BibTeX records: Atul Luykx

download as .bib file

@article{DBLP:journals/tit/ChenLMP21,
  author    = {Yu Long Chen and
               Atul Luykx and
               Bart Mennink and
               Bart Preneel},
  title     = {Systematic Security Analysis of Stream Encryption With Key Erasure},
  journal   = {{IEEE} Trans. Inf. Theory},
  volume    = {67},
  number    = {11},
  pages     = {7518--7534},
  year      = {2021},
  url       = {https://doi.org/10.1109/TIT.2021.3109302},
  doi       = {10.1109/TIT.2021.3109302},
  timestamp = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tit/ChenLMP21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/GaddamL0W21,
  author    = {Sivanarayana Gaddam and
               Atul Luykx and
               Rohit Sinha and
               Gaven J. Watson},
  editor    = {Michael Bailey and
               Rachel Greenstadt},
  title     = {Reducing {HSM} Reliance in Payments through Proxy Re-Encryption},
  booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
               2021},
  pages     = {4061--4078},
  publisher = {{USENIX} Association},
  year      = {2021},
  url       = {https://www.usenix.org/conference/usenixsecurity21/presentation/gaddam},
  timestamp = {Thu, 16 Sep 2021 17:32:10 +0200},
  biburl    = {https://dblp.org/rec/conf/uss/GaddamL0W21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaddamLSW21,
  author    = {Sivanarayana Gaddam and
               Atul Luykx and
               Rohit Sinha and
               Gaven J. Watson},
  title     = {Reducing {HSM} Reliance in Payments through Proxy Re-Encryption},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  pages     = {94},
  year      = {2021},
  url       = {https://eprint.iacr.org/2021/094},
  timestamp = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/iacr/GaddamLSW21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coins/BairdL20,
  author    = {Leemon Baird and
               Atul Luykx},
  title     = {The Hashgraph Protocol: Efficient Asynchronous {BFT} for High-Throughput
               Distributed Ledgers},
  booktitle = {2020 International Conference on Omni-layer Intelligent Systems, {COINS}
               2020, Barcelona, Spain, August 31 - September 2, 2020},
  pages     = {1--7},
  publisher = {{IEEE}},
  year      = {2020},
  url       = {https://doi.org/10.1109/COINS49042.2020.9191430},
  doi       = {10.1109/COINS49042.2020.9191430},
  timestamp = {Tue, 22 Sep 2020 09:56:44 +0200},
  biburl    = {https://dblp.org/rec/conf/coins/BairdL20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbertiniDGKLS20,
  author    = {Ange Albertini and
               Thai Duong and
               Shay Gueron and
               Stefan K{\"{o}}lbl and
               Atul Luykx and
               Sophie Schmieg},
  title     = {How to Abuse and Fix Authenticated Encryption Without Key Commitment},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  pages     = {1456},
  year      = {2020},
  url       = {https://eprint.iacr.org/2020/1456},
  timestamp = {Wed, 02 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/iacr/AlbertiniDGKLS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/JovanovicLMSY19,
  author    = {Philipp Jovanovic and
               Atul Luykx and
               Bart Mennink and
               Yu Sasaki and
               Kan Yasuda},
  title     = {Beyond Conventional Security in Sponge-Based Authenticated Encryption
               Modes},
  journal   = {J. Cryptol.},
  volume    = {32},
  number    = {3},
  pages     = {895--940},
  year      = {2019},
  url       = {https://doi.org/10.1007/s00145-018-9299-7},
  doi       = {10.1007/s00145-018-9299-7},
  timestamp = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/joc/JovanovicLMSY19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LeeLMM18,
  author    = {Jooyoung Lee and
               Atul Luykx and
               Bart Mennink and
               Kazuhiko Minematsu},
  title     = {Connecting tweakable and multi-key blockcipher security},
  journal   = {Des. Codes Cryptogr.},
  volume    = {86},
  number    = {3},
  pages     = {623--640},
  year      = {2018},
  url       = {https://doi.org/10.1007/s10623-017-0347-3},
  doi       = {10.1007/s10623-017-0347-3},
  timestamp = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dcc/LeeLMM18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BanikBLT18,
  author    = {Subhadeep Banik and
               Andrey Bogdanov and
               Atul Luykx and
               Elmar Tischhauser},
  title     = {{SUNDAE:} Small Universal Deterministic Authenticated Encryption for
               the Internet of Things},
  journal   = {{IACR} Trans. Symmetric Cryptol.},
  volume    = {2018},
  number    = {3},
  pages     = {1--35},
  year      = {2018},
  url       = {https://doi.org/10.13154/tosc.v2018.i3.1-35},
  doi       = {10.13154/tosc.v2018.i3.1-35},
  timestamp = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tosc/BanikBLT18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/LuykxP18,
  author    = {Atul Luykx and
               Bart Preneel},
  editor    = {Jesper Buus Nielsen and
               Vincent Rijmen},
  title     = {Optimal Forgeries Against Polynomial-Based MACs and {GCM}},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10820},
  pages     = {445--467},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-78381-9\_17},
  doi       = {10.1007/978-3-319-78381-9\_17},
  timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/eurocrypt/LuykxP18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuykxP18,
  author    = {Atul Luykx and
               Bart Preneel},
  title     = {Optimal Forgeries Against Polynomial-Based MACs and {GCM}},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  pages     = {166},
  year      = {2018},
  url       = {http://eprint.iacr.org/2018/166},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/LuykxP18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DattaLMN17,
  author    = {Nilanjan Datta and
               Atul Luykx and
               Bart Mennink and
               Mridul Nandi},
  title     = {Understanding {RUP} Integrity of {COLM}},
  journal   = {{IACR} Trans. Symmetric Cryptol.},
  volume    = {2017},
  number    = {2},
  pages     = {143--161},
  year      = {2017},
  url       = {https://doi.org/10.13154/tosc.v2017.i2.143-161},
  doi       = {10.13154/tosc.v2017.i2.143-161},
  timestamp = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tosc/DattaLMN17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ChenLMP17,
  author    = {Yu Long Chen and
               Atul Luykx and
               Bart Mennink and
               Bart Preneel},
  title     = {Efficient Length Doubling From Tweakable Block Ciphers},
  journal   = {{IACR} Trans. Symmetric Cryptol.},
  volume    = {2017},
  number    = {3},
  pages     = {253--270},
  year      = {2017},
  url       = {https://doi.org/10.13154/tosc.v2017.i3.253-270},
  doi       = {10.13154/tosc.v2017.i3.253-270},
  timestamp = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tosc/ChenLMP17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/LuykxMP17,
  author    = {Atul Luykx and
               Bart Mennink and
               Kenneth G. Paterson},
  editor    = {Tsuyoshi Takagi and
               Thomas Peyrin},
  title     = {Analyzing Multi-key Security Degradation},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference
               on the Theory and Applications of Cryptology and Information Security,
               Hong Kong, China, December 3-7, 2017, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10625},
  pages     = {575--605},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-70697-9\_20},
  doi       = {10.1007/978-3-319-70697-9\_20},
  timestamp = {Tue, 14 May 2019 10:00:40 +0200},
  biburl    = {https://dblp.org/rec/conf/asiacrypt/LuykxMP17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AshurDL17,
  author    = {Tomer Ashur and
               Orr Dunkelman and
               Atul Luykx},
  editor    = {Jonathan Katz and
               Hovav Shacham},
  title     = {Boosting Authenticated Encryption Robustness with Minimal Modifications},
  booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
               Proceedings, Part {III}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10403},
  pages     = {3--33},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-63697-9\_1},
  doi       = {10.1007/978-3-319-63697-9\_1},
  timestamp = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/crypto/AshurDL17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AshurDL17,
  author    = {Tomer Ashur and
               Orr Dunkelman and
               Atul Luykx},
  title     = {Boosting Authenticated Encryption Robustness With Minimal Modifications},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  pages     = {239},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/239},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/AshurDL17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DattaLMN17,
  author    = {Nilanjan Datta and
               Atul Luykx and
               Bart Mennink and
               Mridul Nandi},
  title     = {Understanding {RUP} Integrity of {COLM}},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  pages     = {431},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/431},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/DattaLMN17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuykxMP17,
  author    = {Atul Luykx and
               Bart Mennink and
               Kenneth G. Paterson},
  title     = {Analyzing Multi-Key Security Degradation},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  pages     = {435},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/435},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/LuykxMP17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenLMP17,
  author    = {Yu Long Chen and
               Atul Luykx and
               Bart Mennink and
               Bart Preneel},
  title     = {Efficient Length Doubling From Tweakable Block Ciphers},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  pages     = {841},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/841},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/ChenLMP17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/basesearch/Luykx16,
  author    = {Atul Luykx},
  title     = {The Design and Analysis of Message Authentication and Authenticated
               Encryption Schemes ; Ontwerp en analyse van berichtverificatie- en
               geverifieerde encryptieschema's},
  school    = {Katholieke Universiteit Leuven, Belgium},
  year      = {2016},
  url       = {https://lirias.kuleuven.be/handle/123456789/539700},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/phd/basesearch/Luykx16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LuykxMN16,
  author    = {Atul Luykx and
               Bart Mennink and
               Samuel Neves},
  title     = {Security Analysis of BLAKE2's Modes of Operation},
  journal   = {{IACR} Trans. Symmetric Cryptol.},
  volume    = {2016},
  number    = {1},
  pages     = {158--176},
  year      = {2016},
  url       = {https://doi.org/10.13154/tosc.v2016.i1.158-176},
  doi       = {10.13154/tosc.v2016.i1.158-176},
  timestamp = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tosc/LuykxMN16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/LuykxPSY16,
  author    = {Atul Luykx and
               Bart Preneel and
               Alan Szepieniec and
               Kan Yasuda},
  editor    = {Marc Fischlin and
               Jean{-}S{\'{e}}bastien Coron},
  title     = {On the Influence of Message Length in PMAC's Security Bounds},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9665},
  pages     = {596--621},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-49890-3\_23},
  doi       = {10.1007/978-3-662-49890-3\_23},
  timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/eurocrypt/LuykxPSY16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/LuykxPTY16,
  author    = {Atul Luykx and
               Bart Preneel and
               Elmar Tischhauser and
               Kan Yasuda},
  editor    = {Thomas Peyrin},
  title     = {A {MAC} Mode for Lightweight Block Ciphers},
  booktitle = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
               Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {9783},
  pages     = {43--59},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-52993-5\_3},
  doi       = {10.1007/978-3-662-52993-5\_3},
  timestamp = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/fse/LuykxPTY16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuykxPSY16,
  author    = {Atul Luykx and
               Bart Preneel and
               Alan Szepieniec and
               Kan Yasuda},
  title     = {On the Influence of Message Length in PMAC's Security Bounds},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  pages     = {185},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/185},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/LuykxPSY16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuykxPTY16,
  author    = {Atul Luykx and
               Bart Preneel and
               Elmar Tischhauser and
               Kan Yasuda},
  title     = {A {MAC} Mode for Lightweight Block Ciphers},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  pages     = {190},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/190},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/LuykxPTY16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuykxMN16,
  author    = {Atul Luykx and
               Bart Mennink and
               Samuel Neves},
  title     = {Security Analysis of BLAKE2's Modes of Operation},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  pages     = {827},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/827},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/LuykxMN16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/LuykxMPW15,
  author    = {Atul Luykx and
               Bart Mennink and
               Bart Preneel and
               Laura Winnen},
  title     = {Two-permutation-based hashing with binary mixing},
  journal   = {J. Math. Cryptol.},
  volume    = {9},
  number    = {3},
  pages     = {139--150},
  year      = {2015},
  url       = {http://www.degruyter.com/view/j/jmc.2015.9.issue-3/jmc-2015-0015/jmc-2015-0015.xml},
  timestamp = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jmc/LuykxMPW15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MouhaL15,
  author    = {Nicky Mouha and
               Atul Luykx},
  editor    = {Rosario Gennaro and
               Matthew Robshaw},
  title     = {Multi-key Security: The Even-Mansour Construction Revisited},
  booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9215},
  pages     = {209--223},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-47989-6\_10},
  doi       = {10.1007/978-3-662-47989-6\_10},
  timestamp = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/crypto/MouhaL15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MouhaL15,
  author    = {Nicky Mouha and
               Atul Luykx},
  title     = {Multi-Key Security: The Even-Mansour Construction Revisited},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  pages     = {101},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/101},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/MouhaL15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/JovanovicLM14,
  author    = {Philipp Jovanovic and
               Atul Luykx and
               Bart Mennink},
  editor    = {Palash Sarkar and
               Tetsu Iwata},
  title     = {Beyond 2 c/2 Security in Sponge-Based Authenticated Encryption Modes},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part
               {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8873},
  pages     = {85--104},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-662-45611-8\_5},
  doi       = {10.1007/978-3-662-45611-8\_5},
  timestamp = {Tue, 14 May 2019 10:00:40 +0200},
  biburl    = {https://dblp.org/rec/conf/asiacrypt/JovanovicLM14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AndreevaBLMMY14,
  author    = {Elena Andreeva and
               Andrey Bogdanov and
               Atul Luykx and
               Bart Mennink and
               Nicky Mouha and
               Kan Yasuda},
  editor    = {Palash Sarkar and
               Tetsu Iwata},
  title     = {How to Securely Release Unverified Plaintext in Authenticated Encryption},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part
               {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8873},
  pages     = {105--125},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-662-45611-8\_6},
  doi       = {10.1007/978-3-662-45611-8\_6},
  timestamp = {Sun, 23 Dec 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/asiacrypt/AndreevaBLMMY14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/AndreevaBBLMMY14,
  author    = {Elena Andreeva and
               Beg{\"{u}}l Bilgin and
               Andrey Bogdanov and
               Atul Luykx and
               Bart Mennink and
               Nicky Mouha and
               Kan Yasuda},
  editor    = {Carlos Cid and
               Christian Rechberger},
  title     = {{APE:} Authenticated Permutation-Based Encryption for Lightweight
               Cryptography},
  booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
               London, UK, March 3-5, 2014. Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8540},
  pages     = {168--186},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-662-46706-0\_9},
  doi       = {10.1007/978-3-662-46706-0\_9},
  timestamp = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/fse/AndreevaBBLMMY14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/AndreevaLMY14,
  author    = {Elena Andreeva and
               Atul Luykx and
               Bart Mennink and
               Kan Yasuda},
  editor    = {Carlos Cid and
               Christian Rechberger},
  title     = {{COBRA:} {A} Parallelizable Authenticated Online Cipher Without Block
               Cipher Inverse},
  booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
               London, UK, March 3-5, 2014. Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8540},
  pages     = {187--204},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-662-46706-0\_10},
  doi       = {10.1007/978-3-662-46706-0\_10},
  timestamp = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/fse/AndreevaLMY14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AndreevaBLMMY14,
  author    = {Elena Andreeva and
               Andrey Bogdanov and
               Atul Luykx and
               Bart Mennink and
               Nicky Mouha and
               Kan Yasuda},
  title     = {How to Securely Release Unverified Plaintext in Authenticated Encryption},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  pages     = {144},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/144},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/AndreevaBLMMY14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JovanovicLM14,
  author    = {Philipp Jovanovic and
               Atul Luykx and
               Bart Mennink},
  title     = {Beyond 2\({}^{\mbox{c/2}}\) Security in Sponge-Based Authenticated
               Encryption Modes},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  pages     = {373},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/373},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/JovanovicLM14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AndreevaBLMTY13,
  author    = {Elena Andreeva and
               Andrey Bogdanov and
               Atul Luykx and
               Bart Mennink and
               Elmar Tischhauser and
               Kan Yasuda},
  editor    = {Kazue Sako and
               Palash Sarkar},
  title     = {Parallelizable and Authenticated Online Ciphers},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Bengaluru, India, December 1-5, 2013, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8269},
  pages     = {424--443},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-42033-7\_22},
  doi       = {10.1007/978-3-642-42033-7\_22},
  timestamp = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/asiacrypt/AndreevaBLMTY13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AndreevaBLMTY13,
  author    = {Elena Andreeva and
               Andrey Bogdanov and
               Atul Luykx and
               Bart Mennink and
               Elmar Tischhauser and
               Kan Yasuda},
  title     = {Parallelizable and Authenticated Online Ciphers},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  pages     = {790},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/790},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/AndreevaBLMTY13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AndreevaBBLMMY13,
  author    = {Elena Andreeva and
               Beg{\"{u}}l Bilgin and
               Andrey Bogdanov and
               Atul Luykx and
               Bart Mennink and
               Nicky Mouha and
               Kan Yasuda},
  title     = {{APE:} Authenticated Permutation-Based Encryption for Lightweight
               Cryptography},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  pages     = {791},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/791},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/AndreevaBBLMMY13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/AndreevaLM12,
  author    = {Elena Andreeva and
               Atul Luykx and
               Bart Mennink},
  editor    = {Lars R. Knudsen and
               Huapeng Wu},
  title     = {Provable Security of {BLAKE} with Non-ideal Compression Function},
  booktitle = {Selected Areas in Cryptography, 19th International Conference, {SAC}
               2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {7707},
  pages     = {321--338},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-35999-6\_21},
  doi       = {10.1007/978-3-642-35999-6\_21},
  timestamp = {Tue, 14 May 2019 10:00:38 +0200},
  biburl    = {https://dblp.org/rec/conf/sacrypt/AndreevaLM12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuykxAMP12,
  author    = {Atul Luykx and
               Elena Andreeva and
               Bart Mennink and
               Bart Preneel},
  title     = {Impossibility Results for Indifferentiability with Resets},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  pages     = {644},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/644},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/LuykxAMP12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AndreevaLM11,
  author    = {Elena Andreeva and
               Atul Luykx and
               Bart Mennink},
  title     = {Provable Security of {BLAKE} with Non-Ideal Compression Function},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  pages     = {620},
  year      = {2011},
  url       = {http://eprint.iacr.org/2011/620},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/AndreevaLM11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics