Mridul Nandi
Mridul Nandi
Geverifieerd e-mailadres voor isical.ac.in - Homepage
Geciteerd door
Geciteerd door
Beetle family of lightweight and secure authenticated encryption ciphers
A Chakraborti, N Datta, M Nandi, K Yasuda
Cryptology ePrint Archive, 2018
Improved indifferentiability security analysis of chopMD hash function
D Chang, M Nandi
Fast Software Encryption: 15th International Workshop, FSE 2008, Lausanne …, 2008
Blockcipher-based authenticated encryption: how small can we go?
A Chakraborti, T Iwata, K Minematsu, M Nandi
Journal of Cryptology 33 (3), 703-741, 2020
S Banik, A Chakraborti, A Inoue, T Iwata, K Minematsu, M Nandi, T Peyrin, ...
Cryptology ePrint Archive, 2020
Indifferentiable security analysis of popular hash functions with prefix-free padding
D Chang, S Lee, M Nandi, M Yung
Advances in Cryptology–ASIACRYPT 2006: 12th International Conference on the …, 2006
Multicollision attacks on some generalized sequential hash functions
M Nandi, DR Stinson
IEEE transactions on Information Theory 53 (2), 759-767, 2007
PHOTON-beetle authenticated encryption and hash family
Z Bao, A Chakraborti, N Datta, J Guo, M Nandi, T Peyrin, K Yasuda
NIST Lightweight Compet. Round 1, 115, 2019
Security analysis of the mode of JH hash function
R Bhattacharyya, A Mandal, M Nandi
Fast Software Encryption: 17th International Workshop, FSE 2010, Seoul …, 2010
Security analysis of a 2/3-rate double length compression function in the black-box model
M Nandi, W Lee, K Sakurai, S Lee
Fast Software Encryption: 12th International Workshop, FSE 2005, Paris …, 2005
Encrypt or decrypt? To make a single-key beyond birthday secure nonce-based MAC
N Datta, A Dutta, M Nandi, K Yasuda
Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018
Double-block hash-then-sum: a paradigm for constructing BBB secure PRF
N Datta, A Dutta, M Nandi, G Paul
IACR Transactions on Symmetric Cryptology, 36-92, 2018
E Andreeva, A Bogdanov, N Datta, A Luykx, B Mennink, M Nandi, ...
Submission to the CAESAR Competition, 2016
RC4-Hash: A new hash function based on RC4
D Chang, KC Gupta, M Nandi
Progress in Cryptology-INDOCRYPT 2006: 7th International Conference on …, 2006
Single key variant of PMAC_Plus
N Datta, A Dutta, M Nandi, G Paul, L Zhang
Cryptology ePrint Archive, 2017
A short proof of the PRP/PRF switching lemma
D Chang, M Nandi
Cryptology ePrint Archive, 2008
TriviA: A fast and secure authenticated encryption scheme
A Chakraborti, A Chattopadhyay, M Hassan, M Nandi
International Workshop on Cryptographic Hardware and Embedded Systems, 330-353, 2015
Status report on the first round of the SHA-3 cryptographic hash algorithm competition
A Regenscheid, S Zhang, J Kelsey, M Nandi, S Paul, R Perlner, ...
US Department of Commerce, National Institute of Standards and Technology, 2009
Beyond birthday bound secure MAC in faulty nonce model
A Dutta, M Nandi, S Talnikar
Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019
Fast and secure CBC-type MAC algorithms
M Nandi
Fast Software Encryption: 16th International Workshop, FSE 2009 Leuven …, 2009
An improved security bound for HCTR
D Chakraborty, M Nandi
Fast Software Encryption: 15th International Workshop, FSE 2008, Lausanne …, 2008
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20