Publications

Back to Homepage
Publication list at DBLP

23. Y. Nawaz, G. Gong and K. C. Gupta . Upper Bounds on Algebraic Immunity of Boolean Power Functions, Preprint.

22. K. C. Gupta, G. Gong and Y. Nawaz. Upper Bound for Algebraic Immunity on a Subclass of Maiorana McFarland Class of Bent Functions, Preprint.

21. Y. Nawaz, K. C. Gupta and G. Gong. Algebraic Immunity of S-boxes based on Power Mappings: Analysis and Construction, IEEE Transactions on Information Theory, vol 55, no 9, pp.4263-4273, Sep. 2009.

20. K. C. Gupta and P. Sarkar. Computing Partial Walsh Transform from the Algebraic Normal Form of a Boolean Function, IEEE Transactions on Information Theory, vol 55, no 3, pp.1354-1359, Mar. 2009.

19. P. Mishra and K. C. Gupta. A Metric on the Set of Elliptic Curves Over F_p, Applied Mathematics Letters, vol 21, Issue 12, pp 1330-1332, Dec. 2008.

18. Yassir Nawaz, K. C. Gupta and Guang Gong. Efficient Techniques to Find Algebraic Immunity of S-boxes Based on Power Mappings, International Workshop on Coding and Cryptogrpahy, pp 237-246, France, 2007.

17. D. Chang, K. C. Gupta and M. Nandi. RC4-Hash : A New Hash Function based on RC4, In Proceedings of Indocrypt 2006, pp 80-94, Lecture Notes in Computer Science 4329, Springer Verlag, 2006.

16. K. C. Gupta, P. K. Mishra and P. Pal. A General Methodology for Pipelining the Point Multiplication Operation in Curve Based Cryptography, ACNS 2006, pp 405 -- 420, Lecture Notes in Computer Science 3989, Springer Verlag, 2006.

15. D. K. Dalai, K. C. Gupta and S. Maitra. Notion of Algebraic Immunity and Its Evaluation Related to Fast Algebraic Attacks, Second International Workshop, Boolean Function: Cryptography and Applications (BFCA 06), pp 107-123, March 2006.

14. Y. Nawaz, G. Gong and K. C. Gupta. Upper Bounds on Algebraic Immunity of Power Functions, In Proceedings of Fast Software Encryption: pp 375-389, Lecture Notes in Computer Science 4047, Springer Verlag, 2006.

13. C. Carlet, D. Dalai, K. C. Gupta and S. Maitra. Algebraic Immunity for Cryptographically Significant Boolean Functions: Analysis and Construction, IEEE Transactions on Information Theory, vol 521, no7, pp.3105-3121, Jul. 2006.

12. G. Gong, K. C. Gupta, M. Hell and Y. Nawaz. Towards a General RC4-like Keystream Generator, Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp.162-174, Lecture Notes in Computer Science 3822 Springer Verlag 2005.

11. D. K. Dalai, K. C. Gupta and S. Maitra. Cryptographically Significant Boolean Functions: Construction and Analysis in terms of Algeraic Immunity, Fast Software Encryption: 12th International workshop, FSE'2005, pp 98-111, Lecture Notes in Computer Science 3557, Springer Verlag, 2005.

10. K. C. Gupta and P. Sarkar. Towards A General Correlation Theorem, IEEE Transactions on Information Theory, vol 51, no9, pp.3297-3302, Aug. 2005.

9. K. C. Gupta and P. Sarkar. Construction of High Degree Resilient S-boxes With Improved Nonlinearity, Information Processing Letters, vol. 95 , pp.413-417, Aug. 2005.

8. S. Maitra, K. C. Gupta, A. Venkateswarlu. Results on Multiples of Primitive Polynomials and Their Products Over GF(2), Theoretical Computer Science, vol. 341, pp. 311-343, Apr. 2005 (This paper is based on 1, 2, 3 and Lecture Notes in Computer Science 2513, pp. 231-242).

7. K. C. Gupta and P. Sarkar. Improved Construction of Nonlinear Resilient S-boxes, In Proceedings of Asiacrypt 2002, pp 466--483. Lecture Notes in Computer Science 2501, Springer Verlag, 2002 (Full version of the paper published in IEEE Transactions on Information Theory, vol 51, no. 1, pp. 339-348, Jan. 2005).

6. D. K. Dalai, K. C. Gupta and S. Maitra. Results on Algebraic Immunity for Cryptographically Significant Boolean Functions, In Proceedings of Indocrypt 2004, pp 92-106, Lecture Notes in Computer Science 3348, Springer Verlag, 2004.

5. K. C. Gupta and P. Sarkar. Software Implementation of Resilient Maiorana-McFarland S-boxes, In Proceedings of WISA 2004, pp 317-331, Lecture Notes in Computer Science 3325, Springer Verlag, 2004.

4. K. C. Gupta and P. Sarkar. Construction of Perfect Nonlinear and Maximally Nonlinear Multioutput Boolean Functions Satisfying Higher Order Strict Avalanche Criteria, In Progress in Cryptology -- Indocrypt 2003, pp 107--120. Lecture Notes in Computer Science 2904, Springer Verlag, 2003 (Full version of the paper published in IEEE Transactions on Information Theory, vol 50, no. 11, pp. 2886-2893, Nov. 2004).

3. S. Maitra, K. C. Gupta and Ayineedi Venkateswarlu. Multiples of Primitive Polynomials and Their Products over GF(2), SAC 2002, pp 214 -- 231, Lecture Notes in Computer Science 2595, Springer Verlag, 2002.

2. K. C. Gupta and S. Maitra. Multiples of Primitive Polynomials over GF(2), In Progress in Cryptology -- Indocrypt 2001, pp 62-72, Lecture Notes in Computer Science 2247, Springer Verlag, 2001.

1. K. C. Gupta and S. Maitra. Primitive Polynomials over GF(2)- A Cryptologic Approach, In ICICS 2001, pp 23-34, Lecture Notes in Computer Science 2229, Springer Verlag, 2001.