Atul Luykx
Atul Luykx
Swirlds Inc
Verified email at swirlds.com - Homepage
TitleCited byYear
Parallelizable and authenticated online ciphers
E Andreeva, A Bogdanov, A Luykx, B Mennink, E Tischhauser, K Yasuda
ASIACRYPT 8269, 424-443, 2013
1192013
How to securely release unverified plaintext in authenticated encryption
E Andreeva, A Bogdanov, A Luykx, B Mennink, N Mouha, K Yasuda
International Conference on the Theory and Application of Cryptology and …, 2014
882014
Beyond 2 c/2 Security in Sponge-Based Authenticated Encryption Modes
P Jovanovic, A Luykx, B Mennink
International Conference on the Theory and Application of Cryptology and …, 2014
712014
APE: authenticated permutation-based encryption for lightweight cryptography
E Andreeva, B Bilgin, A Bogdanov, A Luykx, B Mennink, N Mouha, ...
International Workshop on Fast Software Encryption, 168-186, 2014
592014
PRIMATEs v1
E Andreeva, B Bilgin, A Bogdanov, A Luykx, F Mendel, B Mennink, ...
Submission to CAESAR, 2014
51*2014
COLM v1 (2016)
E Andreeva, A Bogdanov, N Datta, A Luykx, B Mennink, M Nandi, ...
Submission to CAESAR competition, 0
38*
Multi-key security: The Even-Mansour construction revisited
N Mouha, A Luykx
Annual Cryptology Conference, 209-223, 2015
352015
A MAC mode for lightweight block ciphers
A Luykx, B Preneel, E Tischhauser, K Yasuda
International Conference on Fast Software Encryption, 43-59, 2016
312016
Boosting authenticated encryption robustness with minimal modifications
T Ashur, O Dunkelman, A Luykx
Annual International Cryptology Conference, 3-33, 2017
212017
Analyzing multi-key security degradation
A Luykx, B Mennink, KG Paterson
International Conference on the Theory and Application of Cryptology and …, 2017
172017
COBRA: a parallelizable authenticated online cipher without block cipher inverse
E Andreeva, A Luykx, B Mennink, K Yasuda
International Workshop on Fast Software Encryption, 187-204, 2014
172014
Provable security of BLAKE with non-ideal compression function
E Andreeva, A Luykx, B Mennink
International Conference on Selected Areas in Cryptography, 321-338, 2012
172012
On the influence of message length in PMAC’s security bounds
A Luykx, B Preneel, A Szepieniec, K Yasuda
Annual International Conference on the Theory and Applications of …, 2016
72016
Sundae: Small universal deterministic authenticated encryption for the internet of things
S Banik, A Bogdanov, A Luykx, E Tischhauser
IACR Transactions on Symmetric Cryptology, 1-35, 2018
52018
Connecting tweakable and multi-key blockcipher security
J Lee, A Luykx, B Mennink, K Minematsu
Designs, Codes and Cryptography 86 (3), 623-640, 2018
52018
Efficient length doubling from tweakable block ciphers
YL Chen, A Luykx, B Mennink, B Preneel
52017
Algorithms, key size and protocols report
M Abdalla, B Gierlichs, KG Paterson, V Rijmen, AR Sadeghi, NP Smart, ...
Accessed: Dec, 2016
52016
Limits on authenticated encryption use in TLS
A Luykx, KG Paterson
Personal webpage: http://www. isg. rhul. ac. uk/~ kp/TLS-AEbounds. pdf, 2016
52016
Impossibility Results for Indifferentiability with Resets
A Luykx, E Andreeva, B Mennink, B Preneel, KU Leuven
42012
Optimal forgeries against polynomial-based MACs and GCM
A Luykx, B Preneel
Annual International Conference on the Theory and Applications of …, 2018
22018
The system can't perform the operation now. Try again later.
Articles 1–20