What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Ashwin Jha
Google Scholar
ORCID:
0000-0001-5957-2837
23
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/cic
On TRP-RF Switch in the Quantum Query Model.
Ashwin Jha
2025
conf/acns
Generic Security of GCM-SST.
Akiko Inoue
Ashwin Jha
Bart Mennink
Kazuhiko Minematsu
2025
conf/eurocrypt
Towards Optimally Secure Deterministic Authenticated Encryption Schemes.
Yu Long Chen
Avijit Dutta
Ashwin Jha
Mridul Nandi
2025
conf/crypto
Cryptographic Treatment of Key Control Security - In Light of NIST SP 800-108.
Ritam Bhaumik
Avijit Dutta
Akiko Inoue
Tetsu Iwata
Ashwin Jha
Kazuhiko Minematsu
Mridul Nandi
Yu Sasaki
Meltem Sönmez Turan
Stefano Tessaro
2024
conf/eurocrypt
Tight Security of TNT and Beyond - Attacks, Proofs and Possibilities for the Cascaded LRW Paradigm.
Ashwin Jha
Mustafa Khairallah
Mridul Nandi
Abishanka Saha
2024
conf/asiacrypt
Mind the Bad Norms - Revisiting Compressed Oracle-Based Quantum Indistinguishability Proofs.
Ritam Bhaumik
Benoît Cogliati
Jordan Ethan
Ashwin Jha
2023
journals/tosc
Revisiting Randomness Extraction and Key Derivation Using the CBC and Cascade Modes.
Niranjan Balachandran
Ashwin Jha
Mridul Nandi
Soumit Pal
2023
journals/tosc
On Large Tweaks in Tweakable Even-Mansour with Linear Tweak and Key Mixing.
Benoît Cogliati
Jordan Ethan
Ashwin Jha
Soumya Kanti Saha
2023
journals/tosc
Subverting Telegram's End-to-End Encryption.
Benoît Cogliati
Jordan Ethan
Ashwin Jha
2023
conf/crypto
Revisiting the Indifferentiability of the Sum of Permutations.
Aldo Gunsing
Ritam Bhaumik
Ashwin Jha
Bart Mennink
Yaobin Shen
2023
conf/asiacrypt
On Quantum Secure Compressing Pseudorandom Functions.
Ritam Bhaumik
Benoît Cogliati
Jordan Ethan
Ashwin Jha
2022
conf/asiacrypt
Towards Tight Security Bounds for OMAC, XCBC and TMAC.
Soumya Chattopadhyay
Ashwin Jha
Mridul Nandi
2021
journals/tosc
On Length Independent Security Bounds for the PMAC Family.
Bishwajit Chakraborty
Soumya Chattopadhyay
Ashwin Jha
Mridul Nandi
2021
conf/asiacrypt
Fine-Tuning the ISO/IEC Standard LightMAC.
Soumya Chattopadhyay
Ashwin Jha
Mridul Nandi
2020
journals/tosc
ESTATE: A Lightweight and Low Energy Authenticated Encryption Mode.
Avik Chakraborti
Nilanjan Datta
Ashwin Jha
Cuauhtemoc Mancillas-López
Mridul Nandi
Yu Sasaki
2020
journals/tosc
From Combined to Hybrid: Making Feedback-based AE even Smaller.
Avik Chakraborti
Nilanjan Datta
Ashwin Jha
Snehal Mitragotri
Mridul Nandi
2020
journals/tosc
On the Security of Sponge-type Authenticated Encryption Modes.
Bishwajit Chakraborty
Ashwin Jha
Mridul Nandi
2020
journals/joc
Tight Security of Cascaded LRW2.
Ashwin Jha
Mridul Nandi
2020
conf/asiacrypt
How to Build Optimally Secure PRFs Using Block Ciphers.
Benoît Cogliati
Ashwin Jha
Mridul Nandi
2019
journals/tosc
INT-RUP Secure Lightweight Parallel AE Modes.
Avik Chakraborti
Nilanjan Datta
Ashwin Jha
Cuauhtemoc Mancillas-López
Mridul Nandi
Yu Sasaki
2017
journals/tosc
Tight Security Analysis of EHtM MAC.
Avijit Dutta
Ashwin Jha
Mridul Nandi
2017
journals/tosc
On The Exact Security of Message Authentication Using Pseudorandom Functions.
Ashwin Jha
Avradip Mandal
Mridul Nandi
2017
conf/latincrypt
XHX - A Framework for Optimally Secure Tweakable Block Ciphers from Classical Block Ciphers and Universal Hashing.
Ashwin Jha
Eik List
Kazuhiko Minematsu
Sweta Mishra
Mridul Nandi
Coauthors
Abishanka Saha
(1)
Akiko Inoue
(2)
Aldo Gunsing
(1)
Ashwin Jha
(23)
Avijit Dutta
(3)
Avik Chakraborti
(3)
Avradip Mandal
(1)
Bart Mennink
(2)
Benoît Cogliati
(5)
Bishwajit Chakraborty
(2)
Cuauhtemoc Mancillas-López
(2)
Eik List
(1)
Jordan Ethan
(4)
Kazuhiko Minematsu
(3)
Meltem Sönmez Turan
(1)
Mridul Nandi
(16)
Mustafa Khairallah
(1)
Nilanjan Datta
(3)
Niranjan Balachandran
(1)
Ritam Bhaumik
(4)
Snehal Mitragotri
(1)
Soumit Pal
(1)
Soumya Chattopadhyay
(3)
Soumya Kanti Saha
(1)
Stefano Tessaro
(1)
Sweta Mishra
(1)
Tetsu Iwata
(1)
Yaobin Shen
(1)
Yu Long Chen
(1)
Yu Sasaki
(3)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to