Beetle family of lightweight and secure authenticated encryption ciphers A Chakraborti, N Datta, M Nandi, K Yasuda Cryptology ePrint Archive, 2018 | 104 | 2018 |
Gift-cofb S Banik, A Chakraborti, A Inoue, T Iwata, K Minematsu, M Nandi, T Peyrin, ... Cryptology ePrint Archive, 2020 | 90 | 2020 |
Improved indifferentiability security analysis of chopMD hash function D Chang, M Nandi Fast Software Encryption: 15th International Workshop, FSE 2008, Lausanne …, 2008 | 81 | 2008 |
Indifferentiable security analysis of popular hash functions with prefix-free padding D Chang, S Lee, M Nandi, M Yung Advances in Cryptology–ASIACRYPT 2006: 12th International Conference on the …, 2006 | 76 | 2006 |
Multicollision attacks on some generalized sequential hash functions M Nandi, DR Stinson IEEE transactions on Information Theory 53 (2), 759-767, 2007 | 66 | 2007 |
Blockcipher-based authenticated encryption: how small can we go? A Chakraborti, T Iwata, K Minematsu, M Nandi International Conference on Cryptographic Hardware and Embedded Systems, 277-298, 2017 | 65 | 2017 |
PHOTON-beetle authenticated encryption and hash family Z Bao, A Chakraborti, N Datta, J Guo, M Nandi, T Peyrin, K Yasuda NIST Lightweight Compet. Round 1, 115, 2019 | 64 | 2019 |
Security analysis of the mode of JH hash function R Bhattacharyya, A Mandal, M Nandi Fast Software Encryption: 17th International Workshop, FSE 2010, Seoul …, 2010 | 58 | 2010 |
Security analysis of a 2/3-rate double length compression function in the black-box model M Nandi, W Lee, K Sakurai, S Lee Fast Software Encryption: 12th International Workshop, FSE 2005, Paris …, 2005 | 52 | 2005 |
Double-block hash-then-sum: a paradigm for constructing BBB secure PRF N Datta, A Dutta, M Nandi, G Paul IACR Transactions on Symmetric Cryptology, 36-92, 2018 | 48 | 2018 |
Encrypt or decrypt? to make a single-key beyond birthday secure nonce-based MAC N Datta, A Dutta, M Nandi, K Yasuda Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018 | 48 | 2018 |
Beyond birthday bound secure MAC in faulty nonce model A Dutta, M Nandi, S Talnikar Annual International Conference on the Theory and Applications of …, 2019 | 44 | 2019 |
Single key variant of PMAC_Plus N Datta, A Dutta, M Nandi, G Paul, L Zhang Cryptology ePrint Archive, 2017 | 44 | 2017 |
Fast and secure CBC-type MAC algorithms M Nandi International Workshop on Fast Software Encryption, 375-393, 2009 | 44 | 2009 |
COLM v1 E Andreeva, A Bogdanov, N Datta, A Luykx, B Mennink, M Nandi, ... Submission to the CAESAR Competition, 2016 | 43 | 2016 |
RC4-Hash: A new hash function based on RC4 D Chang, KC Gupta, M Nandi Progress in Cryptology-INDOCRYPT 2006: 7th International Conference on …, 2006 | 43 | 2006 |
A short proof of the PRP/PRF switching lemma D Chang, M Nandi Cryptology ePrint Archive, 2008 | 42 | 2008 |
Status report on the first round of the SHA-3 cryptographic hash algorithm competition A Regenscheid, S Zhang, J Kelsey, M Nandi, S Paul, R Perlner, ... US Department of Commerce, National Institute of Standards and Technology, 2009 | 41 | 2009 |
An improved security bound for HCTR D Chakraborty, M Nandi Fast Software Encryption: 15th International Workshop, FSE 2008, Lausanne …, 2008 | 40 | 2008 |
GIFT-COFB v1. 0 S Banik, A Chakraborti, T Iwata, K Minematsu, M Nandi, T Peyrin, ... Submission to the NIST Lightweight Cryptography project, 2019 | 39 | 2019 |