Atul Luykx

According to our database1, Atul Luykx authored at least 30 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
The COLM Authenticated Encryption Scheme.
J. Cryptol., June, 2024

Limits on Authenticated Encryption Use in TLS.
IACR Cryptol. ePrint Arch., 2024

2022
ParaDiSE: Efficient Threshold Authenticated Encryption in Fully Malicious Model.
IACR Cryptol. ePrint Arch., 2022

2021
Systematic Security Analysis of Stream Encryption With Key Erasure.
IEEE Trans. Inf. Theory, 2021

Reducing HSM Reliance in Payments through Proxy Re-Encryption.
IACR Cryptol. ePrint Arch., 2021

An Account of the ISO/IEC Standardization of the Simon and Speck Block Cipher Families.
Proceedings of the Security of Ubiquitous Computing Systems, 2021

2020
How to Abuse and Fix Authenticated Encryption Without Key Commitment.
IACR Cryptol. ePrint Arch., 2020

The Hashgraph Protocol: Efficient Asynchronous BFT for High-Throughput Distributed Ledgers.
Proceedings of the 2020 International Conference on Omni-layer Intelligent Systems, 2020

2019
Beyond Conventional Security in Sponge-Based Authenticated Encryption Modes.
J. Cryptol., 2019

2018
SUNDAE: Small Universal Deterministic Authenticated Encryption for the Internet of Things.
IACR Trans. Symmetric Cryptol., 2018

Optimal Forgeries Against Polynomial-Based MACs and GCM.
IACR Cryptol. ePrint Arch., 2018

Connecting tweakable and multi-key blockcipher security.
Des. Codes Cryptogr., 2018

2017
Analyzing Multi-Key Security Degradation.
IACR Cryptol. ePrint Arch., 2017

Understanding RUP Integrity of COLM.
IACR Cryptol. ePrint Arch., 2017

Efficient Length Doubling From Tweakable Block Ciphers.
IACR Cryptol. ePrint Arch., 2017

Boosting Authenticated Encryption Robustness With Minimal Modifications.
IACR Cryptol. ePrint Arch., 2017

2016
The Design and Analysis of Message Authentication and Authenticated Encryption Schemes ; Ontwerp en analyse van berichtverificatie- en geverifieerde encryptieschema's.
PhD thesis, 2016

A MAC Mode for Lightweight Block Ciphers.
IACR Cryptol. ePrint Arch., 2016

On the Influence of Message Length in PMAC's Security Bounds.
IACR Cryptol. ePrint Arch., 2016

Security Analysis of BLAKE2's Modes of Operation.
IACR Cryptol. ePrint Arch., 2016

2015
Two-permutation-based hashing with binary mixing.
J. Math. Cryptol., 2015

Multi-Key Security: The Even-Mansour Construction Revisited.
IACR Cryptol. ePrint Arch., 2015

2014
Beyond 2<sup>c/2</sup> Security in Sponge-Based Authenticated Encryption Modes.
IACR Cryptol. ePrint Arch., 2014

How to Securely Release Unverified Plaintext in Authenticated Encryption.
IACR Cryptol. ePrint Arch., 2014

COBRA: A Parallelizable Authenticated Online Cipher Without Block Cipher Inverse.
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014

Beyond 2 c/2 Security in Sponge-Based Authenticated Encryption Modes.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
Parallelizable and Authenticated Online Ciphers.
IACR Cryptol. ePrint Arch., 2013

APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography.
IACR Cryptol. ePrint Arch., 2013

2012
Impossibility Results for Indifferentiability with Resets.
IACR Cryptol. ePrint Arch., 2012

2011
Provable Security of BLAKE with Non-Ideal Compression Function.
IACR Cryptol. ePrint Arch., 2011


  Loading...