Search results for: Palash Sarkar
Bulletin of Economic Research > 75 > 2 > 312 - 322
Designs, Codes and Cryptography > 2019 > 87 > 2-3 > 527-546
Cryptography and Communications > 2018 > 10 > 6 > 1137-1163
Cryptography and Communications > 2018 > 10 > 5 > 835-879
Journal of Cryptographic Engineering > 2018 > 8 > 1 > 49-69
Lecture Notes in Computer Science > Public Key Cryptography - PKC 2006 > Pairing-Based Cryptography > 241-256
Identity-Based Encryption > 1-11
Identity-Based Encryption > 163-165
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO 2002 > Stream Ciphers and Boolean Functions > 533-548
Lecture Notes in Computer Science
IEEE Transactions on Information Theory > 2016 > 62 > 10 > 5709 - 5726
Applicable Algebra in Engineering, Communication and Computing > 2017 > 28 > 2 > 109-130
IEEE Transactions on Computers > 2016 > 65 > 8 > 2575 - 2587
Lecture Notes in Computer Science > Progress in Cryptology — INDOCRYPT 2001 > Coding Theory > 117-126
Lecture Notes in Computer Science > Information Security and Cryptology – ICISC 2004 > PKI and Related Implementation > 168-181
Lecture Notes in Computer Science > Information Security and Cryptology – ICISC 2006 > Invited Talks > 7-7
Lecture Notes in Computer Science > Information Security and Cryptology – ICISC 2006 > Public Key Cryptosystems > 310-327
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO’ 99 > Secret-Key Cryptography > 198-215