Ashwin Jha

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
On the number of restricted solutions to constrained systems and their applications2026-03-31Paper
Post-quantum security of key-alternating Feistel ciphers2026-03-31Paper
Tight security of \textsf{TNT} and beyond. Attacks, proofs and possibilities for the cascaded \textsf{LRW} paradigm2024-11-12Paper
On quantum secure compressing pseudorandom functions2024-08-30Paper
Revisiting the indifferentiability of the sum of permutations
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
Towards tight security bounds for \textsf{OMAC, XCBC} and \textsf{TMAC}
Advances in Cryptology – ASIACRYPT 2022
2023-08-25Paper
\textsf{Elastic-Tweak}: a framework for short tweak tweakable block cipher
Lecture Notes in Computer Science
2023-05-12Paper
Fine-tuning the ISO/IEC standard \textsf{LightMAC}
Lecture Notes in Computer Science
2023-05-12Paper
Revisiting the security of \textsf{COMET} authenticated encryption scheme
Lecture Notes in Computer Science
2023-05-12Paper
\textsf{tHyENA}: making \textsf{HyENA} even smaller
Lecture Notes in Computer Science
2023-05-12Paper
How to build optimally secure PRFs using block ciphers2023-03-21Paper
\textsf{Light-OCB}: parallel lightweight authenticated cipher with full security2022-07-13Paper
Tight security of cascaded LRW2
Journal of Cryptology
2020-06-15Paper
XHX -- a framework for optimally secure tweakable block ciphers from classical block ciphers and universal hashing2020-03-02Paper
On Random Read Access in ${\mathsf{OCB}}$
IEEE Transactions on Information Theory
2020-01-28Paper
A New Look at Counters: Don’t Run Like Marathon in a Hundred Meter Race
IEEE Transactions on Computers
2018-06-27Paper
On rate-1 and beyond-the-birthday bound secure online ciphers using tweakable block ciphers
Cryptography and Communications
2018-05-28Paper
Revisiting structure graphs: applications to CBC-MAC and EMAC
Journal of Mathematical Cryptology
2016-12-07Paper


Research outcomes over time


This page was built for person: Ashwin Jha