Chaskey: an efficient MAC algorithm for 32-bit microcontrollers N Mouha, B Mennink, A Van Herrewege, D Watanabe, B Preneel, ... Selected Areas in Cryptography, 306-323, 2014 | 294 | 2014 |
How to Securely Release Unverified Plaintext in Authenticated Encryption E Andreeva, A Bogdanov, A Luykx, B Mennink, N Mouha, K Yasuda Advances in Cryptology-ASIACRYPT 2014, 105-125, 2014 | 152 | 2014 |
Parallelizable and authenticated online ciphers E Andreeva, A Bogdanov, A Luykx, B Mennink, E Tischhauser, K Yasuda Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013 | 144 | 2013 |
Beyond 2^{c/2} Security in Sponge-Based Authenticated Encryption Modes P Jovanovic, A Luykx, B Mennink Advances in Cryptology-ASIACRYPT 2014, 85-104, 2014 | 119 | 2014 |
Security of keyed sponge constructions using a modular proof approach E Andreeva, J Daemen, B Mennink, G Van Assche Fast Software Encryption, 2015 | 103 | 2015 |
Encrypted Davies-Meyer and its dual: Towards optimal security using Mirror theory B Mennink, S Neves Advances in Cryptology–CRYPTO 2017, 556-583, 2017 | 93 | 2017 |
Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption R Granger, P Jovanovic, B Mennink, S Neves Advances in Cryptology-EUROCRYPT 2016, 263-293, 2016 | 93 | 2016 |
Security of full-state keyed Sponge and Duplex: Applications to authenticated encryption B Mennink, R Reyhanitabar, D Vizár Advances in Cryptology-ASIACRYPT 2015, 2015 | 92 | 2015 |
APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography E Andreeva, B Bilgin, A Bogdanov, A Luykx, B Mennink, N Mouha, ... Fast Software Encryption, 2014 | 91 | 2014 |
On the indifferentiability of key-alternating ciphers E Andreeva, A Bogdanov, Y Dodis, B Mennink, JP Steinberger Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013 | 91 | 2013 |
Isap v2. 0 CE Dobraunig, M Eichlseder, S Mangard, F Mendel, BJM Mennink, ... | 90 | 2020 |
When a Bloom Filter is a Doom Filter: Security Assessment of a Novel Iris Biometric Template Protection System J Hermans, B Mennink, R Peeters Biometrics Special Interest Group, BIOSIG, 75-86, 2014 | 79 | 2014 |
Full-State Keyed Duplex With Built-In Multi-User Support J Daemen, B Mennink, G Van Assche Advances in Cryptology-ASIACRYPT 2017, 606-637, 2017 | 70 | 2017 |
PRIMATEs v1 E Andreeva, B Bilgin, A Bogdanov, A Luykx, F Mendel, B Mennink, ... | 62 | 2014 |
XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees B Mennink Advances in Cryptology–CRYPTO 2016, 64-94, 2016 | 57 | 2016 |
Optimally secure tweakable blockciphers B Mennink Fast Software Encryption, 2015 | 54 | 2015 |
Analyzing Multi-Key Security Degradation A Luykx, B Mennink, KG Paterson Advances in Cryptology-ASIACRYPT 2017, 575-605, 2017 | 53 | 2017 |
Security reductions of the second round SHA-3 candidates E Andreeva, B Mennink, B Preneel Information Security: 13th International Conference, ISC 2010, Boca Raton …, 2011 | 52 | 2011 |
Towards understanding the known-key security of block ciphers E Andreeva, A Bogdanov, B Mennink Fast Software Encryption, 348-366, 2013 | 47 | 2013 |
COLM v1 E Andreeva, A Bogdanov, N Datta, A Luykx, B Mennink, M Nandi, ... Submission to the CAESAR Competition, 2016 | 44 | 2016 |