P
Palash Sarkar
Researcher at Indian Statistical Institute
Publications - 330
Citations - 5515
Palash Sarkar is an academic researcher from Indian Statistical Institute. The author has contributed to research in topics: Encryption & Hash function. The author has an hindex of 40, co-authored 315 publications receiving 5144 citations. Previous affiliations of Palash Sarkar include University of Waterloo & Indian Institute of Technology Patna.
Papers
More filters
Journal ArticleDOI
A brief history of cellular automata
TL;DR: A history of cellular automata from their beginnings with von Neumann to the present day is traced, mainly on topics closer to computer science and mathematics rather than physics, biology or other applications.
Posted Content
Pairing-Based Cryptographic Protocols : A Survey.
TL;DR: In this article, the authors have tried to cover different cryptographic protocols based on bilinear pairings which possess, to the best of our knowledge, proper security proofs in the existing security models.
Book ChapterDOI
Nonlinearity Bounds and Constructions of Resilient Boolean Functions
Palash Sarkar,Subhamoy Maitra +1 more
TL;DR: In this article, the authors investigated the relationship between the nonlinearity and the order of resiliency of a Boolean function, and showed that functions achieving the best possible trade-off can be constructed by the Maiorana-McFarland like technique.
Book ChapterDOI
Construction of nonlinear boolean functions with important cryptographic properties
Palash Sarkar,Subhamoy Maitra +1 more
TL;DR: It is shown that for each positive integer m, there are infinitely many integers n, such that it is possible to construct n-variable, m-resilient functions having nonlinearity greater than 2n-1 -2[n/2].
Book ChapterDOI
New applications of time memory data tradeoffs
Jin Hong,Palash Sarkar +1 more
TL;DR: This paper focuses on identifying candidate oneway functions hidden in cryptographic algorithms, inverting which will result in breaking the algorithm, and provides some new applications of TMTO and a set of general guidelines for applying TMTO attacks.