Home  •  Research  •  Résumé (PDF/DOC/TEXT)  •  Teaching  •  Photos  •  FunStuff  •  Contact  •  SPACE 2016

This is the homepage of Vishal Saraswat, Visiting Scientist, at the Indian Statistical Institute (ISI), and formerly, Assistant Professor, at the C.R.Rao Advanced Institute of Mathematics, Statistics and Computer Science (AIMSCS), Hyderabad-India, studying Number Theory, Cryptography, Computer Security, and related subjects.

I am the Tutorial Chair for the Seventh International Conference on Security, Privacy, and Applied Cryptography Engineering (SPACE 2017) to be organized in cooperation with the International Association for Cryptologic Research (IACR) during 13-17 December 2017 at Goa, India.

I was the Program Chair for the Sixth International Conference on Security, Privacy, and Applied Cryptography Engineering (SPACE 2016) which we had organized at AIMSCS, Hyderabad, during 16-18 December 2016.

We had also organized the Code-Based Crypto Workshop 2015 during 28-30 September 2015.

Here is a list of my publications and project reports.

Analysis-Preserving Protection of User Privacy against Information Leakage of Social-Network Likes
An Anonymous Proxy Multi-signature with Accountability
Differential Fault Attack on SIMECK
Efficient and Secure Many-to-One Signature Delegation
Strengthening NTRU Against Message Recovery Attacks
Practical and Secure Integrated PKE+PEKS with Keyword Privacy
Secure and Efficient Scheme for Delegation of Signing Rights
How to Leak a Secret and Reap the Rewards too
A Secure Anonymous Proxy Multi-signature Scheme
Remote Cache-timing Attacks Against AES
Anonymous Signatures Revisited
Public-Key Encryption with Searchable Keywords based on Jacobi Symbols
Attacks on Elliptic Curve Discrete Log Problem
Implementation of Attacks on Discrete Log Problem using Function Field Sieve
Development of an Indigenous Lightweight Block Cipher
Side Channel Cryptanalysis (of block/stream ciphers)
Post Quantum Cryptology
Design of a Lattice Based Cryptosystem
Software Methodologies for Lattice Based Cryptanalysis
Secure and Efficient Long Term Data Management
Long Term Key Management
Applied Remote Cache-timing Attacks Against AES
A Note on Cryptographic Multilinear Maps
Basic Lie Theory