Search Results - "Bart Mennink"

Refine Results
  1. 1

    Understanding the Duplex and Its Security by Mennink, Bart

    Published in IACR Transactions on Symmetric Cryptology (16-06-2023)
    “…At SAC 2011, Bertoni et al. introduced the keyed duplex construction as a tool to build permutation based authenticated encryption schemes. The construction…”
    Get full text
    Journal Article
  2. 2

    On the Resilience of Even-Mansour to Invariant Permutations by Mennink, Bart, Neves, Samuel

    Published in Designs, codes, and cryptography (01-05-2021)
    “…Symmetric cryptographic primitives are often exposed to invariances: deterministic relations between plaintexts and ciphertexts that propagate through the…”
    Get full text
    Journal Article
  3. 3

    Key Prediction Security of Keyed Sponges by Bart Mennink

    Published in IACR Transactions on Symmetric Cryptology (01-12-2018)
    “…The keyed sponge is a well-accepted method for message authentication. It processes data at a certain rate by sequential evaluation of an underlying…”
    Get full text
    Journal Article
  4. 4

    On the collision and preimage security of MDC-4 in the ideal cipher model by Mennink, Bart

    Published in Designs, codes, and cryptography (01-10-2014)
    “…We present a collision and preimage security analysis of MDC-4, a 24-years-old construction for transforming an n -bit block cipher into a 2 n -bit hash…”
    Get full text
    Journal Article
  5. 5

    Permutation-Based Hashing Beyond the Birthday Bound by Lefevre, Charlotte, Mennink, Bart

    Published in IACR Transactions on Symmetric Cryptology (01-03-2024)
    “…It is known that the sponge construction is tightly indifferentiable from a random oracle up to around 2c/2 queries, where c is the capacity. In particular, it…”
    Get full text
    Journal Article
  6. 6

    Tightening Leakage Resilience of the Suffix Keyed Sponge by Berendsen, Henk, Mennink, Bart

    Published in IACR Transactions on Symmetric Cryptology (01-03-2024)
    “…Lightweight cryptographic constructions are often optimized on multiple aspects that put the security bounds to the limit. In this respect, it is important to…”
    Get full text
    Journal Article
  7. 7
  8. 8

    An Algebraic Approach for Evaluating Random Probing Security With Application to AES by Jahandideh, Vahid, Mennink, Bart, Batina, Lejla

    “…We employ an algebraic approach to estimate the success rate of a sidechannel adversary attacking secrets of a masked circuit within the Random Probing Model…”
    Get full text
    Journal Article
  9. 9
  10. 10

    The COLM Authenticated Encryption Scheme by Andreeva, Elena, Bogdanov, Andrey, Datta, Nilanjan, Luykx, Atul, Mennink, Bart, Nandi, Mridul, Tischhauser, Elmar, Yasuda, Kan

    Published in Journal of cryptology (01-04-2024)
    “…In this work we present the COLM authenticated encryption (AE) scheme which is the second of the two winners in the defense in depth category of the CAESAR…”
    Get full text
    Journal Article
  11. 11

    EliMAC: Speeding Up LightMAC by around 20 by Dobraunig, Christoph, Mennink, Bart, Neves, Samuel

    Published in IACR Transactions on Symmetric Cryptology (16-06-2023)
    “…Universal hash functions play a prominent role in the design of message authentication codes and the like. Whereas it is known how to build highly efficient…”
    Get full text
    Journal Article
  12. 12

    Tightness of the Suffix Keyed Sponge Bound by Dobraunig, Christoph, Mennink, Bart

    Published in IACR Transactions on Symmetric Cryptology (01-12-2020)
    “…Generic attacks are a vital ingredient in the evaluation of the tightness of security proofs. In this paper, we evaluate the tightness of the suffix keyed…”
    Get full text
    Journal Article
  13. 13

    Optimal PRFs from Blockcipher Designs by Bart Mennink, Samuel Neves

    Published in IACR Transactions on Symmetric Cryptology (01-09-2017)
    “…Cryptographic modes built on top of a blockcipher usually rely on the assumption that this primitive behaves like a pseudorandom permutation (PRP). For many of…”
    Get full text
    Journal Article
  14. 14

    Isap v2.0 by Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel, Bart Mennink, Robert Primas, Thomas Unterluggauer

    Published in IACR Transactions on Symmetric Cryptology (22-06-2020)
    “…We specify Isap v2.0, a lightweight permutation-based authenticated encryption algorithm that is designed to ease protection against side-channel and fault…”
    Get full text
    Journal Article
  15. 15

    Security of the Suffix Keyed Sponge by Christoph Dobraunig, Bart Mennink

    Published in IACR Transactions on Symmetric Cryptology (01-01-2019)
    “…We formalize and analyze the general suffix keyed sponge construction, a pseudorandom function built on top of a cryptographic permutation. The construction…”
    Get full text
    Journal Article
  16. 16

    Dumbo, Jumbo, and Delirium: Parallel Authenticated Encryption for the Lightweight Circus by Tim Beyne, Yu Long Chen, Christoph Dobraunig, Bart Mennink

    Published in IACR Transactions on Symmetric Cryptology (22-06-2020)
    “…With the trend to connect more and more devices to the Internet, authenticated encryption has become a major backbone in securing the communication, not only…”
    Get full text
    Journal Article
  17. 17

    Errata to Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers by Aldo Gunsing, Joan Daemen, Bart Mennink

    Published in IACR Transactions on Symmetric Cryptology (01-01-2020)
    “…In ToSC 2018(4), Daemen et al. performed an in-depth investigation of sound hashing modes based on arbitrary functions, permutations, or block ciphers…”
    Get full text
    Journal Article
  18. 18

    Short Non-Malleable Codes from Related-Key Secure Block Ciphers by Fehr, Serge, Karpman, Pierre, Mennink, Bart

    Published in IACR Transactions on Symmetric Cryptology (01-01-2018)
    “…A non-malleable code is an unkeyed randomized encoding scheme that offers the strong guarantee that decoding a tampered codeword either results in the original…”
    Get full text
    Journal Article
  19. 19

    Deck-Based Wide Block Cipher Modes and an Exposition of the Blinded Keyed Hashing Model by Aldo Gunsing, Joan Daemen, Bart Mennink

    Published in IACR Transactions on Symmetric Cryptology (01-01-2019)
    “…We present two tweakable wide block cipher modes from doubly-extendable cryptographic keyed (deck) functions and a keyed hash function: double-decker and…”
    Get full text
    Journal Article
  20. 20

    Understanding RUP Integrity of COLM by Nilanjan Datta, Atul Luykx, Bart Mennink, Mridul Nandi

    Published in IACR Transactions on Symmetric Cryptology (01-06-2017)
    “…The authenticated encryption scheme COLM is a third-round candidate in the CAESAR competition. Much like its antecedents COPA, ELmE, and ELmD, COLM consists of…”
    Get full text
    Journal Article