Information-theoretic indistinguishability via the chi-squared method

W Dai, VT Hoang, S Tessaro - Annual International Cryptology Conference, 2017 - Springer
Proving tight bounds on information-theoretic indistinguishability is a central problem in
symmetric cryptography. This paper introduces a new method for information-theoretic …

Orthros: A low-latency PRF

S Banik, T Isobe, F Liu, K Minematsu… - IACR Transactions on …, 2021 - ojs.ub.rub.de
We present Orthros, a 128-bit block pseudorandom function. It is designed with primary
focus on latency of fully unrolled circuits. For this purpose, we adopt a parallel structure …

ZMAC: a fast tweakable block cipher mode for highly secure message authentication

T Iwata, K Minematsu, T Peyrin, Y Seurin - Annual international cryptology …, 2017 - Springer
We propose a new mode of operation called ZMAC allowing to construct a (stateless and
deterministic) message authentication code (MAC) from a tweakable block cipher (TBC) …

Tight security of TNT and beyond: Attacks, proofs and possibilities for the cascaded LRW paradigm

A Jha, M Khairallah, M Nandi, A Saha - … on the Theory and Applications of …, 2024 - Springer
Abstract Liskov, Rivest and Wagner laid the theoretical foundations for tweakable block
ciphers (TBC). In a seminal paper, they proposed two (up to) birthday-bound secure design …

How to build pseudorandom functions from public random permutations

YL Chen, E Lambooij, B Mennink - … , Santa Barbara, CA, USA, August 18 …, 2019 - Springer
Pseudorandom functions are traditionally built upon block ciphers, but with the trend of
permutation based cryptography, it is a natural question to investigate the design of …

Beyond birthday bound secure MAC in faulty nonce model

A Dutta, M Nandi, S Talnikar - … International Conference on the Theory and …, 2019 - Springer
Abstract Encrypt-then-MAC (EtM) is a popular mode for authenticated encryption (AE).
Unfortunately, almost all designs following the EtM paradigm, including the AE suites for …

Encrypt or decrypt? to make a single-key beyond birthday secure nonce-based MAC

N Datta, A Dutta, M Nandi, K Yasuda - … Santa Barbara, CA, USA, August 19 …, 2018 - Springer
Abstract At CRYPTO 2016, Cogliati and Seurin have proposed a highly secure nonce-based
MAC called Encrypted Wegman-Carter with Davies-Meyer (EWCDM EWCDM) construction …

Proof of Mirror Theory for ξmax = 2

A Dutta, M Nandi, A Saha - IEEE Transactions on Information …, 2022 - ieeexplore.ieee.org
In ICISC-05, and in the ePrint 2010/287, Patarin claimed a lower bound on the number of
tuples of-bit strings satisfying for such that, are distinct and. This result is known as Mirror …

Proof of Mirror Theory for a Wide Range of 

B Cogliati, A Dutta, M Nandi, J Patarin… - … Conference on the Theory …, 2023 - Springer
In CRYPTO'03, Patarin conjectured a lower bound on the number of distinct solutions (P
1,…, P q)∈({0, 1} n) q satisfying a system of equations of the form X i⊕ X j= λ i, j such that P …

Tight security of cascaded LRW2

A Jha, M Nandi - Journal of Cryptology, 2020 - Springer
At CRYPTO'12, Landecker et al. introduced the cascaded LRW2 (or CLRW2) construction
and proved that it is a secure tweakable block cipher up to roughly 2^ 2n/3 2 2 n/3 queries …