Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Sumit Kumar Pandey is active.

Publication


Featured researches published by Sumit Kumar Pandey.


cryptographic hardware and embedded systems | 2017

GIFT : A Small Present

Subhadeep Banik; Sumit Kumar Pandey; Thomas Peyrin; Yu Sasaki; Siang Meng Sim; Yosuke Todo

In this article, we revisit the design strategy of PRESENT, leveraging all the advances provided by the research community in construction and cryptanalysis since its publication, to push the design up to its limits. We obtain an improved version, named GIFT, that provides a much increased efficiency in all domains (smaller and faster), while correcting the well-known weakness of PRESENT with regards to linear hulls.


international conference on progress in cryptology | 2007

Efficient window-based scalar multiplication on elliptic curves using double-base number system

Rana Barua; Sumit Kumar Pandey; Ravi Pankaj

In a recent paper [10], Mishra and Dimitrov have proposed a window-based Elliptic Curve (EC) scalar multiplication using double-base number representation. Their methods were rather heuristic. In this paper, given the window lengths w2 and w3 for the bases 2 and 3, we first show how to fix the number of windows, ρ, and then obtain a Double Base Number System (DBNS) representation of the scalar n suitable for window-based EC scalar multiplication. Using the DBNS representation, we obtain our first algorithm that uses a small table of precomputed EC points. We then modify this algorithm to obtain a faster algorithm by reducing the number of EC additions at the cost of storing a larger number of precomputed points in a table. Explicit constructions of the tables are also given.


provable security | 2014

Attribute-Based Signcryption : Signer Privacy, Strong Unforgeability and IND-CCA2 Security in Adaptive-Predicates Attack

Tapas Pandit; Sumit Kumar Pandey; Rana Barua

An Attribute-Based Signcryption (ABSC) is a natural extension of Attribute-Based Encryption (ABE) and Attribute-Based Signature (ABS), where we have the message confidentiality and authenticity together. Since the signer privacy is captured in security of ABS, it is quite natural to expect that the signer privacy will also be preserved in ABSC. In this paper, first we propose an ABSC scheme which is weak existential unforgeable, IND-CCA2 secure in adaptive-predicates attack and achieves signer privacy. Secondly, by applying strongly unforgeable one-time signature (OTS), the above scheme is lifted to an ABSC scheme to attain strong existential unforgeability in adaptive-predicates model. Both the ABSC schemes are constructed on common setup, i.e the public parameters and key are same for both the encryption and signature modules. Our first construction is in the flavor of \(\mathcal{C}{t}\mathcal{E}\&\mathcal{S}\) paradigm, except one extra component that will be computed using both signature components and ciphertext components. The second proposed construction follows a new paradigm (extension of \(\mathcal{C}{t}\mathcal{E}\&\mathcal{S}\)), we call it ”Commit then Encrypt and Sign then Sign” (\(\mathcal{C}{t}\mathcal{E}\&\mathcal{S}{t}\mathcal{S}\)). The last signature is done using a strong OTS scheme. Since the non-repudiation is achieved by \(\mathcal{C}{t}\mathcal{E}\&\mathcal{S}\) paradigm, our systems also achieve the same.


Designs, Codes and Cryptography | 2017

On the direct construction of recursive MDS matrices

Kishan Chand Gupta; Sumit Kumar Pandey; Ayineedi Venkateswarlu

MDS matrices allow to build optimal linear diffusion layers in the design of block ciphers and hash functions. There has been a lot of study in designing efficient MDS matrices suitable for software and/or hardware implementations. In particular recursive MDS matrices are considered for resource constrained environments. Such matrices can be expressed as a power of simple companion matrices, i.e., an MDS matrix


workshop on information security applications | 2010

Construction of identity based signcryption schemes

Sumit Kumar Pandey; Rana Barua


Designs, Codes and Cryptography | 2017

Towards a general construction of recursive MDS diffusion layers

Kishan Chand Gupta; Sumit Kumar Pandey; Ayineedi Venkateswarlu

M = C_g^k


international conference on cryptology in india | 2016

Format Preserving Sets: On Diffusion Layers of Format Preserving Encryption Schemes

Kishan Chand Gupta; Sumit Kumar Pandey; Indranil Ghosh Ray


international conference on progress in cryptology | 2014

How to Leak a Secret and Reap the Rewards Too

Vishal Saraswat; Sumit Kumar Pandey

M=Cgk for some companion matrix corresponding to a monic polynomial


cryptographic hardware and embedded systems | 2017

GIFT: A Small Present Towards Reaching the Limit of Lightweight Encryption

Subhadeep Banik; Sumit Kumar Pandey; Thomas Peyrin; Yu Sasaki; Siang Meng Sim; Yosuke Todo


international workshop on security | 2012

Relaxing IND-CCA: indistinguishability against chosen ciphertext verification attack

Sumit Kumar Pandey; Santanu Sarkar; Mahabir Prasad Jhanwar

g(X) \in \mathbb {F}_q[X]

Collaboration


Dive into the Sumit Kumar Pandey's collaboration.

Top Co-Authors

Avatar

Rana Barua

Indian Statistical Institute

View shared research outputs
Top Co-Authors

Avatar

Kishan Chand Gupta

Indian Statistical Institute

View shared research outputs
Top Co-Authors

Avatar

Tapas Pandit

Indian Statistical Institute

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Siang Meng Sim

Nanyang Technological University

View shared research outputs
Top Co-Authors

Avatar

Thomas Peyrin

Nanyang Technological University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yu Sasaki

University of Electro-Communications

View shared research outputs
Top Co-Authors

Avatar

Indranil Ghosh Ray

Indian Statistical Institute

View shared research outputs
Top Co-Authors

Avatar

Ravi Pankaj

Indian Statistical Institute

View shared research outputs
Researchain Logo
Decentralizing Knowledge