Mridul Nandi
Mridul Nandi
Adresse e-mail validée de isical.ac.in - Page d'accueil
Titre
Citée par
Citée par
Année
Indifferentiable security analysis of popular hash functions with prefix-free padding
D Chang, S Lee, M Nandi, M Yung
International Conference on the Theory and Application of Cryptology and …, 2006
682006
Improved indifferentiability security analysis of chopMD hash function
D Chang, M Nandi
International Workshop on Fast Software Encryption, 429-443, 2008
602008
Multicollision attacks on some generalized sequential hash functions
M Nandi, DR Stinson
IEEE transactions on Information Theory 53 (2), 759-767, 2007
602007
Security analysis of the mode of JH hash function
R Bhattacharyya, A Mandal, M Nandi
International Workshop on Fast Software Encryption, 168-191, 2010
492010
Security analysis of a 2/3-rate double length compression function in the black-box model
M Nandi, W Lee, K Sakurai, S Lee
International Workshop on Fast Software Encryption, 243-254, 2005
462005
RC4-Hash: A new hash function based on RC4
D Chang, KC Gupta, M Nandi
International Conference on Cryptology in India, 80-94, 2006
402006
A simple and unified method of proving indistinguishability
M Nandi
International Conference on Cryptology in India, 317-334, 2006
322006
Beetle family of lightweight and secure authenticated encryption ciphers
A Chakraborti, N Datta, M Nandi, K Yasuda
IACR Transactions on Cryptographic Hardware and Embedded Systems, 218-241, 2018
302018
An improved security bound for HCTR
D Chakraborty, M Nandi
International Workshop on Fast Software Encryption, 289-302, 2008
302008
Status report on the first round of the SHA-3 cryptographic hash algorithm competition
A Regenscheid, S Zhang, J Kelsey, M Nandi, S Paul, R Perlner, ...
US Department of Commerce, National Institute of Standards and Technology, 2009
292009
High speed implementation of authenticated encryption for the MSP430X microcontroller
CPL Gouvêa, J López
International Conference on Cryptology and Information Security in Latin …, 2012
282012
Fast and secure CBC-type MAC algorithms
M Nandi
International Workshop on Fast Software Encryption, 375-393, 2009
282009
Towards optimal double-length hash functions
M Nandi
International Conference on Cryptology in India, 77-89, 2005
272005
Speeding up the wide-pipe: Secure and fast hashing
M Nandi, S Paul
International Conference on Cryptology in India, 144-162, 2010
262010
A keyed sponge construction with pseudorandomness in the standard model
D Chang, M Dworkin, S Hong, J Kelsey, M Nandi
The Third SHA-3 Candidate Conference (March 2012) 3, 7, 2012
252012
TriviA: a fast and secure authenticated encryption scheme
A Chakraborti, A Chattopadhyay, M Hassan, M Nandi
International Workshop on Cryptographic Hardware and Embedded Systems, 330-353, 2015
232015
Blockcipher-based authenticated encryption: how small can we go?
A Chakraborti, T Iwata, K Minematsu, M Nandi
Journal of Cryptology, 1-39, 2019
212019
Revisiting Security Claims of XLS and COPA.
M Nandi
IACR Cryptology ePrint Archive 2015, 444, 2015
212015
Indifferentiability of the Hash Algorithm BLAKE.
D Chang, M Nandi, M Yung
IACR Cryptology ePrint Archive 2011, 623, 2011
212011
ELmE: A Misuse Resistant Parallel Authenticated Encryption
N Datta, M Nandi
Australasian Conference on Information Security and Privacy, 306-321, 2014
202014
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20