Search Results - "Atul Luykx"

  • Showing 1 - 14 results of 14
Refine Results
  1. 1

    The COLM Authenticated Encryption Scheme by Andreeva, Elena, Bogdanov, Andrey, Datta, Nilanjan, Luykx, Atul, Mennink, Bart, Nandi, Mridul, Tischhauser, Elmar, Yasuda, Kan

    Published in Journal of cryptology (01-04-2024)
    “…In this work we present the COLM authenticated encryption (AE) scheme which is the second of the two winners in the defense in depth category of the CAESAR…”
    Get full text
    Journal Article
  2. 2

    SUNDAE: Small Universal Deterministic Authenticated Encryption for the Internet of Things by Subhadeep Banik, Andrey Bogdanov, Atul Luykx, Elmar Tischhauser

    Published in IACR Transactions on Symmetric Cryptology (01-01-2018)
    “…Lightweight cryptography was developed in response to the increasing need to secure devices for the Internet of Things. After significant research effort, many…”
    Get full text
    Journal Article
  3. 3

    Understanding RUP Integrity of COLM by Nilanjan Datta, Atul Luykx, Bart Mennink, Mridul Nandi

    Published in IACR Transactions on Symmetric Cryptology (01-06-2017)
    “…The authenticated encryption scheme COLM is a third-round candidate in the CAESAR competition. Much like its antecedents COPA, ELmE, and ELmD, COLM consists of…”
    Get full text
    Journal Article
  4. 4

    Security Analysis of BLAKE2’s Modes of Operation by Atul Luykx, Bart Mennink, Samuel Neves

    Published in IACR Transactions on Symmetric Cryptology (01-12-2016)
    “…BLAKE2 is a hash function introduced at ACNS 2013, which has been adopted in many constructions and applications. It is a successor to the SHA-3 finalist…”
    Get full text
    Journal Article
  5. 5

    Efficient Length Doubling From Tweakable Block Ciphers by Yu Long Chen, Atul Luykx, Bart Mennink, Bart Preneel

    Published in IACR Transactions on Symmetric Cryptology (01-09-2017)
    “…We present a length doubler, LDT, that turns an n-bit tweakable block cipher into an efficient and secure cipher that can encrypt any bit string of length…”
    Get full text
    Journal Article
  6. 6

    Two-permutation-based hashing with binary mixing by Luykx Atul, Mennink Bart, Preneel Bart, Winnen Laura

    Published in Journal of mathematical cryptology (01-10-2015)
    “…We consider the generic design of compression functions based on two n-bit permutations and XOR-based mixing functions. It is known that any such function…”
    Get full text
    Journal Article
  7. 7

    Beyond Conventional Security in Sponge-Based Authenticated Encryption Modes by Jovanovic, Philipp, Luykx, Atul, Mennink, Bart, Sasaki, Yu, Yasuda, Kan

    Published in Journal of cryptology (15-07-2019)
    “…The Sponge function is known to achieve 2 c / 2 security, where c is its capacity. This bound was carried over to its keyed variants, such as SpongeWrap, to…”
    Get full text
    Journal Article
  8. 8

    Systematic Security Analysis of Stream Encryption With Key Erasure by Chen, Yu Long, Luykx, Atul, Mennink, Bart, Preneel, Bart

    Published in IEEE transactions on information theory (01-11-2021)
    “…We consider a generalized construction of stream ciphers with forward security. The design framework is modular: it is built from a so-called layer function…”
    Get full text
    Journal Article
  9. 9

    Connecting tweakable and multi-key blockcipher security by Lee, Jooyoung, Luykx, Atul, Mennink, Bart, Minematsu, Kazuhiko

    Published in Designs, codes, and cryptography (01-03-2018)
    “…The significance of understanding blockcipher security in the multi-key setting is highlighted by the extensive literature on attacks, and how effective key…”
    Get full text
    Journal Article
  10. 10

    Security Analysis of BLAKE2’s Modes of Operation by Luykx, Atul, Mennink, Bart, Neves, Samuel

    Published in IACR Transactions on Symmetric Cryptology (01-12-2016)
    “…BLAKE2 is a hash function introduced at ACNS 2013, which has been adopted in many constructions and applications. It is a successor to the SHA-3 finalist…”
    Get full text
    Journal Article
  11. 11

    SUNDAE: Small Universal Deterministic Authenticated Encryption for the Internet of Things by Banik, Subhadeep, Bogdanov, Andrey, Luykx, Atul, Tischhauser, Elmar

    Published in IACR Transactions on Symmetric Cryptology (03-09-2018)
    “…Lightweight cryptography was developed in response to the increasing need to secure devices for the Internet of Things. After significant research effort, many…”
    Get full text
    Journal Article
  12. 12

    The Hashgraph Protocol: Efficient Asynchronous BFT for High-Throughput Distributed Ledgers by Baird, Leemon, Luykx, Atul

    “…Atomic broadcast protocols are increasingly used to build distributed ledgers. The most robust protocols achieve byzantine fault tolerance (BFT) and operate in…”
    Get full text
    Conference Proceeding
  13. 13

    Efficient Length Doubling From Tweakable Block Ciphers by Chen, Yu Long, Luykx, Atul, Mennink, Bart, Preneel, Bart

    Published in IACR Transactions on Symmetric Cryptology (19-09-2017)
    “…We present a length doubler, LDT, that turns an n-bit tweakable block cipher into an efficient and secure cipher that can encrypt any bit string of length…”
    Get full text
    Journal Article
  14. 14

    Understanding RUP Integrity of COLM by Datta, Nilanjan, Luykx, Atul, Mennink, Bart, Nandi, Mridul

    Published in IACR Transactions on Symmetric Cryptology (19-06-2017)
    “…The authenticated encryption scheme COLM is a third-round candidate in the CAESAR competition. Much like its antecedents COPA, ELmE, and ELmD, COLM consists of…”
    Get full text
    Journal Article