Volgen
Mridul Nandi
Mridul Nandi
Geverifieerd e-mailadres voor isical.ac.in - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Beetle family of lightweight and secure authenticated encryption ciphers
A Chakraborti, N Datta, M Nandi, K Yasuda
Cryptology ePrint Archive, 2018
1072018
Gift-cofb
S Banik, A Chakraborti, A Inoue, T Iwata, K Minematsu, M Nandi, T Peyrin, ...
Cryptology ePrint Archive, 2020
972020
Improved indifferentiability security analysis of chopMD hash function
D Chang, M Nandi
Fast Software Encryption: 15th International Workshop, FSE 2008, Lausanne …, 2008
822008
Indifferentiable security analysis of popular hash functions with prefix-free padding
D Chang, S Lee, M Nandi, M Yung
Advances in Cryptology–ASIACRYPT 2006: 12th International Conference on the …, 2006
762006
Blockcipher-based authenticated encryption: how small can we go?
A Chakraborti, T Iwata, K Minematsu, M Nandi
International Conference on Cryptographic Hardware and Embedded Systems, 277-298, 2017
672017
PHOTON-beetle authenticated encryption and hash family
Z Bao, A Chakraborti, N Datta, J Guo, M Nandi, T Peyrin, K Yasuda
NIST Lightweight Compet. Round 1, 115, 2019
662019
Multicollision attacks on some generalized sequential hash functions
M Nandi, DR Stinson
IEEE transactions on Information Theory 53 (2), 759-767, 2007
662007
Security analysis of the mode of JH hash function
R Bhattacharyya, A Mandal, M Nandi
Fast Software Encryption: 17th International Workshop, FSE 2010, Seoul …, 2010
592010
Double-block hash-then-sum: a paradigm for constructing BBB secure PRF
N Datta, A Dutta, M Nandi, G Paul
IACR Transactions on Symmetric Cryptology, 36-92, 2018
522018
Security analysis of a 2/3-rate double length compression function in the black-box model
M Nandi, W Lee, K Sakurai, S Lee
Fast Software Encryption: 12th International Workshop, FSE 2005, Paris …, 2005
522005
Encrypt or decrypt? to make a single-key beyond birthday secure nonce-based MAC
N Datta, A Dutta, M Nandi, K Yasuda
Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018
492018
COLM v1
E Andreeva, A Bogdanov, N Datta, A Luykx, B Mennink, M Nandi, ...
Submission to the CAESAR Competition, 2016
452016
Beyond birthday bound secure MAC in faulty nonce model
A Dutta, M Nandi, S Talnikar
Annual International Conference on the Theory and Applications of …, 2019
442019
Single key variant of PMAC_Plus
N Datta, A Dutta, M Nandi, G Paul, L Zhang
Cryptology ePrint Archive, 2017
442017
Fast and secure CBC-type MAC algorithms
M Nandi
International Workshop on Fast Software Encryption, 375-393, 2009
442009
RC4-Hash: A new hash function based on RC4
D Chang, KC Gupta, M Nandi
Progress in Cryptology-INDOCRYPT 2006: 7th International Conference on …, 2006
432006
GIFT-COFB v1. 0
S Banik, A Chakraborti, T Iwata, K Minematsu, M Nandi, T Peyrin, ...
Submission to the NIST Lightweight Cryptography project, 2019
422019
A short proof of the PRP/PRF switching lemma
D Chang, M Nandi
Cryptology ePrint Archive, 2008
422008
Status report on the first round of the SHA-3 cryptographic hash algorithm competition
A Regenscheid, S Zhang, J Kelsey, M Nandi, S Paul, R Perlner, ...
US Department of Commerce, National Institute of Standards and Technology, 2009
412009
An improved security bound for HCTR
D Chakraborty, M Nandi
Fast Software Encryption: 15th International Workshop, FSE 2008, Lausanne …, 2008
412008
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20