Obserwuj
Mridul Nandi
Mridul Nandi
Zweryfikowany adres z isical.ac.in - Strona główna
Tytuł
Cytowane przez
Cytowane przez
Rok
Beetle family of lightweight and secure authenticated encryption ciphers
A Chakraborti, N Datta, M Nandi, K Yasuda
Cryptology ePrint Archive, 2018
1182018
Gift-cofb
S Banik, A Chakraborti, A Inoue, T Iwata, K Minematsu, M Nandi, T Peyrin, ...
Cryptology ePrint Archive, 2020
1022020
Blockcipher-based authenticated encryption: how small can we go?
A Chakraborti, T Iwata, K Minematsu, M Nandi
Journal of Cryptology 33 (3), 703-741, 2020
922020
Improved indifferentiability security analysis of chopMD hash function
D Chang, M Nandi
Fast Software Encryption: 15th International Workshop, FSE 2008, Lausanne …, 2008
812008
Indifferentiable security analysis of popular hash functions with prefix-free padding
D Chang, S Lee, M Nandi, M Yung
International Conference on the Theory and Application of Cryptology and …, 2006
772006
PHOTON-beetle authenticated encryption and hash family
Z Bao, A Chakraborti, N Datta, J Guo, M Nandi, T Peyrin, K Yasuda
NIST Lightweight Compet. Round 1, 115, 2019
762019
Multicollision attacks on some generalized sequential hash functions
M Nandi, DR Stinson
IEEE transactions on Information Theory 53 (2), 759-767, 2007
702007
Security analysis of the mode of JH hash function
R Bhattacharyya, A Mandal, M Nandi
Fast Software Encryption: 17th International Workshop, FSE 2010, Seoul …, 2010
592010
Double-block hash-then-sum: a paradigm for constructing BBB secure PRF
N Datta, A Dutta, M Nandi, G Paul
IACR Transactions on Symmetric Cryptology, 36-92, 2018
542018
Security analysis of a 2/3-rate double length compression function in the black-box model
M Nandi, W Lee, K Sakurai, S Lee
International Workshop on Fast Software Encryption, 243-254, 2005
532005
Encrypt or decrypt? to make a single-key beyond birthday secure nonce-based MAC
N Datta, A Dutta, M Nandi, K Yasuda
Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018
512018
Beyond birthday bound secure MAC in faulty nonce model
A Dutta, M Nandi, S Talnikar
Annual International Conference on the Theory and Applications of …, 2019
492019
GIFT-COFB v1. 0
S Banik, A Chakraborti, T Iwata, K Minematsu, M Nandi, T Peyrin, ...
Submission to the NIST Lightweight Cryptography project, 2019
472019
Single key variant of PMAC_Plus
N Datta, A Dutta, M Nandi, G Paul, L Zhang
Cryptology ePrint Archive, 2017
472017
COLM v1
E Andreeva, A Bogdanov, N Datta, A Luykx, B Mennink, M Nandi, ...
Submission to the CAESAR Competition, 2016
462016
Fast and secure CBC-type MAC algorithms
M Nandi
International Workshop on Fast Software Encryption, 375-393, 2009
452009
RC4-Hash: A new hash function based on RC4
D Chang, KC Gupta, M Nandi
International Conference on Cryptology in India, 80-94, 2006
452006
A short proof of the PRP/PRF switching lemma
D Chang, M Nandi
Cryptology ePrint Archive, 2008
432008
Status report on the first round of the SHA-3 cryptographic hash algorithm competition
A Regenscheid, S Zhang, J Kelsey, M Nandi, S Paul, R Perlner, ...
US Department of Commerce, National Institute of Standards and Technology, 2009
422009
An improved security bound for HCTR
D Chakraborty, M Nandi
Fast Software Encryption: 15th International Workshop, FSE 2008, Lausanne …, 2008
412008
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20