Search Results - "Bart Mennink"
-
1
Understanding the Duplex and Its Security
Published in IACR Transactions on Symmetric Cryptology (16-06-2023)“…At SAC 2011, Bertoni et al. introduced the keyed duplex construction as a tool to build permutation based authenticated encryption schemes. The construction…”
Get full text
Journal Article -
2
On the Resilience of Even-Mansour to Invariant Permutations
Published in Designs, codes, and cryptography (01-05-2021)“…Symmetric cryptographic primitives are often exposed to invariances: deterministic relations between plaintexts and ciphertexts that propagate through the…”
Get full text
Journal Article -
3
Key Prediction Security of Keyed Sponges
Published in IACR Transactions on Symmetric Cryptology (01-12-2018)“…The keyed sponge is a well-accepted method for message authentication. It processes data at a certain rate by sequential evaluation of an underlying…”
Get full text
Journal Article -
4
On the collision and preimage security of MDC-4 in the ideal cipher model
Published in Designs, codes, and cryptography (01-10-2014)“…We present a collision and preimage security analysis of MDC-4, a 24-years-old construction for transforming an n -bit block cipher into a 2 n -bit hash…”
Get full text
Journal Article -
5
Permutation-Based Hashing Beyond the Birthday Bound
Published in IACR Transactions on Symmetric Cryptology (01-03-2024)“…It is known that the sponge construction is tightly indifferentiable from a random oracle up to around 2c/2 queries, where c is the capacity. In particular, it…”
Get full text
Journal Article -
6
Tightening Leakage Resilience of the Suffix Keyed Sponge
Published in IACR Transactions on Symmetric Cryptology (01-03-2024)“…Lightweight cryptographic constructions are often optimized on multiple aspects that put the security bounds to the limit. In this respect, it is important to…”
Get full text
Journal Article -
7
Preface to Volume 2023, Issue 1
Published in IACR Transactions on Symmetric Cryptology (01-01-2023)Get full text
Journal Article -
8
An Algebraic Approach for Evaluating Random Probing Security With Application to AES
Published in IACR transactions on cryptographic hardware and embedded systems (05-09-2024)“…We employ an algebraic approach to estimate the success rate of a sidechannel adversary attacking secrets of a masked circuit within the Random Probing Model…”
Get full text
Journal Article -
9
Preface to Volume 2022, Issue 1
Published in IACR Transactions on Symmetric Cryptology (11-03-2022)Get full text
Journal Article -
10
The COLM Authenticated Encryption Scheme
Published in Journal of cryptology (01-04-2024)“…In this work we present the COLM authenticated encryption (AE) scheme which is the second of the two winners in the defense in depth category of the CAESAR…”
Get full text
Journal Article -
11
EliMAC: Speeding Up LightMAC by around 20
Published in IACR Transactions on Symmetric Cryptology (16-06-2023)“…Universal hash functions play a prominent role in the design of message authentication codes and the like. Whereas it is known how to build highly efficient…”
Get full text
Journal Article -
12
Tightness of the Suffix Keyed Sponge Bound
Published in IACR Transactions on Symmetric Cryptology (01-12-2020)“…Generic attacks are a vital ingredient in the evaluation of the tightness of security proofs. In this paper, we evaluate the tightness of the suffix keyed…”
Get full text
Journal Article -
13
Optimal PRFs from Blockcipher Designs
Published in IACR Transactions on Symmetric Cryptology (01-09-2017)“…Cryptographic modes built on top of a blockcipher usually rely on the assumption that this primitive behaves like a pseudorandom permutation (PRP). For many of…”
Get full text
Journal Article -
14
Isap v2.0
Published in IACR Transactions on Symmetric Cryptology (22-06-2020)“…We specify Isap v2.0, a lightweight permutation-based authenticated encryption algorithm that is designed to ease protection against side-channel and fault…”
Get full text
Journal Article -
15
Security of the Suffix Keyed Sponge
Published in IACR Transactions on Symmetric Cryptology (01-01-2019)“…We formalize and analyze the general suffix keyed sponge construction, a pseudorandom function built on top of a cryptographic permutation. The construction…”
Get full text
Journal Article -
16
Dumbo, Jumbo, and Delirium: Parallel Authenticated Encryption for the Lightweight Circus
Published in IACR Transactions on Symmetric Cryptology (22-06-2020)“…With the trend to connect more and more devices to the Internet, authenticated encryption has become a major backbone in securing the communication, not only…”
Get full text
Journal Article -
17
Errata to Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers
Published in IACR Transactions on Symmetric Cryptology (01-01-2020)“…In ToSC 2018(4), Daemen et al. performed an in-depth investigation of sound hashing modes based on arbitrary functions, permutations, or block ciphers…”
Get full text
Journal Article -
18
Short Non-Malleable Codes from Related-Key Secure Block Ciphers
Published in IACR Transactions on Symmetric Cryptology (01-01-2018)“…A non-malleable code is an unkeyed randomized encoding scheme that offers the strong guarantee that decoding a tampered codeword either results in the original…”
Get full text
Journal Article -
19
Deck-Based Wide Block Cipher Modes and an Exposition of the Blinded Keyed Hashing Model
Published in IACR Transactions on Symmetric Cryptology (01-01-2019)“…We present two tweakable wide block cipher modes from doubly-extendable cryptographic keyed (deck) functions and a keyed hash function: double-decker and…”
Get full text
Journal Article -
20
Understanding RUP Integrity of COLM
Published in IACR Transactions on Symmetric Cryptology (01-06-2017)“…The authenticated encryption scheme COLM is a third-round candidate in the CAESAR competition. Much like its antecedents COPA, ELmE, and ELmD, COLM consists of…”
Get full text
Journal Article