Mridul Nandi

From MaRDI portal
(Redirected from Person:350514)


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Indifferentiability of 3-round confusion-diffusion networks
 
2025-01-10Paper
Tight security of \textsf{TNT} and beyond. Attacks, proofs and possibilities for the cascaded \textsf{LRW} paradigm
 
2024-11-12Paper
Designing full-rate \textsf{Sponge} based AEAD modes
 
2024-10-23Paper
A sponge-based PRF with good multi-user security
 
2024-10-16Paper
Tight security analysis of the public permutation-based \(\mathsf{PMAC\_Plus} \)
Advances in Mathematics of Communications
2024-09-16Paper
Exact security analysis of ASCON
 
2024-08-30Paper
Revisiting collision and local opening analysis of ABR hash
 
2024-06-25Paper
The COLM Authenticated Encryption Scheme
Journal of Cryptology
2024-04-21Paper
Subversion Resilient Hashing: Efficient Constructions and Modular Proofs for Crooked Indifferentiability
IEEE Transactions on Information Theory
2024-03-19Paper
BBB security for 5-round even-Mansour-based key-alternating Feistel ciphers
Designs, Codes and Cryptography
2024-01-15Paper
Proof of mirror theory for a wide range of \(\xi_{\max }\)
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
Indifferentiability of the confusion-diffusion network and the cascade block cipher
Codes, Cryptology and Information Security
2023-10-04Paper
Towards tight security bounds for \textsf{OMAC, XCBC} and \textsf{TMAC}
Advances in Cryptology – ASIACRYPT 2022
2023-08-25Paper
Offset-based BBB-secure tweakable block-ciphers with updatable caches
Lecture Notes in Computer Science
2023-08-14Paper
\textsf{ISAP+}: \textsf{ISAP} with fast authentication
Lecture Notes in Computer Science
2023-08-14Paper
T5: Hashing five inputs with three compression calls
 
2023-07-03Paper
\textsf{Elastic-Tweak}: a framework for short tweak tweakable block cipher
Lecture Notes in Computer Science
2023-05-12Paper
Luby-Rackoff backwards with more users and more security
Lecture Notes in Computer Science
2023-05-12Paper
Fine-tuning the ISO/IEC standard \textsf{LightMAC}
Lecture Notes in Computer Science
2023-05-12Paper
Revisiting the security of \textsf{COMET} authenticated encryption scheme
Lecture Notes in Computer Science
2023-05-12Paper
\textsf{tHyENA}: making \textsf{HyENA} even smaller
Lecture Notes in Computer Science
2023-05-12Paper
Crooked indifferentiability of enveloped XOR revisited
Lecture Notes in Computer Science
2023-05-12Paper
How to build optimally secure PRFs using block ciphers
 
2023-03-21Paper
Practical Fault Attacks on Minalpher: How to Recover Key with Minimum Faults?
Security, Privacy, and Applied Cryptography Engineering
2022-12-09Paper
BBB secure nonce based MAC using public permutations
Progress in Cryptology - AFRICACRYPT 2020
2022-11-09Paper
Proof of Mirror Theory for ξ max = 2
IEEE Transactions on Information Theory
2022-10-11Paper
Multi-user BBB security of public permutations based MAC
Cryptography and Communications
2022-10-06Paper
\textsf{Light-OCB}: parallel lightweight authenticated cipher with full security
 
2022-07-13Paper
\(\mathsf{CENCPP}^\ast\): beyond-birthday-secure encryption from public permutations
Designs, Codes and Cryptography
2022-06-08Paper
The \(\mathsf{mF}\) mode of authenticated encryption with associated data
Journal of Mathematical Cryptology
2022-02-28Paper
Efficient fully CCA-secure predicate encryptions from pair encodings
Advances in Mathematics of Communications
2022-01-24Paper
Mind the composition: birthday bound attacks on EWCDMD and SoKAC21
 
2021-12-01Paper
Improved indifferentiability security proof for 3-round tweakable Luby-Rackoff
Designs, Codes and Cryptography
2021-10-04Paper
The Oribatida v1.3 family of lightweight authenticated encryption schemes
Journal of Mathematical Cryptology
2021-07-14Paper
Delegation-based conversion from CPA to CCA-secure predicate encryption
International Journal of Applied Cryptography
2021-04-22Paper
Blockcipher-based authenticated encryption: how small can we go?
Lecture Notes in Computer Science
2020-06-24Paper
Blockcipher-based authenticated encryption: how small can we go?
Journal of Cryptology
2020-06-15Paper
Tight security of cascaded LRW2
Journal of Cryptology
2020-06-15Paper
XHX -- a framework for optimally secure tweakable block ciphers from classical block ciphers and universal hashing
 
2020-03-02Paper
Beyond birthday bound secure MAC in faulty nonce model
 
2020-02-04Paper
On Random Read Access in ${\mathsf{OCB}}$
IEEE Transactions on Information Theory
2020-01-28Paper
Predicate signatures from pair encodings via dual system proof technique
Journal of Mathematical Cryptology
2019-11-28Paper
\(\mathsf{DWCDM}_+\): a BBB secure nonce based MAC
Advances in Mathematics of Communications
2019-09-19Paper
Tweakable HCTR: a BBB secure tweakable enciphering scheme
 
2019-03-29Paper
On the optimality of non-linear computations for symmetric key primitives
Journal of Mathematical Cryptology
2019-01-11Paper
Short variable length domain extenders with beyond birthday bound security
 
2018-12-20Paper
ZCZ -- achieving \(n\)-bit SPRP security with a minimal number of tweakable-block-cipher calls
 
2018-12-20Paper
Fault based almost universal forgeries on CLOC and SILC
 
2018-10-26Paper
Bernstein bound on WCS is tight -- repairing Luykx-Preneel optimal forgeries
 
2018-09-26Paper
Generic attacks against beyond-birthday-bound MACs
 
2018-09-12Paper
Encrypt or decrypt -- to make a single-key beyond birthday secure nonce-based MAC
 
2018-09-12Paper
Full indifferentiable security of the XOR of two or more random permutations using the \(\chi^2\) method
 
2018-07-09Paper
A New Look at Counters: Don’t Run Like Marathon in a Hundred Meter Race
IEEE Transactions on Computers
2018-06-27Paper
On rate-1 and beyond-the-birthday bound secure online ciphers using tweakable block ciphers
Cryptography and Communications
2018-05-28Paper
A note on the chi-square method: a tool for proving cryptographic security
Cryptography and Communications
2018-05-28Paper
Improved security for OCB3
 
2018-03-08Paper
The iterated random function problem
 
2018-03-08Paper
TriviA: a fast and secure authenticated encryption scheme
 
2018-02-14Paper
Verifiability-based conversion from CPA to CCA-secure predicate encryption
Applicable Algebra in Engineering, Communication and Computing
2018-02-09Paper
ELmD: A Pipelineable Authenticated Encryption and Its Hardware Implementation
IEEE Transactions on Computers
2017-05-16Paper
Attacks on the Authenticated Encryption Mode of Operation <italic>PAE</italic>
IEEE Transactions on Information Theory
2017-04-28Paper
Revisiting full-PRF-secure PMAC and using it for beyond-birthday authenticated encryption
Topics in Cryptology – CT-RSA 2017
2017-04-12Paper
Revisiting structure graphs: applications to CBC-MAC and EMAC
Journal of Mathematical Cryptology
2016-12-07Paper
On the security of joint signature and encryption revisited
Journal of Mathematical Cryptology
2016-12-07Paper
One-key compression function based MAC with security beyond birthday bound
Information Security and Privacy
2016-08-31Paper
INT-RUP Analysis of Block-cipher Based Authenticated Encryption Schemes
Topics in Cryptology - CT-RSA 2016
2016-04-08Paper
On the optimality of non-linear computations of length-preserving encryption schemes
Advances in Cryptology – ASIACRYPT 2015
2016-03-23Paper
An Inverse-Free Single-Keyed Tweakable Enciphering Scheme
Advances in Cryptology – ASIACRYPT 2015
2016-03-23Paper
Equivalence between MAC, WCR and PRF for blockcipher based constructions
Provable Security
2015-09-29Paper
On the Minimum Number of Multiplications Necessary for Universal Hash Functions
Fast Software Encryption
2015-09-18Paper
Characterization of EME with linear mixing
Advances in Information and Computer Security
2015-05-27Paper
Forging attacks on two authenticated encryption schemes COBRA and POET
Lecture Notes in Computer Science
2015-01-16Paper
XLS is not a strong pseudorandom permutation
Lecture Notes in Computer Science
2015-01-16Paper
Elme: a misuse resistant parallel authenticated encryption
Information Security and Privacy
2014-07-24Paper
On the Security of Hash Functions Employing Blockcipher Postprocessing
Fast Software Encryption
2011-07-07Paper
Speeding up the wide-pipe: secure and fast hashing
Progress in Cryptology - INDOCRYPT 2010
2010-12-07Paper
The Characterization of Luby-Rackoff and Its Optimum Single-Key Variants
Progress in Cryptology - INDOCRYPT 2010
2010-12-07Paper
Security analysis of the mode of JH hash function
Fast Software Encryption
2010-07-13Paper
A unified method for improving PRF bounds for a class of blockcipher based MACs
Fast Software Encryption
2010-07-13Paper
New parallel domain extenders for UOWHF
Lecture Notes in Computer Science
2010-01-05Paper
Indifferentiability characterization of hash functions and optimal bounds of popular domain extensions
Progress in Cryptology - INDOCRYPT 2009
2009-12-17Paper
Improved security analysis for OMAC as a pseudorandom function
Journal of Mathematical Cryptology
2009-10-09Paper
Fast and Secure CBC-Type MAC Algorithms
Fast Software Encryption
2009-08-11Paper
Characterizing Padding Rules of MD Hash Functions Preserving Collision Security
Information Security and Privacy
2009-06-25Paper
Two New Efficient CCA-Secure Online Ciphers: MHCBC and MCBC
Progress in Cryptology - INDOCRYPT 2008
2009-01-22Paper
Multicollision Attacks on Some Generalized Sequential Hash Functions
IEEE Transactions on Information Theory
2008-12-21Paper
Improved security analysis of PMAC
Journal of Mathematical Cryptology
2008-11-07Paper
An Improved Security Bound for HCTR
Fast Software Encryption
2008-09-18Paper
Improved Indifferentiability Security Analysis of chopMD Hash Function
Fast Software Encryption
2008-09-18Paper
Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding
Advances in Cryptology – ASIACRYPT 2006
2008-04-24Paper
A Simple and Unified Method of Proving Indistinguishability
Progress in Cryptology - INDOCRYPT 2006
2008-04-11Paper
RC4-Hash: A New Hash Function Based on RC4
Progress in Cryptology - INDOCRYPT 2006
2008-04-11Paper
Towards Optimal Double-Length Hash Functions
Progress in Cryptology - INDOCRYPT 2005
2008-03-17Paper
Selected Areas in Cryptography
Lecture Notes in Computer Science
2006-10-10Paper
Fast Software Encryption
Lecture Notes in Computer Science
2006-06-22Paper
Information Security and Privacy
Lecture Notes in Computer Science
2005-09-07Paper


Research outcomes over time


This page was built for person: Mridul Nandi