Subverting Telegram's End-to-End Encryption BM Cogliati, J Ethan, A Jha CISPA, 2023 | 6 | 2023 |
CTET+: A beyond-birthday-bound secure tweakable enciphering scheme using a single pseudorandom permutation B Cogliati, J Ethan, V Lallemand, B Lee, J Lee, M Minier IACR Transactions on Symmetric Cryptology, 1-35, 2021 | 4 | 2021 |
Context-Committing Security of Leveled Leakage-Resilient AEAD C Dhar, J Ethan, R Jejurikar, M Khairallah, E List, S Mandal IACR Transactions on Symmetric Cryptology 2024 (2), 348-370, 2024 | 3 | 2024 |
On quantum secure compressing pseudorandom functions R Bhaumik, B Cogliati, J Ethan, A Jha International Conference on the Theory and Application of Cryptology and …, 2023 | 2 | 2023 |
Mind the Bad Norms: Revisiting Compressed Oracle-based Quantum Indistinguishability Proofs R Bhaumik, B Cogliati, J Ethan, A Jha Cryptology ePrint Archive, 2024 | | 2024 |
On the Number of Restricted Solutions to Constrained Systems and their Applications B Cogliati, J Ethan, A Jha, M Nandi, A Saha Cryptology ePrint Archive, 2024 | | 2024 |
On Large Tweaks in Tweakable Even-Mansour with Linear Tweak and Key Mixing B Cogliati, J Ethan, A Jha, SK Saha IACR Transactions on Symmetric Cryptology 2023 (4), 330-364, 2023 | | 2023 |