Bart Mennink
Bart Mennink
Digital Security Group, Radboud University, Nijmegen
Geverifieerd e-mailadres voor cs.ru.nl - Homepage
TitelGeciteerd doorJaar
Parallelizable and authenticated online ciphers
E Andreeva, A Bogdanov, A Luykx, B Mennink, E Tischhauser, K Yasuda
International Conference on the Theory and Application of Cryptology and …, 2013
1122013
Chaskey: an efficient MAC algorithm for 32-bit microcontrollers
N Mouha, B Mennink, A Van Herrewege, D Watanabe, B Preneel, ...
Selected Areas in Cryptography, 306-323, 2014
892014
How to Securely Release Unverified Plaintext in Authenticated Encryption
E Andreeva, A Bogdanov, A Luykx, B Mennink, N Mouha, K Yasuda
Advances in Cryptology-ASIACRYPT 2014, 105-125, 2014
832014
Beyond 2^{c/2} Security in Sponge-Based Authenticated Encryption Modes
P Jovanovic, A Luykx, B Mennink
Advances in Cryptology-ASIACRYPT 2014, 85-104, 2014
602014
APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography
E Andreeva, B Bilgin, A Bogdanov, A Luykx, B Mennink, N Mouha, ...
Fast Software Encryption, 2014
592014
On the indifferentiability of key-alternating ciphers
E Andreeva, A Bogdanov, Y Dodis, B Mennink, JP Steinberger
Annual Cryptology Conference, 531-550, 2013
572013
Security of keyed sponge constructions using a modular proof approach
E Andreeva, J Daemen, B Mennink, G Van Assche
Fast Software Encryption, 2015
542015
Security reductions of the second round SHA-3 candidates
E Andreeva, B Mennink, B Preneel
International Conference on Information Security, 39-53, 2010
422010
Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption
R Granger, P Jovanovic, B Mennink, S Neves
Advances in Cryptology-EUROCRYPT 2016, 263-293, 2016
412016
Security of full-state keyed Sponge and Duplex: Applications to authenticated encryption
B Mennink, R Reyhanitabar, D Vizár
Advances in Cryptology-ASIACRYPT 2015, 2015
392015
XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees
B Mennink
Advances in Cryptology–CRYPTO 2016, 64-94, 2016
362016
The parazoa family: generalizing the sponge hash functions
E Andreeva, B Mennink, B Preneel
International Journal of Information Security 11 (3), 149-165, 2012
352012
On the indifferentiability of the Grřstl hash function
E Andreeva, B Mennink, B Preneel
International Conference on Security and Cryptography for Networks, 88-105, 2010
352010
PRIMATEs v1
E Andreeva, B Bilgin, A Bogdanov, A Luykx, F Mendel, B Mennink, ...
29*2014
When a Bloom Filter is a Doom Filter: Security Assessment of a Novel Iris Biometric Template Protection System
J Hermans, B Mennink, R Peeters
Biometrics Special Interest Group, BIOSIG, 75-86, 2014
282014
Towards understanding the known-key security of block ciphers
E Andreeva, A Bogdanov, B Mennink
Fast Software Encryption, 348-366, 2013
282013
Modulo reduction for Paillier encryptions and application to secure statistical analysis
J Guajardo, B Mennink, B Schoenmakers
Financial Cryptography and Data Security, 375-382, 2010
262010
Optimally secure tweakable blockciphers
B Mennink
Fast Software Encryption, 2015
252015
Security analysis and comparison of the SHA-3 finalists BLAKE, Grřstl, JH, Keccak, and Skein
E Andreeva, B Mennink, B Preneel, M Škrobot
International Conference on Cryptology in Africa, 287-305, 2012
232012
AES-COPA v1
E Andreeva, A Bogdanov, A Luykx, B Mennink, E Tischhauser, K Yasuda
21*2014
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20