Search

Your search keyword '"Nandi, Mridul"' showing total 372 results

Search Constraints

Start Over You searched for: Author "Nandi, Mridul" Remove constraint Author: "Nandi, Mridul"
372 results on '"Nandi, Mridul"'

Search Results

51. Balanced permutations Even-Mansour ciphers

54. Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based MAC

55. Generic Attacks Against Beyond-Birthday-Bound MACs

56. Bernstein Bound on WCS is Tight : Repairing Luykx-Preneel Optimal Forgeries

57. Full Indifferentiable Security of the Xor of Two or More Random Permutations Using the Method

58. Tweakable HCTR: A BBB Secure Tweakable Enciphering Scheme

59. Short Variable Length Domain Extenders with Beyond Birthday Bound Security

60. ZCZ – Achieving n-bit SPRP Security with a Minimal Number of Tweakable-Block-Cipher Calls

62. Predicate signatures from pair encodings via dual system proof technique

67. On the optimality of non-linear computations for symmetric key primitives

68. Practical Fault Attacks on Minalpher: How to Recover Key with Minimum Faults?

69. The Iterated Random Function Problem

70. Improved Security for OCB3

71. Blockcipher-Based Authenticated Encryption: How Small Can We Go?

72. Revisiting Full-PRF-Secure PMAC and Using It for Beyond-Birthday Authenticated Encryption

74. INT-RUP Analysis of Block-cipher Based Authenticated Encryption Schemes

75. Fault Based Almost Universal Forgeries on CLOC and SILC

78. An Inverse-Free Single-Keyed Tweakable Enciphering Scheme

79. On the Optimality of Non-Linear Computations of Length-Preserving Encryption Schemes

80. TriviA: A Fast and Secure Authenticated Encryption Scheme

81. On the Minimum Number of Multiplications Necessary for Universal Hash Functions

87. Revisiting structure graphs: Applications to CBC-MAC and EMAC

88. On the security of joint signature and encryption revisited

89. XLS is Not a Strong Pseudorandom Permutation

90. Forging Attacks on Two Authenticated Encryption Schemes COBRA and POET

91. Equivalence between MAC, WCR and PRF for Blockcipher Based Constructions

92. Characterization of EME with Linear Mixing

93. ELmE: A Misuse Resistant Parallel Authenticated Encryption

98. Paperless Independently-Verifiable Voting

99. On the Security of Hash Functions Employing Blockcipher Postprocessing

Catalog

Books, media, physical & digital resources