[go: up one dir, main page]

Follow
Avijit Dutta
Avijit Dutta
Institute for Advancing Intelligence, TCG-CREST
Verified email at tcgcrest.org - Homepage
Title
Cited by
Cited by
Year
Double-block hash-then-sum: a paradigm for constructing BBB secure PRF
N Datta, A Dutta, M Nandi, G Paul
IACR Transactions on Symmetric Cryptology, 36-92, 2018
582018
Encrypt or decrypt? to make a single-key beyond birthday secure nonce-based MAC
N Datta, A Dutta, M Nandi, K Yasuda
Annual International Cryptology Conference, 631-661, 2018
522018
Beyond birthday bound secure MAC in faulty nonce model
A Dutta, M Nandi, S Talnikar
Annual International Conference on the Theory and Applications of …, 2019
512019
Single key variant of PMAC_Plus
N Datta, A Dutta, M Nandi, G Paul, L Zhang
Cryptology ePrint Archive, 2017
492017
Proof of Mirror Theory for ξmax = 2
A Dutta, M Nandi, A Saha
IEEE Transactions on Information Theory 68 (9), 6218-6232, 2022
392022
Release of unverified plaintext: Tight unified model and application to ANYDAE
D Chang, N Datta, A Dutta, B Mennink, M Nandi, S Sanadhya, F Sibleyras
IACR Transactions on Symmetric Cryptology 2019 (4), 119-146, 2019
332019
Permutation based EDM: an inverse free BBB secure PRF
A Dutta, M Nandi, S Talnikar
IACR Transactions on Symmetric Cryptology, 31-70, 2021
282021
Proof of Mirror Theory for a Wide Range of 
B Cogliati, A Dutta, M Nandi, J Patarin, A Saha
Annual International Conference on the Theory and Applications of …, 2023
262023
Tweakable HCTR: A BBB secure tweakable enciphering scheme
A Dutta, M Nandi
International Conference on Cryptology in India, 47-69, 2018
242018
Minimizing the two-round tweakable even-mansour cipher
A Dutta
International Conference on the Theory and Application of Cryptology and …, 2020
202020
Secure proof of ownership using merkle tree for deduplicated storage
J Dave, A Dutta, P Faruki, V Laxmi, MS Gaur
Automatic Control and Computer Sciences 54 (4), 358-370, 2020
182020
Tight security analysis of ehtm MAC
A Dutta, A Jha, M Nandi
Cryptology ePrint Archive, 2017
182017
: beyond-birthday-secure encryption from public permutations
A Bhattacharjee, A Dutta, E List, M Nandi
Designs, Codes and Cryptography 90 (6), 1381-1425, 2022
172022
BBB secure nonce based MAC using public permutations
A Dutta, M Nandi
International Conference on Cryptology in Africa, 172-191, 2020
172020
Tight multi-user security bound of DbHtS
N Datta, A Dutta, M Nandi, S Talnikar
IACR Transactions on Symmetric Cryptology, 192-223, 2023
122023
Building single-key beyond birthday bound message authentication code
N Datta, A Dutta, M Nandi, G Paul, L Zhang
Cryptology ePrint Archive, 2015
112015
Multi-user BBB security of public permutations based MAC
YL Chen, A Dutta, M Nandi
Cryptography and Communications 14 (5), 1145-1177, 2022
92022
Improved security bound of (E/D) WCDM
N Datta, A Dutta, K Dutta
IACR Transactions on Symmetric Cryptology, 138-176, 2021
82021
DWCDM+: A BBB secure nonce based MAC.
N Datta, A Dutta, M Nandi, K Yasuda
Advances in Mathematics of Communications 13 (4), 2019
82019
The iterated random function problem
R Bhaumik, N Datta, A Dutta, N Mouha, M Nandi
International Conference on the Theory and Application of Cryptology and …, 2017
82017
The system can't perform the operation now. Try again later.
Articles 1–20