Search

Your search keyword '"Nilanjan Datta"' showing total 64 results

Search Constraints

Start Over You searched for: Author "Nilanjan Datta" Remove constraint Author: "Nilanjan Datta"
64 results on '"Nilanjan Datta"'

Search Results

1. Cascading Four Round LRW1 is Beyond Birthday Bound Secure

2. Tight Multi-User Security Bound of DbHtS

3. Improved Security Bound of (E/D)WCDM

4. ESTATE: A Lightweight and Low Energy Authenticated Encryption Mode

5. From Combined to Hybrid: Making Feedback-based AE even Smaller

6. Release of Unverified Plaintext: Tight Unified Model and Application to ANYDAE

7. INT-RUP Secure Lightweight Parallel AE Modes

8. Single Key Variant of PMAC_Plus

9. Understanding RUP Integrity of COLM

10. Double-block Hash-then-Sum: A Paradigm for Constructing BBB Secure PRF

11. Lightweight and Side-channel Secure 4 × 4 S-Boxes from Cellular Automata Rules

12. Beetle Family of Lightweight and Secure Authenticated Encryption Ciphers

31. ESTATE: A Lightweight and Low Energy Authenticated Encryption Mode

32. Release of Unverified Plaintext: Tight Unified Model and Application to ANYDAE

33. INT-RUP Secure Lightweight Parallel AE Modes

36. Power Efficiency of S-Boxes: From a Machine-Learning-Based Tool to a Deterministic Model

37. Postauricular sinus: a case report

38. SCADFA: Combined SCA+DFA Attacks on Block Ciphers with Practical Validations

39. <tex-math id='M1'>\begin{document}$\textsf{DWCDM+}$\end{document}</tex-math>: A BBB secure nonce based MAC

40. On the optimality of non-linear computations for symmetric key primitives

41. From Combined to Hybrid: Making Feedback-based AE even Smaller

42. Button battery: a case of neglected foreign body nose

44. A Machine Learning Based Approach to Predict Power Efficiency of S-Boxes

45. Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based MAC

46. Practical Fault Attacks on Minalpher: How to Recover Key with Minimum Faults?

47. The Iterated Random Function Problem

49. MANAGEMENT OF STHAULYA (OBESITY) THROUGH KUNJAL KRIYA

50. ELmD: A Pipelineable Authenticated Encryption and Its Hardware Implementation

Catalog

Books, media, physical & digital resources