What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Mridul Nandi
Google Scholar
76
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/istr
COLM under attack: A cryptanalytic exploration of COLM variants.
Debasmita Chakraborty
Mridul Nandi
2025
conf/eurocrypt
Towards Optimally Secure Deterministic Authenticated Encryption Schemes.
Yu Long Chen
Avijit Dutta
Ashwin Jha
Mridul Nandi
2025
conf/crypto
Cryptographic Treatment of Key Control Security - In Light of NIST SP 800-108.
Ritam Bhaumik
Avijit Dutta
Akiko Inoue
Tetsu Iwata
Ashwin Jha
Kazuhiko Minematsu
Mridul Nandi
Yu Sasaki
Meltem Sönmez Turan
Stefano Tessaro
2024
journals/cic
Lower Bound on Number of Compression Calls of a Collision-Resistance Preserving Hash.
Debasmita Chakraborty
Mridul Nandi
2024
journals/joc
The COLM Authenticated Encryption Scheme.
Elena Andreeva
Andrey Bogdanov
Nilanjan Datta
Atul Luykx
Bart Mennink
Mridul Nandi
Elmar Tischhauser
Kan Yasuda
2024
conf/acisp
Tight Multi-user Security of Ascon and Its Large Key Extension.
Bishwajit Chakraborty
Chandranan Dhar
Mridul Nandi
2024
conf/eurocrypt
Tight Security of TNT and Beyond - Attacks, Proofs and Possibilities for the Cascaded LRW Paradigm.
Ashwin Jha
Mustafa Khairallah
Mridul Nandi
Abishanka Saha
2024
conf/sacrypt
Provably Secure Online Authenticated Encryption and Bidirectional Online Channels.
Arghya Bhattacharjee
Ritam Bhaumik
Daniel Collins
Mridul Nandi
2023
journals/tosc
Tight Multi-User Security Bound of DbHtS.
Nilanjan Datta
Avijit Dutta
Mridul Nandi
Suprita Talnikar
2023
journals/tosc
Revisiting Randomness Extraction and Key Derivation Using the CBC and Cascade Modes.
Niranjan Balachandran
Ashwin Jha
Mridul Nandi
Soumit Pal
2023
conf/eurocrypt
Proof of Mirror Theory for a Wide Range of $\xi _{\max }$.
Benoît Cogliati
Avijit Dutta
Mridul Nandi
Jacques Patarin
Abishanka Saha
2023
conf/asiacrypt
Exact Security Analysis of ASCON.
Bishwajit Chakraborty
Chandranan Dhar
Mridul Nandi
2022
conf/asiacrypt
Towards Tight Security Bounds for OMAC, XCBC and TMAC.
Soumya Chattopadhyay
Ashwin Jha
Mridul Nandi
2022
conf/sacrypt
A Sponge-Based PRF with Good Multi-user Security.
Arghya Bhattacharjee
Ritam Bhaumik
Mridul Nandi
2021
journals/tosc
On Length Independent Security Bounds for the PMAC Family.
Bishwajit Chakraborty
Soumya Chattopadhyay
Ashwin Jha
Mridul Nandi
2021
journals/tosc
Permutation Based EDM: An Inverse Free BBB Secure PRF.
Avijit Dutta
Mridul Nandi
Suprita Talnikar
2021
conf/asiacrypt
Luby-Rackoff Backwards with More Users and More Security.
Srimanta Bhattacharya
Mridul Nandi
2021
conf/asiacrypt
Fine-Tuning the ISO/IEC Standard LightMAC.
Soumya Chattopadhyay
Ashwin Jha
Mridul Nandi
2020
journals/tosc
ESTATE: A Lightweight and Low Energy Authenticated Encryption Mode.
Avik Chakraborti
Nilanjan Datta
Ashwin Jha
Cuauhtemoc Mancillas-López
Mridul Nandi
Yu Sasaki
2020
journals/tosc
From Combined to Hybrid: Making Feedback-based AE even Smaller.
Avik Chakraborti
Nilanjan Datta
Ashwin Jha
Snehal Mitragotri
Mridul Nandi
2020
journals/tosc
On the Composition of Single-Keyed Tweakable Even-Mansour for Achieving BBB Security.
Avik Chakraborti
Mridul Nandi
Suprita Talnikar
Kan Yasuda
2020
journals/tosc
On the Security of Sponge-type Authenticated Encryption Modes.
Bishwajit Chakraborty
Ashwin Jha
Mridul Nandi
2020
journals/joc
Blockcipher-Based Authenticated Encryption: How Small Can We Go?
Avik Chakraborti
Tetsu Iwata
Kazuhiko Minematsu
Mridul Nandi
2020
journals/joc
Tight Security of Cascaded LRW2.
Ashwin Jha
Mridul Nandi
2020
conf/eurocrypt
Mind the Composition: Birthday Bound Attacks on EWCDMD and SoKAC21.
Mridul Nandi
2020
conf/asiacrypt
How to Build Optimally Secure PRFs Using Block Ciphers.
Benoît Cogliati
Ashwin Jha
Mridul Nandi
2020
conf/africacrypt
BBB Secure Nonce Based MAC Using Public Permutations.
Avijit Dutta
Mridul Nandi
2019
journals/tosc
INT-RUP Secure Lightweight Parallel AE Modes.
Avik Chakraborti
Nilanjan Datta
Ashwin Jha
Cuauhtemoc Mancillas-López
Mridul Nandi
Yu Sasaki
2019
journals/tosc
Release of Unverified Plaintext: Tight Unified Model and Application to ANYDAE.
Donghoon Chang
Nilanjan Datta
Avijit Dutta
Bart Mennink
Mridul Nandi
Somitra Sanadhya
Ferdinand Sibleyras
2019
journals/tosc
DoveMAC: A TBC-based PRF with Smaller State, Full Security, and High Rate.
Tony Grochow
Eik List
Mridul Nandi
2019
conf/eurocrypt
Beyond Birthday Bound Secure MAC in Faulty Nonce Model.
Avijit Dutta
Mridul Nandi
Suprita Talnikar
2018
journals/tches
Beetle Family of Lightweight and Secure Authenticated Encryption Ciphers.
Avik Chakraborti
Nilanjan Datta
Mridul Nandi
Kan Yasuda
2018
journals/tosc
Double-block Hash-then-Sum: A Paradigm for Constructing BBB Secure PRF.
Nilanjan Datta
Avijit Dutta
Mridul Nandi
Goutam Paul
2018
journals/tosc
Revisiting Variable Output Length XOR Pseudorandom Function.
Srimanta Bhattacharya
Mridul Nandi
2018
conf/crypto
Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based MAC.
Nilanjan Datta
Avijit Dutta
Mridul Nandi
Kan Yasuda
2018
conf/crypto
Bernstein Bound on WCS is Tight - Repairing Luykx-Preneel Optimal Forgeries.
Mridul Nandi
2018
conf/crypto
Generic Attacks Against Beyond-Birthday-Bound MACs.
Gaëtan Leurent
Mridul Nandi
Ferdinand Sibleyras
2018
conf/eurocrypt
Full Indifferentiable Security of the Xor of Two or More Random Permutations Using the \chi ^2 Method.
Srimanta Bhattacharya
Mridul Nandi
2018
conf/asiacrypt
Short Variable Length Domain Extenders with Beyond Birthday Bound Security.
Yu Long Chen
Bart Mennink
Mridul Nandi
2018
conf/asiacrypt
ZCZ - Achieving n-bit SPRP Security with a Minimal Number of Tweakable-Block-Cipher Calls.
Ritam Bhaumik
Eik List
Mridul Nandi
2017
journals/tosc
ZMAC+ - An Efficient Variable-output-length Variant of ZMAC.
Eik List
Mridul Nandi
2017
journals/tosc
Single Key Variant of PMAC_Plus.
Nilanjan Datta
Avijit Dutta
Mridul Nandi
Goutam Paul
Liting Zhang
2017
journals/tosc
Turning Online Ciphers Off.
Elena Andreeva
Guy Barwell
Ritam Bhaumik
Mridul Nandi
Dan Page
Martijn Stam
2017
journals/tosc
Tight Security Analysis of EHtM MAC.
Avijit Dutta
Ashwin Jha
Mridul Nandi
2017
journals/tosc
On The Exact Security of Message Authentication Using Pseudorandom Functions.
Ashwin Jha
Avradip Mandal
Mridul Nandi
2017
journals/tosc
Understanding RUP Integrity of COLM.
Nilanjan Datta
Atul Luykx
Bart Mennink
Mridul Nandi
2017
conf/latincrypt
XHX - A Framework for Optimally Secure Tweakable Block Ciphers from Classical Block Ciphers and Universal Hashing.
Ashwin Jha
Eik List
Kazuhiko Minematsu
Sweta Mishra
Mridul Nandi
2017
conf/ches
Blockcipher-Based Authenticated Encryption: How Small Can We Go?
Avik Chakraborti
Tetsu Iwata
Kazuhiko Minematsu
Mridul Nandi
2017
conf/ctrsa
Revisiting Full-PRF-Secure PMAC and Using It for Beyond-Birthday Authenticated Encryption.
Eik List
Mridul Nandi
2017
conf/asiacrypt
Improved Security for OCB3.
Ritam Bhaumik
Mridul Nandi
2017
conf/asiacrypt
The Iterated Random Function Problem.
Ritam Bhaumik
Nilanjan Datta
Avijit Dutta
Nicky Mouha
Mridul Nandi
2016
journals/tosc
OleF: an Inverse-Free Online Cipher. An Online SPRP with an Optimal Inverse-Free Construction.
Ritam Bhaumik
Mridul Nandi
2016
conf/acisp
One-Key Compression Function Based MAC with Security Beyond Birthday Bound.
Avijit Dutta
Mridul Nandi
Goutam Paul
2016
conf/ctrsa
INT-RUP Analysis of Block-cipher Based Authenticated Encryption Schemes.
Avik Chakraborti
Nilanjan Datta
Mridul Nandi
2015
conf/ches
TriviA: A Fast and Secure Authenticated Encryption Scheme.
Avik Chakraborti
Anupam Chattopadhyay
Muhammad Hassan
Mridul Nandi
2015
conf/asiacrypt
On the Optimality of Non-Linear Computations of Length-Preserving Encryption Schemes.
Mridul Nandi
2015
conf/asiacrypt
An Inverse-Free Single-Keyed Tweakable Enciphering Scheme.
Ritam Bhaumik
Mridul Nandi
2014
conf/fse
On the Minimum Number of Multiplications Necessary for Universal Hash Functions.
Mridul Nandi
2014
conf/acisp
ELmE: A Misuse Resistant Parallel Authenticated Encryption.
Nilanjan Datta
Mridul Nandi
2014
conf/provsec
Equivalence between MAC, WCR and PRF for Blockcipher Based Constructions.
Nilanjan Datta
Mridul Nandi
2014
conf/iwsec
Characterization of EME with Linear Mixing.
Nilanjan Datta
Mridul Nandi
2014
conf/asiacrypt
Forging Attacks on Two Authenticated Encryption Schemes COBRA and POET.
Mridul Nandi
2014
conf/asiacrypt
XLS is Not a Strong Pseudorandom Permutation.
Mridul Nandi
2011
conf/fse
On the Security of Hash Functions Employing Blockcipher Postprocessing.
Donghoon Chang
Mridul Nandi
Moti Yung
2010
conf/fse
A Unified Method for Improving PRF Bounds for a Class of Blockcipher Based MACs.
Mridul Nandi
2010
conf/fse
Security Analysis of the Mode of JH Hash Function.
Rishiraj Bhattacharyya
Avradip Mandal
Mridul Nandi
2010
conf/iciss
Stamp-It: A Method for Enhancing the Universal Verifiability of E2E Voting Systems.
Mridul Nandi
Stefan Popoveniuc
Poorvi L. Vora
2009
conf/fse
Fast and Secure CBC-Type MAC Algorithms.
Mridul Nandi
2009
conf/acisp
Characterizing Padding Rules of MD Hash Functions Preserving Collision Security.
Mridul Nandi
2008
conf/fse
An Improved Security Bound for HCTR.
Debrup Chakraborty
Mridul Nandi
2008
conf/fse
Improved Indifferentiability Security Analysis of chopMD Hash Function.
Donghoon Chang
Mridul Nandi
2006
conf/asiacrypt
Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding.
Donghoon Chang
Sangjin Lee
Mridul Nandi
Moti Yung
2005
conf/fse
Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model.
Mridul Nandi
Wonil Lee
Kouichi Sakurai
Sangjin Lee
2004
conf/acisp
Pseudorandomness of SPN-Type Transformations.
Wonil Lee
Mridul Nandi
Palash Sarkar
Donghoon Chang
Sangjin Lee
Kouichi Sakurai
2004
conf/sacrypt
A Sufficient Condition for Optimal Domain Extension of UOWHFs.
Mridul Nandi
2003
conf/asiacrypt
New Parallel Domain Extenders for UOWHF.
Wonil Lee
Donghoon Chang
Sangjin Lee
Soo Hak Sung
Mridul Nandi
Coauthors
Abishanka Saha
(2)
Akiko Inoue
(1)
Andrey Bogdanov
(1)
Anupam Chattopadhyay
(1)
Arghya Bhattacharjee
(2)
Ashwin Jha
(16)
Atul Luykx
(2)
Avijit Dutta
(14)
Avik Chakraborti
(9)
Avradip Mandal
(2)
Bart Mennink
(4)
Benoît Cogliati
(2)
Bishwajit Chakraborty
(4)
Chandranan Dhar
(2)
Cuauhtemoc Mancillas-López
(2)
Dan Page
(1)
Daniel Collins
(1)
Debasmita Chakraborty
(2)
Debrup Chakraborty
(1)
Donghoon Chang
(6)
Eik List
(5)
Elena Andreeva
(2)
Elmar Tischhauser
(1)
Ferdinand Sibleyras
(2)
Gaëtan Leurent
(1)
Goutam Paul
(3)
Guy Barwell
(1)
Jacques Patarin
(1)
Kan Yasuda
(4)
Kazuhiko Minematsu
(4)
Kouichi Sakurai
(2)
Liting Zhang
(1)
Martijn Stam
(1)
Meltem Sönmez Turan
(1)
Moti Yung
(2)
Mridul Nandi
(76)
Muhammad Hassan
(1)
Mustafa Khairallah
(1)
Nicky Mouha
(1)
Nilanjan Datta
(16)
Niranjan Balachandran
(1)
Palash Sarkar
(1)
Poorvi L. Vora
(1)
Rishiraj Bhattacharyya
(1)
Ritam Bhaumik
(9)
Sangjin Lee
(4)
Snehal Mitragotri
(1)
Somitra Sanadhya
(1)
Soo Hak Sung
(1)
Soumit Pal
(1)
Soumya Chattopadhyay
(3)
Srimanta Bhattacharya
(3)
Stefan Popoveniuc
(1)
Stefano Tessaro
(1)
Suprita Talnikar
(4)
Sweta Mishra
(1)
Tetsu Iwata
(3)
Tony Grochow
(1)
Wonil Lee
(3)
Yu Long Chen
(2)
Yu Sasaki
(3)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to