Suivre
Mridul Nandi
Mridul Nandi
Adresse e-mail validée de isical.ac.in - Page d'accueil
Titre
Citée par
Citée par
Année
Indifferentiable security analysis of popular hash functions with prefix-free padding
D Chang, S Lee, M Nandi, M Yung
International Conference on the Theory and Application of Cryptology and …, 2006
752006
Improved indifferentiability security analysis of chopMD hash function
D Chang, M Nandi
International Workshop on Fast Software Encryption, 429-443, 2008
742008
Beetle family of lightweight and secure authenticated encryption ciphers
A Chakraborti, N Datta, M Nandi, K Yasuda
Cryptology ePrint Archive, 2018
692018
Multicollision attacks on some generalized sequential hash functions
M Nandi, DR Stinson
IEEE transactions on Information Theory 53 (2), 759-767, 2007
652007
Blockcipher-based authenticated encryption: how small can we go?
A Chakraborti, T Iwata, K Minematsu, M Nandi
Journal of Cryptology 33 (3), 703-741, 2020
572020
Security analysis of the mode of JH hash function
R Bhattacharyya, A Mandal, M Nandi
International Workshop on Fast Software Encryption, 168-191, 2010
542010
Security analysis of a 2/3-rate double length compression function in the black-box model
M Nandi, W Lee, K Sakurai, S Lee
International Workshop on Fast Software Encryption, 243-254, 2005
492005
RC4-Hash: A new hash function based on RC4
D Chang, KC Gupta, M Nandi
International Conference on Cryptology in India, 80-94, 2006
432006
Gift-cofb
S Banik, A Chakraborti, A Inoue, T Iwata, K Minematsu, M Nandi, T Peyrin, ...
Cryptology ePrint Archive, 2020
412020
Encrypt or decrypt? To make a single-key beyond birthday secure nonce-based MAC
N Datta, A Dutta, M Nandi, K Yasuda
Annual International Cryptology Conference, 631-661, 2018
412018
TriviA: A fast and secure authenticated encryption scheme
A Chakraborti, A Chattopadhyay, M Hassan, M Nandi
International Workshop on Cryptographic Hardware and Embedded Systems, 330-353, 2015
382015
Status report on the first round of the SHA-3 cryptographic hash algorithm competition
A Regenscheid, S Zhang, J Kelsey, M Nandi, S Paul, R Perlner, ...
US Department of Commerce, National Institute of Standards and Technology, 2009
372009
Fast and secure CBC-type MAC algorithms
M Nandi
International Workshop on Fast Software Encryption, 375-393, 2009
362009
An improved security bound for HCTR
D Chakraborty, M Nandi
International Workshop on Fast Software Encryption, 289-302, 2008
362008
COLM v1
E Andreeva, A Bogdanov, N Datta, A Luykx, B Mennink, M Nandi, ...
Submission to the CAESAR Competition, 2016
342016
A simple and unified method of proving indistinguishability
M Nandi
International Conference on Cryptology in India, 317-334, 2006
342006
Double-block hash-then-sum: a paradigm for constructing BBB secure PRF
N Datta, A Dutta, M Nandi, G Paul
IACR Transactions on Symmetric Cryptology, 36-92, 2018
322018
Single key variant of PMAC_Plus
N Datta, A Dutta, M Nandi, G Paul, L Zhang
Cryptology ePrint Archive, 2017
322017
A keyed sponge construction with pseudorandomness in the standard model
D Chang, M Dworkin, S Hong, J Kelsey, M Nandi
The Third SHA-3 Candidate Conference (March 2012) 3, 7, 2012
302012
Speeding up the wide-pipe: Secure and fast hashing
M Nandi, S Paul
International Conference on Cryptology in India, 144-162, 2010
302010
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20