Kishan Chand Gupta

According to our database1, Kishan Chand Gupta authored at least 45 papers between 2001 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Almost involutory recursive MDS diffusion layers.
Des. Codes Cryptogr., 2019

Cryptographically significant mds matrices over finite fields: A brief survey and some generalized results.
Adv. in Math. of Comm., 2019

2018
On Diffusion Layers of SPN Based Format Preserving Encryption Schemes: Format Preserving Sets Revisited.
Proceedings of the Progress in Cryptology - INDOCRYPT 2018, 2018

2017
Applications of design theory for the constructions of MDS matrices for lightweight cryptography.
J. Mathematical Cryptology, 2017

Towards a general construction of recursive MDS diffusion layers.
Des. Codes Cryptogr., 2017

On the direct construction of recursive MDS matrices.
Des. Codes Cryptogr., 2017

2016
Format Preserving Sets: On Diffusion Layers of Format Preserving Encryption Schemes.
Proceedings of the Progress in Cryptology - INDOCRYPT 2016, 2016

SPF: A New Family of Efficient Format-Preserving Encryption Algorithms.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

2015
Finding Biaffine and Quadratic Equations for S-Boxes Based on Power Mappings.
IEEE Trans. Information Theory, 2015

Cryptographically significant MDS matrices based on circulant and circulant-like matrices for lightweight applications.
Cryptography and Communications, 2015

2014
On Constructions of Circulant MDS Matrices for Lightweight Cryptography.
Proceedings of the Information Security Practice and Experience, 2014

2013
On Constructions of MDS Matrices from Companion Matrices for Lightweight Cryptography.
IACR Cryptology ePrint Archive, 2013

On Constructions of Involutory MDS Matrices.
Proceedings of the Progress in Cryptology, 2013

On Constructions of MDS Matrices from Companion Matrices for Lightweight Cryptography.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

2012
Finite Automata.
Proceedings of the Handbook of Finite State Based Models and Applications., 2012

2011
Upper bound for algebraic immunity on a subclass of Maiorana McFarland class of bent functions.
Inf. Process. Lett., 2011

2009
Algebraic immunity of S-boxes based on power mappings: analysis and construction.
IEEE Trans. Information Theory, 2009

Computing Partial Walsh Transform From the Algebraic Normal Form of a Boolean Function.
IEEE Trans. Information Theory, 2009

2008
A metric on the set of elliptic curves over Fp.
Appl. Math. Lett., 2008

2006
Algebraic Immunity for Cryptographically Significant Boolean Functions: Analysis and Construction.
IEEE Trans. Information Theory, 2006

Algebraic Immunity of S-boxes Based on Power Mappings: Analysis and Construction.
IACR Cryptology ePrint Archive, 2006

Notion of Algebraic Immunity and Its evaluation Related to Fast Algebraic Attacks.
IACR Cryptology ePrint Archive, 2006

RC4-Hash: A New Hash Function Based on RC4.
Proceedings of the Progress in Cryptology, 2006

Upper Bounds on Algebraic Immunity of Boolean Power Functions.
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006

A General Methodology for Pipelining the Point Multiplication Operation in Curve Based Cryptography.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

2005
Toward a General Correlation Theorem.
IEEE Trans. Information Theory, 2005

Improved construction of nonlinear resilient S-boxes.
IEEE Trans. Information Theory, 2005

Results on multiples of primitive polynomials and their products over GF(2).
Theor. Comput. Sci., 2005

Construction of high degree resilient S-boxes with improved nonlinearity.
Inf. Process. Lett., 2005

A 32-bit RC4-like Keystream Generator.
IACR Cryptology ePrint Archive, 2005

A Metric on the Set of Elliptic Curves over Fp.
IACR Cryptology ePrint Archive, 2005

Cryptographically Significant Boolean Functions: Construction and Analysis in Terms of Algebraic Immunity.
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005

Towards a General RC4-Like Keystream Generator.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005

2004
Construction of Perfect Nonlinear and Maximally Nonlinear Multiple-Output Boolean Functions Satisfying Higher Order Strict Avalanche Criteria.
IEEE Trans. Information Theory, 2004

Efficient Representation and Software Implementation of Resilient Maiorana-McFarland S-boxes.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

Results on Algebraic Immunity for Cryptographically Significant Boolean Functions.
Proceedings of the Progress in Cryptology, 2004

2003
Construction of Perfect Nonlinear and Maximally Nonlinear Multi-Output Boolean Functions Satisfying Higher Order Strict Avalanche Criteria.
IACR Cryptology ePrint Archive, 2003

A General Correlation Theorem.
IACR Cryptology ePrint Archive, 2003

Computing Partial Walsh Transform from the Algebraic Normal Form of a Boolean Function.
IACR Cryptology ePrint Archive, 2003

Computing Walsh Transform from the Algebraic Normal Form of a Boolean Function.
Electronic Notes in Discrete Mathematics, 2003

Construction of Perfect Nonlinear and Maximally Nonlinear Multi-output Boolean Functions Satisfying Higher Order Strict Avalanche Criteria (Extended Abstract).
Proceedings of the Progress in Cryptology, 2003

2002
Multiples of Primitive Polynomials and Their Products over GF(2).
Proceedings of the Selected Areas in Cryptography, 2002

Improved Construction of Nonlinear Resilient S-Boxes.
Proceedings of the Advances in Cryptology, 2002

2001
Multiples of Primitive Polynomials over GF(2).
Proceedings of the Progress in Cryptology, 2001

Primitive Polynomials over GF(2) - A Cryptologic Approach.
Proceedings of the Information and Communications Security, Third International Conference, 2001


  Loading...