Nilanjan Datta

According to our database1, Nilanjan Datta authored at least 44 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
The COLM Authenticated Encryption Scheme.
J. Cryptol., June, 2024

2023
Tight Multi-User Security Bound of DbHtS.
IACR Trans. Symmetric Cryptol., 2023

On the Security of Triplex- and Multiplex-type Constructions with Smaller Tweaks.
IACR Cryptol. ePrint Arch., 2023

Tight Security Bound of 2k-LightMAC Plus.
IACR Cryptol. ePrint Arch., 2023

Cascading Four Round LRW1 is Beyond Birthday Bound Secure.
IACR Cryptol. ePrint Arch., 2023

Designing Full-Rate Sponge based AEAD modes.
IACR Cryptol. ePrint Arch., 2023

2022
Tight Multi-User Security Bound of sfDbHtS.
IACR Cryptol. ePrint Arch., 2022

INT-RUP Security of SAEB and TinyJAMBU.
IACR Cryptol. ePrint Arch., 2022

ISAP+: ISAP with Fast Authentication.
IACR Cryptol. ePrint Arch., 2022

Light but Tight: Lightweight Composition of Serialized S-Boxes with Diffusion Layers for Strong Ciphers.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2022

sf ISAP+: sf ISAP with Fast Authentication.
Proceedings of the Progress in Cryptology - INDOCRYPT 2022, 2022

2021
Improved Security Bound of (E/D)WCDM.
IACR Trans. Symmetric Cryptol., 2021

Improved Security Bound of \textsf{(E/D)WCDM}.
IACR Cryptol. ePrint Arch., 2021

Light-OCB: Parallel Lightweight Authenticated Cipher with Full Security.
IACR Cryptol. ePrint Arch., 2021

tHyENA: Making HyENA Even Smaller.
Proceedings of the Progress in Cryptology - INDOCRYPT 2021, 2021

2020
From Combined to Hybrid: Making Feedback-based AE even Smaller.
IACR Trans. Symmetric Cryptol., 2020

ESTATE: A Lightweight and Low Energy Authenticated Encryption Mode.
IACR Trans. Symmetric Cryptol., 2020

2019
Power Efficiency of S-Boxes: From a Machine-Learning-Based Tool to a Deterministic Model.
IEEE Trans. Very Large Scale Integr. Syst., 2019

INT-RUP Secure Lightweight Parallel AE Modes.
IACR Trans. Symmetric Cryptol., 2019

SCADFA: Combined SCA+DFA Attacks on Block Ciphers with Practical Validations.
IEEE Trans. Computers, 2019

Modeling Power Efficiency of S-boxes Using Machine Learning.
IACR Cryptol. ePrint Arch., 2019

Release of Unverified Plaintext: Tight Unified Model and Application to ANYDAE.
IACR Cryptol. ePrint Arch., 2019

Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher.
IACR Cryptol. ePrint Arch., 2019

sfDWCDM+: A BBB secure nonce based MAC.
Adv. Math. Commun., 2019

A Machine Learning Based Approach to Predict Power Efficiency of S-Boxes.
Proceedings of the 32nd International Conference on VLSI Design and 18th International Conference on Embedded Systems, 2019

2018
Lightweight and Side-channel Secure 4 × 4 S-Boxes from Cellular Automata Rules.
IACR Trans. Symmetric Cryptol., 2018

Beetle Family of Lightweight and Secure Authenticated Encryption Ciphers.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

On the optimality of non-linear computations for symmetric key primitives.
J. Math. Cryptol., 2018

Lightweight and Side-channel Secure 4x4 S-Boxes from Cellular Automata Rules.
IACR Cryptol. ePrint Arch., 2018

Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based MAC.
IACR Cryptol. ePrint Arch., 2018

Double-block Hash-then-Sum: A Paradigm for Constructing BBB Secure PRF.
IACR Cryptol. ePrint Arch., 2018

2017
Understanding RUP Integrity of COLM.
IACR Cryptol. ePrint Arch., 2017

Single Key Variant of PMAC_Plus.
IACR Cryptol. ePrint Arch., 2017

The Iterated Random Function Problem.
IACR Cryptol. ePrint Arch., 2017

Practical Fault Attacks on Minalpher: How to Recover Key with Minimum Faults?
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2017

2016
ELmD: A Pipelineable Authenticated Encryption and Its Hardware Implementation.
IEEE Trans. Computers, 2016

INT-RUP Analysis of Block-cipher Based Authenticated Encryption Schemes.
Proceedings of the Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29, 2016

2015
Generalizing PMAC Under Weaker Assumptions.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

2014
Characterization of EME with Linear Mixing.
IACR Cryptol. ePrint Arch., 2014

Equivalence between MAC, WCR and PRF for Blockcipher Based Constructions.
Proceedings of the Provable Security - 8th International Conference, 2014

ELmE: A Misuse Resistant Parallel Authenticated Encryption.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2013
Misuse Resistant Parallel Authenticated Encryptions.
IACR Cryptol. ePrint Arch., 2013

Equivalence between MAC and PRF for Blockcipher based Constructions.
IACR Cryptol. ePrint Arch., 2013

2011
TweLEX: A Tweaked Version of the LEX Stream Cipher.
IACR Cryptol. ePrint Arch., 2011


  Loading...