Ashwin Jha

Orcid: 0000-0001-5957-2837

Affiliations:
  • Ruhr-University Bochum, Bochum, Germany
  • CISPA Helmholtz Center for Information Security, Saarbrücken, Germany (former)
  • Indian Statistical Institute, Kolkata, India (former)


According to our database1, Ashwin Jha authored at least 41 papers between 2015 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Naor-Reingold goes Beyond-the-Birthday-Bound.
IACR Cryptol. ePrint Arch., 2025

A Note on Feedback-PRF Mode of KDF from NIST SP 800-108.
IACR Cryptol. ePrint Arch., 2025

Post-quantum Security of Key-Alternating Feistel Ciphers.
IACR Cryptol. ePrint Arch., 2025

On TRP-RF Switch in the Quantum Query Model.
IACR Commun. Cryptol., 2025

Towards Optimally Secure Deterministic Authenticated Encryption Schemes.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

Cryptographic Treatment of Key Control Security - In Light of NIST SP 800-108.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

Generic Security of GCM-SST.
Proceedings of the Applied Cryptography and Network Security, 2025

2024
On the Number of Restricted Solutions to Constrained Systems and their Applications.
IACR Cryptol. ePrint Arch., 2024

Tight Security of TNT and Beyond - Attacks, Proofs and Possibilities for the Cascaded LRW Paradigm.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

Mind the Bad Norms - Revisiting Compressed Oracle-Based Quantum Indistinguishability Proofs.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

2023
On Large Tweaks in Tweakable Even-Mansour with Linear Tweak and Key Mixing.
IACR Trans. Symmetric Cryptol., 2023

Subverting Telegram's End-to-End Encryption.
IACR Trans. Symmetric Cryptol., 2023

Revisiting Randomness Extraction and Key Derivation Using the CBC and Cascade Modes.
IACR Trans. Symmetric Cryptol., 2023

Tight Security of TNT: Reinforcing Khairallah's Birthday-bound Attack.
IACR Cryptol. ePrint Arch., 2023

Revisiting the Indifferentiability of the Sum of Permutations.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

On Quantum Secure Compressing Pseudorandom Functions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
A Survey on Applications of H-Technique: Revisiting Security Analysis of PRP and PRF.
Entropy, 2022

Towards Tight Security Bounds for OMAC, XCBC and TMAC.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

2021
Light-OCB: Parallel Lightweight Authenticated Cipher with Full Security.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2021

Revisiting the Security of COMET Authenticated Encryption Scheme.
Proceedings of the Progress in Cryptology - INDOCRYPT 2021, 2021

Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher.
Proceedings of the Progress in Cryptology - INDOCRYPT 2021, 2021

tHyENA: Making HyENA Even Smaller.
Proceedings of the Progress in Cryptology - INDOCRYPT 2021, 2021

Fine-Tuning the ISO/IEC Standard LightMAC.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
From Combined to Hybrid: Making Feedback-based AE even Smaller.
IACR Trans. Symmetric Cryptol., 2020

ESTATE: A Lightweight and Low Energy Authenticated Encryption Mode.
IACR Trans. Symmetric Cryptol., 2020

On Length Independent Security Bounds for the PMAC Family.
IACR Cryptol. ePrint Arch., 2020

How to Build Optimally Secure PRFs Using Block Ciphers.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
INT-RUP Secure Lightweight Parallel AE Modes.
IACR Trans. Symmetric Cryptol., 2019

On Random Read Access in OCB.
IEEE Trans. Inf. Theory, 2019

Tight Security of Cascaded LRW2.
IACR Cryptol. ePrint Arch., 2019

On the Security of Sponge-type Authenticated Encryption Modes.
IACR Cryptol. ePrint Arch., 2019

2018
Applications of H-Technique: Revisiting Symmetric Key Security Analysis.
IACR Cryptol. ePrint Arch., 2018

On rate-1 and beyond-the-birthday bound secure online ciphers using tweakable block ciphers.
Cryptogr. Commun., 2018

2017
A New Look at Counters: Don't Run Like Marathon in a Hundred Meter Race.
IEEE Trans. Computers, 2017

On The Exact Security of Message Authentication Using Pseudorandom Functions.
IACR Cryptol. ePrint Arch., 2017

Tight Security Analysis of EHtM MAC.
IACR Cryptol. ePrint Arch., 2017

XHX - A Framework for Optimally Secure Tweakable Block Ciphers from Classical Block Ciphers and Universal Hashing.
Proceedings of the Progress in Cryptology - LATINCRYPT 2017, 2017

2016
Revisiting structure graphs: Applications to CBC-MAC and EMAC.
J. Math. Cryptol., 2016

Revisiting Structure Graph and Its Applications to CBC-MAC and EMAC.
IACR Cryptol. ePrint Arch., 2016

Exact Security Analysis of Hash-then-Mask Type Probabilistic MAC Constructions.
IACR Cryptol. ePrint Arch., 2016

2015
Some Cryptanalytic Results on Zipper Hash and Concatenated Hash.
IACR Cryptol. ePrint Arch., 2015


  Loading...