Search

Your search keyword '"Nandi, Mridul"' showing total 366 results

Search Constraints

Start Over You searched for: Author "Nandi, Mridul" Remove constraint Author: "Nandi, Mridul"
366 results on '"Nandi, Mridul"'

Search Results

1. Analysis of Knuth's Sampling Algorithm D and D'

5. Zentralisierte Systeme

6. Tight Multi-user Security of Ascon and Its Large Key Extension

7. A Sponge-Based PRF with Good Multi-user Security

9. Designing Full-Rate Sponge Based AEAD Modes

13. Exact Security Analysis of ASCON

15. Proof of Mirror Theory for a Wide Range of

16. Crooked Indifferentiability Revisited

20. Towards Tight Security Bounds for OMAC, XCBC and TMAC

21. Offset-Based BBB-Secure Tweakable Block-ciphers with Updatable Caches

22. with Fast Authentication

23. Big Brother Is Watching You: A Closer Look at Backdoor Construction

24. Light-OCB: Parallel Lightweight Authenticated Cipher with Full Security

26. Decentralized Contact Tracing Protocols

27. Outline of a Proposal and Conclusion

28. Introduction and Preliminaries

29. Centralized Systems

30. The mF mode of authenticated encryption with associated data

31. Crooked Indifferentiability of Enveloped XOR Revisited

32. tHyENA: Making HyENA Even Smaller

33. Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher

34. Revisiting the Security of COMET Authenticated Encryption Scheme

35. Luby-Rackoff Backwards with More Users and More Security

36. Fine-Tuning the ISO/IEC Standard LightMAC

42. How to Build Optimally Secure PRFs Using Block Ciphers

43. BBB Secure Nonce Based MAC Using Public Permutations

44. Mind the Composition: Birthday Bound Attacks on EWCDMD and SoKAC21

47. The Oribatida v1.3 Family of Lightweight Authenticated Encryption Schemes

48. Balanced permutations Even-Mansour ciphers

49. XHX – A Framework for Optimally Secure Tweakable Block Ciphers from Classical Block Ciphers and Universal Hashing

50. Beyond Birthday Bound Secure MAC in Faulty Nonce Model

Catalog

Books, media, physical & digital resources