关注
Avijit Dutta
Avijit Dutta
Institute for Advancing Intelligence, TCG-CREST
在 tcgcrest.org 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Double-block hash-then-sum: a paradigm for constructing BBB secure PRF
N Datta, A Dutta, M Nandi, G Paul
IACR Transactions on Symmetric Cryptology, 36-92, 2018
482018
Encrypt or decrypt? to make a single-key beyond birthday secure nonce-based MAC
N Datta, A Dutta, M Nandi, K Yasuda
Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018
482018
Beyond birthday bound secure MAC in faulty nonce model
A Dutta, M Nandi, S Talnikar
Annual International Conference on the Theory and Applications of …, 2019
442019
Single key variant of PMAC_Plus
N Datta, A Dutta, M Nandi, G Paul, L Zhang
Cryptology ePrint Archive, 2017
442017
Proof of Mirror Theory for ξmax = 2
A Dutta, M Nandi, A Saha
IEEE Transactions on Information Theory 68 (9), 6218-6232, 2022
242022
Release of unverified plaintext: Tight unified model and application to ANYDAE
D Chang, N Datta, A Dutta, B Mennink, M Nandi, S Sanadhya, F Sibleyras
IACR Transactions on Symmetric Cryptology, 119-146, 2019
202019
Permutation based EDM: an inverse free BBB secure PRF
A Dutta, M Nandi, S Talnikar
IACR Transactions on Symmetric Cryptology, 31-70, 2021
182021
Tight security analysis of ehtm MAC
A Dutta, A Jha, M Nandi
Cryptology ePrint Archive, 2017
182017
Minimizing the two-round tweakable even-mansour cipher
A Dutta
Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the …, 2020
172020
Tweakable HCTR: A BBB secure tweakable enciphering scheme
A Dutta, M Nandi
International Conference on Cryptology in India, 47-69, 2018
162018
BBB secure nonce based MAC using public permutations
A Dutta, M Nandi
Progress in Cryptology-AFRICACRYPT 2020: 12th International Conference on …, 2020
152020
: beyond-birthday-secure encryption from public permutations
A Bhattacharjee, A Dutta, E List, M Nandi
Designs, Codes and Cryptography 90 (6), 1381-1425, 2022
142022
Proof of Mirror Theory for a Wide Range of 
B Cogliati, A Dutta, M Nandi, J Patarin, A Saha
Annual International Conference on the Theory and Applications of …, 2023
112023
Building single-key beyond birthday bound message authentication code
N Datta, A Dutta, M Nandi, G Paul, L Zhang
Cryptology ePrint Archive, 2015
112015
Secure proof of ownership using merkle tree for deduplicated storage
J Dave, A Dutta, P Faruki, V Laxmi, MS Gaur
Automatic Control and Computer Sciences 54, 358-370, 2020
102020
DWCDM+: A BBB secure nonce based MAC.
N Datta, A Dutta, M Nandi, K Yasuda
Advances in Mathematics of Communications 13 (4), 2019
82019
Tight multi-user security bound of DbHtS
N Datta, A Dutta, M Nandi, S Talnikar
IACR Transactions on Symmetric Cryptology, 192-223, 2023
72023
Improved security bound of (E/D) WCDM
N Datta, A Dutta, K Dutta
IACR Transactions on Symmetric Cryptology, 138-176, 2021
72021
Deterministic hard fault attack on trivium
A Dutta, G Paul
Advances in Information and Computer Security: 9th International Workshop on …, 2014
72014
Multi-user BBB security of public permutations based MAC
YL Chen, A Dutta, M Nandi
Cryptography and Communications 14 (5), 1145-1177, 2022
62022
系统目前无法执行此操作,请稍后再试。
文章 1–20