Search

Your search keyword '"Nandi, Mridul"' showing total 58 results

Search Constraints

Start Over You searched for: Author "Nandi, Mridul" Remove constraint Author: "Nandi, Mridul" Publisher springer berlin heidelberg Remove constraint Publisher: springer berlin heidelberg
58 results on '"Nandi, Mridul"'

Search Results

1. An Inverse-Free Single-Keyed Tweakable Enciphering Scheme

2. On the Optimality of Non-Linear Computations of Length-Preserving Encryption Schemes

3. TriviA: A Fast and Secure Authenticated Encryption Scheme

4. On the Minimum Number of Multiplications Necessary for Universal Hash Functions

5. XLS is Not a Strong Pseudorandom Permutation

6. Forging Attacks on Two Authenticated Encryption Schemes COBRA and POET

7. Paperless Independently-Verifiable Voting

8. On the Security of Hash Functions Employing Blockcipher Postprocessing

9. Stamp-It: A Method for Enhancing the Universal Verifiability of E2E Voting Systems

10. Speeding Up the Wide-Pipe: Secure and Fast Hashing

11. The Characterization of Luby-Rackoff and Its Optimum Single-Key Variants

12. A Unified Method for Improving PRF Bounds for a Class of Blockcipher Based MACs

13. Security Analysis of the Mode of JH Hash Function

14. Indifferentiability Characterization of Hash Functions and Optimal Bounds of Popular Domain Extensions

15. Fast and Secure CBC-Type MAC Algorithms

16. Characterizing Padding Rules of MD Hash Functions Preserving Collision Security

17. An Improved Security Bound for HCTR

18. Improved Indifferentiability Security Analysis of chopMD Hash Function

19. Two New Efficient CCA-Secure Online Ciphers: MHCBC and MCBC

20. A Simple and Unified Method of Proving Indistinguishability

21. RC4-Hash: A New Hash Function Based on RC4

22. Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding

23. Towards Optimal Double-Length Hash Functions

24. Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model

25. A Sufficient Condition for Optimal Domain Extension of UOWHFs

26. A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model

28. Leakage Squeezing of Order Two

29. Faster Chosen-Key Distinguishers on Reduced-Round AES

30. Implementing CFS

31. On-Line/Off-Line Leakage Resilient Secure Computation Protocols

32. Faster Batch Forgery Identification

33. Constructing Pairing-Friendly Genus 2 Curves with Split Jacobian

34. Computing Small Discrete Logarithms Faster

35. Analysis of Optimum Pairing Products at High Security Levels

36. High-Speed Parallel Implementations of the Rainbow Method in a Heterogeneous System

37. The Higher-Order Meet-in-the-Middle Attack and Its Application to the Camellia Block Cipher : (Extended Abstract)

38. A New Model of Binary Elliptic Curves

39. Efficient Arithmetic on Elliptic Curves in Characteristic 2

40. Compact Hardware Implementations of the Block Ciphers mCrypton, NOEKEON, and SEA

41. Embedded Syndrome-Based Hashing

42. Automatic Search of Truncated Impossible Differentials for Word-Oriented Block Ciphers

43. Cryptanalysis of Pseudo-random Generators Based on Vectorial FCSRs

44. Double-SP Is Weaker Than Single-SP: Rebound Attacks on Feistel Ciphers with Several Rounds

45. Collision Attack on the Hamsi-256 Compression Function

46. Generalized Iterated Hash Fuctions Revisited: New Complexity Bounds for Multicollision Attacks

47. ROSETTA for Single Trace Analysis : Recovery Of Secret Exponent by Triangular Trace Analysis

48. On the Non-malleability of the Fiat-Shamir Transform

49. A Novel Permutation-Based Hash Mode of Operation FP and the Hash Function SAMOSA

50. Another Look at Symmetric Incoherent Optimal Eavesdropping against BB84

Catalog

Books, media, physical & digital resources