Search

Your search keyword '"Stam, Martijn"' showing total 286 results

Search Constraints

Start Over You searched for: Author "Stam, Martijn" Remove constraint Author: "Stam, Martijn"
286 results on '"Stam, Martijn"'

Search Results

1. SoK: Public Key Encryption with Openings

2. Dynamic Security Aspects of Onion Routing

3. Multi-instance Secure Public-Key Encryption

4. On Evaluating Anonymity of Onion Routing

5. Tightness Subtleties for Multi-user PKE Notions

6. Vetted Encryption

8. Assessing the Feasibility of Single Trace Power Analysis of Frodo

9. Untagging Tor: A Formal Treatment of Onion Encryption

13. Authenticated Encryption in the Face of Protocol and Side Channel Leakage

14. Multi-key Authenticated Encryption with Corruptions: Reductions Are Lossy

15. Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations

16. A Modular Treatment of Cryptographic APIs: The Symmetric-Key Case

17. Indifferentiability of Confusion-Diffusion Networks

19. Counting Keys in Parallel After a Side Channel Attack

20. Rogue Decryption Failures: Reconciling AE Robustness Notions

21. A Leakage Resilient MAC

22. On Symmetric Encryption with Distinguishable Decryption Failures

23. KDM Security in the Hybrid Framework

26. Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions

27. Understanding Adaptivity: Random Systems Revisited

28. Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation

29. Collisions Are Not Incidental: A Compression Function Exploiting Discrete Geometry

30. The Symbiosis between Collision and Preimage Resistance

31. The Preimage Security of Double-Block-Length Compression Functions

32. On the Joint Security of Encryption and Signature, Revisited

33. Efficient Hashing Using the AES Instruction Set

34. The Collision Security of Tandem-DM in the Ideal Cipher Model

35. MJH: A Faster Alternative to MDC-2

36. Random Oracles with(out) Programmability

37. Collision Attacks against the Knudsen-Preneel Compression Functions

38. Attacking the Knudsen-Preneel Compression Functions

39. Confidential Signatures and Deterministic Signcryption

40. Another Glance at Double-Length Hashing

41. Blockcipher-Based Hashing Revisited

42. A New Randomness Extraction Paradigm for Hybrid Encryption

43. Building a Collision-Resistant Compression Function from Non-compressing Primitives : (Extended Abstract)

44. Beyond Uniformity: Better Security/Efficiency Tradeoffs for Compression Functions

47. Obfuscation for Cryptographic Purposes

48. Discrete Logarithm Variants of VSH

49. A Key Encapsulation Mechanism for NTRU

50. Practical Cryptography in High Dimensional Tori

Catalog

Books, media, physical & digital resources