Bart Mennink

From MaRDI portal
(Redirected from Person:522210)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Multi-user security of the Elephant v2 authenticated encryption mode2024-10-14Paper
Generic security of the SAFE API and its applications2024-06-26Paper
The COLM Authenticated Encryption Scheme
Journal of Cryptology
2024-04-21Paper
Revisiting the indifferentiability of the sum of permutations
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
Security of truncated permutation without initial value
Advances in Cryptology – ASIACRYPT 2022
2023-08-16Paper
Tight preimage resistance of the sponge construction
Advances in Cryptology – CRYPTO 2022
2023-07-07Paper
The Relation Between CENC and NEMO
Cryptology and Network Security
2023-06-28Paper
Categorization of faulty nonce misuse resistant message authentication
Lecture Notes in Computer Science
2023-05-12Paper
Beyond birthday bound secure fresh rekeying: application to authenticated encryption2023-03-21Paper
The summation-truncation hybrid: reusing discarded bits for free2022-11-09Paper
Collapseability of tree hashes
Post-Quantum Cryptography
2022-10-13Paper
Leakage resilient value comparison with application to message authentication2021-12-08Paper
On the resilience of Even-Mansour to invariant permutations
Designs, Codes and Cryptography
2021-05-10Paper
Practical forgeries for ORANGE
Information Processing Letters
2020-08-04Paper
How to build pseudorandom functions from public random permutations2020-05-20Paper
Leakage resilience of the duplex construction2020-05-11Paper
Linking Stam's bounds with generalized truncation2020-01-28Paper
Beyond conventional security in sponge-based authenticated encryption modes
Journal of Cryptology
2019-08-13Paper
Short variable length domain extenders with beyond birthday bound security2018-12-20Paper
Towards tight security of cascaded LRW22018-12-06Paper
Recipient privacy in online social networks (short paper)2018-10-24Paper
Damaging, simplifying, and salvaging p-OMD2018-10-18Paper
XOR of PRPs in a quantum world2018-09-12Paper
Connecting tweakable and multi-key blockcipher security
Designs, Codes and Cryptography
2018-04-06Paper
Full-state keyed duplex with built-in multi-user support2018-03-08Paper
Analyzing multi-key security degradation2018-03-08Paper
scientific article; zbMATH DE number 6823400 (Why is no real title available?)2018-01-09Paper
Insuperability of the standard versus ideal model gap for tweakable blockcipher security2017-11-15Paper
Encrypted Davies-Meyer and its dual: towards optimal security using mirror theory2017-10-27Paper
Optimal collision security in double block length hashing with single length key
Designs, Codes and Cryptography
2017-04-13Paper
Weak keys for AEZ, and the external key padding attack
Topics in Cryptology – CT-RSA 2017
2017-04-12Paper
XPX: generalized tweakable Even-Mansour with improved security guarantees
Advances in Cryptology – CRYPTO 2016
2016-11-30Paper
Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption
Advances in Cryptology – EUROCRYPT 2016
2016-09-09Paper
Forgery and subkey recovery on CAESAR candidate iFeed
Lecture Notes in Computer Science
2016-05-19Paper
Chaskey: an efficient MAC algorithm for 32-bit microcontrollers
Selected Areas in Cryptography -- SAC 2014
2016-04-13Paper
On the impact of known-key attacks on hash functions
Advances in Cryptology – ASIACRYPT 2015
2016-03-23Paper
Security of full-state keyed sponge and duplex: applications to authenticated encryption
Advances in Cryptology – ASIACRYPT 2015
2016-03-23Paper
On the XOR of multiple random permutations
Applied Cryptography and Network Security
2016-03-10Paper
Provable Security of BLAKE with Non-ideal Compression Function
Selected Areas in Cryptography
2015-12-04Paper
Open problems in hash function security
Designs, Codes and Cryptography
2015-10-26Paper
Two-permutation-based hashing with binary mixing
Journal of Mathematical Cryptology
2015-10-13Paper
COBRA: a parallelizable authenticated online cipher without block cipher inverse
Fast Software Encryption
2015-09-18Paper
Optimally secure tweakable blockciphers
Fast Software Encryption
2015-09-18Paper
Towards Understanding the Known-Key Security of Block Ciphers
Fast Software Encryption
2015-09-18Paper
Security of Keyed Sponge Constructions Using a Modular Proof Approach
Fast Software Encryption
2015-09-18Paper
APE: authenticated permutation-based encryption for lightweight cryptography
Fast Software Encryption
2015-09-18Paper
Breaking and Fixing Cryptophia’s Short Combiner
Cryptology and Network Security
2015-02-10Paper
How to securely release unverified plaintext in authenticated encryption
Lecture Notes in Computer Science
2015-01-16Paper
Beyond \(2^{c/2}\) security in sponge-based authenticated encryption modes
Lecture Notes in Computer Science
2015-01-16Paper
The security of multiple encryption in the ideal cipher model
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
On the collision and preimage security of MDC-4 in the ideal cipher model
Designs, Codes and Cryptography
2014-08-01Paper
Indifferentiability of double length compression functions
Cryptography and Coding
2014-01-17Paper
Parallelizable and authenticated online ciphers
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
On the indifferentiability of key-alternating ciphers
Advances in Cryptology – CRYPTO 2013
2013-09-02Paper
Optimal collision security in double block length hashing with single length key
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
Hash functions based on three permutations: a generic security analysis
Lecture Notes in Computer Science
2012-09-25Paper
Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein
Progress in Cryptology - AFRICACRYPT 2012
2012-07-23Paper
Provable chosen-target-forced-midfix preimage resistance
Selected Areas in Cryptography
2012-06-08Paper
Increasing the flexibility of the herding attack
Information Processing Letters
2012-03-09Paper
Security reductions of the second round SHA-3 candidates
Lecture Notes in Computer Science
2011-02-11Paper
Anonymous credential schemes with encrypted attributes
Cryptology and Network Security
2010-12-07Paper
On the indifferentiability of the Grøstl hash function
Lecture Notes in Computer Science
2010-09-10Paper


Research outcomes over time


This page was built for person: Bart Mennink