Proof of Mirror Theory for a Wide Range of 

B Cogliati, A Dutta, M Nandi, J Patarin… - … Conference on the Theory …, 2023 - Springer
In CRYPTO'03, Patarin conjectured a lower bound on the number of distinct solutions (P
1,…, P q)∈({0, 1} n) q satisfying a system of equations of the form X i⊕ X j= λ i, j such that P …

Permutation based EDM: an inverse free BBB secure PRF

A Dutta, M Nandi, S Talnikar - IACR Transactions on Symmetric …, 2021 - metalla.org
In CRYPTO 2019, Chen et al. have initiated an interesting research direction in designing
PRF based on public permutations. They have proposed two beyond the birthday bound …

Forking sums of permutations for optimally secure and highly efficient PRFs

A Dutta, J Guo, E List - Cryptology ePrint Archive, 2022 - eprint.iacr.org
The desirable encryption scheme possesses high PRF security, high efficiency, and the
ability to produce variable-length outputs. Since designing dedicated secure PRFs is …

: beyond-birthday-secure encryption from public permutations

A Bhattacharjee, A Dutta, E List, M Nandi - Designs, Codes and …, 2022 - Springer
Public permutations have been established as important primitives for the purpose of
designing cryptographic schemes. While many such schemes for authentication and …

CTET+: A beyond-birthday-bound secure tweakable enciphering scheme using a single pseudorandom permutation

B Cogliati, J Ethan, V Lallemand, B Lee… - IACR Transactions on …, 2021 - tosc.iacr.org
In this work, we propose a construction of 2-round tweakable substitutionpermutation
networks using a single secret S-box. This construction is based on non-linear permutation …

[PDF][PDF] Proof of mirror theory for any ξmax

B Cogliati, A Dutta, M Nandi, J Patarin… - IACR Cryptol. ePrint …, 2022 - iacr.steepath.eu
In CRYPTO'03, Patarin conjectured a lower bound on the number of distinct solutions (P1,...,
Pq)∈({0, 1} n) q satisfying a system of equations of the form **⊕ Xj= λi, j such that X1, X2 …

[PDF][PDF] CENCPP-beyond-birthday-secure encryption from public permutations

A Bhattarcharjee, A Dutta, E List… - IACR Cryptol. ePrint …, 2020 - iacr.steepath.eu
Public permutations have been established as valuable primitives since the absence of a
key schedule compared to block ciphers alleviates cryptanalysis. While many permutation …

Mirror Theory and its Applications in Cryptography

A Saha - 2024 - dspace.isical.ac.in
The indistinguishability security of a cryptographic construction refers to the maximum
advantage of an interactive adversary to distinguish between the real and ideal world, where …

Design and Analysis of Authenticated Encryption Modes

A Bhattacharjee - 2024 - dspace.isical.ac.in
This thesis proposes and analyses the security of a few symmetric key modes. The first three
of them are NAEAD modes, named Oribatida, ISAP+ and OCB+. Oribatida is lightweight …

Provable security of symmetric-key cryptographic schemes in classical and quantum frameworks

J Ethan - 2024 - publikationen.sulb.uni-saarland.de
In this dissertation, we focus on designing secure symmetric-key schemes by identifying
flaws, proposing new constructions, and providing rigorous security proofs against classical …