Bart Mennink
Orcid: 0000-0001-6679-1878
According to our database1,
Bart Mennink
authored at least 118 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IACR Trans. Symmetric Cryptol., 2024
IACR Trans. Symmetric Cryptol., 2024
An Algebraic Approach for Evaluating Random Probing Security With Application to AES.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
2023
IEEE Trans. Inf. Forensics Secur., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
2022
IEEE Internet Things J., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
IEEE Trans. Inf. Theory, 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Des. Codes Cryptogr., 2021
Proceedings of the Selected Areas in Cryptography - 28th International Conference, 2021
2020
Errata to Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers.
IACR Trans. Symmetric Cryptol., 2020
Dumbo, Jumbo, and Delirium: Parallel Authenticated Encryption for the Lightweight Circus.
IACR Trans. Symmetric Cryptol., 2020
IACR Cryptol. ePrint Arch., 2020
Beyond Birthday Bound Secure Fresh Rekeying: Application to Authenticated Encryption.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
2019
Deck-Based Wide Block Cipher Modes and an Exposition of the Blinded Keyed Hashing Model.
IACR Trans. Symmetric Cryptol., 2019
IACR Trans. Symmetric Cryptol., 2019
J. Cryptol., 2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the Topics in Cryptology - CT-RSA 2019, 2019
2018
IACR Trans. Symmetric Cryptol., 2018
IACR Trans. Symmetric Cryptol., 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018
Proceedings of the Cryptology and Network Security - 17th International Conference, 2018
2017
IACR Trans. Symmetric Cryptol., 2017
IACR Cryptol. ePrint Arch., 2017
Insuperability of the Standard Versus Ideal Model Gap for Tweakable Blockcipher Security.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Des. Codes Cryptogr., 2017
Proceedings of the Computer Security - ESORICS 2017, 2017
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017
2016
IACR Trans. Symmetric Cryptol., 2016
Int. J. Inf. Sec., 2016
Proceedings of the Advances in Information and Computer Security, 2016
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016
2015
Security of Full-State Keyed and Duplex Sponge: Applications to Authenticated Encryption.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015
Proceedings of the Fast Software Encryption - 22nd International Workshop, 2015
Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015
Proceedings of the Applied Cryptography and Network Security, 2015
2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Des. Codes Cryptogr., 2014
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014
Proceedings of the Cryptology and Network Security - 13th International Conference, 2014
When a Bloom Filter is a Doom Filter: Security Assessment of a Novel Iris Biometric Template Protection System.
Proceedings of the BIOSIG 2014, 2014
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
2013
Provable Security of Cryptographic Hash Functions (Bewijsbare veiligheid van cryptografische hashfuncties) ; Provable Security of Cryptographic Hash Functions.
PhD thesis, 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Cryptography and Coding - 14th IMA International Conference, 2013
2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012
Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012
2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Selected Areas in Cryptography - 18th International Workshop, 2011
2010
J. Inf. Process. Syst., 2010
Towards Side-Channel Resistant Block Cipher Usage or Can We Encrypt Without Side-Channel Countermeasures?
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Information Security - 13th International Conference, 2010
Modulo Reduction for Paillier Encryptions and Application to Secure Statistical Analysis.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010
Proceedings of the Cryptology and Network Security - 9th International Conference, 2010