Martijn Stam

From MaRDI portal
Person:498969

Available identifiers

zbMath Open stam.martijnMaRDI QIDQ498969

List of research outcomes





PublicationDate of PublicationType
SoK: public key encryption with openings2024-11-12Paper
On evaluating anonymity of onion routing2024-10-14Paper
Dynamic security aspects of onion routing2024-08-30Paper
Multi-instance secure public-key encryption2023-11-16Paper
Vetted encryption2022-07-06Paper
Tightness subtleties for multi-user PKE notions2022-06-29Paper
XTR and Tori2022-02-25Paper
Introduction2022-02-25Paper
Assessing the feasibility of single trace power analysis of Frodo2019-02-20Paper
Untagging Tor: a formal treatment of onion encryption2018-07-17Paper
Authenticated encryption in the face of protocol and side channel leakage2018-04-06Paper
Multi-key authenticated encryption with corruptions: reductions are lossy2018-01-19Paper
The security of tandem-DM in the ideal cipher model2017-05-22Paper
Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations2017-02-01Paper
A Modular Treatment of Cryptographic APIs: The Symmetric-Key Case2016-11-30Paper
Indifferentiability of Confusion-Diffusion Networks2016-07-15Paper
Counting Keys in Parallel After a Side Channel Attack2016-03-23Paper
Rogue Decryption Failures: Reconciling AE Robustness Notions2016-01-12Paper
A Leakage Resilient MAC2016-01-12Paper
MJH: a faster alternative to MDC-22015-09-29Paper
On Symmetric Encryption with Distinguishable Decryption Failures2015-09-18Paper
Simulatable Leakage: Analysis, Pitfalls, and New Constructions2015-01-16Paper
Discrete Logarithm Variants of VSH2014-08-21Paper
KDM Security in the Hybrid Framework2014-03-28Paper
Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions2013-05-31Paper
Understanding Adaptivity: Random Systems Revisited2013-03-19Paper
Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation2012-06-29Paper
Collisions Are Not Incidental: A Compression Function Exploiting Discrete Geometry2012-06-15Paper
The Symbiosis between Collision and Preimage Resistance2011-12-16Paper
On the Joint Security of Encryption and Signature, Revisited2011-12-02Paper
The Preimage Security of Double-Block-Length Compression Functions2011-12-02Paper
Efficient Hashing Using the AES Instruction Set2011-10-07Paper
The Collision Security of Tandem-DM in the Ideal Cipher Model2011-08-12Paper
MJH: A Faster Alternative to MDC-22011-02-11Paper
Random Oracles with(out) Programmability2010-12-07Paper
Collision Attacks against the Knudsen-Preneel Compression Functions2010-12-07Paper
An analysis of the blockcipher-based hash functions from PGV2010-11-12Paper
Attacking the Knudsen-Preneel Compression Functions2010-07-13Paper
Confidential Signatures and Deterministic Signcryption2010-05-28Paper
Obfuscation for cryptographic purposes2010-03-01Paper
Another Glance at Double-Length Hashing2010-01-07Paper
Blockcipher-Based Hashing Revisited2009-08-11Paper
A New Randomness Extraction Paradigm for Hybrid Encryption2009-05-12Paper
Beyond Uniformity: Better Security/Efficiency Tradeoffs for Compression Functions2009-02-10Paper
Building a Collision-Resistant Compression Function from Non-compressing Primitives2008-08-19Paper
Practical Cryptography in High Dimensional Tori2008-05-06Paper
Black-Box Secret Sharing from Primitive Sets in Algebraic Number Fields2008-03-17Paper
Obfuscation for Cryptographic Purposes2007-08-30Paper
On Small Characteristic Algebraic Tori in Pairing-Based Cryptography2007-04-04Paper
Cryptography and Coding2006-11-01Paper
Cryptography and Coding2006-11-01Paper
Selected Areas in Cryptography2006-10-10Paper
List signature schemes2006-04-28Paper
Algorithmic Number Theory2005-08-12Paper
https://portal.mardi4nfdi.de/entity/Q44741692004-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44257162003-09-11Paper
On Montgomery-Like Representations for Elliptic Curves over GF(2k)2003-07-27Paper

Research outcomes over time

This page was built for person: Martijn Stam