Sumit Kumar Pandey
Orcid: 0000-0002-5850-598X
According to our database1,
Sumit Kumar Pandey
authored at least 28 papers
between 2007 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
2024
A resilient m-qubit quantum secret sharing scheme using quantum error correction code.
Quantum Inf. Process., February, 2024
2023
2022
Proceedings of the Progress in Cryptology, 2022
Proceedings of the Progress in Cryptology, 2022
2021
2019
Cryptographically significant mds matrices over finite fields: A brief survey and some generalized results.
Adv. Math. Commun., 2019
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2019
2018
Design of robust proportional-integral-derivative controller for generalized decoupled twin rotor multi-input-multi-output system with actuator non-linearity.
J. Syst. Control. Eng., 2018
Proceedings of the 2018 IEEE Intelligent Vehicles Symposium, 2018
On Diffusion Layers of SPN Based Format Preserving Encryption Schemes: Format Preserving Sets Revisited.
Proceedings of the Progress in Cryptology - INDOCRYPT 2018, 2018
2017
Applications of design theory for the constructions of MDS matrices for lightweight cryptography.
J. Math. Cryptol., 2017
Des. Codes Cryptogr., 2017
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017
2016
Attribute-Based Signcryption: Signer Privacy, Strong Unforgeability and IND-CCA Security in Adaptive-Predicates Model (Extended Version).
J. Internet Serv. Inf. Secur., 2016
Proceedings of the Progress in Cryptology - INDOCRYPT 2016, 2016
2014
Attribute-Based Signcryption : Signer Privacy, Strong Unforgeability and IND-CCA2 Security in Adaptive-Predicates Attack.
Proceedings of the Provable Security - 8th International Conference, 2014
Proceedings of the Progress in Cryptology - LATINCRYPT 2014, 2014
2012
Relaxing IND-CCA: Indistinguishability against Chosen Ciphertext Verification Attack.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2012
2011
Efficient Construction of Identity Based Signcryption Schemes from Identity Based Encryption and Signature Schemes.
J. Internet Serv. Inf. Secur., 2011
2010
Proceedings of the Information Security Applications - 11th International Workshop, 2010
2007
Efficient Window-Based Scalar Multiplication on Elliptic Curves Using Double-Base Number System.
Proceedings of the Progress in Cryptology, 2007