What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Bart Mennink
Google Scholar
87
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tosc
To Pad or Not to Pad? Padding-Free Arithmetization-Oriented Sponges.
Charlotte Lefevre
Mario Marhuenda Beltrán
Bart Mennink
2025
journals/tosc
SoK: Security of the Ascon Modes.
Charlotte Lefevre
Bart Mennink
2025
journals/tosc
Keying Merkle-Damgård at the Suffix.
Bart Mennink
2025
conf/acns
Generic Security of GCM-SST.
Akiko Inoue
Ashwin Jha
Bart Mennink
Kazuhiko Minematsu
2025
conf/eurocrypt
Efficient Instances of Docked Double Decker with AES, and Application to Authenticated Encryption.
Christoph Dobraunig
Krystian Matusiewicz
Bart Mennink
Alexander Tereschenko
2025
conf/eurosp
Statistical Evaluation of Entropy Accumulation in Linux.
Alexandre Bouez
Joan Daemen
Bart Mennink
2025
journals/tches
Probing Secure Composability Without Fresh Randomness: Theory and Application to Ascon.
Vahid Jahandideh
Bart Mennink
Lejla Batina
2025
journals/tosc
Minimized PRFs from Public Permutations.
Bart Mennink
2025
journals/cic
Mobile Cell-Based Road Pricing with Verifiable User Privacy.
Alexandre Bouez
Eric R. Verheul
Bart Mennink
2024
journals/tches
An Algebraic Approach for Evaluating Random Probing Security With Application to AES.
Vahid Jahandideh
Bart Mennink
Lejla Batina
2024
journals/cic
Block Cipher Doubling for a Post-Quantum World.
Ritam Bhaumik
André Chailloux
Paul Frixons
Bart Mennink
María Naya-Plasencia
2024
journals/tosc
Permutation-Based Hash Chains with Application to Password Hashing.
Charlotte Lefevre
Bart Mennink
2024
journals/tosc
Tightening Leakage Resilience of the Suffix Keyed Sponge.
Henk Berendsen
Bart Mennink
2024
journals/tosc
Permutation-Based Hashing Beyond the Birthday Bound.
Charlotte Lefevre
Bart Mennink
2024
journals/joc
The COLM Authenticated Encryption Scheme.
Elena Andreeva
Andrey Bogdanov
Nilanjan Datta
Atul Luykx
Bart Mennink
Mridul Nandi
Elmar Tischhauser
Kan Yasuda
2024
conf/acns
Generalized Initialization of the Duplex Construction.
Christoph Dobraunig
Bart Mennink
2024
conf/sacrypt
Generic Security of the Ascon Mode: On the Power of Key Blinding.
Charlotte Lefevre
Bart Mennink
2023
journals/tosc
Understanding the Duplex and Its Security.
Bart Mennink
2023
journals/tosc
Preface to Volume 2023, Issue 1.
Christina Boura
Bart Mennink
2023
journals/tosc
EliMAC: Speeding Up LightMAC by around 20%.
Christoph Dobraunig
Bart Mennink
Samuel Neves
2023
journals/tifs
Secure Distributed Modular Exponentiation: Systematic Analysis and New Results.
Bart Mennink
2023
conf/crypto
Revisiting the Indifferentiability of the Sum of Permutations.
Aldo Gunsing
Ritam Bhaumik
Ashwin Jha
Bart Mennink
Yaobin Shen
2023
conf/asiacrypt
Generic Security of the SAFE API and Its Applications.
Dmitry Khovratovich
Mario Marhuenda Beltrán
Bart Mennink
2022
journals/tosc
Preface to Volume 2022, Issue 1.
Itai Dinur
Bart Mennink
2022
conf/ccs
Leakage and Tamper Resilient Permutation-Based Cryptography.
Christoph Dobraunig
Bart Mennink
Robert Primas
2022
conf/crypto
Tight Preimage Resistance of the Sponge Construction.
Charlotte Lefevre
Bart Mennink
2022
conf/asiacrypt
Security of Truncated Permutation Without Initial Value.
Lorenzo Grassi
Bart Mennink
2021
conf/eurocrypt
Leakage Resilient Value Comparison with Application to Message Authentication.
Christoph Dobraunig
Bart Mennink
2021
conf/asiacrypt
Categorization of Faulty Nonce Misuse Resistant Message Authentication.
Yu Long Chen
Bart Mennink
Bart Preneel
2021
conf/sacrypt
Multi-user Security of the Elephant v2 Authenticated Encryption Mode.
Tim Beyne
Yu Long Chen
Christoph Dobraunig
Bart Mennink
2020
journals/tosc
Errata to Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers.
Aldo Gunsing
Joan Daemen
Bart Mennink
2020
journals/tosc
Isap v2.0.
Christoph Dobraunig
Maria Eichlseder
Stefan Mangard
Florian Mendel
Bart Mennink
Robert Primas
Thomas Unterluggauer
2020
journals/tosc
Tightness of the Suffix Keyed Sponge Bound.
Christoph Dobraunig
Bart Mennink
2020
journals/tosc
Dumbo, Jumbo, and Delirium: Parallel Authenticated Encryption for the Lightweight Circus.
Tim Beyne
Yu Long Chen
Christoph Dobraunig
Bart Mennink
2020
conf/crypto
The Summation-Truncation Hybrid: Reusing Discarded Bits for Free.
Aldo Gunsing
Bart Mennink
2020
conf/asiacrypt
Beyond Birthday Bound Secure Fresh Rekeying: Application to Authenticated Encryption.
Bart Mennink
2019
journals/tosc
Deck-Based Wide Block Cipher Modes and an Exposition of the Blinded Keyed Hashing Model.
Aldo Gunsing
Joan Daemen
Bart Mennink
2019
journals/tosc
Security of the Suffix Keyed Sponge.
Christoph Dobraunig
Bart Mennink
2019
journals/tosc
Release of Unverified Plaintext: Tight Unified Model and Application to ANYDAE.
Donghoon Chang
Nilanjan Datta
Avijit Dutta
Bart Mennink
Mridul Nandi
Somitra Sanadhya
Ferdinand Sibleyras
2019
journals/joc
Beyond Conventional Security in Sponge-Based Authenticated Encryption Modes.
Philipp Jovanovic
Atul Luykx
Bart Mennink
Yu Sasaki
Kan Yasuda
2019
conf/crypto
How to Build Pseudorandom Functions from Public Random Permutations.
Yu Long Chen
Eran Lambooij
Bart Mennink
2019
conf/ctrsa
Linking Stam's Bounds with Generalized Truncation.
Bart Mennink
2019
conf/asiacrypt
Leakage Resilience of the Duplex Construction.
Christoph Dobraunig
Bart Mennink
2018
journals/tosc
Key Prediction Security of Keyed Sponges.
Bart Mennink
2018
journals/tosc
Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers.
Joan Daemen
Bart Mennink
Gilles Van Assche
2018
journals/tosc
Short Non-Malleable Codes from Related-Key Secure Block Ciphers.
Serge Fehr
Pierre Karpman
Bart Mennink
2018
conf/asiacrypt
Short Variable Length Domain Extenders with Beyond Birthday Bound Security.
Yu Long Chen
Bart Mennink
Mridul Nandi
2018
conf/tcc
Towards Tight Security of Cascaded LRW2.
Bart Mennink
2018
conf/cans
The Relation Between CENC and NEMO.
Bart Mennink
2017
journals/tosc
Optimal PRFs from Blockcipher Designs.
Bart Mennink
Samuel Neves
2017
journals/tosc
Understanding RUP Integrity of COLM.
Nilanjan Datta
Atul Luykx
Bart Mennink
Mridul Nandi
2017
journals/tosc
Efficient Length Doubling From Tweakable Block Ciphers.
Yu Long Chen
Atul Luykx
Bart Mennink
Bart Preneel
2017
conf/crypto
Insuperability of the Standard Versus Ideal Model Gap for Tweakable Blockcipher Security.
Bart Mennink
2017
conf/crypto
Encrypted Davies-Meyer and Its Dual: Towards Optimal Security Using Mirror Theory.
Bart Mennink
Samuel Neves
2017
conf/esorics
SePCAR: A Secure and Privacy-Enhancing Protocol for Car Access Provision.
Iraklis Symeonidis
Abdelrahaman Aly
Mustafa A. Mustafa
Bart Mennink
Siemen Dhooghe
Bart Preneel
2017
conf/ctrsa
Weak Keys for AEZ, and the External Key Padding Attack.
Bart Mennink
2017
conf/asiacrypt
Analyzing Multi-key Security Degradation.
Atul Luykx
Bart Mennink
Kenneth G. Paterson
2017
conf/asiacrypt
Full-State Keyed Duplex with Built-In Multi-user Support.
Joan Daemen
Bart Mennink
Gilles Van Assche
2016
journals/tosc
Security Analysis of BLAKE2's Modes of Operation.
Atul Luykx
Bart Mennink
Samuel Neves
2016
conf/crypto
XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees.
Bart Mennink
2016
conf/iwsec
Recipient Privacy in Online Social Networks.
Filipe Beato
Kimmo Halunen
Bart Mennink
2016
conf/eurocrypt
Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption.
Robert Granger
Philipp Jovanovic
Bart Mennink
Samuel Neves
2016
conf/cans
Improving the Sphinx Mix Network.
Filipe Beato
Kimmo Halunen
Bart Mennink
2015
conf/fse
Optimally Secure Tweakable Blockciphers.
Bart Mennink
2015
conf/fse
Security of Keyed Sponge Constructions Using a Modular Proof Approach.
Elena Andreeva
Joan Daemen
Bart Mennink
Gilles Van Assche
2015
conf/acns
On the XOR of Multiple Random Permutations.
Bart Mennink
Bart Preneel
2015
conf/asiacrypt
On the Impact of Known-Key Attacks on Hash Functions.
Bart Mennink
Bart Preneel
2015
conf/asiacrypt
Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption.
Bart Mennink
Reza Reyhanitabar
Damian Vizár
2015
conf/sacrypt
Forgery and Subkey Recovery on CAESAR Candidate iFeed.
Willem Schroé
Bart Mennink
Elena Andreeva
Bart Preneel
2014
conf/fse
COBRA: A Parallelizable Authenticated Online Cipher Without Block Cipher Inverse.
Elena Andreeva
Atul Luykx
Bart Mennink
Kan Yasuda
2014
conf/fse
APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography.
Elena Andreeva
Begül Bilgin
Andrey Bogdanov
Atul Luykx
Bart Mennink
Nicky Mouha
Kan Yasuda
2014
conf/crypto
The Security of Multiple Encryption in the Ideal Cipher Model.
Yuanxi Dai
Jooyoung Lee
Bart Mennink
John P. Steinberger
2014
conf/asiacrypt
How to Securely Release Unverified Plaintext in Authenticated Encryption.
Elena Andreeva
Andrey Bogdanov
Atul Luykx
Bart Mennink
Nicky Mouha
Kan Yasuda
2014
conf/asiacrypt
Beyond 2 c/2 Security in Sponge-Based Authenticated Encryption Modes.
Philipp Jovanovic
Atul Luykx
Bart Mennink
2014
conf/sacrypt
Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers.
Nicky Mouha
Bart Mennink
Anthony Van Herrewege
Dai Watanabe
Bart Preneel
Ingrid Verbauwhede
2014
conf/cans
Breaking and Fixing Cryptophia's Short Combiner.
Bart Mennink
Bart Preneel
2013
conf/fse
Towards Understanding the Known-Key Security of Block Ciphers.
Elena Andreeva
Andrey Bogdanov
Bart Mennink
2013
conf/crypto
On the Indifferentiability of Key-Alternating Ciphers.
Elena Andreeva
Andrey Bogdanov
Yevgeniy Dodis
Bart Mennink
John P. Steinberger
2013
conf/asiacrypt
Parallelizable and Authenticated Online Ciphers.
Elena Andreeva
Andrey Bogdanov
Atul Luykx
Bart Mennink
Elmar Tischhauser
Kan Yasuda
2012
conf/crypto
Hash Functions Based on Three Permutations: A Generic Security Analysis.
Bart Mennink
Bart Preneel
2012
conf/asiacrypt
Optimal Collision Security in Double Block Length Hashing with Single Length Key.
Bart Mennink
2012
conf/africacrypt
Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein.
Elena Andreeva
Bart Mennink
Bart Preneel
Marjan Skrobot
2012
conf/sacrypt
Provable Security of BLAKE with Non-ideal Compression Function.
Elena Andreeva
Atul Luykx
Bart Mennink
2012
conf/cans
A Simple Key-Recovery Attack on McOE-X.
Florian Mendel
Bart Mennink
Vincent Rijmen
Elmar Tischhauser
2011
conf/sacrypt
Provable Chosen-Target-Forced-Midfix Preimage Resistance.
Elena Andreeva
Bart Mennink
2010
conf/fc
Modulo Reduction for Paillier Encryptions and Application to Secure Statistical Analysis.
Jorge Guajardo
Bart Mennink
Berry Schoenmakers
2010
conf/cans
Anonymous Credential Schemes with Encrypted Attributes.
Jorge Guajardo
Bart Mennink
Berry Schoenmakers
Coauthors
Abdelrahaman Aly
(1)
Akiko Inoue
(1)
Aldo Gunsing
(4)
Alexander Tereschenko
(1)
Alexandre Bouez
(2)
André Chailloux
(1)
Andrey Bogdanov
(6)
Anthony Van Herrewege
(1)
Ashwin Jha
(2)
Atul Luykx
(12)
Avijit Dutta
(1)
Bart Mennink
(87)
Bart Preneel
(10)
Begül Bilgin
(1)
Berry Schoenmakers
(2)
Charlotte Lefevre
(6)
Christina Boura
(1)
Christoph Dobraunig
(11)
Dai Watanabe
(1)
Damian Vizár
(1)
Dmitry Khovratovich
(1)
Donghoon Chang
(1)
Elena Andreeva
(12)
Elmar Tischhauser
(3)
Eran Lambooij
(1)
Eric R. Verheul
(1)
Ferdinand Sibleyras
(1)
Filipe Beato
(2)
Florian Mendel
(2)
Gilles Van Assche
(3)
Henk Berendsen
(1)
Ingrid Verbauwhede
(1)
Iraklis Symeonidis
(1)
Itai Dinur
(1)
Joan Daemen
(6)
John P. Steinberger
(2)
Jooyoung Lee
(1)
Jorge Guajardo
(2)
Kan Yasuda
(6)
Kazuhiko Minematsu
(1)
Kenneth G. Paterson
(1)
Kimmo Halunen
(2)
Krystian Matusiewicz
(1)
Lejla Batina
(2)
Lorenzo Grassi
(1)
Maria Eichlseder
(1)
María Naya-Plasencia
(1)
Mario Marhuenda Beltrán
(2)
Marjan Skrobot
(1)
Mridul Nandi
(4)
Mustafa A. Mustafa
(1)
Nicky Mouha
(3)
Nilanjan Datta
(3)
Paul Frixons
(1)
Philipp Jovanovic
(3)
Pierre Karpman
(1)
Reza Reyhanitabar
(1)
Ritam Bhaumik
(2)
Robert Granger
(1)
Robert Primas
(2)
Samuel Neves
(5)
Serge Fehr
(1)
Siemen Dhooghe
(1)
Somitra Sanadhya
(1)
Stefan Mangard
(1)
Thomas Unterluggauer
(1)
Tim Beyne
(2)
Vahid Jahandideh
(2)
Vincent Rijmen
(1)
Willem Schroé
(1)
Yaobin Shen
(1)
Yevgeniy Dodis
(1)
Yu Long Chen
(6)
Yu Sasaki
(1)
Yuanxi Dai
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to