Rana Barua

According to our database1, Rana Barua authored at least 44 papers between 1991 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
On Diffusion Layers of SPN Based Format Preserving Encryption Schemes: Format Preserving Sets Revisited.
Proceedings of the Progress in Cryptology - INDOCRYPT 2018, 2018

2016
Attribute-Based Signcryption: Signer Privacy, Strong Unforgeability and IND-CCA Security in Adaptive-Predicates Model (Extended Version).
J. Internet Serv. Inf. Secur., 2016

2015
Attribute-Based Signcryption : Signer Privacy, Strong Unforgeability and IND-CCA2 Security in Adaptive-Predicates Attack.
IACR Cryptology ePrint Archive, 2015

2014
eCK Secure Single Round ID-based Authenticated Key Exchange Protocols with Master Perfect Forward Secrecy (Extended Version).
JoWUA, 2014

Adaptively Secure Functional Encryption for Finite Languages from DLIN Assumption.
IACR Cryptology ePrint Archive, 2014

Attribute-Based Signcryption : Signer Privacy, Strong Unforgeability and IND-CCA2 Security in Adaptive-Predicates Attack.
Proceedings of the Provable Security - 8th International Conference, 2014

eCK Secure Single Round ID-Based Authenticated Key Exchange Protocols with Master Perfect Forward Secrecy.
Proceedings of the Network and System Security - 8th International Conference, 2014

2012
Finite Automata.
Proceedings of the Handbook of Finite State Based Models and Applications., 2012

Efficient Fully Secure Attribute-Based Encryption Schemes for General Access Structures.
Proceedings of the Provable Security - 6th International Conference, 2012

2011
Efficient Construction of Identity Based Signcryption Schemes from Identity Based Encryption and Signature Schemes.
J. Internet Serv. Inf. Secur., 2011

2010
Construction of Identity Based Signcryption Schemes.
Proceedings of the Information Security Applications - 11th International Workshop, 2010

2009
Minimal-axiom characterizations of the Coleman and Banzhaf indices of voting power.
Mathematical Social Sciences, 2009

A Note on the Carreras-Coleman decisiveness Index.
IGTR, 2009

Sampling from Signed Quadratic Residues: RSA Group Is Pseudofree.
Proceedings of the Progress in Cryptology, 2009

2008
Provably Secure Constant Round Contributory Group Key Agreement in Dynamic Setting.
IEEE Trans. Information Theory, 2008

A Public Key Encryption In Standard Model Using Cramer-Shoup Paradigm.
IACR Cryptology ePrint Archive, 2008

A Variant of Boneh-Gentry-Hamburg's Pairing-Free Identity Based Encryption Scheme.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

2007
Efficient Window-Based Scalar Multiplication on Elliptic Curves Using Double-Base Number System.
Proceedings of the Progress in Cryptology, 2007

2006
Password-based Encrypted Group Key Agreement.
I. J. Network Security, 2006

On the Coleman indices of voting power.
European Journal of Operational Research, 2006

2005
A New Characterization of the Banzhaf Index of Power.
IGTR, 2005

Overview of Key Agreement Protocols.
IACR Cryptology ePrint Archive, 2005

Constant Round Dynamic Group Key Agreement.
IACR Cryptology ePrint Archive, 2005

Dynamic Group Key Agreement in Tree-Based Setting.
IACR Cryptology ePrint Archive, 2005

Constant Round Dynamic Group Key Agreement.
Proceedings of the Information Security, 8th International Conference, 2005

Dynamic Group Key Agreement in Tree-Based Setting.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

2004
Provably Secure Authenticated Tree Based Group Key Agreement Protocol.
IACR Cryptology ePrint Archive, 2004

Pairing-Based Cryptographic Protocols : A Survey.
IACR Cryptology ePrint Archive, 2004

A characterization and some properties of the Banzhaf-Coleman-Dubey-Shapley sensitivity index.
Games and Economic Behavior, 2004

Completeness of a combination of neighbourhood logic and temporal logic.
Formal Asp. Comput., 2004

Efficient Computation of Tate Pairing in Projective Coordinate over General Characteristic Fields.
Proceedings of the Information Security and Cryptology, 2004

Provably Secure Authenticated Tree Based Group Key Agreement.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

New Table Look-Up Methods for Faster Frobenius Map Based Scalar Multiplication Over GF(pn).
Proceedings of the Applied Cryptography and Network Security, 2004

2003
Extending Joux's Protocol to Multi Party Key Agreement.
IACR Cryptology ePrint Archive, 2003

Extending Joux's Protocol to Multi Party Key Agreement (Extended Abstract).
Proceedings of the Progress in Cryptology, 2003

2002
Binary Arithmetic for DNA Computers.
Proceedings of the DNA Computing, 8th International Workshop on DNA Based Computers, 2002

2000
Completeness of neighbourhood logic.
J. Log. Comput., 2000

1999
Completeness of Neighbourhood Logic.
Proceedings of the STACS 99, 1999

1998
Multidimenstional Sigma-Automata, Pi-Polynomials and Generalised S-Matrices.
Theor. Comput. Sci., 1998

The Set of Reversible 90/150 Cellular Automata Is Regular.
Discrete Applied Mathematics, 1998

1997
Architectures for Arithmetic over GF(2m).
Proceedings of the 10th International Conference on VLSI Design (VLSI Design 1997), 1997

1996
sigma-Game, sigma+-Game, and Two-Dimensional Additive Cellular Automata.
Theor. Comput. Sci., 1996

1992
The Hausdorff-Kuratowski Hierarchy of omega-Regular Languages and a Hierarchy of Muller Automata.
Theor. Comput. Sci., 1992

1991
On generalized automata.
Fundam. Inform., 1991


  Loading...