Martijn Stam

Orcid: 0000-0002-5319-4625

According to our database1, Martijn Stam authored at least 66 papers between 2001 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Pincering SKINNY by Exploiting Slow Diffusion Enhancing Differential Power Analysis with Cluster Graph Inference.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

Dynamic Security Aspects of Onion Routing.
IACR Cryptol. ePrint Arch., 2023

SoK: Public Key Encryption with Openings.
IACR Cryptol. ePrint Arch., 2023

2022
Tightness Subtleties for Multi-user PKE Notions.
IACR Cryptol. ePrint Arch., 2022

Multi-Instance Secure Public-Key Encryption.
IACR Cryptol. ePrint Arch., 2022

2021
Redundant Code-based Masking Revisited.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

XTR and Tori.
IACR Cryptol. ePrint Arch., 2021

On Evaluating Anonymity of Onion Routing.
Proceedings of the Selected Areas in Cryptography - 28th International Conference, 2021

2020
Vetted Encryption.
IACR Cryptol. ePrint Arch., 2020

2018
Untagging Tor: A Formal Treatment of Onion Encryption.
IACR Cryptol. ePrint Arch., 2018

Fly, you fool! Faster Frodo for the ARM Cortex-M4.
IACR Cryptol. ePrint Arch., 2018

Assessing the Feasibility of Single Trace Power Analysis of Frodo.
IACR Cryptol. ePrint Arch., 2018

2017
Turning Online Ciphers Off.
IACR Trans. Symmetric Cryptol., 2017

The Security of Tandem-DM in the Ideal Cipher Model.
J. Cryptol., 2017

Modes of Operation Suitable for Computing on Encrypted Data.
IACR Cryptol. ePrint Arch., 2017

Multi-Key Authenticated Encryption with Corruptions: Reductions are Lossy.
IACR Cryptol. ePrint Arch., 2017

Authenticated Encryption in the Face of Protocol and Side Channel Leakage.
IACR Cryptol. ePrint Arch., 2017

2016
A Modular Treatment of Cryptographic APIs: The Symmetric-Key Case.
IACR Cryptol. ePrint Arch., 2016

How low can you go? Using side-channel data to enhance brute-force key recovery.
IACR Cryptol. ePrint Arch., 2016

Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations.
IACR Cryptol. ePrint Arch., 2016

2015
How to Enumerate Your Keys Accurately and Efficiently After a Side Channel Attack.
IACR Cryptol. ePrint Arch., 2015

Indifferentiability of Confusion-Diffusion Networks.
IACR Cryptol. ePrint Arch., 2015

Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation.
IACR Cryptol. ePrint Arch., 2015

Rogue Decryption Failures: Reconciling AE Robustness Notions.
IACR Cryptol. ePrint Arch., 2015

Turning Online Ciphers Off.
IACR Cryptol. ePrint Arch., 2015

MJH: a faster alternative to MDC-2.
Des. Codes Cryptogr., 2015

A Leakage Resilient MAC.
Proceedings of the Cryptography and Coding - 15th IMA International Conference, 2015

Counting Keys in Parallel After a Side Channel Attack.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
Making and Breaking Leakage Simulators.
IACR Cryptol. ePrint Arch., 2014

Simulatable Leakage: Analysis, Pitfalls, and New Constructions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
A Leakage Resilient MAC.
IACR Cryptol. ePrint Arch., 2013

KDM Security in the Hybrid Framework.
IACR Cryptol. ePrint Arch., 2013

On Symmetric Encryption with Distinguishable Decryption Failures.
IACR Cryptol. ePrint Arch., 2013

Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions.
IACR Cryptol. ePrint Arch., 2013

2012
Collisions Are Not Incidental: A Compression Function Exploiting Discrete Geometry.
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012

Understanding Adaptivity: Random Systems Revisited.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

2011
On the Joint Security of Encryption and Signature, Revisited.
IACR Cryptol. ePrint Arch., 2011

The preimage security of double-block-length compression functions.
IACR Cryptol. ePrint Arch., 2011

The Symbiosis between Collision and Preimage Resistance.
Proceedings of the Cryptography and Coding - 13th IMA International Conference, 2011

The Preimage Security of Double-Block-Length Compression Functions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

2010
Obfuscation for Cryptographic Purposes.
J. Cryptol., 2010

An Analysis of the Blockcipher-Based Hash Functions from PGV.
J. Cryptol., 2010

The collision security of Tandem-DM in the ideal cipher model.
IACR Cryptol. ePrint Arch., 2010

Efficient Hashing using the AES Instruction Set.
IACR Cryptol. ePrint Arch., 2010

Attacking the Knudsen-Preneel Compression Functions.
Proceedings of the Fast Software Encryption, 17th International Workshop, 2010

Collision Attacks against the Knudsen-Preneel Compression Functions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010

Random Oracles with(out) Programmability.
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010

2009
Confidential Signatures and Deterministic Signcryption.
IACR Cryptol. ePrint Arch., 2009

Another Glance at Double-Length Hashing.
Proceedings of the Cryptography and Coding, 2009

2008
Blockcipher Based Hashing Revisited.
IACR Cryptol. ePrint Arch., 2008

A New Randomness Extraction Paradigm for Hybrid Encryption.
IACR Cryptol. ePrint Arch., 2008

Beyond Uniformity: Better Security/Efficiency Tradeoffs for Compression Functions.
Proceedings of the Advances in Cryptology, 2008

2007
Building a Collision-Resistant Compression Function from Non-Compressing Primitives.
IACR Cryptol. ePrint Arch., 2007

2006
On Small Characteristic Algebraic Tori in Pairing-Based Cryptography.
LMS J. Comput. Math., 2006

List signature schemes.
Discret. Appl. Math., 2006

Discrete Logarithm Variants of VSH.
Proceedings of the Progressin Cryptology, 2006

2005
Hardware and Software Normal Basis Arithmetic for Pairing-Based Cryptography in Characteristic Three.
IEEE Trans. Computers, 2005

A Key Encapsulation Mechanism for NTRU.
Proceedings of the Cryptography and Coding, 2005

Hash Based Digital Signature Schemes.
Proceedings of the Cryptography and Coding, 2005

Black-Box Secret Sharing from Primitive Sets in Algebraic Number Fields.
Proceedings of the Advances in Cryptology, 2005

2004
Practical Cryptography in High Dimensional Tori.
IACR Cryptol. ePrint Arch., 2004

On XTR and Side-Channel Analysis.
Proceedings of the Selected Areas in Cryptography, 11th International Workshop, 2004

A Comparison of CEILIDH and XTR.
Proceedings of the Algorithmic Number Theory, 6th International Symposium, 2004

2003
On Montgomery-Like Representationsfor Elliptic Curves over GF(2<sup>k</sup>).
Proceedings of the Public Key Cryptography, 2003

2002
Efficient Subgroup Exponentiation in Quadratic and Sixth Degree Extensions.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002

2001
Speeding Up XTR.
Proceedings of the Advances in Cryptology, 2001


  Loading...