default search action
Mridul Nandi
Person information
- affiliation: Indian Statistical Institute, Kolkata, India
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j58]Debasmita Chakraborty, Mridul Nandi:
Lower Bound on Number of Compression Calls of a Collision-Resistance Preserving Hash. IACR Commun. Cryptol. 1(3): 22 (2024) - [j57]Arghya Bhattacharjee, Ritam Bhaumik, Avijit Dutta, Mridul Nandi, Anik Raychaudhuri:
BBB security for 5-round even-Mansour-based key-alternating Feistel ciphers. Des. Codes Cryptogr. 92(1): 13-49 (2024) - [j56]Elena Andreeva, Andrey Bogdanov, Nilanjan Datta, Atul Luykx, Bart Mennink, Mridul Nandi, Elmar Tischhauser, Kan Yasuda:
The COLM Authenticated Encryption Scheme. J. Cryptol. 37(2): 15 (2024) - [c73]Bishwajit Chakraborty, Chandranan Dhar, Mridul Nandi:
Tight Multi-user Security of Ascon and Its Large Key Extension. ACISP (1) 2024: 57-76 - [c72]Mridul Nandi, N. V. Vinodchandran, Arijit Ghosh, Kuldeep S. Meel, Soumit Pal, Sourav Chakraborty:
Improved Streaming Algorithm for the Klee's Measure Problem and Generalizations. APPROX/RANDOM 2024: 26:1-26:21 - [c71]Ashwin Jha, Mustafa Khairallah, Mridul Nandi, Abishanka Saha:
Tight Security of TNT and Beyond - Attacks, Proofs and Possibilities for the Cascaded LRW Paradigm. EUROCRYPT (1) 2024: 249-279 - [c70]Ritam Bhaumik, Mridul Nandi, Sayantan Paul, Abishanka Saha:
Indifferentiability of 3-Round Confusion-Diffusion Networks. SCN (2) 2024: 140-161 - [i100]Bishwajit Chakraborty, Chandranan Dhar, Mridul Nandi:
Tight Multi-user Security of Ascon and Its Large Key Extension. IACR Cryptol. ePrint Arch. 2024: 579 (2024) - [i99]Debasmita Chakraborty, Mridul Nandi:
Lower Bound on Number of Compression Calls of a Collision-Resistance Preserving Hash. IACR Cryptol. ePrint Arch. 2024: 1095 (2024) - [i98]Benoît Cogliati, Jordan Ethan, Ashwin Jha, Mridul Nandi, Abishanka Saha:
On the Number of Restricted Solutions to Constrained Systems and their Applications. IACR Cryptol. ePrint Arch. 2024: 1163 (2024) - [i97]Arghya Bhattacharjee, Ritam Bhaumik, Daniel Collins, Mridul Nandi:
Provably Secure Online Authenticated Encryption and Bidirectional Online Channels. IACR Cryptol. ePrint Arch. 2024: 1346 (2024) - 2023
- [j55]Rishiraj Bhattacharyya, Mridul Nandi, Anik Raychaudhuri:
Subversion Resilient Hashing: Efficient Constructions and Modular Proofs for Crooked Indifferentiability. IEEE Trans. Inf. Theory 69(5): 3302-3315 (2023) - [j54]Nilanjan Datta, Avijit Dutta, Mridul Nandi, Suprita Talnikar:
Tight Multi-User Security Bound of DbHtS. IACR Trans. Symmetric Cryptol. 2023(1): 192-223 (2023) - [j53]Niranjan Balachandran, Ashwin Jha, Mridul Nandi, Soumit Pal:
Revisiting Randomness Extraction and Key Derivation Using the CBC and Cascade Modes. IACR Trans. Symmetric Cryptol. 2023(4): 391-419 (2023) - [c69]Bishwajit Chakraborty, Chandranan Dhar, Mridul Nandi:
Exact Security Analysis of ASCON. ASIACRYPT (3) 2023: 346-369 - [c68]Mridul Nandi, Sayantan Paul, Abishanka Saha:
Indifferentiability of the Confusion-Diffusion Network and the Cascade Block Cipher. C2SI 2023: 178-195 - [c67]Benoît Cogliati, Avijit Dutta, Mridul Nandi, Jacques Patarin, Abishanka Saha:
Proof of Mirror Theory for a Wide Range of $\xi _{\max }$. EUROCRYPT (4) 2023: 470-501 - [c66]Bishwajit Chakraborty, Nilanjan Datta, Mridul Nandi:
Designing Full-Rate Sponge Based AEAD Modes. INDOCRYPT (1) 2023: 89-110 - [i96]Mridul Nandi, Soumit Paul:
Analysis of Knuth's Sampling Algorithm D and D'. CoRR abs/2306.05243 (2023) - [i95]Bishwajit Chakraborty, Chandranan Dhar, Mridul Nandi:
Exact Security Analysis of ASCON. IACR Cryptol. ePrint Arch. 2023: 775 (2023) - [i94]Ashwin Jha, Mridul Nandi, Abishanka Saha:
Tight Security of TNT: Reinforcing Khairallah's Birthday-bound Attack. IACR Cryptol. ePrint Arch. 2023: 1233 (2023) - [i93]Ashwin Jha, Mustafa Khairallah, Mridul Nandi, Abishanka Saha:
Tight Security of TNT and Beyond: Attacks, Proofs and Possibilities for the Cascaded LRW Paradigm. IACR Cryptol. ePrint Arch. 2023: 1272 (2023) - [i92]Bishwajit Chakraborty, Nilanjan Datta, Mridul Nandi:
Designing Full-Rate Sponge based AEAD modes. IACR Cryptol. ePrint Arch. 2023: 1673 (2023) - 2022
- [j52]Mridul Nandi, Tapas Pandit:
Efficient fully CCA-secure predicate encryptions from pair encodings. Adv. Math. Commun. 16(1): 37-72 (2022) - [j51]Yu Long Chen, Avijit Dutta, Mridul Nandi:
Multi-user BBB security of public permutations based MAC. Cryptogr. Commun. 14(5): 1145-1177 (2022) - [j50]Arghya Bhattacharjee, Avijit Dutta, Eik List, Mridul Nandi:
CENCPP*: beyond-birthday-secure encryption from public permutations. Des. Codes Cryptogr. 90(6): 1381-1425 (2022) - [j49]Ashwin Jha, Mridul Nandi:
A Survey on Applications of H-Technique: Revisiting Security Analysis of PRP and PRF. Entropy 24(4): 462 (2022) - [j48]Bishwajit Chakraborty, Mridul Nandi:
The mF mode of authenticated encryption with associated data. J. Math. Cryptol. 16(1): 73-97 (2022) - [j47]Avijit Dutta, Mridul Nandi, Abishanka Saha:
Proof of Mirror Theory for ξmax = 2. IEEE Trans. Inf. Theory 68(9): 6218-6232 (2022) - [c65]Soumya Chattopadhyay, Ashwin Jha, Mridul Nandi:
Towards Tight Security Bounds for OMAC, XCBC and TMAC. ASIACRYPT (1) 2022: 348-378 - [c64]Chandranan Dhar, Yevgeniy Dodis, Mridul Nandi:
Revisiting Collision and Local Opening Analysis of ABR Hash. ITC 2022: 11:1-11:22 - [c63]Arghya Bhattacharjee, Ritam Bhaumik, Mridul Nandi:
Offset-Based BBB-Secure Tweakable Block-ciphers with Updatable Caches. INDOCRYPT 2022: 171-194 - [c62]Arghya Bhattacharjee, Avik Chakraborti, Nilanjan Datta, Cuauhtemoc Mancillas-López, Mridul Nandi:
sf ISAP+: sf ISAP with Fast Authentication. INDOCRYPT 2022: 195-219 - [c61]Arghya Bhattacharjee, Ritam Bhaumik, Mridul Nandi:
A Sponge-Based PRF with Good Multi-user Security. SAC 2022: 459-478 - [c60]Anubhab Baksi, Arghya Bhattacharjee, Jakub Breier, Takanori Isobe, Mridul Nandi:
Big Brother Is Watching You: A Closer Look at Backdoor Construction. SPACE 2022: 81-96 - [i91]Yu Long Chen, Avijit Dutta, Mridul Nandi:
Multi-User BBB Security of Public Permutations Based MAC. IACR Cryptol. ePrint Arch. 2022: 304 (2022) - [i90]Benoît Cogliati, Avijit Dutta, Mridul Nandi, Jacques Patarin, Abishanka Saha:
Proof of Mirror Theory for any $\xi_{\max}$. IACR Cryptol. ePrint Arch. 2022: 686 (2022) - [i89]Nilanjan Datta, Avijit Dutta, Mridul Nandi, Suprita Talnikar:
Tight Multi-User Security Bound of sfDbHtS. IACR Cryptol. ePrint Arch. 2022: 689 (2022) - [i88]Avijit Dutta, Mridul Nandi, Suprita Talnikar:
Tight Security Analysis of the Public Permutation-Based PMAC_Plus. IACR Cryptol. ePrint Arch. 2022: 905 (2022) - [i87]Anubhab Baksi, Arghya Bhattacharjee, Jakub Breier, Takanori Isobe, Mridul Nandi:
Big Brother Is Watching You: A Closer Look At Backdoor Construction. IACR Cryptol. ePrint Arch. 2022: 953 (2022) - [i86]Arghya Bhattacharjee, Ritam Bhaumik, Mridul Nandi:
A Sponge-Based PRF with Good Multi-user Security. IACR Cryptol. ePrint Arch. 2022: 1146 (2022) - [i85]Soumya Chattopadhyay, Ashwin Jha, Mridul Nandi:
Towards Tight Security Bounds for OMAC, XCBC and TMAC. IACR Cryptol. ePrint Arch. 2022: 1234 (2022) - [i84]Arghya Bhattacharjee, Avik Chakraborti, Nilanjan Datta, Cuauhtemoc Mancillas-López, Mridul Nandi:
ISAP+: ISAP with Fast Authentication. IACR Cryptol. ePrint Arch. 2022: 1591 (2022) - [i83]Arghya Bhattacharjee, Ritam Bhaumik, Mridul Nandi:
Offset-Based BBB-Secure Tweakable Block-ciphers with Updatable Caches. IACR Cryptol. ePrint Arch. 2022: 1776 (2022) - 2021
- [j46]Ritam Bhaumik, Mridul Nandi, Anik Raychaudhuri:
Improved indifferentiability security proof for 3-round tweakable Luby-Rackoff. Des. Codes Cryptogr. 89(10): 2255-2281 (2021) - [j45]Arghya Bhattacharjee, Cuauhtemoc Mancillas López, Eik List, Mridul Nandi:
The Oribatida v1.3 Family of Lightweight Authenticated Encryption Schemes. J. Math. Cryptol. 15(1): 305-344 (2021) - [j44]Avijit Dutta, Mridul Nandi, Suprita Talnikar:
Permutation Based EDM: An Inverse Free BBB Secure PRF. IACR Trans. Symmetric Cryptol. 2021(2): 31-70 (2021) - [j43]Bishwajit Chakraborty, Soumya Chattopadhyay, Ashwin Jha, Mridul Nandi:
On Length Independent Security Bounds for the PMAC Family. IACR Trans. Symmetric Cryptol. 2021(2): 423-445 (2021) - [c59]Srimanta Bhattacharya, Mridul Nandi:
Luby-Rackoff Backwards with More Users and More Security. ASIACRYPT (3) 2021: 345-375 - [c58]Soumya Chattopadhyay, Ashwin Jha, Mridul Nandi:
Fine-Tuning the ISO/IEC Standard LightMAC. ASIACRYPT (3) 2021: 490-519 - [c57]Yevgeniy Dodis, Dmitry Khovratovich, Nicky Mouha, Mridul Nandi:
T₅: Hashing Five Inputs with Three Compression Calls. ITC 2021: 24:1-24:23 - [c56]Shay Gueron, Ashwin Jha, Mridul Nandi:
Revisiting the Security of COMET Authenticated Encryption Scheme. INDOCRYPT 2021: 3-25 - [c55]Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas-López, Mridul Nandi:
tHyENA: Making HyENA Even Smaller. INDOCRYPT 2021: 26-48 - [c54]Rishiraj Bhattacharyya, Mridul Nandi, Anik Raychaudhuri:
Crooked Indifferentiability of Enveloped XOR Revisited. INDOCRYPT 2021: 73-92 - [c53]Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas-López, Mridul Nandi, Yu Sasaki:
Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher. INDOCRYPT 2021: 114-137 - [c52]Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas-López, Mridul Nandi:
Light-OCB: Parallel Lightweight Authenticated Cipher with Full Security. SPACE 2021: 22-41 - [i82]Rishiraj Bhattacharyya, Mridul Nandi, Anik Raychaudhuri:
Crooked Indifferentiability Revisited. CoRR abs/2101.04888 (2021) - [i81]Mridul Nandi:
A New and Improved Reduction Proof of Cascade PRF. IACR Cryptol. ePrint Arch. 2021: 97 (2021) - [i80]Yevgeniy Dodis, Dmitry Khovratovich, Nicky Mouha, Mridul Nandi:
T5: Hashing Five Inputs with Three Compression Calls. IACR Cryptol. ePrint Arch. 2021: 373 (2021) - [i79]Avijit Dutta, Mridul Nandi, Suprita Talnikar:
Permutation Based EDM: An Inverse Free BBB Secure PRF. IACR Cryptol. ePrint Arch. 2021: 679 (2021) - [i78]Soumya Chattopadhyay, Ashwin Jha, Mridul Nandi:
Fine-tuning the ISO/IEC Standard LightMAC. IACR Cryptol. ePrint Arch. 2021: 1166 (2021) - [i77]Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas López, Mridul Nandi:
Light-OCB: Parallel Lightweight Authenticated Cipher with Full Security. IACR Cryptol. ePrint Arch. 2021: 1535 (2021) - [i76]Shay Gueron, Ashwin Jha, Mridul Nandi:
Revisiting the Security of COMET Authenticated Encryption Scheme. IACR Cryptol. ePrint Arch. 2021: 1541 (2021) - 2020
- [j42]Mridul Nandi, Tapas Pandit:
Delegation-based conversion from CPA to CCA-secure predicate encryption. Int. J. Appl. Cryptogr. 4(1): 16-35 (2020) - [j41]Avik Chakraborti, Tetsu Iwata, Kazuhiko Minematsu, Mridul Nandi:
Blockcipher-Based Authenticated Encryption: How Small Can We Go? J. Cryptol. 33(3): 703-741 (2020) - [j40]Ashwin Jha, Mridul Nandi:
Tight Security of Cascaded LRW2. J. Cryptol. 33(3): 1272-1317 (2020) - [j39]Avik Chakraborti, Mridul Nandi, Suprita Talnikar, Kan Yasuda:
On the Composition of Single-Keyed Tweakable Even-Mansour for Achieving BBB Security. IACR Trans. Symmetric Cryptol. 2020(2): 1-39 (2020) - [j38]Bishwajit Chakraborty, Ashwin Jha, Mridul Nandi:
On the Security of Sponge-type Authenticated Encryption Modes. IACR Trans. Symmetric Cryptol. 2020(2): 93-119 (2020) - [j37]Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas-López, Mridul Nandi, Yu Sasaki:
ESTATE: A Lightweight and Low Energy Authenticated Encryption Mode. IACR Trans. Symmetric Cryptol. 2020(S1): 350-389 (2020) - [j36]Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Snehal Mitragotri, Mridul Nandi:
From Combined to Hybrid: Making Feedback-based AE even Smaller. IACR Trans. Symmetric Cryptol. 2020(S1): 417-445 (2020) - [c51]Avijit Dutta, Mridul Nandi:
BBB Secure Nonce Based MAC Using Public Permutations. AFRICACRYPT 2020: 172-191 - [c50]Benoît Cogliati, Ashwin Jha, Mridul Nandi:
How to Build Optimally Secure PRFs Using Block Ciphers. ASIACRYPT (1) 2020: 754-784 - [c49]Mridul Nandi:
Mind the Composition: Birthday Bound Attacks on EWCDMD and SoKAC21. EUROCRYPT (1) 2020: 203-220 - [i75]Mridul Nandi:
Mind the Composition: Birthday Bound Attacks on EWCDMD and SoKAC21. IACR Cryptol. ePrint Arch. 2020: 236 (2020) - [i74]Avijit Dutta, Mridul Nandi:
BBB Secure Nonce Based MAC Using Public Permutations. IACR Cryptol. ePrint Arch. 2020: 509 (2020) - [i73]Arghya Bhattacharjee, Avijit Dutta, Eik List, Mridul Nandi:
CENCPP - Beyond-birthday-secure Encryption from Public Permutations. IACR Cryptol. ePrint Arch. 2020: 602 (2020) - [i72]Bishwajit Chakraborty, Soumya Chattopadhyay, Ashwin Jha, Mridul Nandi:
On Length Independent Security Bounds for the PMAC Family. IACR Cryptol. ePrint Arch. 2020: 656 (2020) - [i71]Avijit Dutta, Mridul Nandi, Abishanka Saha:
Proof of Mirror Theory for $\xi_{\max}=2$. IACR Cryptol. ePrint Arch. 2020: 669 (2020) - [i70]Subhadeep Banik, Avik Chakraborti, Tetsu Iwata, Kazuhiko Minematsu, Mridul Nandi, Thomas Peyrin, Yu Sasaki, Siang Meng Sim, Yosuke Todo:
GIFT-COFB. IACR Cryptol. ePrint Arch. 2020: 738 (2020) - [i69]Benoît Cogliati, Ashwin Jha, Mridul Nandi:
How to Build Optimally Secure PRFs Using Block Ciphers. IACR Cryptol. ePrint Arch. 2020: 1097 (2020)
2010 – 2019
- 2019
- [j35]Nilanjan Datta, Avijit Dutta, Mridul Nandi, Kan Yasuda:
sfDWCDM+: A BBB secure nonce based MAC. Adv. Math. Commun. 13(4): 705-732 (2019) - [j34]Mridul Nandi, Tapas Pandit:
Predicate signatures from pair encodings via dual system proof technique. J. Math. Cryptol. 13(3-4): 197-228 (2019) - [j33]Ashwin Jha, Cuauhtemoc Mancillas-López, Mridul Nandi, Sourav Sen Gupta:
On Random Read Access in OCB. IEEE Trans. Inf. Theory 65(12): 8325-8344 (2019) - [j32]Tony Grochow, Eik List, Mridul Nandi:
DoveMAC: A TBC-based PRF with Smaller State, Full Security, and High Rate. IACR Trans. Symmetric Cryptol. 2019(3): 43-80 (2019) - [j31]Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas-López, Mridul Nandi, Yu Sasaki:
INT-RUP Secure Lightweight Parallel AE Modes. IACR Trans. Symmetric Cryptol. 2019(4): 81-118 (2019) - [j30]Donghoon Chang, Nilanjan Datta, Avijit Dutta, Bart Mennink, Mridul Nandi, Somitra Sanadhya, Ferdinand Sibleyras:
Release of Unverified Plaintext: Tight Unified Model and Application to ANYDAE. IACR Trans. Symmetric Cryptol. 2019(4): 119-146 (2019) - [c48]Avijit Dutta, Mridul Nandi, Suprita Talnikar:
Beyond Birthday Bound Secure MAC in Faulty Nonce Model. EUROCRYPT (1) 2019: 437-466 - [e2]Shivam Bhasin, Avi Mendelson, Mridul Nandi:
Security, Privacy, and Applied Cryptography Engineering - 9th International Conference, SPACE 2019, Gandhinagar, India, December 3-7, 2019, Proceedings. Lecture Notes in Computer Science 11947, Springer 2019, ISBN 978-3-030-35868-6 [contents] - [i68]Avijit Dutta, Mridul Nandi, Suprita Talnikar:
Beyond Birthday Bound Secure MAC in Faulty Nonce Model. IACR Cryptol. ePrint Arch. 2019: 127 (2019) - [i67]Srimanta Bhattacharya, Mridul Nandi:
Revisiting Variable Output Length XOR Pseudorandom Function. IACR Cryptol. ePrint Arch. 2019: 249 (2019) - [i66]Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas López, Mridul Nandi, Yu Sasaki:
Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher. IACR Cryptol. ePrint Arch. 2019: 440 (2019) - [i65]Srimanta Bhattacharya, Mridul Nandi:
A Note on the Chi-square Method : A Tool for Proving Cryptographic Security. IACR Cryptol. ePrint Arch. 2019: 1157 (2019) - [i64]Avijit Dutta, Mridul Nandi:
Tweakable HCTR: A BBB Secure Tweakable Enciphering Scheme. IACR Cryptol. ePrint Arch. 2019: 1324 (2019) - [i63]Donghoon Chang, Nilanjan Datta, Avijit Dutta, Bart Mennink, Mridul Nandi, Somitra Sanadhya, Ferdinand Sibleyras:
Release of Unverified Plaintext: Tight Unified Model and Application to ANYDAE. IACR Cryptol. ePrint Arch. 2019: 1326 (2019) - [i62]Bishwajit Chakraborty, Ashwin Jha, Mridul Nandi:
On the Security of Sponge-type Authenticated Encryption Modes. IACR Cryptol. ePrint Arch. 2019: 1475 (2019) - [i61]Ashwin Jha, Mridul Nandi:
Tight Security of Cascaded LRW2. IACR Cryptol. ePrint Arch. 2019: 1495 (2019) - 2018
- [j29]Mridul Nandi, Tapas Pandit:
Verifiability-based conversion from CPA to CCA-secure predicate encryption. Appl. Algebra Eng. Commun. Comput. 29(1): 77-102 (2018) - [j28]Ashwin Jha, Mridul Nandi:
On rate-1 and beyond-the-birthday bound secure online ciphers using tweakable block ciphers. Cryptogr. Commun. 10(5): 731-753 (2018) - [j27]Srimanta Bhattacharya, Mridul Nandi:
A note on the chi-square method: A tool for proving cryptographic security. Cryptogr. Commun. 10(5): 935-957 (2018) - [j26]Avik Chakraborti, Anupam Chattopadhyay, Muhammad Hassan, Mridul Nandi:
TriviA and uTriviA: two fast and secure authenticated encryption schemes. J. Cryptogr. Eng. 8(1): 29-48 (2018) - [j25]Avik Chakraborti, Nilanjan Datta, Mridul Nandi:
On the optimality of non-linear computations for symmetric key primitives. J. Math. Cryptol. 12(4): 241-259 (2018) - [j24]Avik Chakraborti, Nilanjan Datta, Mridul Nandi, Kan Yasuda:
Beetle Family of Lightweight and Secure Authenticated Encryption Ciphers. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(2): 218-241 (2018) - [j23]Srimanta Bhattacharya, Mridul Nandi:
Revisiting Variable Output Length XOR Pseudorandom Function. IACR Trans. Symmetric Cryptol. 2018(1): 314-335 (2018) - [j22]Nilanjan Datta, Avijit Dutta, Mridul Nandi, Goutam Paul:
Double-block Hash-then-Sum: A Paradigm for Constructing BBB Secure PRF. IACR Trans. Symmetric Cryptol. 2018(3): 36-92 (2018) - [c47]Yu Long Chen, Bart Mennink, Mridul Nandi:
Short Variable Length Domain Extenders with Beyond Birthday Bound Security. ASIACRYPT (1) 2018: 244-274 - [c46]Ritam Bhaumik, Eik List, Mridul Nandi:
ZCZ - Achieving n-bit SPRP Security with a Minimal Number of Tweakable-Block-Cipher Calls. ASIACRYPT (1) 2018: 336-366 - [c45]Mridul Nandi:
Bernstein Bound on WCS is Tight - Repairing Luykx-Preneel Optimal Forgeries. CRYPTO (2) 2018: 213-238 - [c44]Gaëtan Leurent, Mridul Nandi, Ferdinand Sibleyras:
Generic Attacks Against Beyond-Birthday-Bound MACs. CRYPTO (1) 2018: 306-336 - [c43]Nilanjan Datta, Avijit Dutta, Mridul Nandi, Kan Yasuda:
Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based MAC. CRYPTO (1) 2018: 631-661 - [c42]Srimanta Bhattacharya, Mridul Nandi:
Full Indifferentiable Security of the Xor of Two or More Random Permutations Using the \chi ^2 Method. EUROCRYPT (1) 2018: 387-412 - [c41]Avijit Dutta, Mridul Nandi:
Tweakable HCTR: A BBB Secure Tweakable Enciphering Scheme. INDOCRYPT 2018: 47-69 - [i60]Srimanta Bhattacharya, Mridul Nandi:
Full Indifferentiable Security of the Xor of Two or More Random Permutations Using the χ2 Method. IACR Cryptol. ePrint Arch. 2018: 169 (2018) - [i59]Nilanjan Datta, Avijit Dutta, Mridul Nandi, Kan Yasuda:
Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based MAC. IACR Cryptol. ePrint Arch. 2018: 500 (2018) - [i58]Mridul Nandi:
Bernstein Bound on WCS is Tight - Repairing Luykx-Preneel Optimal Forgeries. IACR Cryptol. ePrint Arch. 2018: 520 (2018) - [i57]Gaëtan Leurent, Mridul Nandi, Ferdinand Sibleyras:
Generic Attacks against Beyond-Birthday-Bound MACs. IACR Cryptol. ePrint Arch. 2018: 541 (2018) - [i56]Yu Long Chen, Bart Mennink, Mridul Nandi:
Short Variable Length Domain Extenders With Beyond Birthday Bound Security. IACR Cryptol. ePrint Arch. 2018: 783 (2018) - [i55]Nilanjan Datta, Avijit Dutta, Mridul Nandi, Goutam Paul:
Double-block Hash-then-Sum: A Paradigm for Constructing BBB Secure PRF. IACR Cryptol. ePrint Arch. 2018: 804 (2018) - [i54]Avik Chakraborti, Nilanjan Datta, Mridul Nandi, Kan Yasuda:
Beetle Family of Lightweight and Secure Authenticated Encryption Ciphers. IACR Cryptol. ePrint Arch. 2018: 805 (2018) - [i53]Ritam Bhaumik, Eik List, Mridul Nandi:
ZCZ - Achieving n-bit SPRP Security with a Minimal Number of Tweakable-block-cipher Calls. IACR Cryptol. ePrint Arch. 2018: 819 (2018) - [i52]Ashwin Jha, Mridul Nandi:
Applications of H-Technique: Revisiting Symmetric Key Security Analysis. IACR Cryptol. ePrint Arch. 2018: 1130 (2018) - 2017
- [j21]Shoni Gilboa, Shay Gueron, Mridul Nandi:
Balanced Permutations Even-Mansour Ciphers. Cryptogr. 1(1): 2 (2017) - [j20]Debapriya Basu Roy, Avik Chakraborti, Donghoon Chang, S. V. Dilip Kumar, Debdeep Mukhopadhyay, Mridul Nandi:
Two Efficient Fault-Based Attacks on CLOC and SILC. J. Hardw. Syst. Secur. 1(3): 252-268 (2017) - [j19]Avijit Dutta, Ashwin Jha, Mridul Nandi:
A New Look at Counters: Don't Run Like Marathon in a Hundred Meter Race. IEEE Trans. Computers 66(11): 1851-1864 (2017) - [j18]Ashwin Jha, Avradip Mandal, Mridul Nandi:
On The Exact Security of Message Authentication Using Pseudorandom Functions. IACR Trans. Symmetric Cryptol. 2017(1): 427-448 (2017) - [j17]Elena Andreeva, Guy Barwell, Ritam Bhaumik, Mridul Nandi, Dan Page, Martijn Stam:
Turning Online Ciphers Off. IACR Trans. Symmetric Cryptol. 2017(2): 105-142 (2017) - [j16]Nilanjan Datta, Atul Luykx, Bart Mennink, Mridul Nandi:
Understanding RUP Integrity of COLM. IACR Trans. Symmetric Cryptol. 2017(2): 143-161 (2017) - [j15]Avijit Dutta, Ashwin Jha, Mridul Nandi:
Tight Security Analysis of EHtM MAC. IACR Trans. Symmetric Cryptol. 2017(3): 130-150 (2017) - [j14]Nilanjan Datta, Avijit Dutta, Mridul Nandi, Goutam Paul, Liting Zhang:
Single Key Variant of PMAC_Plus. IACR Trans. Symmetric Cryptol. 2017(4): 268-305 (2017) - [j13]Eik List, Mridul Nandi:
ZMAC+ - An Efficient Variable-output-length Variant of ZMAC. IACR Trans. Symmetric Cryptol. 2017(4): 306-325 (2017) - [c40]Ritam Bhaumik, Mridul Nandi:
Improved Security for OCB3. ASIACRYPT (2) 2017: 638-666 - [c39]Ritam Bhaumik, Nilanjan Datta, Avijit Dutta, Nicky Mouha, Mridul Nandi:
The Iterated Random Function Problem. ASIACRYPT (2) 2017: 667-697 - [c38]Avik Chakraborti, Tetsu Iwata, Kazuhiko Minematsu, Mridul Nandi:
Blockcipher-Based Authenticated Encryption: How Small Can We Go? CHES 2017: 277-298 - [c37]Eik List, Mridul Nandi:
Revisiting Full-PRF-Secure PMAC and Using It for Beyond-Birthday Authenticated Encryption. CT-RSA 2017: 258-274 - [c36]Ashwin Jha, Eik List, Kazuhiko Minematsu, Sweta Mishra, Mridul Nandi:
XHX - A Framework for Optimally Secure Tweakable Block Ciphers from Classical Block Ciphers and Universal Hashing. LATINCRYPT 2017: 207-227 - [c35]Avik Chakraborti, Nilanjan Datta, Mridul Nandi:
Practical Fault Attacks on Minalpher: How to Recover Key with Minimum Faults? SPACE 2017: 111-132 - [i51]Ashwin Jha, Avradip Mandal, Mridul Nandi:
On The Exact Security of Message Authentication Using Pseudorandom Functions. IACR Cryptol. ePrint Arch. 2017: 172 (2017) - [i50]Nilanjan Datta, Atul Luykx, Bart Mennink, Mridul Nandi:
Understanding RUP Integrity of COLM. IACR Cryptol. ePrint Arch. 2017: 431 (2017) - [i49]Mridul Nandi:
Birthday Attack on Dual EWCDM. IACR Cryptol. ePrint Arch. 2017: 579 (2017) - [i48]Avik Chakraborti, Tetsu Iwata, Kazuhiko Minematsu, Mridul Nandi:
Blockcipher-based Authenticated Encryption: How Small Can We Go? IACR Cryptol. ePrint Arch. 2017: 649 (2017) - [i47]Avijit Dutta, Ashwin Jha, Mridul Nandi:
Tight Security Analysis of EHtM MAC. IACR Cryptol. ePrint Arch. 2017: 837 (2017) - [i46]Ritam Bhaumik, Mridul Nandi:
Improved Security for OCB3. IACR Cryptol. ePrint Arch. 2017: 845 (2017) - [i45]Nilanjan Datta, Avijit Dutta, Mridul Nandi, Goutam Paul, Liting Zhang:
Single Key Variant of PMAC_Plus. IACR Cryptol. ePrint Arch. 2017: 848 (2017) - [i44]Ritam Bhaumik, Nilanjan Datta, Avijit Dutta, Nicky Mouha, Mridul Nandi:
The Iterated Random Function Problem. IACR Cryptol. ePrint Arch. 2017: 892 (2017) - [i43]Ashwin Jha, Eik List, Kazuhiko Minematsu, Sweta Mishra, Mridul Nandi:
XHX - A Framework for Optimally Secure Tweakable Block Ciphers from Classical Block Ciphers and Universal Hashing. IACR Cryptol. ePrint Arch. 2017: 1075 (2017) - 2016
- [j12]Ashwin Jha, Mridul Nandi:
Revisiting structure graphs: Applications to CBC-MAC and EMAC. J. Math. Cryptol. 10(3-4): 157-180 (2016) - [j11]Mridul Nandi, Tapas Pandit:
On the security of joint signature and encryption revisited. J. Math. Cryptol. 10(3-4): 181-221 (2016) - [j10]Lilian Bossuet, Nilanjan Datta, Cuauhtemoc Mancillas-López, Mridul Nandi:
ELmD: A Pipelineable Authenticated Encryption and Its Hardware Implementation. IEEE Trans. Computers 65(11): 3318-3331 (2016) - [j9]Ritam Bhaumik, Mridul Nandi:
OleF: an Inverse-Free Online Cipher. An Online SPRP with an Optimal Inverse-Free Construction. IACR Trans. Symmetric Cryptol. 2016(2): 30-51 (2016) - [c34]Avijit Dutta, Mridul Nandi, Goutam Paul:
One-Key Compression Function Based MAC with Security Beyond Birthday Bound. ACISP (1) 2016: 343-358 - [c33]Avik Chakraborti, Nilanjan Datta, Mridul Nandi:
INT-RUP Analysis of Block-cipher Based Authenticated Encryption Schemes. CT-RSA 2016: 39-54 - [c32]Debapriya Basu Roy, Avik Chakraborti, Donghoon Chang, S. V. Dilip Kumar, Debdeep Mukhopadhyay, Mridul Nandi:
Fault Based Almost Universal Forgeries on CLOC and SILC. SPACE 2016: 66-86 - [i42]Ashwin Jha, Mridul Nandi:
Revisiting Structure Graph and Its Applications to CBC-MAC and EMAC. IACR Cryptol. ePrint Arch. 2016: 161 (2016) - [i41]Avijit Dutta, Ashwin Jha, Mridul Nandi:
Exact Security Analysis of Hash-then-Mask Type Probabilistic MAC Constructions. IACR Cryptol. ePrint Arch. 2016: 983 (2016) - [i40]Ritam Bhaumik, Mridul Nandi:
OleF: An Inverse-Free Online Cipher. IACR Cryptol. ePrint Arch. 2016: 1090 (2016) - [i39]Eik List, Mridul Nandi:
Revisiting Full-PRF-Secure PMAC and Using It for Beyond-Birthday Authenticated Encryption. IACR Cryptol. ePrint Arch. 2016: 1174 (2016) - 2015
- [j8]Debrup Chakraborty, Mridul Nandi:
Attacks on the Authenticated Encryption Mode of Operation PAE. IEEE Trans. Inf. Theory 61(10): 5636-5642 (2015) - [c31]Mridul Nandi:
On the Optimality of Non-Linear Computations of Length-Preserving Encryption Schemes. ASIACRYPT (2) 2015: 113-133 - [c30]Ritam Bhaumik, Mridul Nandi:
An Inverse-Free Single-Keyed Tweakable Enciphering Scheme. ASIACRYPT (2) 2015: 159-180 - [c29]Avik Chakraborti, Anupam Chattopadhyay, Muhammad Hassan, Mridul Nandi:
TriviA: A Fast and Secure Authenticated Encryption Scheme. CHES 2015: 330-353 - [i38]Mridul Nandi:
On the Optimality of Non-Linear Computations of Length-Preserving Encryption Schemes. IACR Cryptol. ePrint Arch. 2015: 414 (2015) - [i37]Mridul Nandi:
Revisiting Security Claims of XLS and COPA. IACR Cryptol. ePrint Arch. 2015: 444 (2015) - [i36]Mridul Nandi:
XLS is not a Strong Pseudorandom Permutation. IACR Cryptol. ePrint Arch. 2015: 445 (2015) - [i35]Mridul Nandi, Tapas Pandit:
Generic Conversions from CPA to CCA secure Functional Encryption. IACR Cryptol. ePrint Arch. 2015: 457 (2015) - [i34]Mridul Nandi:
A Simple Proof of a Distinguishing Bound of Iterated Uniform Random Permutation. IACR Cryptol. ePrint Arch. 2015: 579 (2015) - [i33]Avik Chakraborti, Anupam Chattopadhyay, Muhammad Hassan, Mridul Nandi:
TriviA: A Fast and Secure Authenticated Encryption Scheme. IACR Cryptol. ePrint Arch. 2015: 590 (2015) - [i32]Ritam Bhaumik, Mridul Nandi:
Revisiting Turning Online Cipher Off. IACR Cryptol. ePrint Arch. 2015: 813 (2015) - [i31]Mridul Nandi, Tapas Pandit:
On the Power of Pair Encodings: Frameworks for Predicate Cryptographic Primitives. IACR Cryptol. ePrint Arch. 2015: 955 (2015) - [i30]Ashwin Jha, Mridul Nandi:
Some Cryptanalytic Results on Zipper Hash and Concatenated Hash. IACR Cryptol. ePrint Arch. 2015: 973 (2015) - [i29]Ritam Bhaumik, Mridul Nandi:
An Inverse-free Single-Keyed Tweakable Enciphering Scheme. IACR Cryptol. ePrint Arch. 2015: 1148 (2015) - 2014
- [c28]Nilanjan Datta, Mridul Nandi:
ELmE: A Misuse Resistant Parallel Authenticated Encryption. ACISP 2014: 306-321 - [c27]Mridul Nandi:
Forging Attacks on Two Authenticated Encryption Schemes COBRA and POET. ASIACRYPT (1) 2014: 126-140 - [c26]Mridul Nandi:
XLS is Not a Strong Pseudorandom Permutation. ASIACRYPT (1) 2014: 478-490 - [c25]Mridul Nandi:
On the Minimum Number of Multiplications Necessary for Universal Hash Functions. FSE 2014: 489-508 - [c24]Nilanjan Datta, Mridul Nandi:
Characterization of EME with Linear Mixing. IWSEC 2014: 221-239 - [c23]Nilanjan Datta, Mridul Nandi:
Equivalence between MAC, WCR and PRF for Blockcipher Based Constructions. ProvSec 2014: 300-308 - [i28]Nilanjan Datta, Mridul Nandi:
Characterization of EME with Linear Mixing. IACR Cryptol. ePrint Arch. 2014: 9 (2014) - [i27]Mridul Nandi:
Forging Attacks on two Authenticated Encryptions COBRA and POET. IACR Cryptol. ePrint Arch. 2014: 363 (2014) - 2013
- [c22]Mohammad A. AlAhmad, Imad Fakhri Alshaikhli, Mridul Nandi:
Joux multicollisions attack in sponge construction. SIN 2013: 292-296 - [i26]Mridul Nandi:
On the Minimum Number of Multiplications Necessary for Universal Hash Constructions. IACR Cryptol. ePrint Arch. 2013: 574 (2013) - [i25]Nilanjan Datta, Mridul Nandi:
Equivalence between MAC and PRF for Blockcipher based Constructions. IACR Cryptol. ePrint Arch. 2013: 575 (2013) - [i24]Nilanjan Datta, Mridul Nandi:
Misuse Resistant Parallel Authenticated Encryptions. IACR Cryptol. ePrint Arch. 2013: 767 (2013) - 2012
- [e1]Steven D. Galbraith, Mridul Nandi:
Progress in Cryptology - INDOCRYPT 2012, 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings. Lecture Notes in Computer Science 7668, Springer 2012, ISBN 978-3-642-34930-0 [contents] - 2011
- [c21]Donghoon Chang, Mridul Nandi, Moti Yung:
On the Security of Hash Functions Employing Blockcipher Postprocessing. FSE 2011: 146-166 - [c20]David Chaum, Alex Florescu, Mridul Nandi, Stefan Popoveniuc, Jan Rubio, Poorvi L. Vora, Filip Zagórski:
Paperless Independently-Verifiable Voting. VoteID 2011: 140-157 - [i23]Donghoon Chang, Mridul Nandi, Moti Yung:
Indifferentiability of the Hash Algorithm BLAKE. IACR Cryptol. ePrint Arch. 2011: 623 (2011) - 2010
- [c19]Rishiraj Bhattacharyya, Avradip Mandal, Mridul Nandi:
Security Analysis of the Mode of JH Hash Function. FSE 2010: 168-191 - [c18]Mridul Nandi:
A Unified Method for Improving PRF Bounds for a Class of Blockcipher Based MACs. FSE 2010: 212-229 - [c17]Mridul Nandi, Stefan Popoveniuc, Poorvi L. Vora:
Stamp-It: A Method for Enhancing the Universal Verifiability of E2E Voting Systems. ICISS 2010: 81-95 - [c16]Mridul Nandi:
The Characterization of Luby-Rackoff and Its Optimum Single-Key Variants. INDOCRYPT 2010: 82-97 - [c15]Mridul Nandi, Souradyuti Paul:
Speeding Up the Wide-Pipe: Secure and Fast Hashing. INDOCRYPT 2010: 144-162 - [i22]Mridul Nandi:
A Unified Method for Improving PRF Bounds for a Class of Blockcipher based MACs. IACR Cryptol. ePrint Arch. 2010: 14 (2010) - [i21]Mridul Nandi, Souradyuti Paul:
Speeding Up The Widepipe: Secure and Fast Hashing. IACR Cryptol. ePrint Arch. 2010: 193 (2010) - [i20]Donghoon Chang, Mridul Nandi, Moti Yung:
On the Security of Hash Functions Employing Blockcipher Postprocessing. IACR Cryptol. ePrint Arch. 2010: 629 (2010)
2000 – 2009
- 2009
- [j7]Mridul Nandi:
A Generic Method to Extend Message Space of a Strong Pseudorandom Permutation. Computación y Sistemas 12(3) (2009) - [j6]Mridul Nandi:
Improved security analysis for OMAC as a pseudorandom function. J. Math. Cryptol. 3(2): 133-148 (2009) - [c14]Mridul Nandi:
Characterizing Padding Rules of MD Hash Functions Preserving Collision Security. ACISP 2009: 171-184 - [c13]Mridul Nandi:
Fast and Secure CBC-Type MAC Algorithms. FSE 2009: 375-393 - [c12]Rishiraj Bhattacharyya, Avradip Mandal, Mridul Nandi:
Indifferentiability Characterization of Hash Functions and Optimal Bounds of Popular Domain Extensions. INDOCRYPT 2009: 199-218 - [i19]Mridul Nandi:
Characterizing Padding Rules of MD Hash Functions Preserving Collision Security. IACR Cryptol. ePrint Arch. 2009: 325 (2009) - 2008
- [j5]Donghoon Chang, Mridul Nandi, Jesang Lee, Jaechul Sung, Seokhie Hong, Jongin Lim, Haeryong Park, Kilsoo Chun:
Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(9): 2607-2614 (2008) - [j4]Mridul Nandi, Avradip Mandal:
Improved security analysis of PMAC. J. Math. Cryptol. 2(2): 149-162 (2008) - [c11]Debrup Chakraborty, Mridul Nandi:
An Improved Security Bound for HCTR. FSE 2008: 289-302 - [c10]Donghoon Chang, Mridul Nandi:
Improved Indifferentiability Security Analysis of chopMD Hash Function. FSE 2008: 429-443 - [c9]Mridul Nandi:
Two New Efficient CCA-Secure Online Ciphers: MHCBC and MCBC. INDOCRYPT 2008: 350-362 - [i18]Donghoon Chang, Mridul Nandi:
A Short Proof of the PRP/PRF Switching Lemma. IACR Cryptol. ePrint Arch. 2008: 78 (2008) - [i17]Mridul Nandi:
Improving upon HCTR and matching attacks for Hash-Counter-Hash approach. IACR Cryptol. ePrint Arch. 2008: 90 (2008) - [i16]Mridul Nandi:
A Generic Method to Extend Message Space of a Strong Pseudorandom Permutation. IACR Cryptol. ePrint Arch. 2008: 91 (2008) - [i15]Mridul Nandi:
An Efficient SPRP-secure Construction based on Pseudo Random Involution. IACR Cryptol. ePrint Arch. 2008: 92 (2008) - [i14]Mridul Nandi:
Two New Efficient CCA-Secure Online Ciphers: MHCBC and MCBC. IACR Cryptol. ePrint Arch. 2008: 401 (2008) - 2007
- [j3]Mridul Nandi, Douglas R. Stinson:
Multicollision Attacks on Some Generalized Sequential Hash Functions. IEEE Trans. Inf. Theory 53(2): 759-767 (2007) - [i13]Mridul Nandi, Avradip Mandal:
Improved Security Analysis of PMAC. IACR Cryptol. ePrint Arch. 2007: 31 (2007) - [i12]Avradip Mandal, Mridul Nandi:
An improved collision probability for CBC-MAC and PMAC. IACR Cryptol. ePrint Arch. 2007: 32 (2007) - [i11]Mridul Nandi:
A Simple Security Analysis of Hash-CBC and a New Efficient One-Key Online Cipher. IACR Cryptol. ePrint Arch. 2007: 158 (2007) - [i10]Mridul Nandi:
Improved security analysis of OMAC. IACR Cryptol. ePrint Arch. 2007: 292 (2007) - [i9]Donghoon Chang, Mridul Nandi, Jesang Lee, Jaechul Sung, Seokhie Hong:
Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function. IACR Cryptol. ePrint Arch. 2007: 416 (2007) - 2006
- [c8]Donghoon Chang, Sangjin Lee, Mridul Nandi, Moti Yung:
Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding. ASIACRYPT 2006: 283-298 - [c7]Donghoon Chang, Kishan Chand Gupta, Mridul Nandi:
RC4-Hash: A New Hash Function Based on RC4. INDOCRYPT 2006: 80-94 - [c6]Mridul Nandi:
A Simple and Unified Method of Proving Indistinguishability. INDOCRYPT 2006: 317-334 - [i8]Mridul Nandi, Douglas R. Stinson:
Multicollision Attacks on some Generalized Sequential Hash Functions. IACR Cryptol. ePrint Arch. 2006: 55 (2006) - [i7]Mridul Nandi:
A Simple and Unified Method of Proving Unpredictability. IACR Cryptol. ePrint Arch. 2006: 264 (2006) - [i6]Donghoon Chang, Mridul Nandi:
General Distinguishing Attacks on NMAC and HMAC with Birthday Attack Complexity. IACR Cryptol. ePrint Arch. 2006: 441 (2006) - 2005
- [j2]Wonil Lee, Mridul Nandi, Palash Sarkar, Donghoon Chang, Sangjin Lee, Kouichi Sakurai:
PGV-Style Block-Cipher-Based Hash Families and Black-Box Analysis. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(1): 39-48 (2005) - [j1]Wonil Lee, Donghoon Chang, Sangjin Lee, Soo Hak Sung, Mridul Nandi:
Construction of UOWHF: Two New Parallel Methods. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(1): 49-58 (2005) - [c5]Mridul Nandi, Wonil Lee, Kouichi Sakurai, Sangjin Lee:
Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model. FSE 2005: 243-254 - [c4]Mridul Nandi:
Towards Optimal Double-Length Hash Functions. INDOCRYPT 2005: 77-89 - 2004
- [c3]Wonil Lee, Mridul Nandi, Palash Sarkar, Donghoon Chang, Sangjin Lee, Kouichi Sakurai:
Pseudorandomness of SPN-Type Transformations. ACISP 2004: 212-223 - [c2]Mridul Nandi:
A Sufficient Condition for Optimal Domain Extension of UOWHFs. Selected Areas in Cryptography 2004: 341-354 - [i5]Wonil Lee, Mridul Nandi, Palash Sarkar, Donghoon Chang, Sangjin Lee, Kouichi Sakurai:
A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model. IACR Cryptol. ePrint Arch. 2004: 69 (2004) - [i4]Mridul Nandi:
Designs of Efficient Secure Large Hash Values. IACR Cryptol. ePrint Arch. 2004: 296 (2004) - [i3]Mridul Nandi, Douglas R. Stinson:
Multicollision Attacks on Generalized Hash Functions. IACR Cryptol. ePrint Arch. 2004: 330 (2004) - 2003
- [c1]Wonil Lee, Donghoon Chang, Sangjin Lee, Soo Hak Sung, Mridul Nandi:
New Parallel Domain Extenders for UOWHF. ASIACRYPT 2003: 208-227 - [i2]Mridul Nandi:
A New Tree based Domain Extension of UOWHF. IACR Cryptol. ePrint Arch. 2003: 142 (2003) - [i1]Mridul Nandi:
A Sufficient Condition and Optimal Domain Extension of UOWHF. IACR Cryptol. ePrint Arch. 2003: 158 (2003)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint