Martijn Stam

From MaRDI portal
Person:498969

Available identifiers

zbMath Open stam.martijnMaRDI QIDQ498969

List of research outcomes

PublicationDate of PublicationType
Multi-instance secure public-key encryption2023-11-16Paper
Vetted encryption2022-07-06Paper
Tightness subtleties for multi-user PKE notions2022-06-29Paper
Introduction2022-02-25Paper
XTR and Tori2022-02-25Paper
Assessing the feasibility of single trace power analysis of Frodo2019-02-20Paper
Untagging Tor: a formal treatment of onion encryption2018-07-17Paper
Authenticated encryption in the face of protocol and side channel leakage2018-04-06Paper
Multi-key authenticated encryption with corruptions: reductions are lossy2018-01-19Paper
The security of tandem-DM in the ideal cipher model2017-05-22Paper
Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations2017-02-01Paper
A Modular Treatment of Cryptographic APIs: The Symmetric-Key Case2016-11-30Paper
Indifferentiability of Confusion-Diffusion Networks2016-07-15Paper
Counting Keys in Parallel After a Side Channel Attack2016-03-23Paper
Rogue Decryption Failures: Reconciling AE Robustness Notions2016-01-12Paper
A Leakage Resilient MAC2016-01-12Paper
MJH: a faster alternative to MDC-22015-09-29Paper
On Symmetric Encryption with Distinguishable Decryption Failures2015-09-18Paper
Simulatable Leakage: Analysis, Pitfalls, and New Constructions2015-01-16Paper
Discrete Logarithm Variants of VSH2014-08-21Paper
KDM Security in the Hybrid Framework2014-03-28Paper
Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions2013-05-31Paper
Understanding Adaptivity: Random Systems Revisited2013-03-19Paper
Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation2012-06-29Paper
Collisions Are Not Incidental: A Compression Function Exploiting Discrete Geometry2012-06-15Paper
The Symbiosis between Collision and Preimage Resistance2011-12-16Paper
On the Joint Security of Encryption and Signature, Revisited2011-12-02Paper
The Preimage Security of Double-Block-Length Compression Functions2011-12-02Paper
Efficient Hashing Using the AES Instruction Set2011-10-07Paper
The Collision Security of Tandem-DM in the Ideal Cipher Model2011-08-12Paper
MJH: A Faster Alternative to MDC-22011-02-11Paper
Collision Attacks against the Knudsen-Preneel Compression Functions2010-12-07Paper
Random Oracles with(out) Programmability2010-12-07Paper
An analysis of the blockcipher-based hash functions from PGV2010-11-12Paper
Attacking the Knudsen-Preneel Compression Functions2010-07-13Paper
Confidential Signatures and Deterministic Signcryption2010-05-28Paper
Obfuscation for cryptographic purposes2010-03-01Paper
Another Glance at Double-Length Hashing2010-01-07Paper
Blockcipher-Based Hashing Revisited2009-08-11Paper
A New Randomness Extraction Paradigm for Hybrid Encryption2009-05-12Paper
Beyond Uniformity: Better Security/Efficiency Tradeoffs for Compression Functions2009-02-10Paper
Building a Collision-Resistant Compression Function from Non-compressing Primitives2008-08-19Paper
Practical Cryptography in High Dimensional Tori2008-05-06Paper
Black-Box Secret Sharing from Primitive Sets in Algebraic Number Fields2008-03-17Paper
Obfuscation for Cryptographic Purposes2007-08-30Paper
On Small Characteristic Algebraic Tori in Pairing-Based Cryptography2007-04-04Paper
Cryptography and Coding2006-11-01Paper
Cryptography and Coding2006-11-01Paper
Selected Areas in Cryptography2006-10-10Paper
List signature schemes2006-04-28Paper
Algorithmic Number Theory2005-08-12Paper
https://portal.mardi4nfdi.de/entity/Q44741692004-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44257162003-09-11Paper
On Montgomery-Like Representations for Elliptic Curves over GF(2k)2003-07-27Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Martijn Stam