Bart Mennink

From MaRDI portal
Person:522210

Available identifiers

zbMath Open mennink.bartMaRDI QIDQ522210

List of research outcomes





PublicationDate of PublicationType
Multi-user security of the Elephant v2 authenticated encryption mode2024-10-14Paper
Generic security of the SAFE API and its applications2024-06-26Paper
The COLM Authenticated Encryption Scheme2024-04-21Paper
Revisiting the indifferentiability of the sum of permutations2024-02-02Paper
Security of truncated permutation without initial value2023-08-16Paper
Tight preimage resistance of the sponge construction2023-07-07Paper
The Relation Between CENC and NEMO2023-06-28Paper
Categorization of faulty nonce misuse resistant message authentication2023-05-12Paper
Beyond birthday bound secure fresh rekeying: application to authenticated encryption2023-03-21Paper
The summation-truncation hybrid: reusing discarded bits for free2022-11-09Paper
Collapseability of Tree Hashes2022-10-13Paper
Leakage resilient value comparison with application to message authentication2021-12-08Paper
On the resilience of Even-Mansour to invariant permutations2021-05-10Paper
Practical forgeries for ORANGE2020-08-04Paper
How to build pseudorandom functions from public random permutations2020-05-20Paper
Leakage resilience of the duplex construction2020-05-11Paper
Linking Stam's bounds with generalized truncation2020-01-28Paper
Beyond conventional security in sponge-based authenticated encryption modes2019-08-13Paper
Short variable length domain extenders with beyond birthday bound security2018-12-20Paper
Towards tight security of cascaded LRW22018-12-06Paper
Recipient privacy in online social networks (short paper)2018-10-24Paper
Damaging, simplifying, and salvaging p-OMD2018-10-18Paper
XOR of PRPs in a quantum world2018-09-12Paper
Connecting tweakable and multi-key blockcipher security2018-04-06Paper
Full-state keyed duplex with built-in multi-user support2018-03-08Paper
Analyzing multi-key security degradation2018-03-08Paper
https://portal.mardi4nfdi.de/entity/Q46022842018-01-09Paper
Insuperability of the standard versus ideal model gap for tweakable blockcipher security2017-11-15Paper
Encrypted Davies-Meyer and its dual: towards optimal security using mirror theory2017-10-27Paper
Optimal collision security in double block length hashing with single length key2017-04-13Paper
Weak Keys for AEZ, and the External Key Padding Attack2017-04-12Paper
XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees2016-11-30Paper
Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption2016-09-09Paper
Forgery and Subkey Recovery on CAESAR Candidate iFeed2016-05-19Paper
Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers2016-04-13Paper
On the Impact of Known-Key Attacks on Hash Functions2016-03-23Paper
Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption2016-03-23Paper
On the XOR of Multiple Random Permutations2016-03-10Paper
Provable Security of BLAKE with Non-ideal Compression Function2015-12-04Paper
Open problems in hash function security2015-10-26Paper
Two-permutation-based hashing with binary mixing2015-10-13Paper
COBRA: A Parallelizable Authenticated Online Cipher Without Block Cipher Inverse2015-09-18Paper
Optimally Secure Tweakable Blockciphers2015-09-18Paper
Towards Understanding the Known-Key Security of Block Ciphers2015-09-18Paper
Security of Keyed Sponge Constructions Using a Modular Proof Approach2015-09-18Paper
APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography2015-09-18Paper
Breaking and Fixing Cryptophia’s Short Combiner2015-02-10Paper
How to Securely Release Unverified Plaintext in Authenticated Encryption2015-01-16Paper
Beyond 2 c/2 Security in Sponge-Based Authenticated Encryption Modes2015-01-16Paper
The Security of Multiple Encryption in the Ideal Cipher Model2014-08-07Paper
On the collision and preimage security of MDC-4 in the ideal cipher model2014-08-01Paper
Indifferentiability of Double Length Compression Functions2014-01-17Paper
Parallelizable and Authenticated Online Ciphers2013-12-10Paper
On the Indifferentiability of Key-Alternating Ciphers2013-09-02Paper
Optimal Collision Security in Double Block Length Hashing with Single Length Key2013-03-19Paper
Hash Functions Based on Three Permutations: A Generic Security Analysis2012-09-25Paper
Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein2012-07-23Paper
Provable Chosen-Target-Forced-Midfix Preimage Resistance2012-06-08Paper
Increasing the flexibility of the herding attack2012-03-09Paper
Security Reductions of the Second Round SHA-3 Candidates2011-02-11Paper
Anonymous Credential Schemes with Encrypted Attributes2010-12-07Paper
On the Indifferentiability of the Grøstl Hash Function2010-09-10Paper

Research outcomes over time

This page was built for person: Bart Mennink