Who am I?

I am Professor in the Applied Statistics Unit of the Indian Statitical Institute, Kolkata in India. My main research area in Symmetric Cryptography. My research focusses on cryptographic algorithms and security analysis.

I did B.Stat (1999) and M.Stat (2001) and Ph.D (2005) from Indian Statistical Institute, Kolkata. Before joining Indian Statistical Institute, I was a Post-doc fellow in the CACR, Waterloo University (worked with Professor Douglas Stinson), Scientist in IPN, CINVESTAV, Mexico, visiting researcher in National Institute of Standard and Technology and George Washington University, USA. Please click on "More Info" for further details.

M o r e I n f o R e s u m e

Courses and Lecture Series


Topic Course Year
Advanced Cryptology
M.Tech CrS, 2nd Year Third Semester
2020 - 21
Cryptology
M.Tech CS, 2nd Year First Semester
2019 - 20, 2018 - 19,
2017 - 18,
Aug 2014 - Dec 2014
Basic Probability Theory
M.Math 2nd Year First Semester
2019 - 20,
July 2015 - Dec 2015,
July 2013 - Dec 2013,
July 2011 - Dec 2011
Advanced Cryptology
M.Tech CS, 2nd Year Second Semester
2018 - 19,
Jan 2015 - April 2015,
Jan 2014 - April 2014
Algebra and Number Theory
M.Tech CrS, 1st Year First Semester
2017 - 18
Number Theory
B.Stat 3rd Year Second Semester 2017 - 18, 2016 - 17
Abstract Algebra
B.Stat 2nd Year First Semester 2016-2017,
Jan 2013 - April 2013
Graph Theory and Combinatorics M.Math 2nd Year Second Semester 2015-16
Linear Algebra-II B.Stat1st Year Second Semester Jan 2012 - April 2012
Probability and Stochastic Process M.Tech 1st year First Semester July 2012 - Dec 2012
Lecture Series 1 Coefficient H-Technique for research scholars
July 2018 - Aug 2018
Lecture Series 1 Provable security of symmetric key for research scholars
Sep 2016 - Nov 2016



Awards and Recognitions


  1. CAESAR Winner: ELmD (with Nilanjan Datta): A misuse resistant authenticated encryption. Submitted to CAESAR Competition, 2014. Currently named as COLM after merging with COPA and selected as a winner in "Defense in Depth" category of CAESAR. This work is also invited for publication of a special issue on Journal of Cryptology (submission in 2019).

  2. Invited Papers:
    • - COFB (with Avik Chakraborti, Tetsu Iwata and Kazuhiko Minematsu). It was nominated as one of the best papers in CHES 2017 and invited for publication of Journal of Cryptology (Accepted in 2019).
    • - COLM (with Nilanjan Datta and others) has been invited for publication to a special issue at the Journal of Cryptology (currently under review).

  3. NIST LWC Submissions: Designer of the following submissions to the NIST Standardisation Competition of Lightweight Authenticated Encryption and Hash Algorithms.
    (1) COMET (2) ESTATE (3) GIFT-COFB (4) HyENA (5) LOTUS-AEAD and LOCUS-AEAD (6) mixFeed (7) ORANGE (8) ORIBATIDA (9) PHOTON-Beetle and (10) SPOC.
    All these 10 algorithms have been selected for the second round (out of 32 algorithms).

  4. Other CAESAR Submission: TriviA (with Avik Chakraborti): A streamcipher based authenticated encryption. Submitted to CAESAR Competition, 2014. It was selected for the second round.

  5. Awards:
    • - Selected as one of the top three students for Shyama-Prasad Scholarship in 2001.
    • - Indian National Mathematical Olympiad Awardee and participant of International Mathematical Olympiad Training Camp in 1995 and 1996.

  6. Erdős number is two (co-authored with Douglas Stinson).


Organizer

  1. - Regional Mathematical Olympiad Coordinator for WB Region (2017, 2018, 2019 and 2020).
  2. - Member of Selection Committee of NIST Standardization Competition of Hash Algorithms (SHA3) (An US Federal Government Project Under Department of Commerce).
  3. - Organized Asian Symmetric Key Workshop, 2018 at Indian Statistical Institute, Kolkata.
  4. - Organized Winter School at ASU on Interplay between Statistics and Cryptology in Dec, 2014.
  5. - Organized Workshop on SHA3 and Its Evaluation in Dec, 2012.


Program Chair

  1. - Program co-chair of SPACE 2019.
  2. - Program co-chair of Asian Symmetric Key Workshop 2018.
  3. - Program co-chair of Indocrypt 2012 (jointly with Steven Galbraith).


Invitated Talks

  1. - Invited speaker (to be held) on "Current Trends in Cryptography" CTCrypt 2020
  2. - Invited as a keynote speaker of Indocrypt 2018.
  3. - Invited as a keynote speaker of SPACE 2018.
  4. - Invited Speaker for Asian Symmetric Key Workshop 2017.
  5. - Invited Speaker for Asian Symmetric Key Workshop 2016.
  6. - Invited Speaker for Asian Symmetric Key Workshop 2015.
  7. - Invited Speaker for Asian Symmetric Key Workshop 2014.


Books Edited

  1. 1. Shivam Bhasin, Avi Mendelson, Mridul Nandi: Security, Privacy, and Applied Cryptography Engineering - 9th International Conference, SPACE 2019, Gandhinagar, India, December 3-7, 2019, Proceedings. Lecture Notes in Computer Science 11947, Springer 2019.

  2. 2. Steven D. Galbraith, Mridul Nandi: Progress in Cryptology - INDOCRYPT 2012, 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings. Lecture Notes in Computer Science 7668, Springer 2012.


Selected Publications


This is the list of important publications. Please refer my resume for the full list of publications.

Important Journal Publications


  1. 1. Ashwin Jha; Mridul Nandi, Tight Security of Cascaded LRW2. Journal of Cryptology 33, pages1272–1317 (2020). (Link of the paper)
  2. 2. Ashwin Jha; Cuauhtemoc Mancillas-Lopez; Mridul Nandi; Sourav Sen Gupta. On random access of OCB. IEEE Transaction on Information Theory, 2019, 65(12), pp 8325-8344. (Link of the paper)
  3. 3. Avik Chakraborti, Tetsu Iwata, Kazuhiko Minematsu, Mridul Nandi. Blockcipher-based Authenticated Encryption: How Small Can We Go? Journal of Cryptology, 33, pages 703–741(2020) (Link of the paper)
  4. 4. Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas-Lpez, Mridul Nandi, Yu Sasaki. INT-RUP Secure Lightweight Parallel AE Modes. IACR Transaction on Symmetric Cryptology, 2019(4). pp 81-118. (Link of the paper)
  5. 5. Avik Chakraborti, Nilanjan Datta, Mridul Nandi. On the optimality of non-linear computations for symmetric key primitives. Journal of Mathematical Cryptology, 2018, 12(4), pp 241-259. (Link of the paper)
  6. 6. Nilanjan Datta; Avijit Dutta; Mridul Nandi; Goutam Paul. Double-block Hash-then-Sum: A Paradigm for Constructing BBB Secure PRF. IACR Transaction on Symmetric Cryptology. 2018(3), pp 36-92. (Link of the paper)
  7. 7. Mridul Nandi, Tapas Pandit. Verifiability-based conversion from CPA to CCA-secure predicate encryption. Applicable Algebra in Engineering, Communication and Computing, 2018, 29(1), pp 77-102. (Link of the paper)
  8. 8. Ashwin Jha, Mridul Nandi. On rate-1 and beyond-the-birthday bound secure online ciphers using tweakable block ciphers. Cryptography and Communications, 2018, 10(5), pp 731-753. (Link of the paper)
  9. 9. Avik Chakraborti, Nilanjan Datta, Mridul Nandi, Kan Yasuda. Beetle Family of Lightweight and Secure Authenticated Encryption Ciphers. IACR Transaction on Cryptographic Hardware Embedded System. 2018(2), pp 218-241. (Link of the paper)
  10. 10. Srimanta Bhattacharya, Mridul Nandi. Revisiting Variable Output Length XOR Pseudorandom Function. IACR Transaction on Symmetric Cryptology 2018(1), pp 314-335. (Link of the paper)
  11. 11. Ashwin Jha, Avijit Dutta, Mridul Nandi. A New Look at Counters: Don't Run Like Marathon in a Hundred Meter Race. IEEE Transaction on Computers, 2017, 66(11), pp 1851-1864. (Link of the paper)
  12. 12. Nilanjan Datta, Avijit Dutta, Mridul Nandi, Goutam Paul, Liting Zhang. Single Key Variant of PMAC Plus. IACR Transaction on Symmetric Cryptology 2017(4), pp 268-305. (Link of the paper)
  13. 13. Ashwin Jha, Mridul Nandi. Revisiting Structure Graphs: Applications to CBC-MAC and EMAC. Journal of Mathematical Cryptology, 2016, 10(3-4), pp 157-180. (Link of the paper)
  14. 14. Mridul Nandi, Tapas Pandit. On the Security of Joint Signature and Encryption Revisited. Journal of Mathematical Cryptology, 2016, 10(3-4), pp 181-221. (Link of the paper)
  15. 15. Eik List, Mridul Nandi. ZMAC+ - An Efficient Variable-output-length Variant of ZMAC. IACR Transaction on Symmetric Cryptology. 2017(4), pp 306-325. (Link of the paper)
  16. 16. Ritam Bhaumik, Mridul Nandi. OleF: an Inverse-Free Online Cipher. An Online SPRP with an Optimal Inverse-Free Construction. IACR Transaction on Symmetric Cryptology. 2016(2), pp 30-51. (Link of the paper)
  17. 17. Debrup Chakraborty, Mridul Nandi. Attacks on the Authenticated Encryption Mode of Operation PAE. IEEE Transaction on Information Theory 2015, 61(10): pp 5636-5642. (Link of the paper)
  18. 18. Mridul Nandi. An improved security analysis of OMAC. Journal of Mathematical Cryptology, 2009. Volume 3, Issue 2, Pages 133 - 148. (Link of the paper)
  19. 19. Mridul Nandi and Avradip Mandal. An Improved Security Analysis of PMAC. Journal of Mathematical Cryptology, 2008(2)2, pp 149 - 162. (Link of the paper)
  20. 20. Mridul Nandi and D. R. Stinson. Multicollision attacks on a class of generalized Sequential hash functions. IEEE Transactions on Information Theory, 2007 (53)2, pp 759 - 767. (Link of the paper)

Important Conference Publications

  1. 1. Mridul Nandi. Mind the Composition: Birthday Bound Attacks on EWCDMD and SoKAC21. (Link of the paper)
  2. 2. Avijit Dutta, Mridul Nandi, Suprita Talnikar: Beyond Birthday Bound Secure MAC in Faulty Nonce Model. EUROCRYPT 2019(1), pp 437-466. (Link of the paper)
  3. 3. Mridul Nandi. Bernstein Bound on WCS is Tight - Repairing Luykx-Preneel Optimal Forgeries. CRYPTO 2018(2), pp 213-238. (Link of the paper)
  4. 4. Gatan Leurent, Mridul Nandi, Ferdinand Sibleyras: Generic Attacks against Beyond-Birthday-Bound MACs. CRYPTO 2018(1), pp 306-336. (Link of the paper)
  5. 5. Nilanjan Datta, Avijit Dutta, Mridul Nandi, Kan Yasuda. Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based MAC. CRYPTO 2018(1), pp 631-661. (Link of the paper)
  6. 6. Srimanta Bhattacharya, Mridul Nandi: Full Indifferentiable Security of the Xor of Two or More Random Permutations Using the χ2 Method. EUROCRYPT 2018(1), pp 387-412. (Link of the paper)
  7. 7. Yu Long Chen, Bart Mennink, Mridul Nandi: Short Variable Length Domain Extenders with Beyond Birthday Bound Security. ASIACRYPT 2018(1), pp 244-274. (Link of the paper)
  8. 8. Ritam Bhaumik, Eik List, Mridul Nandi: ZCZ - Achieving n-bit SPRP Security with a Minimal Number of Tweakable-Block-Cipher Calls. ASIACRYPT 2018(1), pp 336-366. (Link of the paper)
  9. 9. Ritam Bhaumik; Mridul Nandi. Improved Security for OCB3. ASIACRYPT 2017(2), pp 638-666. (Link of the paper)
  10. 10. Ritam Bhaumik; Nilanjan Datta; Avijit Dutta; Nicky Mouha; Mridul Nandi. The Iterated Random Function Problem. ASIACRYPT 2017(2), pp 667-697. (Link of the paper)
  11. 11. Mridul Nandi. On the Optimality of Non-Linear Computations of Length-Preserving Encryption Schemes.ASIACRYPT 2015(2), pp 113-133. (Link of the paper)
  12. 12. Ritam Bhaumik, Mridul Nandi. An Inverse-Free Single-Keyed Tweakable Enciphering Scheme. ASIACRYPT 2015(2), pp 159-180. (Link of the paper)
  13. 13. Avik Chakraborti, Anupam Chattopadhyay, Muhammad Hassan, Mridul Nandi. TriviA: A Fast and Secure Authenticated Encryption Scheme. CHES 2015, pp 330-353. (Link of the paper)
  14. 14. Mridul Nandi. Forging Attacks on Two Authenticated Encryption Schemes COBRA and POET. ASIACRYPT 2014(1) pp 126-140. (Link of the paper)
  15. 15. Mridul Nandi. XLS is Not a Strong Pseudorandom Permutation. ASIACRYPT 2014(1), pp 478-490. (Link of the paper)
  16. 16. Mridul Nandi: On the Minimum Number of Multiplications Necessary for Universal Hash Constructions. Fast Software Encryption 2014, pp 113-133. (Link of the paper)
  17. 17. David Chaum, Alex Florescu, Mridul Nandi, Stefan Popoveniuc, Jan Rubio, Poorvi L. Vora and Filip Zagrski. Paperless Independently-Verifiable Voting. VoteID 2011. LNCS Volume 7187, pp 140-157. (Link of the paper)
  18. 18. Donghoon Chang, Mridul Nandi, Moti Yung. On the Security of Hash Functions Employing Blockcipher Postprocessing. Fast Software Encryption 2011, Volume 6733, pp 146-166. (Link of the paper)
  19. 19. Mridul Nandi. A Unified Method for Improving PRF Bounds for a Class of Blockcipher based MACs. Fast Software Encryption 2010. Springer, volume 6147, pp 212-219, 2010. (Link of the paper)
  20. 20. Rishiraj Bhattacharyya, Avradip Mandal, and Mridul Nandi. Security Analysis of the Mode of JH Hash Function. Fast Software Encryption 2010. Springer, volume 6147, pp 168-191, 2010. (Link of the paper)
  21. 21. Mridul Nandi. Fast and Secure CBC-type MAC Algorithms. Fast Software Encryption, 2009, volume 5665, pp 375 - 393. (Link of the paper)
  22. 22. Debrup Chakrabarty and Mridul Nandi. An improved security analysis of HCTR. Fast Software Encryption 2008, Springer, Lecture Notes in Computer Science, volume 5086, pp 289 - 302. (Link of the paper)
  23. 23. Donghoon Chang and Mridul Nandi. Improved indifferentiability security analysis of chopMD Hash Function. Fast Software Encryption 2008, Volume 5086, pp 429-443. (Link of the paper)
  24. 24. Donghoon Chang, Sangjin Lee, Mridul Nandi and Moti Yung. Indifferentiable Security Analysis of Popular Hash Function with prefix-free padding. Asiacrypt 2006. Volume 4284, pp 283 - 289. (Link of the paper)
  25. 25. Mridul Nandi. A Sufficient Condition on Domain Extension of UOWHF, Proceedings of Selected Areas in Cryptography 2004. Volume 3357, pp 341 - 354. (Link of the paper)

Students


Past Students (PhD Awarded)

  1. 1. Nilanjan Datta: PhD Thesis on Pseudorandom Function and Authenticated Encryption. Obtained PhD in 2016.
  2. 2. Avik Chakraborti: PhD Thesis on Design, Analysis and Hardware Implementation of Authenticated Encryption Schemes. Obtained PhD in 2017.
  3. 3. Ritam Bhaumik: PhD Thesis on Design and Provable Security Analysis of Symmetric Key Modes. Obtained PhD in 2020.
  4. 4. Avijit Dutta PhD Thesis on Design and Analysis of Beyond Birthday Secure Message Authentication Codes. Obtained PhD in 2020.
  5. 5. Ashwin Jha PhD Thesis on Provable security on Pseudorandom Functions. Obtained PhD in 2020.

PhD Students (Ongoing)

  1. 1. Bishwajit Chakraborty on Lightweight Authenticated Encryptions.
  2. 2. Soumya Chattopadhyay on Provable Security on PMAC Type Designs.
  3. 3. Suprita Talnikar on Provable Security on Permutation Based Designs.
  4. 4. Arghya Bhattacharjee on Lightweight Authenticated Encryptions and Cryptanalysis.
  5. 5. Snehal Mitrogi on Cryptanalysis on Designs.
  6. 6. Anik Raychaudhuri on Hash Functions.
  7. 7. Debasmita Chakraborty on Cryptanalysis on AES.