Folgen
Bart Mennink
Bart Mennink
Digital Security Group, Radboud University, Nijmegen
Bestätigte E-Mail-Adresse bei cs.ru.nl - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Chaskey: an efficient MAC algorithm for 32-bit microcontrollers
N Mouha, B Mennink, A Van Herrewege, D Watanabe, B Preneel, ...
Selected Areas in Cryptography, 306-323, 2014
3122014
How to Securely Release Unverified Plaintext in Authenticated Encryption
E Andreeva, A Bogdanov, A Luykx, B Mennink, N Mouha, K Yasuda
Advances in Cryptology-ASIACRYPT 2014, 105-125, 2014
1692014
Parallelizable and authenticated online ciphers
E Andreeva, A Bogdanov, A Luykx, B Mennink, E Tischhauser, K Yasuda
Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013
1492013
Beyond 2^{c/2} Security in Sponge-Based Authenticated Encryption Modes
P Jovanovic, A Luykx, B Mennink
Advances in Cryptology-ASIACRYPT 2014, 85-104, 2014
1242014
Security of keyed sponge constructions using a modular proof approach
E Andreeva, J Daemen, B Mennink, G Van Assche
Fast Software Encryption, 2015
1052015
Isap v2. 0
C Dobraunig, M Eichlseder, S Mangard, F Mendel, B Mennink, R Primas, ...
IACR Transactions on Symmetric Cryptology, 390-416, 2020
1022020
Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption
R Granger, P Jovanovic, B Mennink, S Neves
Advances in Cryptology-EUROCRYPT 2016, 263-293, 2016
1012016
Encrypted Davies-Meyer and its dual: Towards optimal security using Mirror theory
B Mennink, S Neves
Advances in Cryptology–CRYPTO 2017, 556-583, 2017
982017
Security of full-state keyed Sponge and Duplex: Applications to authenticated encryption
B Mennink, R Reyhanitabar, D Vizár
Advances in Cryptology-ASIACRYPT 2015, 2015
972015
APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography
E Andreeva, B Bilgin, A Bogdanov, A Luykx, B Mennink, N Mouha, ...
Fast Software Encryption, 2014
952014
On the indifferentiability of key-alternating ciphers
E Andreeva, A Bogdanov, Y Dodis, B Mennink, JP Steinberger
Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013
952013
When a Bloom Filter is a Doom Filter: Security Assessment of a Novel Iris Biometric Template Protection System
J Hermans, B Mennink, R Peeters
Biometrics Special Interest Group, BIOSIG, 75-86, 2014
842014
Full-State Keyed Duplex With Built-In Multi-User Support
J Daemen, B Mennink, G Van Assche
Advances in Cryptology-ASIACRYPT 2017, 606-637, 2017
762017
PRIMATEs v1
E Andreeva, B Bilgin, A Bogdanov, A Luykx, F Mendel, B Mennink, ...
642014
XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees
B Mennink
Advances in Cryptology–CRYPTO 2016, 64-94, 2016
572016
Analyzing Multi-Key Security Degradation
A Luykx, B Mennink, KG Paterson
Advances in Cryptology-ASIACRYPT 2017, 575-605, 2017
562017
Optimally secure tweakable blockciphers
B Mennink
Fast Software Encryption, 2015
562015
Security reductions of the second round SHA-3 candidates
E Andreeva, B Mennink, B Preneel
Information Security: 13th International Conference, ISC 2010, Boca Raton …, 2011
522011
Towards understanding the known-key security of block ciphers
E Andreeva, A Bogdanov, B Mennink
Fast Software Encryption, 348-366, 2013
502013
SePCAR: A Secure and Privacy-enhancing Protocol for Car Access Provision
I Symeonidis, A Aly, MA Mustafa, B Mennink, S Dhooghe, B Preneel
ESORICS 2017, 475-493, 2017
462017
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20