Double-block hash-then-sum: a paradigm for constructing BBB secure PRF N Datta, A Dutta, M Nandi, G Paul IACR Transactions on Symmetric Cryptology, 36-92, 2018 | 48 | 2018 |
Encrypt or decrypt? to make a single-key beyond birthday secure nonce-based MAC N Datta, A Dutta, M Nandi, K Yasuda Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018 | 48 | 2018 |
Beyond birthday bound secure MAC in faulty nonce model A Dutta, M Nandi, S Talnikar Annual International Conference on the Theory and Applications of …, 2019 | 44 | 2019 |
Single key variant of PMAC_Plus N Datta, A Dutta, M Nandi, G Paul, L Zhang Cryptology ePrint Archive, 2017 | 44 | 2017 |
Proof of Mirror Theory for ξmax = 2 A Dutta, M Nandi, A Saha IEEE Transactions on Information Theory 68 (9), 6218-6232, 2022 | 24 | 2022 |
Release of unverified plaintext: Tight unified model and application to ANYDAE D Chang, N Datta, A Dutta, B Mennink, M Nandi, S Sanadhya, F Sibleyras IACR Transactions on Symmetric Cryptology, 119-146, 2019 | 20 | 2019 |
Permutation based EDM: an inverse free BBB secure PRF A Dutta, M Nandi, S Talnikar IACR Transactions on Symmetric Cryptology, 31-70, 2021 | 18 | 2021 |
Tight security analysis of ehtm MAC A Dutta, A Jha, M Nandi Cryptology ePrint Archive, 2017 | 18 | 2017 |
Minimizing the two-round tweakable even-mansour cipher A Dutta Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the …, 2020 | 17 | 2020 |
Tweakable HCTR: A BBB secure tweakable enciphering scheme A Dutta, M Nandi International Conference on Cryptology in India, 47-69, 2018 | 16 | 2018 |
BBB secure nonce based MAC using public permutations A Dutta, M Nandi Progress in Cryptology-AFRICACRYPT 2020: 12th International Conference on …, 2020 | 15 | 2020 |
: beyond-birthday-secure encryption from public permutations A Bhattacharjee, A Dutta, E List, M Nandi Designs, Codes and Cryptography 90 (6), 1381-1425, 2022 | 14 | 2022 |
Proof of Mirror Theory for a Wide Range of B Cogliati, A Dutta, M Nandi, J Patarin, A Saha Annual International Conference on the Theory and Applications of …, 2023 | 11 | 2023 |
Building single-key beyond birthday bound message authentication code N Datta, A Dutta, M Nandi, G Paul, L Zhang Cryptology ePrint Archive, 2015 | 11 | 2015 |
Secure proof of ownership using merkle tree for deduplicated storage J Dave, A Dutta, P Faruki, V Laxmi, MS Gaur Automatic Control and Computer Sciences 54, 358-370, 2020 | 10 | 2020 |
DWCDM+: A BBB secure nonce based MAC. N Datta, A Dutta, M Nandi, K Yasuda Advances in Mathematics of Communications 13 (4), 2019 | 8 | 2019 |
Tight multi-user security bound of DbHtS N Datta, A Dutta, M Nandi, S Talnikar IACR Transactions on Symmetric Cryptology, 192-223, 2023 | 7 | 2023 |
Improved security bound of (E/D) WCDM N Datta, A Dutta, K Dutta IACR Transactions on Symmetric Cryptology, 138-176, 2021 | 7 | 2021 |
Deterministic hard fault attack on trivium A Dutta, G Paul Advances in Information and Computer Security: 9th International Workshop on …, 2014 | 7 | 2014 |
Multi-user BBB security of public permutations based MAC YL Chen, A Dutta, M Nandi Cryptography and Communications 14 (5), 1145-1177, 2022 | 6 | 2022 |