The following pages link to Martijn Stam (Q498969):
Displaying 50 items.
- MJH: a faster alternative to MDC-2 (Q498970) (← links)
- An analysis of the blockcipher-based hash functions from PGV (Q604636) (← links)
- Untagging Tor: a formal treatment of onion encryption (Q1653088) (← links)
- Multi-key authenticated encryption with corruptions: reductions are lossy (Q1690202) (← links)
- Assessing the feasibility of single trace power analysis of Frodo (Q1726676) (← links)
- Tightness subtleties for multi-user PKE notions (Q2149787) (← links)
- Vetted encryption (Q2152047) (← links)
- Obfuscation for cryptographic purposes (Q2267356) (← links)
- The security of tandem-DM in the ideal cipher model (Q2397447) (← links)
- Authenticated encryption in the face of protocol and side channel leakage (Q2412889) (← links)
- List signature schemes (Q2489914) (← links)
- Counting Keys in Parallel After a Side Channel Attack (Q2795977) (← links)
- A Modular Treatment of Cryptographic APIs: The Symmetric-Key Case (Q2835591) (← links)
- Discrete Logarithm Variants of VSH (Q2876978) (← links)
- Collisions Are Not Incidental: A Compression Function Exploiting Discrete Geometry (Q2891491) (← links)
- Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation (Q2894438) (← links)
- Simulatable Leakage: Analysis, Pitfalls, and New Constructions (Q2938847) (← links)
- On Symmetric Encryption with Distinguishable Decryption Failures (Q2946887) (← links)
- Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations (Q2958136) (← links)
- Collision Attacks against the Knudsen-Preneel Compression Functions (Q3058650) (← links)
- Random Oracles with(out) Programmability (Q3058663) (← links)
- MJH: A Faster Alternative to MDC-2 (Q3073709) (← links)
- On the Joint Security of Encryption and Signature, Revisited (Q3102184) (← links)
- The Preimage Security of Double-Block-Length Compression Functions (Q3102189) (← links)
- The Symbiosis between Collision and Preimage Resistance (Q3104691) (← links)
- Efficient Hashing Using the AES Instruction Set (Q3172989) (← links)
- Blockcipher-Based Hashing Revisited (Q3391563) (← links)
- On Small Characteristic Algebraic Tori in Pairing-Based Cryptography (Q3430820) (← links)
- Rogue Decryption Failures: Reconciling AE Robustness Notions (Q3460100) (← links)
- A Leakage Resilient MAC (Q3460113) (← links)
- Building a Collision-Resistant Compression Function from Non-compressing Primitives (Q3519539) (← links)
- Confidential Signatures and Deterministic Signcryption (Q3562915) (← links)
- Attacking the Knudsen-Preneel Compression Functions (Q3577954) (← links)
- Obfuscation for Cryptographic Purposes (Q3596380) (← links)
- Beyond Uniformity: Better Security/Efficiency Tradeoffs for Compression Functions (Q3600231) (← links)
- A New Randomness Extraction Paradigm for Hybrid Encryption (Q3627459) (← links)
- Another Glance at Double-Length Hashing (Q3654618) (← links)
- On Montgomery-Like Representations for Elliptic Curves over GF(2k) (Q4414712) (← links)
- (Q4425716) (← links)
- (Q4474169) (← links)
- Understanding Adaptivity: Random Systems Revisited (Q4911593) (← links)
- Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions (Q4924425) (← links)
- Introduction (Q5034403) (← links)
- XTR and Tori (Q5034412) (← links)
- The Collision Security of Tandem-DM in the Ideal Cipher Model (Q5199213) (← links)
- Practical Cryptography in High Dimensional Tori (Q5385732) (← links)
- KDM Security in the Hybrid Framework (Q5404767) (← links)
- Black-Box Secret Sharing from Primitive Sets in Algebraic Number Fields (Q5451035) (← links)
- Algorithmic Number Theory (Q5465623) (← links)
- Selected Areas in Cryptography (Q5491739) (← links)