Follow
Kunwar Singh
Kunwar Singh
CSE Deapartment, NIT Trichy
Verified email at nitt.edu - Homepage
Title
Cited by
Cited by
Year
Efficient weighted threshold ECDSA for securing bitcoin wallet
P Dikshit, K Singh
2017 ISEA Asia Security and Privacy (ISEASP), 1-9, 2017
432017
Lattice Based Identity Based Proxy Re-Encryption Scheme.
K Singh, CP Rangan, AK Banerjee
J. Internet Serv. Inf. Secur. 3 (3/4), 38-51, 2013
342013
Lattice based identity based unidirectional proxy re-encryption scheme
K Singh, CP Rangan, AK Banerjee
Security, Privacy, and Applied Cryptography Engineering: 4th International …, 2014
272014
Cryptanalysis of unidirectional proxy re-encryption scheme
K Singh, CP Rangan, AK Banerjee
Information and Communication Technology: Second IFIP TC5/8 International …, 2014
242014
Cryptanalysis of Salsa and ChaCha: revisited
KKC Deepthi, K Singh
International Conference on Mobile Networks and Management, 324-338, 2017
232017
Adaptively secure efficient lattice (H) IBE in standard model with short public parameters
K Singh, C Pandurangan, AK Banerjee
International Conference on Security, Privacy, and Applied Cryptography …, 2012
222012
Lattice-based identity-based resplittable threshold public key encryption scheme
K Singh, CP Rangan, AK Banerjee
International Journal of Computer Mathematics 93 (2), 289-307, 2016
182016
Lattice Based Forward-Secure Identity Based Encryption Scheme with Shorter Ciphertext.
K Singh, C Pandurangan, AK Banerjee
J. Internet Serv. Inf. Secur. 3 (1/2), 5-19, 2013
162013
Provably secure lattice based identity based unidirectional PRE and PRE+ schemes
K Singh, CP Rangan, R Agrawal, S Sheshank
Journal of Information Security and Applications 54, 102569, 2020
132020
A privacy-preserving framework for endorsement process in hyperledger fabric
J Dharani, K Sundarakantham, K Singh
Computers & Security 116, 102637, 2022
122022
Lattice Based Efficient Threshold Public Key Encryption Scheme.
K Singh, CP Rangan, AK Banerjee
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 4 (4), 93-107, 2013
92013
A hierarchical identity-based security for delay tolerant networks using lattice-based cryptography
G Srivastava, R Agrawal, K Singh, R Tripathi, K Naik
Peer-to-Peer Networking and Applications 13, 348-367, 2020
82020
Privacy based decentralized public key infrastructure (PKI) implementation using smart contract in blockchain
P Sivakumar, K Singh
National Institute of Technology, 6, 2017
82017
Lattice Based Universal Re-encryption for Mixnet.
K Singh, CP Rangan, AK Banerjee
J. Internet Serv. Inf. Secur. 4 (1), 1-11, 2014
82014
Cryptanalysis for reduced round Salsa and ChaCha: revisited
KKC Deepthi, K Singh
IET Information Security 13 (6), 591-602, 2019
72019
Lattice based mix network for location privacy in mobile system
K Singh, CP Rangan, AK Banerjee
Mobile Information Systems 2015, 2015
72015
Efficient lattice HIBE in the standard model with shorter public parameters
K Singh, CP Rangan, AK Banerjee
Information and Communication Technology: Second IFIP TC5/8 International …, 2014
72014
Lattice Forward-Secure Identity Based Encryption Scheme.
K Singh, C Pandurangan, AK Banerjee
J. Internet Serv. Inf. Secur. 2 (3/4), 118-128, 2012
72012
Identity based hybrid signcryption revisited
K Singh
2012 International Conference on Information Technology and e-Services, 1-7, 2012
72012
Cryptanalysis of stream cipher LIZARD using division property and MILP based cube attack
SK Karthika, K Singh
Discrete Applied Mathematics 325, 63-78, 2023
62023
The system can't perform the operation now. Try again later.
Articles 1–20