Suivre
Ashwin Jha
Ashwin Jha
CISPA Helmholtz Center for Information Security
Adresse e-mail validée de cispa.de - Page d'accueil
Titre
Citée par
Citée par
Année
ESTATE: A lightweight and low energy authenticated encryption mode
A Chakraborti, N Datta, A Jha, C Mancillas-López, M Nandi, Y Sasaki
IACR Transactions on Symmetric Cryptology, 350-389, 2020
332020
Lotus-aead and locus-aead
A Chakraborti, N Datta, A Jha, CM Lopez, M Nandi, Y Sasaki
Submission to the NIST Lightweight Cryptography project, 2019
282019
Comet: counter mode encryption with authentication tag
S Gueron, A Jha, M Nandi
Second Round Candidate of the NIST LWC Competition, 2019
27*2019
Tight security of cascaded LRW2
A Jha, M Nandi
Journal of Cryptology 33 (3), 1272-1317, 2020
262020
XHX–A Framework for Optimally Secure Tweakable Block Ciphers from Classical Block Ciphers and Universal Hashing
A Jha, E List, K Minematsu, S Mishra, M Nandi
International Conference on Cryptology and Information Security in Latin …, 2017
24*2017
Revisiting structure graphs: Applications to CBC-MAC and EMAC
A Jha, M Nandi
Journal of Mathematical Cryptology 10 (3-4), 157-180, 2016
242016
HyENA
A Chakraborti, N Datta, A Jha, M Nandi
Submission to the NIST Lightweight Cryptography project, 2019
22*2019
Tight security analysis of ehtm MAC
A Dutta, A Jha, M Nandi
Cryptology ePrint Archive, 2017
182017
Elastic-tweak: A framework for short tweak tweakable block cipher
A Chakraborti, N Datta, A Jha, C Mancillas-López, M Nandi, Y Sasaki
International Conference on Cryptology in India, 114-137, 2021
172021
ESTATE
A Chakraborti, N Datta, A Jha, CM Lopez, M Nandi, Y Sasaki
Submission to NIST LwC Standardization Process (Round 2), 2019
142019
Spoc
R AlTawy, G Gong, M He, A Jha, K Mandal, M Nandi, R Rohit
Submission to NIST LwC Standardization Process (Round 2), 2019
14*2019
INT-RUP secure lightweight parallel AE modes
A Chakraborti, N Datta, A Jha, C Mancillas-López, M Nandi, Y Sasaki
IACR Transactions on Symmetric Cryptology, 81-118, 2019
142019
On the security of sponge-type authenticated encryption modes
B Chakraborty, A Jha, M Nandi
Cryptology ePrint Archive, 2019
112019
A Survey on Applications of H-Technique: Revisiting Security Analysis of PRP and PRF
A Jha, M Nandi
IACR Cryptol. ePrint Arch. 2018 (1130), 2018
10*2018
From combined to hybrid: Making feedback-based AE even smaller
A Chakraborti, N Datta, A Jha, S Mitragotri, M Nandi
IACR Transactions on Symmetric Cryptology, 417-445, 2020
82020
On the security of COMET authenticated encryption scheme
S Gueron, A Jha, M Nandi
NIST Lightweight Cryptography Workshop 2019, 2019
8*2019
On length independent security bounds for the PMAC family
B Chakraborty, S Chattopadhyay, A Jha, M Nandi
IACR Transactions on Symmetric Cryptology 2021 (2), 423-445, 2021
72021
Fine-Tuning the ISO/IEC Standard LightMAC
S Chattopadhyay, A Jha, M Nandi
Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021
62021
On rate-1 and beyond-the-birthday bound secure online ciphers using tweakable block ciphers
A Jha, M Nandi
Cryptography and Communications 10 (5), 731-753, 2018
62018
Some cryptanalytic results on Zipper hash and concatenated hash
A Jha, M Nandi
Cryptology ePrint Archive, 2015
62015
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20