Bart Mennink

From MaRDI portal
Person:522210

Available identifiers

zbMath Open mennink.bartMaRDI QIDQ522210

List of research outcomes

PublicationDate of PublicationType
Revisiting the indifferentiability of the sum of permutations2024-02-02Paper
Security of truncated permutation without initial value2023-08-16Paper
Tight preimage resistance of the sponge construction2023-07-07Paper
The Relation Between CENC and NEMO2023-06-28Paper
Categorization of faulty nonce misuse resistant message authentication2023-05-12Paper
Beyond birthday bound secure fresh rekeying: application to authenticated encryption2023-03-21Paper
The summation-truncation hybrid: reusing discarded bits for free2022-11-09Paper
Collapseability of Tree Hashes2022-10-13Paper
Leakage resilient value comparison with application to message authentication2021-12-08Paper
On the resilience of Even-Mansour to invariant permutations2021-05-10Paper
Practical forgeries for ORANGE2020-08-04Paper
How to build pseudorandom functions from public random permutations2020-05-20Paper
Leakage resilience of the duplex construction2020-05-11Paper
Linking Stam's bounds with generalized truncation2020-01-28Paper
Beyond conventional security in sponge-based authenticated encryption modes2019-08-13Paper
Short variable length domain extenders with beyond birthday bound security2018-12-20Paper
Towards tight security of cascaded LRW22018-12-06Paper
Recipient privacy in online social networks (short paper)2018-10-24Paper
Damaging, simplifying, and salvaging p-OMD2018-10-18Paper
XOR of PRPs in a quantum world2018-09-12Paper
Connecting tweakable and multi-key blockcipher security2018-04-06Paper
Analyzing multi-key security degradation2018-03-08Paper
Full-state keyed duplex with built-in multi-user support2018-03-08Paper
https://portal.mardi4nfdi.de/entity/Q46022842018-01-09Paper
Insuperability of the standard versus ideal model gap for tweakable blockcipher security2017-11-15Paper
Encrypted Davies-Meyer and its dual: towards optimal security using mirror theory2017-10-27Paper
Optimal collision security in double block length hashing with single length key2017-04-13Paper
Weak Keys for AEZ, and the External Key Padding Attack2017-04-12Paper
XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees2016-11-30Paper
Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption2016-09-09Paper
Forgery and Subkey Recovery on CAESAR Candidate iFeed2016-05-19Paper
Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers2016-04-13Paper
On the Impact of Known-Key Attacks on Hash Functions2016-03-23Paper
Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption2016-03-23Paper
On the XOR of Multiple Random Permutations2016-03-10Paper
Provable Security of BLAKE with Non-ideal Compression Function2015-12-04Paper
Open problems in hash function security2015-10-26Paper
Two-permutation-based hashing with binary mixing2015-10-13Paper
Towards Understanding the Known-Key Security of Block Ciphers2015-09-18Paper
APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography2015-09-18Paper
COBRA: A Parallelizable Authenticated Online Cipher Without Block Cipher Inverse2015-09-18Paper
Security of Keyed Sponge Constructions Using a Modular Proof Approach2015-09-18Paper
Optimally Secure Tweakable Blockciphers2015-09-18Paper
Breaking and Fixing Cryptophia’s Short Combiner2015-02-10Paper
Beyond 2 c/2 Security in Sponge-Based Authenticated Encryption Modes2015-01-16Paper
How to Securely Release Unverified Plaintext in Authenticated Encryption2015-01-16Paper
The Security of Multiple Encryption in the Ideal Cipher Model2014-08-07Paper
On the collision and preimage security of MDC-4 in the ideal cipher model2014-08-01Paper
Indifferentiability of Double Length Compression Functions2014-01-17Paper
Parallelizable and Authenticated Online Ciphers2013-12-10Paper
On the Indifferentiability of Key-Alternating Ciphers2013-09-02Paper
Optimal Collision Security in Double Block Length Hashing with Single Length Key2013-03-19Paper
Hash Functions Based on Three Permutations: A Generic Security Analysis2012-09-25Paper
Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein2012-07-23Paper
Provable Chosen-Target-Forced-Midfix Preimage Resistance2012-06-08Paper
Increasing the flexibility of the herding attack2012-03-09Paper
Security Reductions of the Second Round SHA-3 Candidates2011-02-11Paper
Anonymous Credential Schemes with Encrypted Attributes2010-12-07Paper
On the Indifferentiability of the Grøstl Hash Function2010-09-10Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Bart Mennink