Author(s)
|
Title of Paper
|
Journal
|
Volume (No.)
|
Page numbers
|
Year
|
Impact Factor of the Journal
(Optional)
|
Kunwar Singh, Karthika S K,
|
Theoretical Analysis of Biases in TLS En[1]cryption Scheme Chacha 128
|
Int. J. of Ad Hoc and Ubiquitous Computing (IJAHUC) (SCI)
|
|
|
2022
|
|
Kunwar Singh, KKC Deepti, S. K. Karthika
|
Improved related-cipher attack on Salsa and ChaCha
|
International journal information technology, Springer.
|
|
|
2022
|
|
Kunwar Singh Ch Koteswara Rao.
|
Oblivious Stable Sorting Protocol and Oblivious Binary Search Protocol for Secure Multi-party Computation
|
Journal of High-Speed Networks.
|
|
|
2021
|
|
Kunwar Singh, S Mercy Shalinie, Dharani J, K Sundarakantham,
|
A PrivacyPreserving Framework for Endorsement Process in Hyperledger Fabric
|
Computers Security,
|
|
|
2022
|
|
Kunwar Singh, C. Pandu Rangan, Richa Agarwal, Samir Sheshank
|
Lattice-based Unidirectional PRE and PRE+ Schemes
|
IET Information Security (SCI)
|
|
|
2020
|
|
Kunwar Singh, C. Pandu Rangan, Richa Agarwal, Samir Sheshank
|
Provably Secure Lattice-Based Identity Based Unidirectional PRE and PRE+ Schemes
|
Journal of Information Security and Applications (SCI)
|
54
|
|
2020
|
|
Kunwar Singh , Ch Koteswara Rao
|
Securely Solving Privacy Preserving Minimum Spanning Tree Algorithms in Semi-honest Model
|
Int. J. of Ad Hoc and Ubiquitous Computing (IJAHUC) (SCI)
|
34
|
1-10
|
2020
|
|
Kunwar Singh, Gaurav Srivastava, Richa Agrawal, Rajeev Tripathi, and Kshirasagar Naik
|
A Hierarchical Identity-based Security for Delay Toler[1]and Networks using Lattice-based Cryptography
|
Peer-to-Peer Networking and Applications (SCI), Springer
|
13
|
348 - 367
|
2020
|
|
Kunwar Singh, KKC Deepti
|
Cryptanalysis of reduced round Salsa and ChaCha
|
IET Information Security (SCI).
|
13
|
591 – 602
|
2019
|
|
Kunwar Singh Pratyush Dikshit
|
Weighted threshold ECDSA for securing bitcoin wallet
|
ACCENTS Transactions on Information Security, pp.
|
2(6)
|
43-51
|
2017
|
|
Kunwar Singh, C.Pandu Rangan, A.K.Banerjee
|
Lattice-Based Identity Based Resplittable Threshold Public Key Encryption Scheme
|
International Journal of Computer Mathematics
|
93
|
289-307
|
2016
|
.577
|
Kunwar Singh, C. Pandu Rangan, A. K. Banerjee
|
Lattice-Based Mix Network for Location Privacy in Mobile System
|
Mobile Information Systems
|
|
|
2015
|
1.462
|
Kunwar Singh, C. Pandu Rangan, A. K. Banerjee
|
Lattice-Based Universal Re-encryption for Mixnet
|
Journal of Information Science and Information Security ( JISIS )
|
4
|
1-12
|
2014
|
|
Kunwar Singh, C. Pandu Rangan, A. K. Banerjee
|
Lattice-Based Identity Based Proxy Re-Encryption Scheme
|
Journal of Information Science and Information Security ( JISIS )
|
3
|
38-51
|
2013
|
|
Kunwar Singh, C. Pandu Rangan, A. K. Banerjee
|
Lattice-based efficient threshold public key encryption scheme
|
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (jowua)
|
4
|
93-107
|
2013
|
|
Kunwar Singh, C. Pandu Rangan, A. K. Banerjee
|
Lattice-Based ForwardSecure Identity Based Encryption Schemes with Shorter Ciphertext
|
Journal of Information Science and Information Security ( JISIS )
|
3
|
5-19
|
2013
|
|
Kunwar Singh, C. Pandu Rangan, A. K. Banerjee
|
Lattice-Based ForwardSecure Identity Based Encryption Schemes
|
Journal of Information Science and Information security ( JISIS )
|
2
|
118- 128
|
2012
|
|