Mridul Nandi
Mridul Nandi
Adresse e-mail validée de isical.ac.in - Page d'accueil
Titre
Citée par
Citée par
Année
Indifferentiable security analysis of popular hash functions with prefix-free padding
D Chang, S Lee, M Nandi, M Yung
International Conference on the Theory and Application of Cryptology and …, 2006
702006
Improved indifferentiability security analysis of chopMD hash function
D Chang, M Nandi
International Workshop on Fast Software Encryption, 429-443, 2008
612008
Multicollision attacks on some generalized sequential hash functions
M Nandi, DR Stinson
IEEE transactions on Information Theory 53 (2), 759-767, 2007
602007
Security analysis of the mode of JH hash function
R Bhattacharyya, A Mandal, M Nandi
International Workshop on Fast Software Encryption, 168-191, 2010
502010
Security analysis of a 2/3-rate double length compression function in the black-box model
M Nandi, W Lee, K Sakurai, S Lee
International Workshop on Fast Software Encryption, 243-254, 2005
462005
RC4-Hash: A new hash function based on RC4
D Chang, KC Gupta, M Nandi
International Conference on Cryptology in India, 80-94, 2006
382006
Beetle family of lightweight and secure authenticated encryption ciphers
A Chakraborti, N Datta, M Nandi, K Yasuda
IACR Transactions on Cryptographic Hardware and Embedded Systems, 218-241, 2018
372018
A simple and unified method of proving indistinguishability
M Nandi
International Conference on Cryptology in India, 317-334, 2006
322006
An improved security bound for HCTR
D Chakraborty, M Nandi
International Workshop on Fast Software Encryption, 289-302, 2008
302008
Status report on the first round of the SHA-3 cryptographic hash algorithm competition
A Regenscheid, S Zhang, J Kelsey, M Nandi, S Paul, R Perlner, ...
US Department of Commerce, National Institute of Standards and Technology, 2009
292009
High speed implementation of authenticated encryption for the MSP430X microcontroller
CPL Gouvêa, J López
International Conference on Cryptology and Information Security in Latin …, 2012
282012
Fast and secure CBC-type MAC algorithms
M Nandi
International Workshop on Fast Software Encryption, 375-393, 2009
282009
A keyed sponge construction with pseudorandomness in the standard model
D Chang, M Dworkin, S Hong, J Kelsey, M Nandi
The Third SHA-3 Candidate Conference (March 2012) 3, 7, 2012
262012
Towards optimal double-length hash functions
M Nandi
International Conference on Cryptology in India, 77-89, 2005
262005
Blockcipher-based authenticated encryption: how small can we go?
A Chakraborti, T Iwata, K Minematsu, M Nandi
Journal of Cryptology, 1-39, 2019
242019
Speeding up the wide-pipe: Secure and fast hashing
M Nandi, S Paul
International Conference on Cryptology in India, 144-162, 2010
242010
TriviA: a fast and secure authenticated encryption scheme
A Chakraborti, A Chattopadhyay, M Hassan, M Nandi
International Workshop on Cryptographic Hardware and Embedded Systems, 330-353, 2015
232015
Indifferentiability of the Hash Algorithm BLAKE.
D Chang, M Nandi, M Yung
IACR Cryptol. ePrint Arch. 2011, 623, 2011
212011
Improved security analysis of PMAC
M Nandi, A Mandal
Journal of Mathematical Cryptology 2 (2), 149-162, 2008
212008
Revisiting Security Claims of XLS and COPA.
M Nandi
IACR Cryptol. ePrint Arch. 2015, 444, 2015
202015
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20