Follow
Ashwin Jha
Ashwin Jha
CISPA Helmholtz Center for Information Security
Verified email at cispa.de - Homepage
Title
Cited by
Cited by
Year
ESTATE: A lightweight and low energy authenticated encryption mode
A Chakraborti, N Datta, A Jha, C Mancillas-López, M Nandi, Y Sasaki
IACR Transactions on Symmetric Cryptology, 350-389, 2020
382020
Lotus-aead and locus-aead
A Chakraborti, N Datta, A Jha, CM Lopez, M Nandi, Y Sasaki
Submission to the NIST Lightweight Cryptography project, 2019
302019
Tight security of cascaded LRW2
A Jha, M Nandi
Journal of Cryptology 33 (3), 1272-1317, 2020
292020
Comet: counter mode encryption with authentication tag
S Gueron, A Jha, M Nandi
Second Round Candidate of the NIST LWC Competition, 2019
29*2019
Revisiting structure graphs: Applications to CBC-MAC and EMAC
A Jha, M Nandi
Journal of Mathematical Cryptology 10 (3-4), 157-180, 2016
272016
XHX–A Framework for Optimally Secure Tweakable Block Ciphers from Classical Block Ciphers and Universal Hashing
A Jha, E List, K Minematsu, S Mishra, M Nandi
International Conference on Cryptology and Information Security in Latin …, 2017
25*2017
Hyena
A Chakraborti, N Datta, A Jha, M Nandi
Submission to the NIST Lightweight Cryptography project, 2019
23*2019
Elastic-tweak: A framework for short tweak tweakable block cipher
A Chakraborti, N Datta, A Jha, C Mancillas-López, M Nandi, Y Sasaki
International Conference on Cryptology in India, 114-137, 2021
202021
INT-RUP secure lightweight parallel AE modes
A Chakraborti, N Datta, A Jha, C Mancillas-López, M Nandi, Y Sasaki
IACR Transactions on Symmetric Cryptology, 81-118, 2019
192019
Tight security analysis of ehtm MAC
A Dutta, A Jha, M Nandi
Cryptology ePrint Archive, 2017
182017
ESTATE
A Chakraborti, N Datta, A Jha, CM Lopez, M Nandi, Y Sasaki
Submission to NIST LwC Standardization Process (Round 2), 2019
172019
Spoc
R AlTawy, G Gong, M He, A Jha, K Mandal, M Nandi, R Rohit
Submission to NIST LwC Standardization Process (Round 2), 2019
14*2019
On the security of sponge-type authenticated encryption modes
B Chakraborty, A Jha, M Nandi
Cryptology ePrint Archive, 2019
132019
A Survey on Applications of H-Technique: Revisiting Security Analysis of PRP and PRF
A Jha, M Nandi
IACR Cryptol. ePrint Arch. 2018 (1130), 2018
12*2018
From combined to hybrid: Making feedback-based AE even smaller
A Chakraborti, N Datta, A Jha, S Mitragotri, M Nandi
IACR Transactions on Symmetric Cryptology, 417-445, 2020
112020
Towards tight security bounds for OMAC, XCBC and TMAC
S Chattopadhyay, A Jha, M Nandi
International Conference on the Theory and Application of Cryptology and …, 2022
82022
On length independent security bounds for the PMAC family
B Chakraborty, S Chattopadhyay, A Jha, M Nandi
IACR Transactions on Symmetric Cryptology 2021 (2), 423-445, 2021
82021
Fine-Tuning the ISO/IEC Standard LightMAC
S Chattopadhyay, A Jha, M Nandi
Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021
82021
On the security of COMET authenticated encryption scheme
S Gueron, A Jha, M Nandi
NIST Lightweight Cryptography Workshop 2019, 2019
8*2019
On rate-1 and beyond-the-birthday bound secure online ciphers using tweakable block ciphers
A Jha, M Nandi
Cryptography and Communications 10 (5), 731-753, 2018
72018
The system can't perform the operation now. Try again later.
Articles 1–20