What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Avijit Dutta
Google Scholar
ORCID:
0000-0003-2672-7331
25
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/cic
Sequential Indifferentiability of STH and EDM.
Nilanjan Datta
Avijit Dutta
Sougata Mandal
Hrithik Nandi
2025
conf/eurocrypt
Towards Optimally Secure Deterministic Authenticated Encryption Schemes.
Yu Long Chen
Avijit Dutta
Ashwin Jha
Mridul Nandi
2025
conf/crypto
Cryptographic Treatment of Key Control Security - In Light of NIST SP 800-108.
Ritam Bhaumik
Avijit Dutta
Akiko Inoue
Tetsu Iwata
Ashwin Jha
Kazuhiko Minematsu
Mridul Nandi
Yu Sasaki
Meltem Sönmez Turan
Stefano Tessaro
2025
journals/tosc
HCTR+: An Optimally Secure TBC-Based Accordion Mode.
Nilanjan Datta
Avijit Dutta
Shibam Ghosh
Eik List
Hrithik Nandi
2025
journals/cic
Multi User Security of LightMAC and LightMAC_Plus.
Nilanjan Datta
Shreya Dey
Avijit Dutta
Devdutta Kanungo
2024
journals/cic
FEDT: Forkcipher-based Leakage-resilient Beyond-birthday-secure AE.
Nilanjan Datta
Avijit Dutta
Eik List
Sougata Mandal
2024
conf/crypto
The Committing Security of MACs with Applications to Generic Composition.
Ritam Bhaumik
Bishwajit Chakraborty
Wonseok Choi
Avijit Dutta
Jérôme Govinden
Yaobin Shen
2024
conf/provsec
Efficient Variants of TNT with BBB Security.
Ritam Bhaumik
Wonseok Choi
Avijit Dutta
Cuauhtemoc Mancillas López
Hrithik Nandi
Yaobin Shen
2023
journals/tosc
Tight Multi-User Security Bound of DbHtS.
Nilanjan Datta
Avijit Dutta
Mridul Nandi
Suprita Talnikar
2023
journals/tosc
Cascading Four Round LRW1 is Beyond Birthday Bound Secure.
Nilanjan Datta
Shreya Dey
Avijit Dutta
Sougata Mandal
2023
conf/icics
PAE: Towards More Efficient and BBB-Secure AE from a Single Public Permutation.
Arghya Bhattacharjee
Ritam Bhaumik
Avijit Dutta
Eik List
2023
conf/eurocrypt
Proof of Mirror Theory for a Wide Range of $\xi _{\max }$.
Benoît Cogliati
Avijit Dutta
Mridul Nandi
Jacques Patarin
Abishanka Saha
2021
journals/tosc
Improved Security Bound of (E/D)WCDM.
Nilanjan Datta
Avijit Dutta
Kushankur Dutta
2021
journals/tosc
Permutation Based EDM: An Inverse Free BBB Secure PRF.
Avijit Dutta
Mridul Nandi
Suprita Talnikar
2020
conf/asiacrypt
Minimizing the Two-Round Tweakable Even-Mansour Cipher.
Avijit Dutta
2020
conf/africacrypt
BBB Secure Nonce Based MAC Using Public Permutations.
Avijit Dutta
Mridul Nandi
2019
journals/tosc
Release of Unverified Plaintext: Tight Unified Model and Application to ANYDAE.
Donghoon Chang
Nilanjan Datta
Avijit Dutta
Bart Mennink
Mridul Nandi
Somitra Sanadhya
Ferdinand Sibleyras
2019
conf/eurocrypt
Beyond Birthday Bound Secure MAC in Faulty Nonce Model.
Avijit Dutta
Mridul Nandi
Suprita Talnikar
2018
journals/tosc
Double-block Hash-then-Sum: A Paradigm for Constructing BBB Secure PRF.
Nilanjan Datta
Avijit Dutta
Mridul Nandi
Goutam Paul
2018
conf/crypto
Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based MAC.
Nilanjan Datta
Avijit Dutta
Mridul Nandi
Kan Yasuda
2017
journals/tosc
Single Key Variant of PMAC_Plus.
Nilanjan Datta
Avijit Dutta
Mridul Nandi
Goutam Paul
Liting Zhang
2017
journals/tosc
Tight Security Analysis of EHtM MAC.
Avijit Dutta
Ashwin Jha
Mridul Nandi
2017
conf/asiacrypt
The Iterated Random Function Problem.
Ritam Bhaumik
Nilanjan Datta
Avijit Dutta
Nicky Mouha
Mridul Nandi
2016
conf/acisp
One-Key Compression Function Based MAC with Security Beyond Birthday Bound.
Avijit Dutta
Mridul Nandi
Goutam Paul
2014
conf/iwsec
Deterministic Hard Fault Attack on Trivium.
Avijit Dutta
Goutam Paul
Coauthors
Abishanka Saha
(1)
Akiko Inoue
(1)
Arghya Bhattacharjee
(1)
Ashwin Jha
(3)
Avijit Dutta
(25)
Bart Mennink
(1)
Benoît Cogliati
(1)
Bishwajit Chakraborty
(1)
Cuauhtemoc Mancillas López
(1)
Devdutta Kanungo
(1)
Donghoon Chang
(1)
Eik List
(3)
Ferdinand Sibleyras
(1)
Goutam Paul
(4)
Hrithik Nandi
(3)
Jacques Patarin
(1)
Jérôme Govinden
(1)
Kan Yasuda
(1)
Kazuhiko Minematsu
(1)
Kushankur Dutta
(1)
Liting Zhang
(1)
Meltem Sönmez Turan
(1)
Mridul Nandi
(14)
Nicky Mouha
(1)
Nilanjan Datta
(12)
Ritam Bhaumik
(5)
Shibam Ghosh
(1)
Shreya Dey
(2)
Somitra Sanadhya
(1)
Sougata Mandal
(3)
Stefano Tessaro
(1)
Suprita Talnikar
(3)
Tetsu Iwata
(1)
Wonseok Choi
(2)
Yaobin Shen
(2)
Yu Long Chen
(1)
Yu Sasaki
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to