The following pages link to Bart Mennink (Q522210):
Displaying 50 items.
- Optimal collision security in double block length hashing with single length key (Q522211) (← links)
- Two-permutation-based hashing with binary mixing (Q745103) (← links)
- Increasing the flexibility of the herding attack (Q763502) (← links)
- Practical forgeries for ORANGE (Q783690) (← links)
- On the resilience of Even-Mansour to invariant permutations (Q831175) (← links)
- Open problems in hash function security (Q887443) (← links)
- Towards tight security of cascaded LRW2 (Q1631325) (← links)
- Short variable length domain extenders with beyond birthday bound security (Q1633453) (← links)
- XOR of PRPs in a quantum world (Q1673621) (← links)
- Encrypted Davies-Meyer and its dual: towards optimal security using mirror theory (Q1675220) (← links)
- Insuperability of the standard versus ideal model gap for tweakable blockcipher security (Q1680237) (← links)
- Analyzing multi-key security degradation (Q1703940) (← links)
- Full-state keyed duplex with built-in multi-user support (Q1703941) (← links)
- Damaging, simplifying, and salvaging p-OMD (Q1799189) (← links)
- Recipient privacy in online social networks (short paper) (Q1800683) (← links)
- Leakage resilient value comparison with application to message authentication (Q2056738) (← links)
- The summation-truncation hybrid: reusing discarded bits for free (Q2096483) (← links)
- Leakage resilience of the duplex construction (Q2178854) (← links)
- How to build pseudorandom functions from public random permutations (Q2181853) (← links)
- Linking Stam's bounds with generalized truncation (Q2290458) (← links)
- Beyond conventional security in sponge-based authenticated encryption modes (Q2318091) (← links)
- Connecting tweakable and multi-key blockcipher security (Q2413014) (← links)
- On the collision and preimage security of MDC-4 in the ideal cipher model (Q2510658) (← links)
- Beyond birthday bound secure fresh rekeying: application to authenticated encryption (Q2692358) (← links)
- On the XOR of Multiple Random Permutations (Q2794522) (← links)
- On the Impact of Known-Key Attacks on Hash Functions (Q2795966) (← links)
- Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption (Q2795986) (← links)
- Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers (Q2798625) (← links)
- Forgery and Subkey Recovery on CAESAR Candidate iFeed (Q2807205) (← links)
- Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption (Q2820486) (← links)
- XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees (Q2835583) (← links)
- On the Indifferentiability of Key-Alternating Ciphers (Q2845693) (← links)
- Parallelizable and Authenticated Online Ciphers (Q2867233) (← links)
- Indifferentiability of Double Length Compression Functions (Q2870097) (← links)
- The Security of Multiple Encryption in the Ideal Cipher Model (Q2874494) (← links)
- Provable Chosen-Target-Forced-Midfix Preimage Resistance (Q2889862) (← links)
- Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein (Q2900626) (← links)
- Hash Functions Based on Three Permutations: A Generic Security Analysis (Q2914268) (← links)
- Beyond 2 c/2 Security in Sponge-Based Authenticated Encryption Modes (Q2938839) (← links)
- How to Securely Release Unverified Plaintext in Authenticated Encryption (Q2938840) (← links)
- Towards Understanding the Known-Key Security of Block Ciphers (Q2946886) (← links)
- APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography (Q2946909) (← links)
- COBRA: A Parallelizable Authenticated Online Cipher Without Block Cipher Inverse (Q2946910) (← links)
- Security of Keyed Sponge Constructions Using a Modular Proof Approach (Q2946951) (← links)
- Optimally Secure Tweakable Blockciphers (Q2946955) (← links)
- Weak Keys for AEZ, and the External Key Padding Attack (Q2975806) (← links)
- Anonymous Credential Schemes with Encrypted Attributes (Q3058768) (← links)
- Security Reductions of the Second Round SHA-3 Candidates (Q3073779) (← links)
- Provable Security of BLAKE with Non-ideal Compression Function (Q3455508) (← links)
- On the Indifferentiability of the Grøstl Hash Function (Q3588332) (← links)