Kishan Chand Gupta

According to our database1, Kishan Chand Gupta authored at least 47 papers between 2001 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
On the construction of near-MDS matrices.
Cryptogr. Commun., March, 2024

Construction of all MDS and involutory MDS matrices.
CoRR, 2024

2023
On the Direct Construction of MDS and Near-MDS Matrices.
CoRR, 2023

2022
FUTURE: A Lightweight Block Cipher Using an Optimal Diffusion Matrix.
Proceedings of the Progress in Cryptology, 2022

Construction of Recursive MDS Matrices Using DLS Matrices.
Proceedings of the Progress in Cryptology, 2022

2019
Almost involutory recursive MDS diffusion layers.
Des. Codes Cryptogr., 2019

Cryptographically significant mds matrices over finite fields: A brief survey and some generalized results.
Adv. Math. Commun., 2019

A Few Negative Results on Constructions of MDS Matrices Using Low XOR Matrices.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2019

2018
On Diffusion Layers of SPN Based Format Preserving Encryption Schemes: Format Preserving Sets Revisited.
Proceedings of the Progress in Cryptology - INDOCRYPT 2018, 2018

2017
Applications of design theory for the constructions of MDS matrices for lightweight cryptography.
J. Math. Cryptol., 2017

Towards a general construction of recursive MDS diffusion layers.
Des. Codes Cryptogr., 2017

On the direct construction of recursive MDS matrices.
Des. Codes Cryptogr., 2017

2016
Format Preserving Sets: On Diffusion Layers of Format Preserving Encryption Schemes.
Proceedings of the Progress in Cryptology - INDOCRYPT 2016, 2016

SPF: A New Family of Efficient Format-Preserving Encryption Algorithms.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

2015
Finding Biaffine and Quadratic Equations for S-Boxes Based on Power Mappings.
IEEE Trans. Inf. Theory, 2015

Cryptographically significant MDS matrices based on circulant and circulant-like matrices for lightweight applications.
Cryptogr. Commun., 2015

2014
On Constructions of Circulant MDS Matrices for Lightweight Cryptography.
Proceedings of the Information Security Practice and Experience, 2014

2013
On Constructions of MDS Matrices from Companion Matrices for Lightweight Cryptography.
IACR Cryptol. ePrint Arch., 2013

On Constructions of Involutory MDS Matrices.
Proceedings of the Progress in Cryptology, 2013

Stream and block ciphers.
Proceedings of the Handbook of Finite Fields., 2013

2012
Finite Automata.
Proceedings of the Handbook of Finite State Based Models and Applications., 2012

2011
Upper bound for algebraic immunity on a subclass of Maiorana McFarland class of bent functions.
Inf. Process. Lett., 2011

2009
Algebraic immunity of S-boxes based on power mappings: analysis and construction.
IEEE Trans. Inf. Theory, 2009

Computing Partial Walsh Transform From the Algebraic Normal Form of a Boolean Function.
IEEE Trans. Inf. Theory, 2009

2008
A metric on the set of elliptic curves over F<sub>p</sub>.
Appl. Math. Lett., 2008

2006
Algebraic Immunity for Cryptographically Significant Boolean Functions: Analysis and Construction.
IEEE Trans. Inf. Theory, 2006

Notion of Algebraic Immunity and Its evaluation Related to Fast Algebraic Attacks.
IACR Cryptol. ePrint Arch., 2006

RC4-Hash: A New Hash Function Based on RC4.
Proceedings of the Progress in Cryptology, 2006

Upper Bounds on Algebraic Immunity of Boolean Power Functions.
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006

A General Methodology for Pipelining the Point Multiplication Operation in Curve Based Cryptography.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

2005
Toward a General Correlation Theorem.
IEEE Trans. Inf. Theory, 2005

Improved construction of nonlinear resilient S-boxes.
IEEE Trans. Inf. Theory, 2005

Results on multiples of primitive polynomials and their products over GF(2).
Theor. Comput. Sci., 2005

Construction of high degree resilient S-boxes with improved nonlinearity.
Inf. Process. Lett., 2005

A 32-bit RC4-like Keystream Generator.
IACR Cryptol. ePrint Arch., 2005

Cryptographically Significant Boolean Functions: Construction and Analysis in Terms of Algebraic Immunity.
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005

Towards a General RC4-Like Keystream Generator.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005

2004
Construction of Perfect Nonlinear and Maximally Nonlinear Multiple-Output Boolean Functions Satisfying Higher Order Strict Avalanche Criteria.
IEEE Trans. Inf. Theory, 2004

Efficient Representation and Software Implementation of Resilient Maiorana-McFarland S-boxes.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

Results on Algebraic Immunity for Cryptographically Significant Boolean Functions.
Proceedings of the Progress in Cryptology, 2004

2003
Construction of Perfect Nonlinear and Maximally Nonlinear Multi-Output Boolean Functions Satisfying Higher Order Strict Avalanche Criteria.
IACR Cryptol. ePrint Arch., 2003

A General Correlation Theorem.
IACR Cryptol. ePrint Arch., 2003

Computing Walsh Transform from the Algebraic Normal Form of a Boolean Function.
Electron. Notes Discret. Math., 2003

Construction of Perfect Nonlinear and Maximally Nonlinear Multi-output Boolean Functions Satisfying Higher Order Strict Avalanche Criteria (Extended Abstract).
Proceedings of the Progress in Cryptology, 2003

2002
Multiples of Primitive Polynomials and Their Products over GF(2).
Proceedings of the Selected Areas in Cryptography, 2002

2001
Multiples of Primitive Polynomials over GF(2).
Proceedings of the Progress in Cryptology, 2001

Primitive Polynomials over GF(2) - A Cryptologic Approach.
Proceedings of the Information and Communications Security, Third International Conference, 2001


  Loading...