Martijn Stam

Orcid: 0000-0002-5319-4625

According to our database1, Martijn Stam authored at least 68 papers between 2001 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Counter Galois Onion (CGO) for Tor: Fast Non-Malleable Onion Encryption.
IACR Cryptol. ePrint Arch., 2025

A Comparison of Graph-Inference Side-Channel Attacks Against SKINNY.
Proceedings of the Constructive Approaches for Security Analysis and Design of Embedded Systems, 2025

2024
SoK: Public Key Encryption with Openings.
Proceedings of the Public-Key Cryptography - PKC 2024, 2024

2023
Pincering SKINNY by Exploiting Slow Diffusion Enhancing Differential Power Analysis with Cluster Graph Inference.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

Multi-instance Secure Public-Key Encryption.
Proceedings of the Public-Key Cryptography - PKC 2023, 2023

Dynamic Security Aspects of Onion Routing.
Proceedings of the Cryptography and Coding - 19th IMA International Conference, 2023

2021
Redundant Code-based Masking Revisited.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

XTR and Tori.
IACR Cryptol. ePrint Arch., 2021

On Evaluating Anonymity of Onion Routing.
Proceedings of the Selected Areas in Cryptography - 28th International Conference, 2021

Tightness Subtleties for Multi-user PKE Notions.
Proceedings of the Cryptography and Coding - 18th IMA International Conference, 2021

2020
Vetted Encryption.
Proceedings of the Progress in Cryptology - INDOCRYPT 2020, 2020

2018
Fly, you fool! Faster Frodo for the ARM Cortex-M4.
IACR Cryptol. ePrint Arch., 2018

Assessing the Feasibility of Single Trace Power Analysis of Frodo.
Proceedings of the Selected Areas in Cryptography - SAC 2018, 2018

Untagging Tor: A Formal Treatment of Onion Encryption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

2017
Turning Online Ciphers Off.
IACR Trans. Symmetric Cryptol., 2017

The Security of Tandem-DM in the Ideal Cipher Model.
J. Cryptol., 2017

Modes of Operation Suitable for Computing on Encrypted Data.
IACR Cryptol. ePrint Arch., 2017

Multi-key Authenticated Encryption with Corruptions: Reductions Are Lossy.
Proceedings of the Theory of Cryptography - 15th International Conference, 2017

Authenticated Encryption in the Face of Protocol and Side Channel Leakage.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

2016
How low can you go? Using side-channel data to enhance brute-force key recovery.
IACR Cryptol. ePrint Arch., 2016

Indifferentiability of Confusion-Diffusion Networks.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

A Modular Treatment of Cryptographic APIs: The Symmetric-Key Case.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
How to Enumerate Your Keys Accurately and Efficiently After a Side Channel Attack.
IACR Cryptol. ePrint Arch., 2015

Turning Online Ciphers Off.
IACR Cryptol. ePrint Arch., 2015

A Leakage Resilient MAC.
Proceedings of the Cryptography and Coding - 15th IMA International Conference, 2015

Rogue Decryption Failures: Reconciling AE Robustness Notions.
Proceedings of the Cryptography and Coding - 15th IMA International Conference, 2015

Counting Keys in Parallel After a Side Channel Attack.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
Making and Breaking Leakage Simulators.
IACR Cryptol. ePrint Arch., 2014

KDM Security in the Hybrid Framework.
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014

Simulatable Leakage: Analysis, Pitfalls, and New Constructions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
A Leakage Resilient MAC.
IACR Cryptol. ePrint Arch., 2013

On Symmetric Encryption with Distinguishable Decryption Failures.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013

Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions.
Proceedings of the Advances in Cryptology, 2013

2012
Collisions Are Not Incidental: A Compression Function Exploiting Discrete Geometry.
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012

Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012

Understanding Adaptivity: Random Systems Revisited.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

2011
The preimage security of double-block-length compression functions.
IACR Cryptol. ePrint Arch., 2011

The Symbiosis between Collision and Preimage Resistance.
Proceedings of the Cryptography and Coding - 13th IMA International Conference, 2011

MJH: A Faster Alternative to MDC-2.
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011

The Collision Security of Tandem-DM in the Ideal Cipher Model.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011

Efficient Hashing Using the AES Instruction Set.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011

On the Joint Security of Encryption and Signature, Revisited.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

The Preimage Security of Double-Block-Length Compression Functions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

2010
An Analysis of the Blockcipher-Based Hash Functions from PGV.
J. Cryptol., 2010

Confidential Signatures and Deterministic Signcryption.
Proceedings of the Public Key Cryptography, 2010

Attacking the Knudsen-Preneel Compression Functions.
Proceedings of the Fast Software Encryption, 17th International Workshop, 2010

Collision Attacks against the Knudsen-Preneel Compression Functions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010

Random Oracles with(out) Programmability.
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010

2009
Another Glance at Double-Length Hashing.
Proceedings of the Cryptography and Coding, 2009

Blockcipher-Based Hashing Revisited.
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009

A New Randomness Extraction Paradigm for Hybrid Encryption.
Proceedings of the Advances in Cryptology, 2009

2008
Building a Collision-Resistant Compression Function from Non-compressing Primitives.
Proceedings of the Automata, Languages and Programming, 35th International Colloquium, 2008

Beyond Uniformity: Better Security/Efficiency Tradeoffs for Compression Functions.
Proceedings of the Advances in Cryptology, 2008

2007
Obfuscation for Cryptographic Purposes.
Proceedings of the Theory of Cryptography, 4th Theory of Cryptography Conference, 2007

2006
On Small Characteristic Algebraic Tori in Pairing-Based Cryptography.
LMS J. Comput. Math., 2006

List signature schemes.
Discret. Appl. Math., 2006

Discrete Logarithm Variants of VSH.
Proceedings of the Progressin Cryptology, 2006

2005
Hardware and Software Normal Basis Arithmetic for Pairing-Based Cryptography in Characteristic Three.
IEEE Trans. Computers, 2005

A Key Encapsulation Mechanism for NTRU.
Proceedings of the Cryptography and Coding, 2005

Hash Based Digital Signature Schemes.
Proceedings of the Cryptography and Coding, 2005

Practical Cryptography in High Dimensional Tori.
Proceedings of the Advances in Cryptology, 2005

Black-Box Secret Sharing from Primitive Sets in Algebraic Number Fields.
Proceedings of the Advances in Cryptology, 2005

2004
On XTR and Side-Channel Analysis.
Proceedings of the Selected Areas in Cryptography, 11th International Workshop, 2004

A Comparison of CEILIDH and XTR.
Proceedings of the Algorithmic Number Theory, 6th International Symposium, 2004

2003
On Montgomery-Like Representationsfor Elliptic Curves over GF(2<sup>k</sup>).
Proceedings of the Public Key Cryptography, 2003

2002
Efficient Subgroup Exponentiation in Quadratic and Sixth Degree Extensions.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002

2001
Speeding Up XTR.
Proceedings of the Advances in Cryptology, 2001


  Loading...