Vishal Saraswat

Orcid: 0000-0001-7082-9568

According to our database1, Vishal Saraswat authored at least 35 papers between 2007 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Privacy Preserving Records Sharing using Blockchain and Format Preserving Encryption.
IACR Cryptol. ePrint Arch., 2023

2021
Anonymous Fair Auction on Blockchain.
Proceedings of the 11th IFIP International Conference on New Technologies, 2021

Protection Guidelines for Blockchain Based Digital Identity.
Proceedings of the Hybrid Intelligent Systems, 2021

Attacks on Blockchain Based Digital Identity.
Proceedings of the Blockchain and Applications - 3rd International Congress, 2021

2020
Lattice signatures using NTRU on the hardness of worst-case ideal lattice problems.
IET Inf. Secur., 2020

Linear Secret Sharing Schemes with Finer Access Structure.
Proceedings of the Sixth International Conference on Mathematics and Computing, 2020

Towards a Lightweight Blockchain Platform for Critical Infrastructure Protection.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

Anonymous Proof-of-Asset Transactions Using Designated Blind Signatures.
Proceedings of the Foundations and Practice of Security - 13th International Symposium, 2020

A Hybrid Approach for Fast Anomaly Detection in Controller Area Networks.
Proceedings of the 14th IEEE International Conference on Advanced Networks and Telecommunications Systems, 2020

2019
Public-Key Encryption with Integrated Keyword Search.
J. Hardw. Syst. Secur., 2019

Generalized Secret Sharing Schemes Using N<sup>μ</sup>MDS Codes.
Proceedings of the Mathematical Aspects of Computer and Information Sciences, 2019

Smart Wallets on Blockchain - Attacks and Their Costs.
Proceedings of the Smart City and Informatization - 7th International Conference, 2019

Secret Sharing Using Near-MDS Codes.
Proceedings of the Codes, Cryptology and Information Security, 2019

Ripping the Fabric: Attacks and Mitigations on Hyperledger Fabric.
Proceedings of the Applications and Techniques in Information Security, 2019

2018
Anonymous yet Traceable Strong Designated Verifier Signature.
Proceedings of the Information Security - 21st International Conference, 2018

A Novel Lattice Reduction Algorithm.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

Compact Lattice Signatures.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

2017
A secure anonymous proxy signcryption scheme.
J. Math. Cryptol., 2017

An Evaluation of Lightweight Block Ciphers for Resource-Constrained Applications: Area, Performance, and Security.
J. Hardw. Syst. Secur., 2017

Editorial for the Special Issue in Journal of Hardware and Systems Security (HaSS) Based on Selected Papers from 6th International Conference on Security, Privacy and Applied Cryptographic Engineering (SPACE 2016).
J. Hardw. Syst. Secur., 2017

An Offline Outdoor Navigation System with Full Privacy.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Short Integrated PKE+PEKS in Standard Model.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2017

2016
Analysis-preserving protection of user privacy against information leakage of social-network Likes.
Inf. Sci., 2016

Efficient Proxy Signature Scheme from Pairings.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

Adaptively Secure Strong Designated Signature.
Proceedings of the Progress in Cryptology - INDOCRYPT 2016, 2016

Differential Fault Attack on SIMECK.
Proceedings of the Third Workshop on Cryptography and Security in Computing Systems, 2016

2015
Practical and Secure Integrated PKE+PEKS with Keyword Privacy.
Proceedings of the SECRYPT 2015, 2015

Efficient and Secure Many-to-One Signature Delegation.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

2014
A Secure Anonymous Proxy Multi-signature Scheme.
Proceedings of the SECRYPT 2014, 2014

How to Leak a Secret and Reap the Rewards Too.
Proceedings of the Progress in Cryptology - LATINCRYPT 2014, 2014

Secure and Efficient Scheme for Delegation of Signing Rights.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

An Anonymous Proxy Multi-signature with Accountablility.
Proceedings of the E-Business and Telecommunications - 11th International Joint Conference, 2014

Remote cache-timing attacks against AES.
Proceedings of the First Workshop on Cryptography and Security in Computing Systems, 2014

2009
Anonymous Signatures Revisited.
IACR Cryptol. ePrint Arch., 2009

2007
Public Key Encryption with Searchable Keywords Based on Jacobi Symbols.
Proceedings of the Progress in Cryptology, 2007


  Loading...