Post-quantum Security of Key-Alternating Feistel Ciphers
Jyotirmoy Basak, Ritam Bhaumik, Amit Kumar Chauhan, Ravindra Jejurikar, Ashwin Jha, Anandarup Roy, André Schrottenloher, Suprita Talnikar
To appear in the proceedings of ASIACRYPT 2025 (2025)
On the Number of Restricted Solutions to Constrained Systems and their Applications
Benoît Cogliati, Jordan Ethan, Ashwin Jha, Mridul Nandi, Abishanka Saha
To appear in the proceedings of ASIACRYPT 2025 (2025)
Cryptographic Treatment of Key Control Security - In Light of NIST SP 800-108
Ritam Bhaumik, Avijit Dutta, Akiko Inoue, Tetsu Iwata, Ashwin Jha, Kazuhiko Minematsu, Mridul Nandi, Yu Sasaki, Meltem Sönmez Turan, Stefano Tessaro
Proceedings (Part V) of CRYPTO 2025: 371-403 (2025)
Naor-Reingold goes Beyond-the-Birthday-Bound
Avik Chakraborti, Bishwajit Chakraborty, Nilanjan Datta, Avijit Dutta, Ashwin Jha, Sougata Mandal, Hrithik Nandi, Mridul Nandi, Abishanka Saha
On TRP-RF Switch in the Quantum Query Model
Ashwin Jha
IACR Commun. Cryptol. 2(2): 11 (2025)
Generic Security Analysis of GCM-SST
Akiko Inoue, Ashwin Jha, Bart Mennink, Kazuhiko Minematsu
Proceedings (Part II) of ACNS 2025: 342-369 (2025)
Towards Optimally Secure Deterministic Authenticated Encryption Schemes
Yu Long Chen, Avijit Dutta, Ashwin Jha, Mridul Nandi
Proceedings (Part I) of EUROCRYPT 2025: 3-32 (2025)
Mind the Bad Norms - Revisiting Compressed Oracle-Based Quantum Indistinguishability Proofs
Ritam Bhaumik, Benoît Cogliati, Jordan Ethan, Ashwin Jha
Proceedings (Part IX) of ASIACRYPT 2024: 215-247 (2024)
A Note on the Generalized Sum-Capture Problem for Rings
Ashwin Jha
Tight Security of TNT and Beyond - Attacks, Proofs and Possibilities for the Cascaded LRW Paradigm
Ashwin Jha, Mustafa Khairallah, Mridul Nandi, Abishanka Saha
Proceedings (Part I) of EUROCRYPT 2024: 249-279 (2024)
Revisiting Randomness Extraction and Key Derivation Using the CBC and Cascade Modes
Nianjan Balachandran, Ashwin Jha, Mridul Nandi, Soumit Pal
IACR Trans. Symmetric Cryptol. 2023(4): 391-419 (2023)
On Large Tweaks in Tweakable Even-Mansour with Linear Tweak and Key Mixing
Benoît Cogliati, Jordan Ethan, Ashwin Jha, Soumya Kanti Saha
IACR Trans. Symmetric Cryptol. 2023(4): 330--364 (2023)
On Quantum Secure Compressing Pseudorandom Functions
Ritam Bhaumik, Benoît Cogliati, Jordan Ethan, Ashwin Jha
Proceedings (Part III) of ASIACRYPT 2023: 34-66 (2023)
Revisiting the Indifferentiability of the Sum of Permutations
Aldo Gunsing, Ritam Bhaumik, Ashwin Jha, Bart Mennink, Yaobin Shen
Proceedings (Part III) of CRYPTO 2023: 628-660 (2023)
Subverting Telegram’s End-to-End Encryption
Benoît Cogliati, Jordan Ethan, Ashwin Jha
IACR Transactions on Symmetric Cryptology 2023(1): 5-40 (2023)
Towards Tight Security Bounds for OMAC, XCBC and TMAC
Soumya Chattopadhyay, Ashwin Jha, Mridul Nandi
Proceedings (Part I) of ASIACRYPT 2022: 348-378 (2022)
A Survey on Applications of H-Technique: Revisiting Security Analysis of PRP and PRF
Ashwin Jha, Mridul Nandi
Entropy 24(4): 462 (2022)
Light-OCB: Parallel Lightweight Authenticated Cipher with Full Security
Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas-López, Mridul Nandi
Proceedings of SPACE 2021: 22-41 (2021)
Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher
Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas-López, Mridul Nandi, Yu Sasaki
Proceedings of INDOCRYPT 2021: 114-137 (2021)
tHyENA: Making HyENA Even Smaller
Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas-López, Mridul Nandi
Proceedings of INDOCRYPT 2021: 26-48 (2021)
Revisiting the Security of COMET Authenticated Encryption Scheme
Shay Gueron, Ashwin Jha, Mridul Nandi
Proceedings of INDOCRYPT 2021: 3-25 (2021)
Fine-tuning the ISO/IEC Standard LightMAC
Soumya Chattopadhyay, Ashwin Jha, Mridul Nandi
Proceedings (Part III) of ASIACRYPT 2021: 490-519 (2021)
On Length Independent Security Bounds for the PMAC Family
Bishwajit Chakraborty, Soumya Chattopadhyay, Ashwin Jha, Mridul Nandi
IACR Transactions on Symmetric Cryptology 2021(2): 423-445 (2021)
How to Build Optimally Secure PRFs Using Block Ciphers
Benoît Cogliati, Ashwin Jha, Mridul Nandi
Proceedings (Part I) of ASIACRYPT 2020: 754-784 (2020)
On the Security of Sponge-type Authenticated Encryption Modes
Bishwajit Chakraborty, Ashwin Jha, Mridul Nandi
IACR Transactions on Symmetric Cryptology 2020(2): 93-119 (2020)
From Combined to Hybrid: Making Feedback-based AE even Smaller
Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Snehal Mitragotri, Mridul Nandi
IACR Transactions on Symmetric Cryptology 2020(S1): 417-445 (2020)
ESTATE: A Lightweight and Low Energy Authenticated Encryption Mode
Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas-López, Mridul Nandi, Yu Sasaki
IACR Transactions on Symmetric Cryptology 2020(S1): 350-389 (2020)
Tight Security of Cascaded LRW2
Ashwin Jha, Mridul Nandi
Journal of Cryptology 33(3): 1272-1317 (2020)
On Random Read Access in OCB
Ashwin Jha, Cuauhtemoc Mancillas-López, Mridul Nandi, Sourav Sen Gupta
IEEE Transactions on Information Theory 65(12): 8325-8344 (2019)
INT-RUP Secure Lightweight Parallel AE Modes
Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas-López, Mridul Nandi, Yu Sasaki
IACR Transactions on Symmetric Cryptology 2019(4): 81-118 (2019)
On Rate-1 and Beyond-the-Birthday Bound Secure Online Ciphers using Tweakable Block Ciphers
Ashwin Jha, Mridul Nandi
Cryptography and Communications 10(5): 731-753 (2018)
XHX - A Framework for Optimally Secure Tweakable Block Ciphers from Classical Block Ciphers and Universal Hashing
Ashwin Jha, Eik List, Kazuhiko Minematsu, Sweta Mishra, Mridul Nandi
Proceedings of LATINCRYPT 2017: 207-227 (2017)
Tight Security Analysis of EHtM MAC
Avijit Dutta, Ashwin Jha, Mridul Nandi
IACR Transactions on Symmetric Cryptology 2017(3): 130-150 (2017)
On the Exact Security of Message Authentication using Pseudorandom Functions
Ashwin Jha, Avradip Mandal, Mridul Nandi
IACR Transactions on Symmetric Cryptology 2017(1): 427-448 (2017)
A New Look at Counters: Don't Run Like Marathon in a Hundred Meter Race
Avijit Dutta, Ashwin Jha, Mridul Nandi
IEEE Transactions on Computers 66(11): 1851-1864 (2017)
Exact Security Analysis of Hash-then-Mask Type Probabilistic MAC Constructions
Avijit Dutta, Ashwin Jha, Mridul Nandi
IACR Cryptology ePrint Archive Report 2016/983 (2016)
Revisiting Structure Graph: Applications to CBC-MAC and EMAC
Ashwin Jha, Mridul Nandi
Journal of Mathematical Cryptology 10(3-4): 157-180 (2016)
Some Cryptanalytic Results on Zipper Hash and Concatenated Hash
Ashwin Jha, Mridul Nandi
IACR Cryptology ePrint Archive Report 2015/973 (2015)
ACM CCS 2025, 2026
ASIACRYPT 2025
ToSC 2022/23, 2023/2024, 2025/2026
CANS 2022, 2023
Journal of Cryptology
Design, Codes and Cryptology
IEEE Transactions on Information Theory
IET Information Security
IACR CRYPTO, EUROCRYPT, ASIACRYPT
Co-organized GAPS 2025 , a workshop on the provable security of symmetric cryptography at NTU, Singapore.