286 results on '"Stam, Martijn"'
Search Results
2. Dynamic Security Aspects of Onion Routing
3. Multi-instance Secure Public-Key Encryption
4. On Evaluating Anonymity of Onion Routing
5. Tightness Subtleties for Multi-user PKE Notions
6. Vetted Encryption
7. On Evaluating Anonymity of Onion Routing
8. Assessing the Feasibility of Single Trace Power Analysis of Frodo
9. Untagging Tor: A Formal Treatment of Onion Encryption
10. Tightness Subtleties for Multi-user PKE Notions
11. Pincering SKINNY by Exploiting Slow Diffusion
12. Vetted Encryption
13. Authenticated Encryption in the Face of Protocol and Side Channel Leakage
14. Multi-key Authenticated Encryption with Corruptions: Reductions Are Lossy
15. Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations
16. A Modular Treatment of Cryptographic APIs: The Symmetric-Key Case
17. Indifferentiability of Confusion-Diffusion Networks
18. Assessing the Feasibility of Single Trace Power Analysis of Frodo
19. Counting Keys in Parallel After a Side Channel Attack
20. Rogue Decryption Failures: Reconciling AE Robustness Notions
21. A Leakage Resilient MAC
22. On Symmetric Encryption with Distinguishable Decryption Failures
23. KDM Security in the Hybrid Framework
24. Untagging Tor: A Formal Treatment of Onion Encryption
25. The Security of Tandem-DM in the Ideal Cipher Model
26. Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions
27. Understanding Adaptivity: Random Systems Revisited
28. Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation
29. Collisions Are Not Incidental: A Compression Function Exploiting Discrete Geometry
30. The Symbiosis between Collision and Preimage Resistance
31. The Preimage Security of Double-Block-Length Compression Functions
32. On the Joint Security of Encryption and Signature, Revisited
33. Efficient Hashing Using the AES Instruction Set
34. The Collision Security of Tandem-DM in the Ideal Cipher Model
35. MJH: A Faster Alternative to MDC-2
36. Random Oracles with(out) Programmability
37. Collision Attacks against the Knudsen-Preneel Compression Functions
38. Attacking the Knudsen-Preneel Compression Functions
39. Confidential Signatures and Deterministic Signcryption
40. Another Glance at Double-Length Hashing
41. Blockcipher-Based Hashing Revisited
42. A New Randomness Extraction Paradigm for Hybrid Encryption
43. Building a Collision-Resistant Compression Function from Non-compressing Primitives : (Extended Abstract)
44. Beyond Uniformity: Better Security/Efficiency Tradeoffs for Compression Functions
45. Multi-key Authenticated Encryption with Corruptions: Reductions Are Lossy
46. Authenticated Encryption in the Face of Protocol and Side Channel Leakage
47. Obfuscation for Cryptographic Purposes
48. Discrete Logarithm Variants of VSH
49. A Key Encapsulation Mechanism for NTRU
50. Practical Cryptography in High Dimensional Tori
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.