Bart Mennink

Orcid: 0000-0001-6679-1878

According to our database1, Bart Mennink authored at least 113 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
The COLM Authenticated Encryption Scheme.
J. Cryptol., June, 2024

Tightening Leakage Resilience of the Suffix Keyed Sponge.
IACR Trans. Symmetric Cryptol., 2024

Permutation-Based Hashing Beyond the Birthday Bound.
IACR Cryptol. ePrint Arch., 2024

Efficient Instances of Docked Double Decker With AES.
IACR Cryptol. ePrint Arch., 2024

2023
EliMAC: Speeding Up LightMAC by around 20%.
IACR Trans. Symmetric Cryptol., 2023

Preface to Volume 2023, Issue 1.
IACR Trans. Symmetric Cryptol., 2023

Secure Distributed Modular Exponentiation: Systematic Analysis and New Results.
IEEE Trans. Inf. Forensics Secur., 2023

Generic Security of the Ascon Mode: On the Power of Key Blinding.
IACR Cryptol. ePrint Arch., 2023

Generic Security of the SAFE API and Its Applications.
IACR Cryptol. ePrint Arch., 2023

Revisiting the Indifferentiability of the Sum of Permutations.
IACR Cryptol. ePrint Arch., 2023

Generalized Initialization of the Duplex Construction.
IACR Cryptol. ePrint Arch., 2023

SAFE: Sponge API for Field Elements.
IACR Cryptol. ePrint Arch., 2023

2022
Preface to Volume 2022, Issue 1.
IACR Trans. Symmetric Cryptol., 2022

HERMES: Scalable, Secure, and Privacy-Enhancing Vehicular Sharing-Access System.
IEEE Internet Things J., 2022

Understanding the Duplex and Its Security.
IACR Cryptol. ePrint Arch., 2022

Security of Truncated Permutation Without Initial Value.
IACR Cryptol. ePrint Arch., 2022

Tight Preimage Resistance of the Sponge Construction.
IACR Cryptol. ePrint Arch., 2022

The Summation-Truncation Hybrid: Reusing Discarded Bits for Free.
IACR Cryptol. ePrint Arch., 2022

Collapseability of Tree Hashes.
IACR Cryptol. ePrint Arch., 2022

Deck-Based Wide Block Cipher Modes and an Exposition of the Blinded Keyed Hashing Model.
IACR Cryptol. ePrint Arch., 2022

Symmetric Cryptography (Dagstuhl Seminar 22141).
Dagstuhl Reports, 2022

Leakage and Tamper Resilient Permutation-Based Cryptography.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Systematic Security Analysis of Stream Encryption With Key Erasure.
IEEE Trans. Inf. Theory, 2021

Leakage Resilient Value Comparison With Application to Message Authentication.
IACR Cryptol. ePrint Arch., 2021

Categorization of Faulty Nonce Misuse Resistant Message Authentication.
IACR Cryptol. ePrint Arch., 2021

On the Resilience of Even-Mansour to Invariant Permutations.
Des. Codes Cryptogr., 2021

Multi-user Security of the Elephant v2 Authenticated Encryption Mode.
Proceedings of the Selected Areas in Cryptography - 28th International Conference, 2021

2020
Errata to Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers.
IACR Trans. Symmetric Cryptol., 2020

Tightness of the Suffix Keyed Sponge Bound.
IACR Trans. Symmetric Cryptol., 2020

Isap v2.0.
IACR Trans. Symmetric Cryptol., 2020

Dumbo, Jumbo, and Delirium: Parallel Authenticated Encryption for the Lightweight Circus.
IACR Trans. Symmetric Cryptol., 2020

Practical forgeries for ORANGE.
Inf. Process. Lett., 2020

HERMES: Scalable, Secure, and Privacy-Enhancing Vehicle Access System.
IACR Cryptol. ePrint Arch., 2020

Beyond Birthday Bound Secure Fresh Rekeying: Application to Authenticated Encryption.
IACR Cryptol. ePrint Arch., 2020

Exploring the Golden Mean Between Leakage and Fault Resilience and Practice.
IACR Cryptol. ePrint Arch., 2020

Symmetric Cryptography (Dagstuhl Seminar 20041).
Dagstuhl Reports, 2020

2019
Beyond Conventional Security in Sponge-Based Authenticated Encryption Modes.
J. Cryptol., 2019

Security of the Suffix Keyed Sponge.
IACR Cryptol. ePrint Arch., 2019

Leakage Resilience of the Duplex Construction.
IACR Cryptol. ePrint Arch., 2019

How to Build Pseudorandom Functions From Public Random Permutations.
IACR Cryptol. ePrint Arch., 2019

Release of Unverified Plaintext: Tight Unified Model and Application to ANYDAE.
IACR Cryptol. ePrint Arch., 2019

Linking Stam's Bounds with Generalized Truncation.
Proceedings of the Topics in Cryptology - CT-RSA 2019, 2019

2018
Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers.
IACR Trans. Symmetric Cryptol., 2018

Key Prediction Security of Keyed Sponges.
IACR Cryptol. ePrint Arch., 2018

Towards Tight Security of Cascaded LRW2.
IACR Cryptol. ePrint Arch., 2018

Short Non-Malleable Codes from Related-Key Secure Block Ciphers.
IACR Cryptol. ePrint Arch., 2018

Short Variable Length Domain Extenders With Beyond Birthday Bound Security.
IACR Cryptol. ePrint Arch., 2018

Connecting tweakable and multi-key blockcipher security.
Des. Codes Cryptogr., 2018

Privacy-preserving Distributed Access Control for Medical Data.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

The Relation Between CENC and NEMO.
Proceedings of the Cryptology and Network Security - 17th International Conference, 2018

2017
XOR of PRPs in a Quantum World.
IACR Cryptol. ePrint Arch., 2017

Optimal PRFs from Blockcipher Designs.
IACR Cryptol. ePrint Arch., 2017

Encrypted Davies-Meyer and Its Dual: Towards Optimal Security Using Mirror Theory.
IACR Cryptol. ePrint Arch., 2017

Insuperability of the Standard Versus Ideal Model Gap for Tweakable Blockcipher Security.
IACR Cryptol. ePrint Arch., 2017

Analyzing Multi-Key Security Degradation.
IACR Cryptol. ePrint Arch., 2017

Understanding RUP Integrity of COLM.
IACR Cryptol. ePrint Arch., 2017

Full-State Keyed Duplex With Built-In Multi-User Support.
IACR Cryptol. ePrint Arch., 2017

Efficient Length Doubling From Tweakable Block Ciphers.
IACR Cryptol. ePrint Arch., 2017

Optimal collision security in double block length hashing with single length key.
Des. Codes Cryptogr., 2017

SePCAR: A Secure and Privacy-Enhancing Protocol for Car Access Provision.
Proceedings of the Computer Security - ESORICS 2017, 2017

Weak Keys for AEZ, and the External Key Padding Attack.
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017

2016
Efficient parallelizable hashing using small non-compressing primitives.
Int. J. Inf. Sec., 2016

Security Analysis of BLAKE2's Modes of Operation.
IACR Cryptol. ePrint Arch., 2016

CENC is Optimally Secure.
IACR Cryptol. ePrint Arch., 2016

Damaging, Simplifying, and Salvaging p-OMD.
IACR Cryptol. ePrint Arch., 2016

Recipient Privacy in Online Social Networks.
Proceedings of the Advances in Information and Computer Security, 2016

Improving the Sphinx Mix Network.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

2015
Two-permutation-based hashing with binary mixing.
J. Math. Cryptol., 2015

Security of Full-State Keyed and Duplex Sponge: Applications to Authenticated Encryption.
IACR Cryptol. ePrint Arch., 2015

On the Impact of Known-Key Attacks on Hash Functions.
IACR Cryptol. ePrint Arch., 2015

XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees.
IACR Cryptol. ePrint Arch., 2015

Optimally Secure Tweakable Blockciphers.
IACR Cryptol. ePrint Arch., 2015

Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption.
IACR Cryptol. ePrint Arch., 2015

Trivial Nonce-Misusing Attack on Pure OMD.
IACR Cryptol. ePrint Arch., 2015

Towards Understanding the Known-Key Security of Block Ciphers.
IACR Cryptol. ePrint Arch., 2015

Open problems in hash function security.
Des. Codes Cryptogr., 2015

Forgery and Subkey Recovery on CAESAR Candidate iFeed.
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015

Security of Keyed Sponge Constructions Using a Modular Proof Approach.
Proceedings of the Fast Software Encryption - 22nd International Workshop, 2015

Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

On the XOR of Multiple Random Permutations.
Proceedings of the Applied Cryptography and Network Security, 2015

2014
Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers.
IACR Cryptol. ePrint Arch., 2014

Triple and Quadruple Encryption: Bridging the Gaps.
IACR Cryptol. ePrint Arch., 2014

Beyond 2<sup>c/2</sup> Security in Sponge-Based Authenticated Encryption Modes.
IACR Cryptol. ePrint Arch., 2014

How to Securely Release Unverified Plaintext in Authenticated Encryption.
IACR Cryptol. ePrint Arch., 2014

On the collision and preimage security of MDC-4 in the ideal cipher model.
Des. Codes Cryptogr., 2014

COBRA: A Parallelizable Authenticated Online Cipher Without Block Cipher Inverse.
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014

The Security of Multiple Encryption in the Ideal Cipher Model.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

Breaking and Fixing Cryptophia's Short Combiner.
Proceedings of the Cryptology and Network Security - 13th International Conference, 2014

Speedup for European ePassport Authentication.
Proceedings of the BIOSIG 2014, 2014

Shattering the Glass Maze.
Proceedings of the BIOSIG 2014, 2014

When a Bloom Filter is a Doom Filter: Security Assessment of a Novel Iris Biometric Template Protection System.
Proceedings of the BIOSIG 2014, 2014

Beyond 2 c/2 Security in Sponge-Based Authenticated Encryption Modes.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
Provable Security of Cryptographic Hash Functions (Bewijsbare veiligheid van cryptografische hashfuncties) ; Provable Security of Cryptographic Hash Functions.
PhD thesis, 2013

Parallelizable and Authenticated Online Ciphers.
IACR Cryptol. ePrint Arch., 2013

On the Indifferentiability of Key-Alternating Ciphers.
IACR Cryptol. ePrint Arch., 2013

APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography.
IACR Cryptol. ePrint Arch., 2013

Indifferentiability of Double Length Compression Functions.
Proceedings of the Cryptography and Coding - 14th IMA International Conference, 2013

2012
Increasing the flexibility of the herding attack.
Inf. Process. Lett., 2012

The parazoa family: generalizing the sponge hash functions.
Int. J. Inf. Sec., 2012

On security arguments of the second round SHA-3 candidates.
Int. J. Inf. Sec., 2012

Impossibility Results for Indifferentiability with Resets.
IACR Cryptol. ePrint Arch., 2012

A Simple Key-Recovery Attack on McOE-X.
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012

Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012

2011
Hash Functions Based on Three Permutations: A Generic Security Analysis.
IACR Cryptol. ePrint Arch., 2011

Provable Security of BLAKE with Non-Ideal Compression Function.
IACR Cryptol. ePrint Arch., 2011

Provable Chosen-Target-Forced-Midfix Preimage Resistance.
Proceedings of the Selected Areas in Cryptography - 18th International Workshop, 2011

2010
Security Properties of Domain Extenders for Cryptographic Hash Functions.
J. Inf. Process. Syst., 2010

Towards Side-Channel Resistant Block Cipher Usage or Can We Encrypt Without Side-Channel Countermeasures?
IACR Cryptol. ePrint Arch., 2010

Security Reductions of the Second Round SHA-3 Candidates.
IACR Cryptol. ePrint Arch., 2010

On the Indifferentiability of the Gröstl Hash Function.
IACR Cryptol. ePrint Arch., 2010

On Side-Channel Resistant Block Cipher Usage.
Proceedings of the Information Security - 13th International Conference, 2010

Modulo Reduction for Paillier Encryptions and Application to Secure Statistical Analysis.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

Anonymous Credential Schemes with Encrypted Attributes.
Proceedings of the Cryptology and Network Security - 9th International Conference, 2010


  Loading...