Mridul Nandi
Orcid: 0000000210296576Affiliations:
 Indian Statistical Institute, Kolkata, India
According to our database^{1},
Mridul Nandi
authored at least 173 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:

on orcid.org
On csauthors.net:
Bibliography
2024
J. Cryptol., June, 2024
Des. Codes Cryptogr., January, 2024
On the Number of Restricted Solutions to Constrained Systems and their Applications.
IACR Cryptol. ePrint Arch., 2024
Lower Bound on Number of Compression Calls of a CollisionResistance Preserving Hash.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
2023
Subversion Resilient Hashing: Efficient Constructions and Modular Proofs for Crooked Indifferentiability.
IEEE Trans. Inf. Theory, May, 2023
IACR Trans. Symmetric Cryptol., 2023
Revisiting Randomness Extraction and Key Derivation Using the CBC and Cascade Modes.
IACR Trans. Symmetric Cryptol., 2023
IACR Cryptol. ePrint Arch., 2023
Tight Security of TNT and Beyond: Attacks, Proofs and Possibilities for the Cascaded LRW Paradigm.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
CoRR, 2023
Proceedings of the Advances in Cryptology  EUROCRYPT 2023, 2023
Indifferentiability of the ConfusionDiffusion Network and the Cascade Block Cipher.
Proceedings of the Codes, Cryptology and Information Security, 2023
2022
IEEE Trans. Inf. Theory, 2022
J. Math. Cryptol., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
A Survey on Applications of HTechnique: Revisiting Security Analysis of PRP and PRF.
Entropy, 2022
Des. Codes Cryptogr., 2022
Cryptogr. Commun., 2022
Adv. Math. Commun., 2022
Proceedings of the Progress in Cryptology  INDOCRYPT 2022, 2022
Proceedings of the 3rd Conference on InformationTheoretic Cryptography, 2022
2021
IACR Trans. Symmetric Cryptol., 2021
IACR Trans. Symmetric Cryptol., 2021
J. Math. Cryptol., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Des. Codes Cryptogr., 2021
CoRR, 2021
Proceedings of the Progress in Cryptology  INDOCRYPT 2021, 2021
Proceedings of the Progress in Cryptology  INDOCRYPT 2021, 2021
Proceedings of the 2nd Conference on InformationTheoretic Cryptography, 2021
Proceedings of the Advances in Cryptology  ASIACRYPT 2021, 2021
2020
IACR Trans. Symmetric Cryptol., 2020
On the Composition of SingleKeyed Tweakable EvenMansour for Achieving BBB Security.
IACR Trans. Symmetric Cryptol., 2020
IACR Trans. Symmetric Cryptol., 2020
IACR Trans. Symmetric Cryptol., 2020
J. Cryptol., 2020
J. Cryptol., 2020
Int. J. Appl. Cryptogr., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
2019
IACR Trans. Symmetric Cryptol., 2019
IACR Trans. Symmetric Cryptol., 2019
IACR Trans. Symmetric Cryptol., 2019
IEEE Trans. Inf. Theory, 2019
J. Math. Cryptol., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Adv. Math. Commun., 2019
2018
IACR Trans. Symmetric Cryptol., 2018
IACR Trans. Symmetric Cryptol., 2018
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018
J. Math. Cryptol., 2018
J. Cryptogr. Eng., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
ZCZ  Achieving nbit SPRP Security with a Minimal Number of Tweakableblockcipher Calls.
IACR Cryptol. ePrint Arch., 2018
Full Indifferentiable Security of the Xor of Two or More Random Permutations Using the χ<sup>2</sup> Method.
IACR Cryptol. ePrint Arch., 2018
On rate1 and beyondthebirthday bound secure online ciphers using tweakable block ciphers.
Cryptogr. Commun., 2018
Cryptogr. Commun., 2018
Appl. Algebra Eng. Commun. Comput., 2018
Full Indifferentiable Security of the Xor of Two or More Random Permutations Using the \chi ^2 Method.
Proceedings of the Advances in Cryptology  EUROCRYPT 2018  37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018
2017
IACR Trans. Symmetric Cryptol., 2017
IACR Trans. Symmetric Cryptol., 2017
IACR Trans. Symmetric Cryptol., 2017
IACR Trans. Symmetric Cryptol., 2017
IACR Trans. Symmetric Cryptol., 2017
IACR Trans. Symmetric Cryptol., 2017
IEEE Trans. Computers, 2017
J. Hardw. Syst. Secur., 2017
IACR Cryptol. ePrint Arch., 2017
XHX  A Framework for Optimally Secure Tweakable Block Ciphers from Classical Block Ciphers and Universal Hashing.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Cryptogr., 2017
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2017
2016
OleF: an InverseFree Online Cipher. An Online SPRP with an Optimal InverseFree Construction.
IACR Trans. Symmetric Cryptol., 2016
IEEE Trans. Computers, 2016
J. Math. Cryptol., 2016
J. Math. Cryptol., 2016
Revisiting FullPRFSecure PMAC and Using It for BeyondBirthday Authenticated Encryption.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2016
Proceedings of the Topics in Cryptology  CTRSA 2016  The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29, 2016
Proceedings of the Information Security and Privacy  21st Australasian Conference, 2016
2015
IEEE Trans. Inf. Theory, 2015
On the Power of Pair Encodings: Frameworks for Predicate Cryptographic Primitives.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
On the Optimality of NonLinear Computations of LengthPreserving Encryption Schemes.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Provable Security  8th International Conference, 2014
Proceedings of the Fast Software Encryption  21st International Workshop, 2014
Proceedings of the Advances in Cryptology  ASIACRYPT 2014, 2014
Proceedings of the Information Security and Privacy  19th Australasian Conference, 2014
2013
On the Minimum Number of Multiplications Necessary for Universal Hash Constructions.
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the 6th International Conference on Security of Information and Networks, 2013
2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the EVoting and Identity  Third International Conference, 2011
2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Progress in Cryptology  INDOCRYPT 2010, 2010
Proceedings of the Progress in Cryptology  INDOCRYPT 2010, 2010
StampIt: A Method for Enhancing the Universal Verifiability of E2E Voting Systems.
Proceedings of the Information Systems Security  6th International Conference, 2010
Proceedings of the Fast Software Encryption, 17th International Workshop, 2010
2009
J. Math. Cryptol., 2009
IACR Cryptol. ePrint Arch., 2009
Computación y Sistemas, 2009
Indifferentiability Characterization of Hash Functions and Optimal Bounds of Popular Domain Extensions.
Proceedings of the Progress in Cryptology, 2009
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009
2008
J. Math. Cryptol., 2008
Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008
2007
IEEE Trans. Inf. Theory, 2007
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function.
IACR Cryptol. ePrint Arch., 2007
2006
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Progress in Cryptology, 2006
Proceedings of the Progress in Cryptology, 2006
Indifferentiable Security Analysis of Popular Hash Functions with PrefixFree Padding.
Proceedings of the Advances in Cryptology, 2006
2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
Proceedings of the Progress in Cryptology, 2005
Security Analysis of a 2/3Rate Double Length Compression Function in the BlackBox Model.
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005
2004
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
Proceedings of the Selected Areas in Cryptography, 11th International Workshop, 2004
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
2003
IACR Cryptol. ePrint Arch., 2003
IACR Cryptol. ePrint Arch., 2003
Proceedings of the Advances in Cryptology  ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003