Rishiraj Bhattacharyya

Dr.

20092024

Research activity per year

Filter
Conference contribution

Search results

  • 2024

    On Efficient and Secure Compression Functions for Arithmetization-Oriented Hashing

    Andreeva, E., Bhattacharyya, R., Roy, A. & Trevisani, S., 8 Apr 2024, (Accepted/In press) 2024 IEEE 37th Computer Security Foundations Symposium (CSF). IEEE, p. 558-573 16 p. (IEEE Computer Security Foundations Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    13 Downloads (Pure)
  • Testing Self-Reducible Samplers

    Bhattacharyya, R., Chakraborty, S., Pote, Y., Sarkar, U. & Sen, S., 24 Mar 2024, Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence. AAAI Press, p. 7952-7960 9 p. (Proceedings of the AAAI Conference on Artificial Intelligence; vol. 38, no. 8).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • 2021

    Compactness of hashing modes and efficiency beyond Merkle tree

    Andreeva, E., Bhattacharyya, R. & Roy, A., 16 Jun 2021, Advances in Cryptology – EUROCRYPT 2021: 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17–21, 2021, Proceedings, Part II. Canteaut, A. & Standaert, F-X. (eds.). 1 ed. Springer, p. 92-123 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12697 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    19 Downloads (Pure)
  • Crooked indifferentiability of enveloped XOR revisited

    Bhattacharyya, R., Nandi, M. & Raychaudhuri, A., 9 Dec 2021, Progress in Cryptology – INDOCRYPT 2021: 22nd International Conference on Cryptology in India, Jaipur, India, December 12–15, 2021, Proceedings. Adhikari, A., Küsters, R. & Preneel, B. (eds.). 1 ed. Springer, p. 73-92 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13143 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    44 Downloads (Pure)
  • 2020

    Memory-Tight Reductions for Practical Key Encapsulation Mechanisms

    Bhattacharyya, R., 2020, Public-Key Cryptography – PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Kiayias, A., Kohlweiss, M., Wallden, P. & Zikas, V. (eds.). Springer Vieweg, p. 249-278 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12110 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2014

    Secure message authentication against related-key attack

    Bhattacharyya, R. & Roy, A., 2014, Fast Software Encryption - 20th International Workshop, FSE 2013, Revised Selected Papers. Springer Verlag, p. 305-324 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8424 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    11 Citations (Scopus)
  • 2011

    On the impossibility of instantiating PSS in the standard model

    Bhattacharyya, R. & Mandal, A., 2011, Public Key Cryptography, PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Proceedings. p. 351-368 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6571 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    1 Citation (Scopus)
  • On the indifferentiability of Fugue and Luffa

    Bhattacharyya, R. & Mandal, A., 2011, Applied Cryptography and Network Security - 9th International Conference, ACNS 2011, Proceedings. p. 479-497 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6715 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • 2010

    Security analysis of the mode of JH hash function

    Bhattacharyya, R., Mandal, A. & Nandi, M., 2010, Fast Software Encryption - 17th International Workshop, FSE 2010, Revised Selected Papers. p. 168-191 24 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6147 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    29 Citations (Scopus)
  • 2009

    Indifferentiability characterization of hash functions and optimal bounds of popular domain extensions

    Bhattacharyya, R., Mandal, A. & Nandi, M., 2009, Progress in Cryptology - INDOCRYPT 2009 - 10th International Conference on Cryptology in India, Proceedings. p. 199-218 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5922 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Citations (Scopus)