Security analysis of the mode of JH hash function R Bhattacharyya, A Mandal, M Nandi Fast Software Encryption: 17th International Workshop, FSE 2010, Seoul …, 2010 | 58 | 2010 |
Complexity of the Unconstrained Traveling Tournament Problem R Bhattacharyya Operations Research Letters 44 (5), 649-654, 2016 | 46* | 2016 |
Property Testing of Joint Distributions using Conditional Samples R Bhattacharyya, S Chakraborty ACM Transactions on Computation Theory (TOCT) 10 (4), 16, 2018 | 34 | 2018 |
Indifferentiability characterization of hash functions and optimal bounds of popular domain extensions R Bhattacharyya, A Mandal, M Nandi International Conference on Cryptology in India, 199-218, 2009 | 26 | 2009 |
Secure message authentication against related-key attack R Bhattacharyya, A Roy Fast Software Encryption: 20th International Workshop, FSE 2013, Singapore …, 2014 | 25 | 2014 |
Non-adaptive programmability of random oracle R Bhattacharyya, P Mukherjee Theoretical Computer Science 592, 97-114, 2015 | 11 | 2015 |
Memory-tight reductions for practical key encapsulation mechanisms R Bhattacharyya IACR International Conference on Public-Key Cryptography, 249-278, 2020 | 10 | 2020 |
Compactness of hashing modes and efficiency beyond Merkle tree E Andreeva, R Bhattacharyya, A Roy Annual International Conference on the Theory and Applications of …, 2021 | 8 | 2021 |
Crooked indifferentiability of enveloped XOR revisited R Bhattacharyya, M Nandi, A Raychaudhuri Progress in Cryptology–INDOCRYPT 2021: 22nd International Conference on …, 2021 | 7* | 2021 |
On the indifferentiability of Fugue and Luffa R Bhattacharyya, A Mandal Applied Cryptography and Network Security: 9th International Conference …, 2011 | 7 | 2011 |
On the impossibility of instantiating PSS in the standard model R Bhattacharyya, A Mandal Public Key Cryptography–PKC 2011: 14th International Conference on Practice …, 2011 | 4 | 2011 |
Testing Self-Reducible Samplers R Bhattacharyya, S Chakraborty, Y Pote, U Sarkar, S Sen Proceedings of the AAAI Conference on Artificial Intelligence 38 (8), 7952-7960, 2024 | 1 | 2024 |
Subversion Resilient Hashing: Efficient Constructions and Modular Proofs for Crooked Indifferentiability R Bhattacharyya, M Nandi, A Raychaudhuri IEEE Transactions on Information Theory 69 (5), 3302-3315, 2023 | 1 | 2023 |
Constant query locally decodable codes against a computationally bounded adversary R Bhattacharyya, S Chakraborty | 1 | 2011 |
On Efficient and Secure Compression Functions for Arithmetization-Oriented Hashing E Andreeva, R Bhattacharyya, A Roy, S Trevisani 2024 IEEE 37th Computer Security Foundations Symposium (CSF), 558-573, 2024 | | 2024 |
Bandwidth-Hard Functions from Random Permutations R Bhattacharyya, A Mandal arXiv preprint arXiv:2207.11519, 2022 | | 2022 |
Firefighter Problem with Minimum Budget: Hardness and Approximation Algorithm for Unit Disk Graphs D Chatterjee, R Bhattacharyya arXiv preprint arXiv:2203.15509, 2022 | | 2022 |