Kumar Pandey, Rana Barua:
Construction of Identity Based Signcryption Schemes. WISA 2010: 1-14
2000 – 2009
- 2007
- [c1]Rana Barua, Sumit Kumar Pandey, Ravi Pankaj:
Efficient Window-Based Scalar Multiplication on Elliptic Curves Using Double-Base Number System. INDOCRYPT 2007: 351-360
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint