2024 |
-
Permutation-Based Hash Chains with Application to Password Hashing
Charlotte Lefevre, Bart Mennink
Cryptology ePrint Archive. Report 2024/557, 45 pages (2024)
-
Efficient Instances of Docked Double Decker With AES, and Application to Authenticated Encryption
Christoph Dobraunig, Krystian Matusiewicz, Bart Mennink, Alexander Tereschenko
Cryptology ePrint Archive. Report 2024/084, 45 pages (2024)
-
Block Cipher Doubling for a Post-Quantum World
Ritam Bhaumik, André Chailloux, Paul Frixons, Bart Mennink, María Naya-Plasencia
IACR Communications in Cryptology. To appear (2024)
-
Symmetric Cryptography (Dagstuhl Seminar 24041)
Christof Beierle, Bart Mennink, María Naya-Plasencia, Yu Sasaki, Rachelle Heim Boissier
Dagstuhl Reports, 14(1), pp. 72-89 (2024)
-
An Algebraic Approach for Evaluating Random Probing Security With Application to AES
Vahid Jahandideh, Bart Mennink, Lejla Batina
IACR Transactions on Cryptographic Hardware and Embedded Systems 2024(4), pp. 657-689 (2024)
-
Generic Security of the Ascon Mode: On the Power of Key Blinding
Charlotte Lefevre, Bart Mennink
Selected Areas in Cryptography, SAC 2024. To appear (2024)
-
Tightening Leakage Resilience of the Suffix Keyed Sponge
Henk Berendsen, Bart Mennink
IACR Transactions on Symmetric Cryptology 2024(1), pp. 459-496 (2024)
-
Permutation-Based Hashing Beyond the Birthday Bound
Charlotte Lefevre, Bart Mennink
IACR Transactions on Symmetric Cryptology 2024(1), pp. 71-113 (2024)
-
The COLM Authenticated Encryption Scheme
Elena Andreeva, Andrey Bogdanov, Nilanjan Datta, Atul Luykx, Bart Mennink, Mridul Nandi, Elmar Tischhauser, Kan Yasuda
Journal of Cryptology, 37(2), pp. 15 (2024)
-
Generalized Initialization of the Duplex Construction
Christoph Dobraunig, Bart Mennink
Applied Cryptography and Network Security, ACNS 2024 (II). LNCS, vol. 14584, pp. 460-484. Springer (2024)
|
2023 |
-
Encryption and Security of Counter Mode
Bart Mennink
Symmetric Cryptography 1 - Design and Security Proofs (Boura, Naya-Plasencia). Book chapter, pp. 147-157. Wiley (2023)
-
Modeling Security
Bart Mennink
Symmetric Cryptography 1 - Design and Security Proofs (Boura, Naya-Plasencia). Book chapter, pp. 137-146. Wiley (2023)
-
Generic Security of the SAFE API and Its Applications
Dmitry Khovratovich, Mario Marhuenda Beltrán, Bart Mennink
ASIACRYPT 2023 (VIII). LNCS, vol. 14445, pp. 301-327. Springer (2023)
-
Information Security Conference, ISC 2023, Proceedings
Elias Athanasopoulos, Bart Mennink
LNCS, vol. 14411. Springer (2023)
-
Secure Distributed Modular Exponentiation: Systematic Analysis and New Results
Bart Mennink
IEEE Transactions on Information Forensics Security 18, pp. 4188-4197 (2023)
-
Revisiting the Indifferentiability of the Sum of Permutations
Aldo Gunsing, Ritam Bhaumik, Ashwin Jha, Bart Mennink, Yaobin Shen
CRYPTO 2023 (III). LNCS, vol. 14083, pp. 628-660. Springer (2023)
-
EliMAC: Speeding Up LightMAC by around 20%
Christoph Dobraunig, Bart Mennink, Samuel Neves
IACR Transactions on Symmetric Cryptology 2023(2), pp. 69-93 (2023)
-
Understanding the Duplex and Its Security
Bart Mennink
IACR Transactions on Symmetric Cryptology 2023(2), pp. 1-46 (2023)
-
Preface to Volume 2023, Issue 1
Christina Boura, Bart Mennink
IACR Transactions on Symmetric Cryptology 2023(1), pp. 1-4 (2023)
-
SAFE: Sponge API for Field Elements
Jean-Philippe Aumasson, Dmitry Khovratovich, Bart Mennink, Porçu Quine
Cryptology ePrint Archive. Report 2023/522, 9 pages (2023)
|
2022 |
-
Security of Truncated Permutation Without Initial Value
Lorenzo Grassi, Bart Mennink
ASIACRYPT 2022 (II). LNCS, vol. 13792, pp. 620-650. Springer (2022)
-
Leakage and Tamper Resilient Permutation-Based Cryptography
Christoph Dobraunig, Bart Mennink, Robert Primas
ACM CCS 2022. pp. 859-873. ACM (2022)
-
Symmetric Cryptography (Dagstuhl Seminar 22141)
Nils Gregor Leander, Bart Mennink, María Naya-Plasencia, Yu Sasaki, Eran Lambooij
Dagstuhl Reports, 12(4), pp. 1-12 (2022)
-
Tight Preimage Resistance of the Sponge Construction
Charlotte Lefevre, Bart Mennink
CRYPTO 2022 (IV). LNCS, vol. 13510, pp. 185-204. Springer (2022)
-
Preface to Volume 2022, Issue 1
Itai Dinur, Bart Mennink
IACR Transactions on Symmetric Cryptology 2022(1), pp. 1-4 (2022)
-
HERMES: Scalable, Secure, and Privacy-Enhancing Vehicle Access System
Iraklis Symeonidis, Dragos Rotaru, Mustafa A. Mustafa, Bart Mennink, Bart Preneel, Panos Papadimitratos
IEEE Internet of Things Journal, 9(1), pp. 129-151 (2022)
|
2021 |
-
Categorization of Faulty Nonce Misuse Resistant Message Authentication
Yu Long Chen, Bart Mennink, Bart Preneel
ASIACRYPT 2021 (III). LNCS, vol. 13092, pp. 520-550. Springer (2021)
-
Multi-User Security of the Elephant v2 Authenticated Encryption Mode
Tim Beyne, Yu Long Chen, Christoph Dobraunig, Bart Mennink
Selected Areas in Cryptography, SAC 2021. LNCS, vol. 13203, pp. 155-178. Springer (2022)
-
Systematic Security Analysis of Stream Encryption With Key Erasure
Yu Long Chen, Atul Luykx, Bart Mennink, Bart Preneel
IEEE Transactions on Information Theory 67(11), pp. 7518-7534 (2021)
-
Leakage Resilient Value Comparison With Application to Message Authentication
Christoph Dobraunig, Bart Mennink
EUROCRYPT 2021 (II). LNCS, vol. 12697, pp. 377-407. Springer (2021)
-
On the Resilience of Even-Mansour to Invariant Permutations
Bart Mennink, Samuel Neves
Designs, Codes and Cryptography 89(5), pp. 859-893 (2021)
|
2020 |
-
Tightness of the Suffix Keyed Sponge Bound
Christoph Dobraunig, Bart Mennink
IACR Transactions on Symmetric Cryptology 2020(4), pp. 195-212 (2020)
-
Beyond Birthday Bound Secure Fresh Rekeying: Application to Authenticated Encryption
Bart Mennink
ASIACRYPT 2020 (I). LNCS, vol. 12491, pp. 630-661. Springer (2020)
-
Errata to Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers
Aldo Gunsing, Joan Daemen, Bart Mennink
IACR Transactions on Symmetric Cryptology 2020(3), pp. 362-366 (2020)
-
The Summation-Truncation Hybrid: Reusing Discarded Bits for Free
Aldo Gunsing, Bart Mennink
CRYPTO 2020 (I). LNCS, vol. 12170, pp. 187-217. Springer (2020)
-
Symmetric Cryptography (Dagstuhl Seminar 20041)
Nils Gregor Leander, Bart Mennink, Kaisa Nyberg, Kan Yasuda
Dagstuhl Reports, 10(1), pp. 130-143 (2020)
-
Practical Forgeries for ORANGE
Christoph Dobraunig, Florian Mendel, Bart Mennink
Information Processing Letters, 159-160, pp. 105961 (2020)
-
ISAP v2.0
Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel, Bart Mennink, Robert Primas, Thomas Unterluggauer
IACR Transactions on Symmetric Cryptology Special Issue on Designs for the NIST Lightweight Standardisation Process, pp. 390-416 (2020)
-
Dumbo, Jumbo, and Delirium: Parallel Authenticated Encryption for the Lightweight Circus
Tim Beyne, Yu Long Chen, Christoph Dobraunig, Bart Mennink
IACR Transactions on Symmetric Cryptology Special Issue on Designs for the NIST Lightweight Standardisation Process, pp. 5-30 (2020)
-
Collapseability of Tree Hashes
Aldo Gunsing, Bart Mennink
Conference on Post-Quantum Cryptography, PQCrypto 2020. LNCS, vol. 10346, pp. 367-383. Springer (2020)
|
2019 |
-
Security of the Suffix Keyed Sponge
Christoph Dobraunig, Bart Mennink
IACR Transactions on Symmetric Cryptology 2019(4), pp. 223-248 (2019)
-
Release of Unverified Plaintext: Tight Unified Model and Application to ANYDAE
Donghoon Chang, Nilanjan Datta, Avijit Dutta, Bart Mennink, Mridul Nandi, Somitra Sanadhya, Ferdinand Sibleyras
IACR Transactions on Symmetric Cryptology 2019(4), pp. 119-146 (2019)
-
Deck-Based Wide Block Cipher Modes and an Exposition of the Blinded Keyed Hashing Model
Aldo Gunsing, Joan Daemen, Bart Mennink
IACR Transactions on Symmetric Cryptology 2019(4), pp. 1-22 (2019)
-
Leakage Resilience of the Duplex Construction
Christoph Dobraunig, Bart Mennink
ASIACRYPT 2019 (III). LNCS, vol. 11923, pp. 225-255. Springer (2019)
-
How to Build Pseudorandom Functions From Public Random Permutations
Yu Long Chen, Eran Lambooij, Bart Mennink
CRYPTO 2019 (I). LNCS, vol. 10403, pp. 556-583. Springer (2019)
-
Beyond Conventional Security in Sponge-Based Authenticated Encryption Modes
Philipp Jovanovic, Atul Luykx, Bart Mennink, Yu Sasaki, Kan Yasuda
Journal of Cryptology, 32(3), pp. 895-940 (2019)
-
Linking Stam's Bounds With Generalized Truncation
Bart Mennink
Topics in Cryptology, CT-RSA 2019. LNCS, vol. 11405, pp. 313-329. Springer (2019)
|
2018 |
-
Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers
Joan Daemen, Bart Mennink, Gilles Van Assche
IACR Transactions on Symmetric Cryptology 2018(4), pp. 197-228 (2018)
(This pdf is the updated version of the paper, fixing an error in the proof (see Section 1.3 of this version). Please refer to this version.)
-
Key Prediction Security of Keyed Sponges
Bart Mennink
IACR Transactions on Symmetric Cryptology 2018(4), pp. 128-149 (2018)
-
Short Variable Length Domain Extenders With Beyond Birthday Bound Security
Yu Long Chen, Bart Mennink, Mridul Nandi
ASIACRYPT 2018 (I). LNCS, vol. 11272, pp. 244-274. Springer (2018)
-
Towards Tight Security of Cascaded LRW2
Bart Mennink
Theory of Cryptography Conference, TCC 2018. LNCS, vol. 11240, pp. 192-222. Springer (2018)
-
The Relation Between CENC and NEMO
Bart Mennink
Cryptology and Network Security, CANS 2018. LNCS, vol. 11124, pp. 177-189. Springer (2018)
-
Privacy-Preserving Distributed Access Control for Medical Data
Christian Maulany, Majid Nateghizad, Bart Mennink, Zekeriya Erkin
International Joint Conference on e-Business and Telecommunications, ICETE 2018 (II). pp. 488-497. SciTePress (2018)
-
Connecting Tweakable and Multi-Key Blockcipher Security
Jooyoung Lee, Atul Luykx, Bart Mennink, Kazuhiko Minematsu
Designs, Codes and Cryptography 86(3), pp. 623-640 (2018)
-
Short Non-Malleable Codes from Related-Key Secure Block Ciphers
Serge Fehr, Pierre Karpman, Bart Mennink
IACR Transactions on Symmetric Cryptology 2018(1), pp. 336-352 (2018)
|
2017 |
-
Full-State Keyed Duplex With Built-In Multi-User Support
Joan Daemen, Bart Mennink, Gilles Van Assche
ASIACRYPT 2017 (II). LNCS, vol. 10625, pp. 606-637. Springer (2017)
-
Analyzing Multi-Key Security Degradation
Atul Luykx, Bart Mennink, Kenneth G. Paterson
ASIACRYPT 2017 (II). LNCS, vol. 10625, pp. 575-605. Springer (2017)
-
Efficient Length Doubling from Tweakable Block Ciphers
Yu Long Chen, Atul Luykx, Bart Mennink, Bart Preneel
IACR Transactions on Symmetric Cryptology 2017(3), pp. 253-270 (2017)
-
Optimal PRFs from Blockcipher Designs
Bart Mennink, Samuel Neves
IACR Transactions on Symmetric Cryptology 2017(3), pp. 228-252 (2017)
-
De verjaardagsparadox in de cryptografie
Bart Mennink
Nieuw Archief voor Wiskunde 5/18(3), pp. 190-194 (2017)
-
Wiskunde in de cryptografie (Redactioneel)
Bart Mennink, Marc Stevens
Nieuw Archief voor Wiskunde 5/18(3), pp. 155-155 (2017)
-
SePCAR: A Secure and Privacy-Enhancing Protocol for Car Access Provision
Iraklis Symeonidis, Abdelrahaman Aly, Mustafa A. Mustafa, Bart Mennink, Siemen Dhooghe, Bart Preneel
European Symposium on Research in Computer Security, ESORICS 2017 (II). LNCS, vol. 10493, pp. 475-493. Springer (2017)
-
Encrypted Davies-Meyer and Its Dual: Towards Optimal Security Using Mirror Theory
Bart Mennink, Samuel Neves
CRYPTO 2017 (III). LNCS, vol. 10403, pp. 556-583. Springer (2017)
-
Insuperability of the Standard Versus Ideal Model Gap for Tweakable Blockcipher Security
Bart Mennink
CRYPTO 2017 (II). LNCS, vol. 10402, pp. 708-732. Springer (2017)
-
Understanding RUP Integrity of COLM
Nilanjan Datta, Atul Luykx, Bart Mennink, Mridul Nandi
IACR Transactions on Symmetric Cryptology 2017(2), pp. 143-161 (2017)
-
XOR of PRPs in a Quantum World
Bart Mennink, Alan Szepieniec
Conference on Post-Quantum Cryptography, PQCrypto 2017. LNCS, vol. 10346, pp. 367-383. Springer (2017)
-
Optimal Collision Security in Double Block Length Hashing with Single Length Key
Bart Mennink
Designs, Codes and Cryptography 83(2), pp. 357-406 (2017)
-
Weak Keys for AEZ, and the External Key Padding Attack
Bart Mennink
Topics in Cryptology, CT-RSA 2017. LNCS, vol. 10159, pp. 223-237. Springer (2017)
|
2016 |
-
Security Analysis of BLAKE2's Modes of Operation
Atul Luykx, Bart Mennink, Samuel Neves
IACR Transactions on Symmetric Cryptology 2016(1), pp. 158-176 (2016)
-
CENC is Optimally Secure
Tetsu Iwata, Bart Mennink, Damian Vizár
Cryptology ePrint Archive. Report 2016/1087, 5 pages (2016)
-
Improving the Sphinx Mix Network
Filipe Beato, Kimmo Halunen, Bart Mennink
Cryptology and Network Security, CANS 2016. LNCS, vol. 10052, pp. 681-691. Springer (2016)
-
Recipient Privacy in Online Social Networks
Filipe Beato, Kimmo Halunen, Bart Mennink
International Workshop on Security, IWSEC 2016. LNCS, vol. 9836, pp. 254-264. Springer (2016)
-
Damaging, Simplifying, and Salvaging p-OMD
Tomer Ashur, Bart Mennink
Information Security Conference, ISC 2016. LNCS, vol. 9866, pp. 73-92. Springer (2016)
-
XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees
Bart Mennink
CRYPTO 2016 (I). LNCS, vol. 9814, pp. 64-94. Springer (2016)
-
Efficient Parallelizable Hashing Using Small Non-Compressing Primitives
Bart Mennink, Bart Preneel
International Journal of Information Security 15(3), pp. 285-300 (2016)
-
Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption
Robert Granger, Philipp Jovanovic, Bart Mennink, Samuel Neves
EUROCRYPT 2016 (I). LNCS, vol. 9665, pp. 263-293. Springer (2016)
|
2015 |
-
Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption
Bart Mennink, Reza Reyhanitabar, Damian Vizár
ASIACRYPT 2015 (II). LNCS, vol. 9453, pp. 465-489. Springer (2015)
-
On the Impact of Known-Key Attacks on Hash Functions
Bart Mennink, Bart Preneel
ASIACRYPT 2015 (II). LNCS, vol. 9453, pp. 59-84. Springer (2015)
-
Two-Permutation-Based Hashing with Binary Mixing
Atul Luykx, Bart Mennink, Bart Preneel, Laura Winnen
Journal of Mathematical Cryptology 9(3), pp. 139-150 (2015)
-
Open Problems in Hash Function Security
Elena Andreeva, Bart Mennink, Bart Preneel
Designs, Codes and Cryptography 77(2), pp. 611-631 (2015)
-
Forgery and Subkey Recovery on CAESAR candidate iFeed
Willem Schroé, Bart Mennink, Elena Andreeva, Bart Preneel
Selected Areas in Cryptography, SAC 2015. LNCS, vol. 9566, pp. 197-204. Springer (2016)
-
On the XOR of Multiple Random Permutations
Bart Mennink, Bart Preneel
Applied Cryptography and Network Security, ACNS 2015. LNCS, vol. 9092, pp. 619-634. Springer (2015)
-
Optimally Secure Tweakable Blockciphers
Bart Mennink
Fast Software Encryption, FSE 2015. LNCS, vol. 9054, pp. 428-448. Springer (2015)
(This pdf is the updated version of the paper, with a slightly adjusted description of the scheme to fix an oversight in the proof. Please refer to this version.)
-
Security of Keyed Sponge Constructions Using a Modular Proof Approach
Elena Andreeva, Joan Daemen, Bart Mennink, Gilles Van Assche
Fast Software Encryption, FSE 2015. LNCS, vol. 9054, pp. 364-384. Springer (2015)
-
Trivial Nonce-Misusing Attack on Pure OMD
Tomer Ashur, Bart Mennink
Cryptology ePrint Archive. Report 2015/175, 3 pages (2015)
|
2014 |
-
How to Securely Release Unverified Plaintext in Authenticated Encryption
Elena Andreeva, Andrey Bogdanov, Atul Luykx, Bart Mennink, Nicky Mouha, Kan Yasuda
ASIACRYPT 2014 (I). LNCS, vol. 8873, pp. 105-125. Springer (2014)
-
Beyond 2^{c/2} Security in Sponge-Based Authenticated Encryption Modes
Philipp Jovanovic, Atul Luykx, Bart Mennink
ASIACRYPT 2014 (I). LNCS, vol. 8873, pp. 85-104. Springer (2014)
-
Breaking and Fixing Cryptophia's Short Combiner
Bart Mennink, Bart Preneel
Cryptology and Network Security, CANS 2014. LNCS, vol. 8813, pp. 50-63. Springer (2014)
-
When a Bloom Filter is a Doom Filter: Security Assessment of a Novel Iris Biometric Template Protection System
Jens Hermans, Bart Mennink, Roel Peeters
Biometrics Special Interest Group, BIOSIG 2014. LNI, vol. P-230, pp. 75-86. Gesellschaft für Informatik (2014)
-
Shattering the Glass Maze
Jens Hermans, Roel Peeters, Bart Mennink
Biometrics Special Interest Group, BIOSIG 2014. LNI, vol. P-230, pp. 63-74. Gesellschaft für Informatik (2014)
-
Speedup for European ePassport Authentication
Roel Peeters, Jens Hermans, Bart Mennink
Biometrics Special Interest Group, BIOSIG 2014. LNI, vol. P-230, pp. 51-62. Gesellschaft für Informatik (2014)
-
On the Collision and Preimage Security of MDC-4 in the Ideal Cipher Model
Bart Mennink
Designs, Codes and Cryptography 73(1), pp. 121-150 (2014)
-
The Security of Multiple Encryption in the Ideal Cipher Model
Yuanxi Dai, Jooyoung Lee, Bart Mennink, John P. Steinberger
CRYPTO 2014 (I). LNCS, vol. 8616, pp. 20-38. Springer (2014)
-
Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers
Nicky Mouha, Bart Mennink, Anthony Van Herrewege, Dai Watanabe, Bart Preneel, Ingrid Verbauwhede
Selected Areas in Cryptography, SAC 2014. LNCS, vol. 8781, pp. 306-323. Springer (2014)
-
COBRA: A Parallelizable Authenticated Online Cipher Without Block Cipher Inverse
Elena Andreeva, Atul Luykx, Bart Mennink, Kan Yasuda
Fast Software Encryption, FSE 2014. LNCS, vol. 8540, pp. 187-204. Springer (2014)
-
APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography
Elena Andreeva, Begül Bilgin, Andrey Bogdanov, Atul Luykx, Bart Mennink, Nicky Mouha, Kan Yasuda
Fast Software Encryption, FSE 2014. LNCS, vol. 8540, pp. 168-186. Springer (2014)
-
Triple and Quadruple Encryption: Bridging the Gaps
Bart Mennink, Bart Preneel
Cryptology ePrint Archive. Report 2014/016, 16 pages (2014)
|
2013 |
-
Indifferentiability of Double Length Compression Functions
Bart Mennink
IMA Cryptography and Coding 2013. LNCS, vol. 8308, pp. 232-251. Springer (2013)
-
Parallelizable and Authenticated Online Ciphers
Elena Andreeva, Andrey Bogdanov, Atul Luykx, Bart Mennink, Elmar W. Tischhauser, Kan Yasuda
ASIACRYPT 2013 (I). LNCS, vol. 8269, pp. 424-443. Springer (2013)
-
On the Indifferentiability of Key-Alternating Ciphers
Elena Andreeva, Andrey Bogdanov, Yevgeniy Dodis, Bart Mennink, John P. Steinberger
CRYPTO 2013 (I). LNCS, vol. 8042, pp. 531-550. Springer (2013)
-
Provable Security of Cryptographic Hash Functions
Bart Mennink
PhD thesis, KU Leuven, Bart Preneel, Vincent Rijmen (promotors), xvi+238 pages (2013)
-
Towards Understanding the Known-Key Security of Block Ciphers
Elena Andreeva, Andrey Bogdanov, Bart Mennink
Fast Software Encryption, FSE 2013. LNCS, vol. 8424, pp. 348-366. Springer (2014)
-
D.SYM.11: Final Hash Functions Status Report
Christina Boura, Bart Mennink, María Naya-Plasencia, Christian Rechberger
ICT-2007-216676, European Network of Excellence in Cryptology II, technical report (2013)
|
2012 |
-
Impossibility Results for Indifferentiability with Resets
Atul Luykx, Elena Andreeva, Bart Mennink, Bart Preneel
Cryptology ePrint Archive. Report 2012/644, 13 pages (2012)
-
A Simple Key-Recovery Attack on McOE-X
Florian Mendel, Bart Mennink, Vincent Rijmen, Elmar W. Tischhauser
Cryptology and Network Security, CANS 2012. LNCS, vol. 7712, pp. 23-31. Springer (2012). BEST PAPER AWARD!
-
Optimal Collision Security in Double Block Length Hashing with Single Length Key
Bart Mennink
ASIACRYPT 2012. LNCS, vol. 7658, pp. 526-543. Springer (2012)
-
Hash Functions Based on Three Permutations: A Generic Security Analysis
Bart Mennink, Bart Preneel
CRYPTO 2012. LNCS, vol. 7417, pp. 330-347. Springer (2012)
-
Provable Security of BLAKE with Non-Ideal Compression Function
Elena Andreeva, Atul Luykx, Bart Mennink
Selected Areas in Cryptography, SAC 2012. LNCS, vol. 7707, pp. 322-339. Springer (2012)
-
Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein
Elena Andreeva, Bart Mennink, Bart Preneel, Marjan Škrobot
AFRICACRYPT 2012. LNCS, vol. 7374, pp. 287-305. Springer (2012). BEST PAPER AWARD!
-
The Parazoa Family: Generalizing the Sponge Hash Functions
Elena Andreeva, Bart Mennink, Bart Preneel
International Journal of Information Security 11(3), pp. 149-165 (2012)
-
On Security Arguments of the Second Round SHA-3 Candidates
Elena Andreeva, Andrey Bogdanov, Bart Mennink, Bart Preneel, Christian Rechberger
International Journal of Information Security 11(2), pp. 103-120 (2012)
-
Increasing the Flexibility of the Herding Attack
Bart Mennink
Information Processing Letters 112(3), pp. 98-105 (2012)
|
2011 |
-
Provable Chosen-Target-Forced-Midfix Preimage Resistance
Elena Andreeva, Bart Mennink
Selected Areas in Cryptography, SAC 2011. LNCS, vol. 7118, pp. 37-54. Springer (2011)
|
2010 |
-
Anonymous Credential Schemes with Encrypted Attributes
Jorge Guajardo, Bart Mennink, Berry Schoenmakers
Cryptology and Network Security, CANS 2010. LNCS, vol. 6467, pp. 314-333. Springer (2010)
-
Security Properties of Domain Extenders for Cryptographic Hash Functions
Elena Andreeva, Bart Mennink, Bart Preneel
Journal of Information Processing Systems 6(4), pp. 453-480 (2010)
-
On Side-Channel Resistant Block Cipher Usage
Jorge Guajardo, Bart Mennink
Information Security Conference, ISC 2010. LNCS, vol. 6531, pp. 254-268. Springer (2010)
-
Security Reductions of the Second Round SHA-3 Candidates
Elena Andreeva, Bart Mennink, Bart Preneel
Information Security Conference, ISC 2010. LNCS, vol. 6531, pp. 39-53. Springer (2010)
-
On the Indifferentiability of the Grøstl Hash Function
Elena Andreeva, Bart Mennink, Bart Preneel
Security and Cryptography for Networks, SCN 2010. LNCS, vol. 6280, pp. 88-105. Springer (2010)
-
Modulo Reduction for Paillier Encryptions and Application to Secure Statistical Analysis (extended abstract)
Jorge Guajardo, Bart Mennink, Berry Schoenmakers
Financial Cryptography and Data Security, FC 2010. LNCS, vol. 6052, pp. 375-382. Springer (2010)
|
2009 |
-
Encrypted certificate schemes and their security and privacy analysis
Bart Mennink
Master's thesis, TU Eindhoven, Jorge Guajardo, Berry Schoenmakers (promotors), xii+103 pages (2009)
|