Quantum linearization attacks

X Bonnetain, G Leurent, M Naya-Plasencia… - Advances in Cryptology …, 2021 - Springer
Recent works have shown that quantum period-finding can be used to break many popular
constructions (some block ciphers such as Even-Mansour, multiple MACs and AEs...) in the …

Beyond birthday bound secure MAC in faulty nonce model

A Dutta, M Nandi, S Talnikar - … International Conference on the Theory and …, 2019 - Springer
Abstract Encrypt-then-MAC (EtM) is a popular mode for authenticated encryption (AE).
Unfortunately, almost all designs following the EtM paradigm, including the AE suites for …

Encrypt or decrypt? to make a single-key beyond birthday secure nonce-based MAC

N Datta, A Dutta, M Nandi, K Yasuda - … Santa Barbara, CA, USA, August 19 …, 2018 - Springer
Abstract At CRYPTO 2016, Cogliati and Seurin have proposed a highly secure nonce-based
MAC called Encrypted Wegman-Carter with Davies-Meyer (EWCDM EWCDM) construction …

Proof of Mirror Theory for ξmax = 2

A Dutta, M Nandi, A Saha - IEEE Transactions on Information …, 2022 - ieeexplore.ieee.org
In ICISC-05, and in the ePrint 2010/287, Patarin claimed a lower bound on the number of
tuples of-bit strings satisfying for such that, are distinct and. This result is known as Mirror …

Proof of Mirror Theory for a Wide Range of 

B Cogliati, A Dutta, M Nandi, J Patarin… - … Conference on the Theory …, 2023 - Springer
In CRYPTO'03, Patarin conjectured a lower bound on the number of distinct solutions (P
1,…, P q)∈({0, 1} n) q satisfying a system of equations of the form X i⊕ X j= λ i, j such that P …

Generic attacks against beyond-birthday-bound MACs

G Leurent, M Nandi, F Sibleyras - Annual International Cryptology …, 2018 - Springer
In this work, we study the security of several recent MAC constructions with provable security
beyond the birthday bound. We consider block-cipher based constructions with a double …

Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting

Y Shen, L Wang, D Gu, J Weng - Annual International Cryptology …, 2021 - Springer
Abstract Double-block Hash-then-Sum (DbHtS) MACs are a class of MACs that aim for
achieving beyond-birthday-bound security, including SUM-ECBC, PMAC_Plus, 3kf9 and …

Revisiting variable output length XOR pseudorandom function

S Bhattacharya, M Nandi - IACR Transactions on Symmetric …, 2018 - tosc.iacr.org
Let σ be some positive integer and C⊆{(i, j): 1≤ i< j≤ σ}. The theory behind finding a lower
bound on the number of distinct blocks P1,..., Pσ∈{0, 1} n satisfying a set of linear equations …

Attacks on beyond-birthday-bound macs in the quantum setting

T Guo, P Wang, L Hu, D Ye - … , PQCrypto 2021, Daejeon, South Korea, July …, 2021 - Springer
We systematically study the security of twelve Beyond-Birthday-Bound Message
Authentication Codes (BBB MACs) in the Q2 model where attackers have quantum-query …

Mind the composition: Birthday bound attacks on EWCDMD and sokac21

M Nandi - Annual International Conference on the Theory and …, 2020 - Springer
In an early version of CRYPTO'17, Mennink and Neves proposed EWCDMD, a dual of
EWCDM, and showed n-bit security, where n is the block size of the underlying block cipher …