58 results on '"Nandi, Mridul"'
Search Results
2. On the Optimality of Non-Linear Computations of Length-Preserving Encryption Schemes
3. TriviA: A Fast and Secure Authenticated Encryption Scheme
4. On the Minimum Number of Multiplications Necessary for Universal Hash Functions
5. XLS is Not a Strong Pseudorandom Permutation
6. Forging Attacks on Two Authenticated Encryption Schemes COBRA and POET
7. Paperless Independently-Verifiable Voting
8. On the Security of Hash Functions Employing Blockcipher Postprocessing
9. Stamp-It: A Method for Enhancing the Universal Verifiability of E2E Voting Systems
10. Speeding Up the Wide-Pipe: Secure and Fast Hashing
11. The Characterization of Luby-Rackoff and Its Optimum Single-Key Variants
12. A Unified Method for Improving PRF Bounds for a Class of Blockcipher Based MACs
13. Security Analysis of the Mode of JH Hash Function
14. Indifferentiability Characterization of Hash Functions and Optimal Bounds of Popular Domain Extensions
15. Fast and Secure CBC-Type MAC Algorithms
16. Characterizing Padding Rules of MD Hash Functions Preserving Collision Security
17. An Improved Security Bound for HCTR
18. Improved Indifferentiability Security Analysis of chopMD Hash Function
19. Two New Efficient CCA-Secure Online Ciphers: MHCBC and MCBC
20. A Simple and Unified Method of Proving Indistinguishability
21. RC4-Hash: A New Hash Function Based on RC4
22. Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding
23. Towards Optimal Double-Length Hash Functions
24. Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model
25. A Sufficient Condition for Optimal Domain Extension of UOWHFs
26. A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model
27. New Parallel Domain Extenders for UOWHF
28. Leakage Squeezing of Order Two
29. Faster Chosen-Key Distinguishers on Reduced-Round AES
30. Implementing CFS
31. On-Line/Off-Line Leakage Resilient Secure Computation Protocols
32. Faster Batch Forgery Identification
33. Constructing Pairing-Friendly Genus 2 Curves with Split Jacobian
34. Computing Small Discrete Logarithms Faster
35. Analysis of Optimum Pairing Products at High Security Levels
36. High-Speed Parallel Implementations of the Rainbow Method in a Heterogeneous System
37. The Higher-Order Meet-in-the-Middle Attack and Its Application to the Camellia Block Cipher : (Extended Abstract)
38. A New Model of Binary Elliptic Curves
39. Efficient Arithmetic on Elliptic Curves in Characteristic 2
40. Compact Hardware Implementations of the Block Ciphers mCrypton, NOEKEON, and SEA
41. Embedded Syndrome-Based Hashing
42. Automatic Search of Truncated Impossible Differentials for Word-Oriented Block Ciphers
43. Cryptanalysis of Pseudo-random Generators Based on Vectorial FCSRs
44. Double-SP Is Weaker Than Single-SP: Rebound Attacks on Feistel Ciphers with Several Rounds
45. Collision Attack on the Hamsi-256 Compression Function
46. Generalized Iterated Hash Fuctions Revisited: New Complexity Bounds for Multicollision Attacks
47. ROSETTA for Single Trace Analysis : Recovery Of Secret Exponent by Triangular Trace Analysis
48. On the Non-malleability of the Fiat-Shamir Transform
49. A Novel Permutation-Based Hash Mode of Operation FP and the Hash Function SAMOSA
50. Another Look at Symmetric Incoherent Optimal Eavesdropping against BB84
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.