NILanjan Datta
NILanjan Datta
Indian Statistical Institute, Kolkata
Verified email at iitkgp.ac.in
TitleCited byYear
ELmE: A Misuse Resistant Parallel Authenticated Encryption
N Datta, M Nandi
Australasian Conference on Information Security and Privacy, 306-321, 2014
192014
COLM v1
E Andreeva, A Bogdanov, N Datta, A Luykx, B Mennink, M Nandi, ...
Submission to the CAESAR Competition, 2016
16*2016
Beetle family of lightweight and secure authenticated encryption ciphers
A Chakraborti, N Datta, M Nandi, K Yasuda
IACR Transactions on Cryptographic Hardware and Embedded Systems, 218-241, 2018
142018
ELmD: a pipelineable authenticated encryption and its hardware implementation
L Bossuet, N Datta, C Mancillas-López, M Nandi
IEEE Transactions on Computers 65 (11), 3318-3331, 2016
132016
ELmD: a pipelineable authenticated encryption and its hardware implementation
L Bossuet, N Datta, C Mancillas-López, M Nandi
IEEE Transactions on Computers 65 (11), 3318-3331, 2016
132016
Single key variant of PMAC_plus
N Datta, A Dutta, M Nandi, G Paul, L Zhang
IACR Transactions on Symmetric Cryptology, 268-305, 2017
112017
ElmD (2014)
N Datta, M Nandi
11*
ELmD
N Datta, M Nandi
92014
Encrypt or decrypt? To make a single-key beyond birthday secure nonce-based MAC
N Datta, A Dutta, M Nandi, K Yasuda
Annual International Cryptology Conference, 631-661, 2018
72018
INT-RUP analysis of block-cipher based authenticated encryption schemes
A Chakraborti, N Datta, M Nandi
Cryptographers’ Track at the RSA Conference, 39-54, 2016
72016
Misuse Resistant Parallel Authenticated Encryptions.
N Datta, M Nandi
IACR Cryptology ePrint Archive 2013, 767, 2013
72013
AES-COPA
E Andreeva, A Bogdanov, A Luykx, B Mennink, E Tischhauser, K Yasuda, ...
62014
Double-block hash-then-sum: a paradigm for constructing BBB secure PRF
N Datta, A Dutta, M Nandi, G Paul
IACR Transactions on Symmetric Cryptology, 36-92, 2018
52018
ELmD v2. 0
N Datta, M Nandi
52015
Building single-key beyond birthday bound message authentication code
N Datta, A Dutta, M Nandi, G Paul, L Zhang
Cryptology ePrint Archive, Report 2015/958, 2015. http://eprint. iacr. org …, 2015
42015
One-key double-sum MAC with beyond-birthday security
N Datta, A Dutta, M Nandi, G Paul, L Zhang
Cryptology ePrint Archive, Report 2015/958, 2015. http://eprint. iacr. org, 2015
42015
Understanding RUP integrity of COLM
N Datta, A Luykx, B Mennink, M Nandi
22017
Proposal of ELmD v2. 1
N Datta, M Nandi
Submission to the CAESAR Competition, 2016
22016
Experimental Study of Locking Phenomena on Oscillating Rings Implemented in Logic Devices
U Mureddu, N Bochard, L Bossuet, V Fischer
IEEE Transactions on Circuits and Systems I: Regular Papers, 2019
12019
A Machine Learning Based Approach to Predict Power Efficiency of S-Boxes
R Sadhukhan, N Datta, D Mukhopadhyay
2019 32nd International Conference on VLSI Design and 2019 18th …, 2019
12019
The system can't perform the operation now. Try again later.
Articles 1–20