Vishal Saraswat

ORCID: 0000-0001-7082-9568
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Blockchain Technology Applications and Security
  • Chaos-based Image/Signal Encryption
  • Cryptographic Implementations and Security
  • Complexity and Algorithms in Graphs
  • Privacy-Preserving Technologies in Data
  • Internet Traffic Analysis and Secure E-voting
  • Coding theory and cryptography
  • Advanced Malware Detection Techniques
  • Cryptography and Residue Arithmetic
  • Quantum Computing Algorithms and Architecture
  • Advanced Steganography and Watermarking Techniques
  • graph theory and CDMA systems
  • Optical Systems and Laser Technology
  • Advanced Algorithms and Applications
  • Privacy, Security, and Data Protection
  • Oral and gingival health research
  • Advanced Computing and Algorithms
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Internet of Things and AI
  • Mobile and Web Applications
  • Advanced Mathematical Theories
  • Intelligence, Security, War Strategy
  • Cybercrime and Law Enforcement Studies
  • IoT and GPS-based Vehicle Safety Systems

Robert Bosch (India)
2019-2024

Robert Bosch (Netherlands)
2021

Indian Institute of Technology Jammu
2018-2019

Indian Institute of Technology Indore
2018

Indian Statistical Institute
2017

CR Rao Advanced Institute of Mathematics, Statistics and Computer Science
2014-2016

University of Minnesota
2007-2012

University of Minnesota System
2009

Twin Cities Orthopedics
2009

In 2013, researchers from the National Security Agency of USA (NSA) proposed two lightweight block ciphers SIMON and SPECK [3]. While is tuned for optimal performance in hardware, software. At CHES 2015, Yang et al. [6] combined "good" design components both a new cipher SIMECK that even more compact efficient. this paper we show vulnerable to fault attacks demonstrate on SIMECK. The first random bit-flip attack which recovers n-bit last round key Simeck using average about n/2 faults second...

10.1145/2858930.2858939 article EN 2016-01-20

Recent advancements in the field of in-vehicle network and wireless communication, has been steadily progressing. Also, advent technologies such as Vehicular Adhoc Networks (VANET) Intelligent Transportation System (ITS), transformed modern automobiles into a sophisticated cyber-physical system rather than just isolated mechanical device. Modern rely on many electronic control units communicating over Controller Area Network (CAN) bus. Although protecting car's external interfaces is an...

10.1109/ants50601.2020.9342791 article EN 2020-12-14

We present a cache-timing attack on the Advanced Encryption Standard (AES) [14] with potential to be applied remotely and develop an evaluation framework for comparing relative performance of attacks under various simulated network conditions. examine Bernstein's original AES [3], its variants [6, 12, 10]. conduct analysis noise hypothesis fishing concept in order reduce number samples required recover key our implementation [3]. Our rough estimate is about 2 × 109 which comparable 4...

10.1145/2556315.2556322 article EN 2014-01-14

Public-key encryption with keyword search (PEKS) schemes are useful to delegate searching capabilities on encrypted data a third party, who does not hold the entire secret key, but only an appropriate token which allows operations preserves privacy. We propose efficient and practical integrated public-key (PKE) scheme (PKE+PEKS) we prove be secure in strongest security notion for PKE+PEKS schemes. In particular, provide unified proof of its joint CCA-security standard model. The our relies...

10.5220/0005577104480453 article EN 2015-01-01

In a competitive market, online auction systems enable optimal trading of digital products and services. Bidders can participate in existing blockchain-based auctions while protecting the confidentiality their bids decentralized, transparent, secure, auditable manner. However, parties would prefer not to disclose interests competitors, remain anonymous during auctions. this paper, we firstly analyze specific requirements for fair We present formal model tailored study that facilitate...

10.3390/electronics10192340 article EN Electronics 2021-09-24

Online auction systems allow to achieve an optimal trading of digital goods and services in a competitive market. Existing blockchain-based auctions the bidders take part process while maintaining confidentiality their bids decentralized, transparent, secure auditable way. However, market, parties would prefer not disclose interests competitors, remain anonymous during auctions. In this paper, we firstly analyze specific requirements for fair We propose formal model tailored study...

10.1109/ntms49979.2021.9432664 article EN 2021-04-19

Abstract We introduce a new cryptographic primitive identity-based anonymous proxy signcryption which provides anonymity to the sender while also providing mechanism original expose identity of in case misuse. formal definition an (IBAPS) scheme and give security model for it. construct IBAPS prove its under discrete logarithm assumption computational Diffie–Hellman assumption. Moreover, we do efficiency comparison with existing schemes show that our is much more efficient than those...

10.1515/jmc-2015-0014 article EN Journal of Mathematical Cryptology 2017-05-17

Recently, lattice signatures based on the Fiat-Shamir framework have seen a lot of improvements which are efficient in practice. The security these signature schemes depends mainly hardness solving short integer solutions (SIS) and/or learning with errors problem random oracle model. authors propose an alternative lattice-based scheme over ring . key generation is combination NTRU and Ring SIS like generation. Both verification done efficiently by doing polynomial convolutions proposed...

10.1049/iet-ifs.2019.0580 article EN IET Information Security 2020-06-03

Critical Infrastructures are one of the vital systems that support modern societies. The adoption technologies like Industry 4.0, Industrial Internet Things (IIoT) in critical infrastructures have made it a lucrative target for cyberattackers. Protecting infrastructure is paramount importance due to sensitive nature data coupled with resource-constrained devices. advent blockchains can be significant enabler protecting through use immutable ledger storing operations. However, computationally...

10.1109/icdcs47774.2020.00166 article EN 2020-11-01
Coming Soon ...