Sumit Kumar Pandey
Indian Statistical Institute
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Sumit Kumar Pandey.
cryptographic hardware and embedded systems | 2017
Subhadeep Banik; Sumit Kumar Pandey; Thomas Peyrin; Yu Sasaki; Siang Meng Sim; Yosuke Todo
In this article, we revisit the design strategy of PRESENT, leveraging all the advances provided by the research community in construction and cryptanalysis since its publication, to push the design up to its limits. We obtain an improved version, named GIFT, that provides a much increased efficiency in all domains (smaller and faster), while correcting the well-known weakness of PRESENT with regards to linear hulls.
international conference on progress in cryptology | 2007
Rana Barua; Sumit Kumar Pandey; Ravi Pankaj
In a recent paper [10], Mishra and Dimitrov have proposed a window-based Elliptic Curve (EC) scalar multiplication using double-base number representation. Their methods were rather heuristic. In this paper, given the window lengths w2 and w3 for the bases 2 and 3, we first show how to fix the number of windows, ρ, and then obtain a Double Base Number System (DBNS) representation of the scalar n suitable for window-based EC scalar multiplication. Using the DBNS representation, we obtain our first algorithm that uses a small table of precomputed EC points. We then modify this algorithm to obtain a faster algorithm by reducing the number of EC additions at the cost of storing a larger number of precomputed points in a table. Explicit constructions of the tables are also given.
provable security | 2014
Tapas Pandit; Sumit Kumar Pandey; Rana Barua
An Attribute-Based Signcryption (ABSC) is a natural extension of Attribute-Based Encryption (ABE) and Attribute-Based Signature (ABS), where we have the message confidentiality and authenticity together. Since the signer privacy is captured in security of ABS, it is quite natural to expect that the signer privacy will also be preserved in ABSC. In this paper, first we propose an ABSC scheme which is weak existential unforgeable, IND-CCA2 secure in adaptive-predicates attack and achieves signer privacy. Secondly, by applying strongly unforgeable one-time signature (OTS), the above scheme is lifted to an ABSC scheme to attain strong existential unforgeability in adaptive-predicates model. Both the ABSC schemes are constructed on common setup, i.e the public parameters and key are same for both the encryption and signature modules. Our first construction is in the flavor of \(\mathcal{C}{t}\mathcal{E}\&\mathcal{S}\) paradigm, except one extra component that will be computed using both signature components and ciphertext components. The second proposed construction follows a new paradigm (extension of \(\mathcal{C}{t}\mathcal{E}\&\mathcal{S}\)), we call it ”Commit then Encrypt and Sign then Sign” (\(\mathcal{C}{t}\mathcal{E}\&\mathcal{S}{t}\mathcal{S}\)). The last signature is done using a strong OTS scheme. Since the non-repudiation is achieved by \(\mathcal{C}{t}\mathcal{E}\&\mathcal{S}\) paradigm, our systems also achieve the same.
Designs, Codes and Cryptography | 2017
Kishan Chand Gupta; Sumit Kumar Pandey; Ayineedi Venkateswarlu
MDS matrices allow to build optimal linear diffusion layers in the design of block ciphers and hash functions. There has been a lot of study in designing efficient MDS matrices suitable for software and/or hardware implementations. In particular recursive MDS matrices are considered for resource constrained environments. Such matrices can be expressed as a power of simple companion matrices, i.e., an MDS matrix
workshop on information security applications | 2010
Sumit Kumar Pandey; Rana Barua
Designs, Codes and Cryptography | 2017
Kishan Chand Gupta; Sumit Kumar Pandey; Ayineedi Venkateswarlu
M = C_g^k
international conference on cryptology in india | 2016
Kishan Chand Gupta; Sumit Kumar Pandey; Indranil Ghosh Ray
international conference on progress in cryptology | 2014
Vishal Saraswat; Sumit Kumar Pandey
M=Cgk for some companion matrix corresponding to a monic polynomial
cryptographic hardware and embedded systems | 2017
Subhadeep Banik; Sumit Kumar Pandey; Thomas Peyrin; Yu Sasaki; Siang Meng Sim; Yosuke Todo
international workshop on security | 2012
Sumit Kumar Pandey; Santanu Sarkar; Mahabir Prasad Jhanwar
g(X) \in \mathbb {F}_q[X]