default search action
Kalikinkar Mandal
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Nusa Zidaric, Kalikinkar Mandal, Guang Gong, Mark D. Aagaard:
The welch-gong stream cipher - evolutionary path. Cryptogr. Commun. 16(1): 129-165 (2024) - [e1]Claude Carlet, Kalikinkar Mandal, Vincent Rijmen:
Selected Areas in Cryptography - SAC 2023 - 30th International Conference, Fredericton, Canada, August 14-18, 2023, Revised Selected Papers. Lecture Notes in Computer Science 14201, Springer 2024, ISBN 978-3-031-53367-9 [contents] - 2022
- [j14]Kalikinkar Mandal, Guang Gong:
On ideal t-tuple distribution of orthogonal functions in filtering de bruijn generators. Adv. Math. Commun. 16(3): 597-619 (2022) - [j13]Kalikinkar Mandal, Dhiman Saha, Sumanta Sarkar, Yosuke Todo:
Sycon: a new milestone in designing ASCON-like permutations. J. Cryptogr. Eng. 12(3): 305-327 (2022) - [c18]Kalikinkar Mandal:
Practical Single-Pass Oblivious Aggregation and Billing Computation Protocols for Smart Meters. CANS 2022: 279-291 - [c17]Vishnu Asutosh Dasu, Sumanta Sarkar, Kalikinkar Mandal:
PROV-FL: Privacy-preserving Round Optimal Verifiable Federated Learning. AISec@CCS 2022: 33-44 - [c16]Kalikinkar Mandal:
Cryptographic Pseudorandom Noise Generators for Lattice-based Cryptography and Differential Privacy. IWSDA 2022: 1-4 - 2021
- [c15]Kalikinkar Mandal, Guang Gong:
Homomorphic Evaluation of Lightweight Cipher Boolean Circuits. FPS 2021: 63-74 - [c14]Yunjie Yi, Kalikinkar Mandal, Guang Gong:
Implementation of Lightweight Ciphers and Their Integration into Entity Authentication with IEEE 802.11 Physical Layer Transmission. FPS 2021: 113-129 - [i9]Kalikinkar Mandal, Dhiman Saha, Sumanta Sarkar, Yosuke Todo:
Sycon: A New Milestone in Designing ASCON-like Permutations. IACR Cryptol. ePrint Arch. 2021: 157 (2021) - 2020
- [j12]Kalikinkar Mandal, Bo Yang, Guang Gong, Mark D. Aagaard:
Analysis and Efficient Implementations of a Class of Composited de Bruijn Sequences. IEEE Trans. Computers 69(12): 1835-1848 (2020) - [j11]Riham AlTawy, Guang Gong, Kalikinkar Mandal, Raghvendra Rohit:
WAGE: An Authenticated Encryption with a Twist. IACR Trans. Symmetric Cryptol. 2020(S1): 132-159 (2020) - [c13]Yunsi Fei, Guang Gong, Cheng Gongye, Kalikinkar Mandal, Raghvendra Rohit, Tianhong Xu, Yunjie Yi, Nusa Zidaric:
Correlation Power Analysis and Higher-Order Masking Implementation of WAGE. SAC 2020: 593-614 - [i8]Kalikinkar Mandal, Guang Gong:
PrivFL: Practical Privacy-preserving Federated Regressions on High-dimensional Data over Mobile Networks. CoRR abs/2004.02264 (2020) - [i7]Riham AlTawy, Guang Gong, Kalikinkar Mandal, Raghvendra Rohit:
WAGE: An Authenticated Encryption with a Twist. IACR Cryptol. ePrint Arch. 2020: 435 (2020) - [i6]Yunsi Fei, Guang Gong, Cheng Gongye, Kalikinkar Mandal, Raghvendra Rohit, Tianhong Xu, Yunjie Yi, Nusa Zidaric:
Correlation Power Analysis and Higher-order Masking Implementation of WAGE. IACR Cryptol. ePrint Arch. 2020: 1202 (2020)
2010 – 2019
- 2019
- [c12]Kalikinkar Mandal, Guang Gong:
PrivFL: Practical Privacy-preserving Federated Regressions on High-dimensional Data over Mobile Networks. CCSW 2019: 57-68 - [c11]Sumanta Sarkar, Kalikinkar Mandal, Dhiman Saha:
On the Relationship Between Resilient Boolean Functions and Linear Branch Number of S-Boxes. INDOCRYPT 2019: 361-374 - [i5]Kalikinkar Mandal, Guang Gong:
PrivFL: Practical Privacy-preserving Federated Regressions on High-dimensional Data over Mobile Networks. IACR Cryptol. ePrint Arch. 2019: 979 (2019) - [i4]Sumanta Sarkar, Kalikinkar Mandal, Dhiman Saha:
On the Relationship between Resilient Boolean Functions and Linear Branch Number of S-boxes. IACR Cryptol. ePrint Arch. 2019: 1427 (2019) - 2018
- [j10]Kalikinkar Mandal, Bo Yang, Guang Gong, Mark D. Aagaard:
On ideal t-tuple distribution of filtering de Bruijn sequence generators. Cryptogr. Commun. 10(4): 629-641 (2018) - [j9]Riham AlTawy, Raghvendra Rohit, Morgan He, Kalikinkar Mandal, Gangqiang Yang, Guang Gong:
Towards a Cryptographic Minimal Design: The sLiSCP Family of Permutations. IEEE Trans. Computers 67(9): 1341-1358 (2018) - [j8]Riham AlTawy, Raghvendra Rohit, Morgan He, Kalikinkar Mandal, Gangqiang Yang, Guang Gong:
SLISCP-light: Towards Hardware Optimized Sponge-specific Cryptographic Permutations. ACM Trans. Embed. Comput. Syst. 17(4): 81:1-81:26 (2018) - 2017
- [j7]Bo Yang, Kalikinkar Mandal, Mark D. Aagaard, Guang Gong:
Efficient Composited de Bruijn Sequence Generators. IEEE Trans. Computers 66(8): 1354-1368 (2017) - [c10]Teng Wu, Yin Tan, Kalikinkar Mandal, Guang Gong:
On the Multi-output Filtering Model and Its Applications. C2SI 2017: 265-281 - [c9]Riham AlTawy, Raghvendra Rohit, Morgan He, Kalikinkar Mandal, Gangqiang Yang, Guang Gong:
sLiSCP: Simeck-Based Permutations for Lightweight Sponge Cryptographic Primitives. SAC 2017: 129-150 - [i3]Riham AlTawy, Raghvendra Rohit, Morgan He, Kalikinkar Mandal, Gangqiang Yang, Guang Gong:
sLiSCP: Simeck-based Permutations for Lightweight Sponge Cryptographic Primitives. IACR Cryptol. ePrint Arch. 2017: 747 (2017) - 2016
- [j6]Kalikinkar Mandal, Guang Gong:
Filtering Nonlinear Feedback Shift Registers using Welch-Gong Transformations for Securing RFID Applications. EAI Endorsed Trans. Security Safety 3(7): e3 (2016) - [j5]Kalikinkar Mandal, Guang Gong:
Feedback Reconstruction and Implementations of Pseudorandom Number Generators from Composited De Bruijn Sequences. IEEE Trans. Computers 65(9): 2725-2738 (2016) - [j4]Kalikinkar Mandal, Xinxin Fan, Guang Gong:
Design and Implementation of Warbler Family of Lightweight Pseudorandom Number Generators for Smart Devices. ACM Trans. Embed. Comput. Syst. 15(1): 1:1-1:28 (2016) - [c8]Kalikinkar Mandal, Basel Alomair, Radha Poovendran:
Secure Error-Tolerant Graph Matching Protocols. CANS 2016: 265-283 - [c7]Moreno Ambrosin, Hossein Hosseini, Kalikinkar Mandal, Mauro Conti, Radha Poovendran:
Despicable me(ter): Anonymous and fine-grained metering data reporting with dishonest meters. CNS 2016: 163-171 - [i2]Kalikinkar Mandal, Basel Alomair, Radha Poovendran:
Secure Error-Tolerant Graph Matching Protocols. IACR Cryptol. ePrint Arch. 2016: 908 (2016) - 2015
- [j3]Xinxin Fan, Kalikinkar Mandal, Guang Gong:
WG-8: A Lightweight Stream Cipher for Resource-Constrained Smart Devices. EAI Endorsed Trans. Security Safety 2(3): e4 (2015) - [c6]Moreno Ambrosin, Hossein Hosseini, Kalikinkar Mandal, Mauro Conti, Radha Poovendran:
Verifiable and privacy-preserving fine-grained data-collection for smart metering. CNS 2015: 655-658 - 2014
- [j2]Kalikinkar Mandal, Guang Gong, Xinxin Fan, Mark D. Aagaard:
Optimal parameters for the WG stream cipher family. Cryptogr. Commun. 6(2): 117-135 (2014) - [p1]Kalikinkar Mandal, Guang Gong:
Generating Good Span n Sequences Using Orthogonal Functions in Nonlinear Feedback Shift Registers. Open Problems in Mathematics and Computational Science 2014: 127-162 - [i1]Guang Gong, Kalikinkar Mandal, Yin Tan, Teng Wu:
On the Multi-output Filtering Model and Its Applications. IACR Cryptol. ePrint Arch. 2014: 542 (2014) - 2013
- [j1]Goutam K. Audhya, Koushik Sinha, Kalikinkar Mandal, Rana Dattagupta, Sasthi C. Ghosh, Bhabani P. Sinha:
A New Approach to Fast Near-Optimal Channel Assignment in Cellular Mobile Networks. IEEE Trans. Mob. Comput. 12(9): 1814-1827 (2013) - [c5]Kalikinkar Mandal, Guang Gong, Xinxin Fan, Mark D. Aagaard:
On selection of optimal parameters for the WG stream cipher family. CWIT 2013: 17-21 - [c4]Xinxin Fan, Kalikinkar Mandal, Guang Gong:
WG-8: A Lightweight Stream Cipher for Resource-Constrained Smart Devices. QSHINE 2013: 617-632 - [c3]Kalikinkar Mandal, Guang Gong:
Filtering Nonlinear Feedback Shift Registers Using Welch-Gong Transformations for Securing RFID Applications. QSHINE 2013: 643-657 - 2012
- [c2]Kalikinkar Mandal, Xinxin Fan, Guang Gong:
Warbler: A Lightweight Pseudorandom Number Generator for EPC C1 Gen2 Tags. RFIDSec Asia 2012: 73-84 - [c1]Kalikinkar Mandal, Guang Gong:
Cryptographically Strong de Bruijn Sequences with Large Periods. Selected Areas in Cryptography 2012: 104-118
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint