Sahadeo Padhye

Orcid: 0000-0002-6863-6123

According to our database1, Sahadeo Padhye authored at least 39 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
On some fast iterative methods for split variational inclusion problem and fixed point problem of demicontractive mappings.
Comput. Appl. Math., March, 2024

2023
A Multivariate Convertible Group Signature Scheme.
SN Comput. Sci., November, 2023

A Lattice-Based Single-Share Secret Sharing Scheme.
SN Comput. Sci., November, 2023

Cryptanalysis of multivariate threshold ring signature schemes.
Inf. Process. Lett., March, 2023

Lattice Based Signatures with Additional Functionalities.
IACR Cryptol. ePrint Arch., 2023

Cryptanalysis of Short and Provable Secure Lattice-Based Signature Scheme.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2023

2022
Lattice-based undeniable signature scheme.
Ann. des Télécommunications, 2022

2021
A New Identity-Based Multivariate Signature Scheme.
Proceedings of the Seventh International Conference on Mathematics and Computing, 2021

2020
Identity based blind signature scheme over NTRU lattices.
Inf. Process. Lett., 2020

Cryptanalysis of ID based Proxy-Blind signature scheme over lattice.
ICT Express, 2020

2019
MaTRU-KE: A key exchange protocol based on MaTRU cryptosystem.
Int. J. Commun. Syst., 2019

Untraceability of Partial Blind and Blind Signature Schemes.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

2018
Threshold Ring Signature with Message Block Sharing.
Proceedings of the Security and Privacy - Second ISEA International Conference, 2018

2016
Generalisations of NTRU cryptosystem.
Secur. Commun. Networks, 2016

2015
Provable Secure Multi-Proxy Signature Scheme without Bilinear Maps.
Int. J. Netw. Secur., 2015

Provable secure identity-based multi-proxy signature scheme.
Int. J. Commun. Syst., 2015

Identity-based multi-proxy multi-signature scheme provably secure in random oracle model.
Trans. Emerg. Telecommun. Technol., 2015

ECDLP-based certificateless proxy signature scheme with message recovery.
Trans. Emerg. Telecommun. Technol., 2015

Efficient and provable secure scheme for delegation of signing rights between the groups.
Ann. des Télécommunications, 2015

2014
Provably Secure Proxy Multi-Signature Scheme Based on ECC.
Inf. Technol. Control., 2014

Cryptanalysis of Multi Prime RSA with Secret Key Greater than Public Key.
Int. J. Netw. Secur., 2014

2013
Analysis on the generalization of proxy signature.
Secur. Commun. Networks, 2013

Provable secure proxy signature scheme without bilinear pairings.
Int. J. Commun. Syst., 2013

Efficient ID-based multiproxy multisignature without bilinear maps in ROM.
Ann. des Télécommunications, 2013

Improved Proxy Signature Scheme without Bilinear Pairings.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2013

2012
Weak Keys in RSA over The Work of Blomer & May.
Int. J. Netw. Secur., 2012

Efficient ID-based proxy multi-signature scheme secure in random oracle.
Frontiers Comput. Sci., 2012

An efficient certificateless two-party authenticated key agreement protocol.
Comput. Math. Appl., 2012

2011
A Pairing-free Certificateless Authenticated Key Agreement Protocol in the eCK Model.
IACR Cryptol. ePrint Arch., 2011

An ID-Based Proxy Multi Signature Scheme without Bilinear Pairings.
Proceedings of the Security Aspects in Information Technology, 2011

An ID-based Designated Verifier Proxy Signature Scheme without Bilinear Pairing.
Proceedings of the 5th Indian International Conference on Artificial Intelligence, 2011

2006
A Fast Semantically Secure Public Key Cryptosystem Based on Factoring.
Int. J. Netw. Secur., 2006

Cryptanalysis of Koyama Scheme.
Int. J. Netw. Secur., 2006

On DRSA Public Key Cryptosystem.
Int. Arab J. Inf. Technol., 2006

A Public Key Cryptosystem Based on Pell Equation.
IACR Cryptol. ePrint Arch., 2006

2005
Partial known plaintext attack on Koyama scheme.
Inf. Process. Lett., 2005

An Efficient Variant of RSA Cryptosystem.
IACR Cryptol. ePrint Arch., 2005

On Security of Koyama Schemes.
IACR Cryptol. ePrint Arch., 2005

A Public Key Cryptosystem Based on Singular Cubic Curve.
IACR Cryptol. ePrint Arch., 2005


  Loading...