Ashwin Jha

Ruhr-University Bochum
Faculty of Computer Science
Symmetric Cryptography MC 1.40
Universitätsstr. 150
44801 Bochum, Germany
ashwin.jha@ruhr-uni-bochum.de

I am a postdoctoral researcher in Prof. Gregor Leander's group at CASA, RUB. Shortly before this, I was a postdoc at CISPA. My research interests are primarily in symmetric-key cryptography. Specifically, I work on the design and analysis of symmetric-key modes of operation.

I received my PhD in Computer Science from the Applied Statistics Unit of ISI, Kolkata, in June 2020. For my PhD dissertation, I worked on the provable security of symmetric-key cryptographic schemes under the supervision of Prof. Mridul Nandi. Prior to that, I did my masters in Computer Science from ISI, Kolkata. For my masters thesis, I worked on the cryptanalysis of iterated hash function and its variants, under the supervision of Prof. Mridul Nandi. I received my undergraduate education in Computer Engineering from the Delhi College of Engineering, University of Delhi.

My CV is available here.

Publications
  1. On the Number of Restricted Solutions to Constrained Systems and their Applications
    Benoît Cogliati, Jordan Ethan, Ashwin Jha, Mridul Nandi, Abishanka Saha
  2. A Note on the Generalized Sum-Capture Problem for Rings
    Ashwin Jha
  3. Tight Security of TNT and Beyond - Attacks, Proofs and Possibilities for the Cascaded LRW Paradigm
    Ashwin Jha, Mustafa Khairallah, Mridul Nandi, Abishanka Saha
    Proceedings of EUROCRYPT 2024: 249-279 (2024)
  4. Revisiting Randomness Extraction and Key Derivation Using the CBC and Cascade Modes
    Nianjan Balachandran, Ashwin Jha, Mridul Nandi, Soumit Pal
    IACR Trans. Symmetric Cryptol. 2023(4): 391-419 (2023)
  5. On Large Tweaks in Tweakable Even-Mansour with Linear Tweak and Key Mixing
    Benoît Cogliati, Jordan Ethan, Ashwin Jha, Soumya Kanti Saha
    IACR Trans. Symmetric Cryptol. 2023(4): 330--364 (2023)
  6. On Quantum Secure Compressing Pseudorandom Functions
    Ritam Bhaumik, Benoît Cogliati, Jordan Ethan, Ashwin Jha
    Proceedings of ASIACRYPT 2023: 34-66 (2023)
  7. Revisiting the Indifferentiability of the Sum of Permutations
    Aldo Gunsing, Ritam Bhaumik, Ashwin Jha, Bart Mennink, Yaobin Shen
    Proceedings of CRYPTO 2023: 628-660 (2023)
  8. Subverting Telegram’s End-to-End Encryption
    Benoît Cogliati, Jordan Ethan, Ashwin Jha
    IACR Transactions on Symmetric Cryptology 2023(1): 5-40 (2023)
  9. Towards Tight Security Bounds for OMAC, XCBC and TMAC
    Soumya Chattopadhyay, Ashwin Jha, Mridul Nandi
    Proceedings of ASIACRYPT 2022: 348-378 (2022)
  10. A Survey on Applications of H-Technique: Revisiting Security Analysis of PRP and PRF
    Ashwin Jha, Mridul Nandi
    Entropy 24(4): 462 (2022)
  11. Light-OCB: Parallel Lightweight Authenticated Cipher with Full Security
    Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas-López, Mridul Nandi
    Proceedings of SPACE 2021: 22-41 (2021)
  12. Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher
    Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas-López, Mridul Nandi, Yu Sasaki
    Proceedings of INDOCRYPT 2021: 114-137 (2021)
  13. tHyENA: Making HyENA Even Smaller
    Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas-López, Mridul Nandi
    Proceedings of INDOCRYPT 2021: 26-48 (2021)
  14. Revisiting the Security of COMET Authenticated Encryption Scheme
    Shay Gueron, Ashwin Jha, Mridul Nandi
    Proceedings of INDOCRYPT 2021: 3-25 (2021)
  15. Fine-tuning the ISO/IEC Standard LightMAC
    Soumya Chattopadhyay, Ashwin Jha, Mridul Nandi
    Proceedings (Part III) of ASIACRYPT 2021: 490-519 (2021)
  16. On Length Independent Security Bounds for the PMAC Family
    Bishwajit Chakraborty, Soumya Chattopadhyay, Ashwin Jha, Mridul Nandi
    IACR Transactions on Symmetric Cryptology 2021(2): 423-445 (2021)
  17. How to Build Optimally Secure PRFs Using Block Ciphers
    Benoît Cogliati, Ashwin Jha, Mridul Nandi
    Proceedings (Part I) of ASIACRYPT 2020: 754-784 (2020)
  18. On the Security of Sponge-type Authenticated Encryption Modes
    Bishwajit Chakraborty, Ashwin Jha, Mridul Nandi
    IACR Transactions on Symmetric Cryptology 2020(2): 93-119 (2020)
  19. From Combined to Hybrid: Making Feedback-based AE even Smaller
    Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Snehal Mitragotri, Mridul Nandi
    IACR Transactions on Symmetric Cryptology 2020(S1): 417-445 (2020)
  20. ESTATE: A Lightweight and Low Energy Authenticated Encryption Mode
    Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas-López, Mridul Nandi, Yu Sasaki
    IACR Transactions on Symmetric Cryptology 2020(S1): 350-389 (2020)
  21. Tight Security of Cascaded LRW2
    Ashwin Jha, Mridul Nandi
    Journal of Cryptology 33(3): 1272-1317 (2020)
  22. On Random Read Access in OCB
    Ashwin Jha, Cuauhtemoc Mancillas-López, Mridul Nandi, Sourav Sen Gupta
    IEEE Transactions on Information Theory 65(12): 8325-8344 (2019)
  23. INT-RUP Secure Lightweight Parallel AE Modes
    Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas-López, Mridul Nandi, Yu Sasaki
    IACR Transactions on Symmetric Cryptology 2019(4): 81-118 (2019)
  24. On Rate-1 and Beyond-the-Birthday Bound Secure Online Ciphers using Tweakable Block Ciphers
    Ashwin Jha, Mridul Nandi
    Cryptography and Communications 10(5): 731-753 (2018)
  25. XHX - A Framework for Optimally Secure Tweakable Block Ciphers from Classical Block Ciphers and Universal Hashing
    Ashwin Jha, Eik List, Kazuhiko Minematsu, Sweta Mishra, Mridul Nandi
    Proceedings of LATINCRYPT 2017: 207-227 (2017)
  26. Tight Security Analysis of EHtM MAC
    Avijit Dutta, Ashwin Jha, Mridul Nandi
    IACR Transactions on Symmetric Cryptology 2017(3): 130-150 (2017)
  27. On the Exact Security of Message Authentication using Pseudorandom Functions
    Ashwin Jha, Avradip Mandal, Mridul Nandi
    IACR Transactions on Symmetric Cryptology 2017(1): 427-448 (2017)
  28. A New Look at Counters: Don't Run Like Marathon in a Hundred Meter Race
    Avijit Dutta, Ashwin Jha, Mridul Nandi
    IEEE Transactions on Computers 66(11): 1851-1864 (2017)
  29. Exact Security Analysis of Hash-then-Mask Type Probabilistic MAC Constructions
    Avijit Dutta, Ashwin Jha, Mridul Nandi
    IACR Cryptology ePrint Archive Report 2016/983 (2016)
  30. Revisiting Structure Graph: Applications to CBC-MAC and EMAC
    Ashwin Jha, Mridul Nandi
    Journal of Mathematical Cryptology 10(3-4): 157-180 (2016)
  31. Some Cryptanalytic Results on Zipper Hash and Concatenated Hash
    Ashwin Jha, Mridul Nandi
    IACR Cryptology ePrint Archive Report 2015/973 (2015)
Activities
Other Abodes