Parallelizable and authenticated online ciphers E Andreeva, A Bogdanov, A Luykx, B Mennink, E Tischhauser, K Yasuda ASIACRYPT 8269, 424-443, 2013 | 137 | 2013 |
How to securely release unverified plaintext in authenticated encryption E Andreeva, A Bogdanov, A Luykx, B Mennink, N Mouha, K Yasuda International Conference on the Theory and Application of Cryptology and …, 2014 | 127 | 2014 |
Beyond 2 c/2 Security in Sponge-Based Authenticated Encryption Modes P Jovanovic, A Luykx, B Mennink International Conference on the Theory and Application of Cryptology and …, 2014 | 100 | 2014 |
APE: authenticated permutation-based encryption for lightweight cryptography E Andreeva, B Bilgin, A Bogdanov, A Luykx, B Mennink, N Mouha, ... International Workshop on Fast Software Encryption, 168-186, 2014 | 79 | 2014 |
A MAC mode for lightweight block ciphers A Luykx, B Preneel, E Tischhauser, K Yasuda International Conference on Fast Software Encryption, 43-59, 2016 | 71 | 2016 |
Multi-key security: The Even-Mansour construction revisited N Mouha, A Luykx Annual Cryptology Conference, 209-223, 2015 | 63 | 2015 |
COLM v1, 2016 E Andreeva, A Bogdanov, N Datta, A Luykx, B Mennink, M Nandi, ... Submission to CAESAR competition, 0 | 62* | |
PRIMATEs v1 E Andreeva, B Bilgin, A Bogdanov, A Luykx, F Mendel, B Mennink, ... Submission to the CAESAR Competition, 2014 | 61* | 2014 |
Boosting authenticated encryption robustness with minimal modifications T Ashur, O Dunkelman, A Luykx Annual International Cryptology Conference, 3-33, 2017 | 45 | 2017 |
Analyzing multi-key security degradation A Luykx, B Mennink, KG Paterson International Conference on the Theory and Application of Cryptology and …, 2017 | 34 | 2017 |
Sundae: Small universal deterministic authenticated encryption for the internet of things S Banik, A Bogdanov, A Luykx, E Tischhauser IACR Transactions on Symmetric Cryptology, 1-35, 2018 | 29 | 2018 |
Limits on authenticated encryption use in TLS A Luykx, KG Paterson Personal webpage: http://www. isg. rhul. ac. uk/~ kp/TLS-AEbounds. pdf, 2016 | 21* | 2016 |
Provable security of BLAKE with non-ideal compression function E Andreeva, A Luykx, B Mennink International Conference on Selected Areas in Cryptography, 321-338, 2012 | 21 | 2012 |
COBRA: A parallelizable authenticated online cipher without block cipher inverse E Andreeva, A Luykx, B Mennink, K Yasuda International Workshop on Fast Software Encryption, 187-204, 2014 | 18 | 2014 |
Algorithms, key size and protocols report (2018) N Smart, M Abdalla, E Bjørstad, C Cid, B Gierlichs, A Hülsing, A Luykx, ... ECRYPT—CSA, H2020-ICT-2014—Project 645421, 2018 | 16 | 2018 |
On the influence of message length in PMAC’s security bounds A Luykx, B Preneel, A Szepieniec, K Yasuda Annual International Conference on the Theory and Applications of …, 2016 | 13 | 2016 |
Optimal forgeries against polynomial-based MACs and GCM A Luykx, B Preneel Annual International Conference on the Theory and Applications of …, 2018 | 12 | 2018 |
Security analysis of BLAKE2's modes of operation A Luykx, B Mennink, S Neves Cryptology ePrint Archive, 2016 | 12 | 2016 |
Efficient length doubling from tweakable block ciphers YL Chen, A Luykx, BJM Mennink, B Preneel | 10 | 2017 |
Beyond conventional security in sponge-based authenticated encryption modes P Jovanovic, A Luykx, B Mennink, Y Sasaki, K Yasuda Journal of Cryptology 32 (3), 895-940, 2019 | 9 | 2019 |