- Palash Sarkar
- Applied Statistics Unit
- Indian Statistical Institute
203, B.T. Road, Kolkata 700108, INDIA. e-mail: palash AT isical DOT ac DOT in

Below are links to files
corresponding to some talks that I have given in the past and to
some notes. These have not been carefully proof-checked and may
have typographical errors and (hopefully minor) inaccuracies.
Neither are these in their final forms and the files may be
updated from time to time.

Notes

Notes on Conditional Expectation and Martingales

Talks

Introductory and Expository

A Few Notions in Cryptography, National Institute of Technology, Durgapur, 11th April, 2014.

Cryptography: What Should Be Used? International Conference on Security Aspects in Information Technology, High-Performance Computing and Networking, Haldia, West Bengal, 22nd October 2011.

On Using Mathematics to Attain Secrecy, Indian Statistical Institute, Bengaluru, 24th February 2012.

What Can Be Proved About Security? Centre for Artificial Intelligence and Robotics, Bengaluru, 23rd February 2012.

Public-Key and Identity-Based Encryption

Identity Based Encryption: An Overview

Probabilistic Security Games, Seminar in honour of Professor Bhamidi V. Rao, Indian Statistical Institute, January 15, 2008.

Cyclic Groups in Cryptography

Public Key Encryption Based on Cyclic Groups

The Electronic World, Information Technology Act and Public Key Infrastructure in India, QUT, Brisbane, 2009.

Identity-Based Encryption: A 30-Minute Tour, Indian Statistical Institute, Kolkata, January 2012.

Public-Key Infrastructure in India: Status and Issues

On the Balasubramanian-Koblitz Results, Institute of Mathematical Sciences, 22nd February 2012.

Digital Signatures: A Panoramic View, International Conference on Electrical Engineering, Computing Science and Automatic Control, 2015, October 28, Mexico City, 2015.

A General Polynomial Selection Method and New Asymptotic Complexities for the Tower Number Field Sieve Algorithm, Asiacrypt 2016, Hanoi.

Challenges with Assessing the Impact of NFS Advances on the Security of Pairing-Based Cryptography, Mycrypt 2016, Kuala Lumpur.

Modes of Operations

Disk Encryption

Modes of Operations for Wide-Block Encryption

How to Use Your Block Cipher?

Another Look at XCB

An Introduction to Authenticated Encryption

Stream Ciphers, Block Ciphers and Hash Functions

Generic Attacks on Symmetric Ciphers

Stream Ciphers – An Overview

Some Aspects of Block Ciphers, CU-ISI Tutorial Workshop on Cryptology, 17th July 2011

Attacks on Stream Ciphers: A Perspective

Hash Functions: A Gentle Introduction

On Symmetric Key Broadcast Encryption, Elliptic Curve Cryptography, 10th October, 2014

Symmetric Key Broadcast Encryption: State-of-the-Art, IRN Meeting on Mobile Security, Samsung R&D Institute India, 4th December, 2015

Another Look at Normal Approximations in Cryptanalysis, Indocrypt, 8th December 2015, Bengaluru.

A New Test Statistic for Key Recovery Attacks Using Multiple Linear Approximations, Mycrypt 2016, Kuala Lumpur.

Other Talks

Tackling Malicious Behaviour in Randomised Response Techniques

A Few Interesting Connections Between Statistics and Computer Science

What is Meant by the Privacy of a Sampled Individual?

Some Aspects of Barua’s Work on Automata Theory

Axiomatic Geometry: Euclid and Beyond

To Compute or Not to Compute?

Symmetric Balanced Squares

On Statistics and Induction (a long version)

Notes

Notes on Conditional Expectation and Martingales

Talks

Introductory and Expository

A Few Notions in Cryptography, National Institute of Technology, Durgapur, 11th April, 2014.

Cryptography: What Should Be Used? International Conference on Security Aspects in Information Technology, High-Performance Computing and Networking, Haldia, West Bengal, 22nd October 2011.

On Using Mathematics to Attain Secrecy, Indian Statistical Institute, Bengaluru, 24th February 2012.

What Can Be Proved About Security? Centre for Artificial Intelligence and Robotics, Bengaluru, 23rd February 2012.

Public-Key and Identity-Based Encryption

Identity Based Encryption: An Overview

Probabilistic Security Games, Seminar in honour of Professor Bhamidi V. Rao, Indian Statistical Institute, January 15, 2008.

Cyclic Groups in Cryptography

Public Key Encryption Based on Cyclic Groups

The Electronic World, Information Technology Act and Public Key Infrastructure in India, QUT, Brisbane, 2009.

Identity-Based Encryption: A 30-Minute Tour, Indian Statistical Institute, Kolkata, January 2012.

Public-Key Infrastructure in India: Status and Issues

On the Balasubramanian-Koblitz Results, Institute of Mathematical Sciences, 22nd February 2012.

Digital Signatures: A Panoramic View, International Conference on Electrical Engineering, Computing Science and Automatic Control, 2015, October 28, Mexico City, 2015.

A General Polynomial Selection Method and New Asymptotic Complexities for the Tower Number Field Sieve Algorithm, Asiacrypt 2016, Hanoi.

Challenges with Assessing the Impact of NFS Advances on the Security of Pairing-Based Cryptography, Mycrypt 2016, Kuala Lumpur.

Modes of Operations

Disk Encryption

Modes of Operations for Wide-Block Encryption

How to Use Your Block Cipher?

Another Look at XCB

An Introduction to Authenticated Encryption

Stream Ciphers, Block Ciphers and Hash Functions

Generic Attacks on Symmetric Ciphers

Stream Ciphers – An Overview

Some Aspects of Block Ciphers, CU-ISI Tutorial Workshop on Cryptology, 17th July 2011

Attacks on Stream Ciphers: A Perspective

Hash Functions: A Gentle Introduction

On Symmetric Key Broadcast Encryption, Elliptic Curve Cryptography, 10th October, 2014

Symmetric Key Broadcast Encryption: State-of-the-Art, IRN Meeting on Mobile Security, Samsung R&D Institute India, 4th December, 2015

Another Look at Normal Approximations in Cryptanalysis, Indocrypt, 8th December 2015, Bengaluru.

A New Test Statistic for Key Recovery Attacks Using Multiple Linear Approximations, Mycrypt 2016, Kuala Lumpur.

Other Talks

Tackling Malicious Behaviour in Randomised Response Techniques

A Few Interesting Connections Between Statistics and Computer Science

What is Meant by the Privacy of a Sampled Individual?

Some Aspects of Barua’s Work on Automata Theory

Axiomatic Geometry: Euclid and Beyond

To Compute or Not to Compute?

Symmetric Balanced Squares

On Statistics and Induction (a long version)