Home CV Publications Activities
 




2019
  1. Security of the Suffix Keyed Sponge
    Christoph Dobraunig, Bart Mennink
    Cryptology ePrint Archive. Report 2019/573, 24 pages (2019)
  2. How to Build Pseudorandom Functions From Public Random Permutations
    Yu Long Chen, Eran Lambooij, Bart Mennink
    CRYPTO 2019, to appear (2019)
  3. Leakage Resilience of the Duplex Construction  
    Christoph Dobraunig, Bart Mennink
    Cryptology ePrint Archive. Report 2019/225, 31 pages (2019)
  4. Beyond Conventional Security in Sponge-Based Authenticated Encryption Modes  
    Philipp Jovanovic, Atul Luykx, Bart Mennink, Yu Sasaki, Kan Yasuda
    Journal of Cryptology, 32(3), pp. 895-940 (2019)
  5. Linking Stam's Bounds With Generalized Truncation    
    Bart Mennink
    Topics in Cryptology, CT-RSA 2019. LNCS, vol. 11405, pp. 313-329. Springer (2019)
2018
  1. Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers    
    Joan Daemen, Bart Mennink, Gilles Van Assche
    IACR Transactions on Symmetric Cryptology 3(4), pp. 197-228 (2018)
  2. Key Prediction Security of Keyed Sponges    
    Bart Mennink
    IACR Transactions on Symmetric Cryptology 3(4), pp. 128-149 (2018)
  3. Short Variable Length Domain Extenders With Beyond Birthday Bound Security    
    Yu Long Chen, Bart Mennink, Mridul Nandi
    ASIACRYPT 2018. LNCS, vol. 11272, pp. 244-274. Springer (2018)
  4. Towards Tight Security of Cascaded LRW2    
    Bart Mennink
    Theory of Cryptography Conference, TCC 2018. LNCS, vol. 11240, pp. 192-222. Springer (2018)
  5. The Relation Between CENC and NEMO    
    Bart Mennink
    Cryptology and Network Security, CANS 2018. LNCS, vol. 11124, pp. 177-189. Springer (2018)
  6. Privacy-Preserving Distributed Access Control for Medical Data    
    Christian Maulany, Majid Nateghizad, Bart Mennink, Zekeriya Erkin
    International Joint Conference on e-Business and Telecommunications, ICETE 2018 (II). pp. 488-497. SciTePress (2018)
  7. Connecting Tweakable and Multi-Key Blockcipher Security    
    Jooyoung Lee, Atul Luykx, Bart Mennink, Kazuhiko Minematsu
    Designs, Codes and Cryptography 86(3), pp. 623-640 (2018)
  8. Short Non-Malleable Codes from Related-Key Secure Block Ciphers    
    Serge Fehr, Pierre Karpman, Bart Mennink
    IACR Transactions on Symmetric Cryptology 3(1), pp. 336-352 (2018)
2017
  1. Full-State Keyed Duplex With Built-In Multi-User Support    
    Joan Daemen, Bart Mennink, Gilles Van Assche
    ASIACRYPT 2017 (II). LNCS, vol. 10625, pp. 606-637. Springer (2017)
  2. Analyzing Multi-Key Security Degradation    
    Atul Luykx, Bart Mennink, Kenneth G. Paterson
    ASIACRYPT 2017 (II). LNCS, vol. 10625, pp. 575-605. Springer (2017)
  3. Efficient Length Doubling from Tweakable Block Ciphers    
    Yu Long Chen, Atul Luykx, Bart Mennink, Bart Preneel
    IACR Transactions on Symmetric Cryptology 2(3), pp. 253-270 (2017)
  4. Optimal PRFs from Blockcipher Designs    
    Bart Mennink, Samuel Neves
    IACR Transactions on Symmetric Cryptology 2(3), pp. 228-252 (2017)
  5. De verjaardagsparadox in de cryptografie  
    Bart Mennink
    Nieuw Archief voor Wiskunde 5/18(3), pp. 190-194 (2017)
  6. Wiskunde in de cryptografie (Redactioneel)  
    Bart Mennink, Marc Stevens
    Nieuw Archief voor Wiskunde 5/18(3), pp. 155-155 (2017)
  7. SePCAR: A Secure and Privacy-Enhancing Protocol for Car Access Provision    
    Iraklis Symeonidis, Abdelrahaman Aly, Mustafa A. Mustafa, Bart Mennink, Siemen Dhooghe, Bart Preneel
    European Symposium on Research in Computer Security, ESORICS 2017 (II). LNCS, vol. 10493, pp. 475-493. Springer (2017)
  8. Encrypted Davies-Meyer and Its Dual: Towards Optimal Security Using Mirror Theory    
    Bart Mennink, Samuel Neves
    CRYPTO 2017 (III). LNCS, vol. 10403, pp. 556-583. Springer (2017)
  9. Insuperability of the Standard Versus Ideal Model Gap for Tweakable Blockcipher Security    
    Bart Mennink
    CRYPTO 2017 (II). LNCS, vol. 10402, pp. 708-732. Springer (2017)
  10. Understanding RUP Integrity of COLM    
    Nilanjan Datta, Atul Luykx, Bart Mennink, Mridul Nandi
    IACR Transactions on Symmetric Cryptology 2(2), pp. 143-161 (2017)
  11. XOR of PRPs in a Quantum World    
    Bart Mennink, Alan Szepieniec
    Conference on Post-Quantum Cryptography, PQCrypto 2017. LNCS, vol. 10346, pp. 367-383. Springer (2017)
  12. Optimal Collision Security in Double Block Length Hashing with Single Length Key    
    Bart Mennink
    Designs, Codes and Cryptography 83(2), pp. 357-406 (2017)
  13. Weak Keys for AEZ, and the External Key Padding Attack    
    Bart Mennink
    Topics in Cryptology, CT-RSA 2017. LNCS, vol. 10159, pp. 223-237. Springer (2017)
2016
  1. Security Analysis of BLAKE2's Modes of Operation    
    Atul Luykx, Bart Mennink, Samuel Neves
    IACR Transactions on Symmetric Cryptology 1(1), pp. 158-176 (2016)
  2. CENC is Optimally Secure  
    Tetsu Iwata, Bart Mennink, Damian Vizr
    Cryptology ePrint Archive. Report 2016/1087, 5 pages (2016)
  3. Improving the Sphinx Mix Network    
    Filipe Beato, Kimmo Halunen, Bart Mennink
    Cryptology and Network Security, CANS 2016. LNCS, vol. 10052, pp. 681-691. Springer (2016)
  4. Recipient Privacy in Online Social Networks    
    Filipe Beato, Kimmo Halunen, Bart Mennink
    International Workshop on Security, IWSEC 2016. LNCS, vol. 9836, pp. 254-264. Springer (2016)
  5. Damaging, Simplifying, and Salvaging p-OMD    
    Tomer Ashur, Bart Mennink
    Information Security Conference, ISC 2016. LNCS, vol. 9866, pp. 73-92. Springer (2016)
  6. XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees    
    Bart Mennink
    CRYPTO 2016 (I). LNCS, vol. 9814, pp. 64-94. Springer (2016)
  7. Efficient Parallelizable Hashing Using Small Non-Compressing Primitives    
    Bart Mennink, Bart Preneel
    International Journal of Information Security 15(3), pp. 285-300 (2016)
  8. Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption    
    Robert Granger, Philipp Jovanovic, Bart Mennink, Samuel Neves
    EUROCRYPT 2016 (I). LNCS, vol. 9665, pp. 263-293. Springer (2016)
2015
  1. Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption    
    Bart Mennink, Reza Reyhanitabar, Damian Vizr
    ASIACRYPT 2015 (II). LNCS, vol. 9453, pp. 465-489. Springer (2015)
  2. On the Impact of Known-Key Attacks on Hash Functions    
    Bart Mennink, Bart Preneel
    ASIACRYPT 2015 (II). LNCS, vol. 9453, pp. 59-84. Springer (2015)
  3. Two-Permutation-Based Hashing with Binary Mixing    
    Atul Luykx, Bart Mennink, Bart Preneel, Laura Winnen
    Journal of Mathematical Cryptology 9(3), pp. 139-150 (2015)
  4. Open Problems in Hash Function Security    
    Elena Andreeva, Bart Mennink, Bart Preneel
    Designs, Codes and Cryptography 77(2), pp. 611-631 (2015)
  5. Forgery and Subkey Recovery on CAESAR candidate iFeed    
    Willem Schro, Bart Mennink, Elena Andreeva, Bart Preneel
    Selected Areas in Cryptography, SAC 2015. LNCS, vol. 9566, pp. 197-204. Springer (2016)
  6. On the XOR of Multiple Random Permutations    
    Bart Mennink, Bart Preneel
    Applied Cryptography and Network Security, ACNS 2015. LNCS, vol. 9092, pp. 619-634. Springer (2015)
  7. Optimally Secure Tweakable Blockciphers    
    Bart Mennink
    Fast Software Encryption, FSE 2015. LNCS, vol. 9054, pp. 428-448. Springer (2015)
    (This pdf is the updated version of the paper, with a slightly adjusted description of the scheme to fix an oversight in the proof. Please refer to this version.)
  8. Security of Keyed Sponge Constructions Using a Modular Proof Approach    
    Elena Andreeva, Joan Daemen, Bart Mennink, Gilles Van Assche
    Fast Software Encryption, FSE 2015. LNCS, vol. 9054, pp. 364-384. Springer (2015)
  9. Trivial Nonce-Misusing Attack on Pure OMD  
    Tomer Ashur, Bart Mennink
    Cryptology ePrint Archive. Report 2015/175, 3 pages (2015)
2014
  1. How to Securely Release Unverified Plaintext in Authenticated Encryption    
    Elena Andreeva, Andrey Bogdanov, Atul Luykx, Bart Mennink, Nicky Mouha, Kan Yasuda
    ASIACRYPT 2014 (I). LNCS, vol. 8873, pp. 105-125. Springer (2014)
  2. Beyond 2^{c/2} Security in Sponge-Based Authenticated Encryption Modes    
    Philipp Jovanovic, Atul Luykx, Bart Mennink
    ASIACRYPT 2014 (I). LNCS, vol. 8873, pp. 85-104. Springer (2014)
  3. Breaking and Fixing Cryptophia's Short Combiner    
    Bart Mennink, Bart Preneel
    Cryptology and Network Security, CANS 2014. LNCS, vol. 8813, pp. 50-63. Springer (2014)
  4. When a Bloom Filter is a Doom Filter: Security Assessment of a Novel Iris Biometric Template Protection System    
    Jens Hermans, Bart Mennink, Roel Peeters
    Biometrics Special Interest Group, BIOSIG 2014. LNI, vol. P-230, pp. 75-86. Gesellschaft fr Informatik (2014)
  5. Shattering the Glass Maze    
    Jens Hermans, Roel Peeters, Bart Mennink
    Biometrics Special Interest Group, BIOSIG 2014. LNI, vol. P-230, pp. 63-74. Gesellschaft fr Informatik (2014)
  6. Speedup for European ePassport Authentication    
    Roel Peeters, Jens Hermans, Bart Mennink
    Biometrics Special Interest Group, BIOSIG 2014. LNI, vol. P-230, pp. 51-62. Gesellschaft fr Informatik (2014)
  7. On the Collision and Preimage Security of MDC-4 in the Ideal Cipher Model    
    Bart Mennink
    Designs, Codes and Cryptography 73(1), pp. 121-150 (2014)
  8. The Security of Multiple Encryption in the Ideal Cipher Model      
    Yuanxi Dai, Jooyoung Lee, Bart Mennink, John P. Steinberger
    CRYPTO 2014 (I). LNCS, vol. 8616, pp. 20-38. Springer (2014)
  9. Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers    
    Nicky Mouha, Bart Mennink, Anthony Van Herrewege, Dai Watanabe, Bart Preneel, Ingrid Verbauwhede
    Selected Areas in Cryptography, SAC 2014. LNCS, vol. 8781, pp. 306-323. Springer (2014)
  10. COBRA: A Parallelizable Authenticated Online Cipher Without Block Cipher Inverse    
    Elena Andreeva, Atul Luykx, Bart Mennink, Kan Yasuda
    Fast Software Encryption, FSE 2014. LNCS, vol. 8540, pp. 187-204. Springer (2015)
  11. APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography    
    Elena Andreeva, Begl Bilgin, Andrey Bogdanov, Atul Luykx, Bart Mennink, Nicky Mouha, Kan Yasuda
    Fast Software Encryption, FSE 2014. LNCS, vol. 8540, pp. 168-186. Springer (2015)
  12. Triple and Quadruple Encryption: Bridging the Gaps  
    Bart Mennink, Bart Preneel
    Cryptology ePrint Archive. Report 2014/016, 16 pages (2014)
2013
  1. Indifferentiability of Double Length Compression Functions    
    Bart Mennink
    IMA Cryptography and Coding 2013. LNCS, vol. 8308, pp. 232-251. Springer (2013)
  2. Parallelizable and Authenticated Online Ciphers    
    Elena Andreeva, Andrey Bogdanov, Atul Luykx, Bart Mennink, Elmar W. Tischhauser, Kan Yasuda
    ASIACRYPT 2013 (I). LNCS, vol. 8269, pp. 424-443. Springer (2013)
  3. On the Indifferentiability of Key-Alternating Ciphers      
    Elena Andreeva, Andrey Bogdanov, Yevgeniy Dodis, Bart Mennink, John P. Steinberger
    CRYPTO 2013 (I). LNCS, vol. 8042, pp. 531-550. Springer (2013)
  4. Provable Security of Cryptographic Hash Functions
    Bart Mennink
    PhD thesis, KU Leuven, Bart Preneel, Vincent Rijmen (promotors), xvi+238 pages (2013)
  5. Towards Understanding the Known-Key Security of Block Ciphers    
    Elena Andreeva, Andrey Bogdanov, Bart Mennink
    Fast Software Encryption, FSE 2013. LNCS, vol. 8424, pp. 348-366. Springer (2014)
2012
  1. Impossibility Results for Indifferentiability with Resets  
    Atul Luykx, Elena Andreeva, Bart Mennink, Bart Preneel
    Cryptology ePrint Archive. Report 2012/644, 13 pages (2012)
  2. A Simple Key-Recovery Attack on McOE-X    
    Florian Mendel, Bart Mennink, Vincent Rijmen, Elmar W. Tischhauser
    Cryptology and Network Security, CANS 2012. LNCS, vol. 7712, pp. 23-31. Springer (2012). BEST PAPER AWARD!
  3. Optimal Collision Security in Double Block Length Hashing with Single Length Key    
    Bart Mennink
    ASIACRYPT 2012. LNCS, vol. 7658, pp. 526-543. Springer (2012)
  4. Hash Functions Based on Three Permutations: A Generic Security Analysis    
    Bart Mennink, Bart Preneel
    CRYPTO 2012. LNCS, vol. 7417, pp. 330-347. Springer (2012)
  5. Provable Security of BLAKE with Non-Ideal Compression Function    
    Elena Andreeva, Atul Luykx, Bart Mennink
    Selected Areas in Cryptography, SAC 2012. LNCS, vol. 7707, pp. 322-339. Springer (2012)
  6. Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grstl, JH, Keccak, and Skein    
    Elena Andreeva, Bart Mennink, Bart Preneel, Marjan Škrobot
    AFRICACRYPT 2012. LNCS, vol. 7374, pp. 287-305. Springer (2012). BEST PAPER AWARD!
  7. The Parazoa Family: Generalizing the Sponge Hash Functions    
    Elena Andreeva, Bart Mennink, Bart Preneel
    International Journal of Information Security 11(3), pp. 149-165 (2012)
  8. On Security Arguments of the Second Round SHA-3 Candidates    
    Elena Andreeva, Andrey Bogdanov, Bart Mennink, Bart Preneel, Christian Rechberger
    International Journal of Information Security 11(2), pp. 103-120 (2012)
  9. Increasing the Flexibility of the Herding Attack    
    Bart Mennink
    Information Processing Letters 112(3), pp. 98-105 (2012)
2011
  1. Provable Chosen-Target-Forced-Midfix Preimage Resistance    
    Elena Andreeva, Bart Mennink
    Selected Areas in Cryptography, SAC 2011. LNCS, vol. 7118, pp. 37-54. Springer (2011)
2010
  1. Anonymous Credential Schemes with Encrypted Attributes    
    Jorge Guajardo, Bart Mennink, Berry Schoenmakers
    Cryptology and Network Security, CANS 2010. LNCS, vol. 6467, pp. 314-333. Springer (2010)
  2. Security Properties of Domain Extenders for Cryptographic Hash Functions    
    Elena Andreeva, Bart Mennink, Bart Preneel
    Journal of Information Processing Systems 6(4), pp. 453-480 (2010)
  3. On Side-Channel Resistant Block Cipher Usage    
    Jorge Guajardo, Bart Mennink
    Information Security Conference, ISC 2010. LNCS, vol. 6531, pp. 254-268. Springer (2010)
  4. Security Reductions of the Second Round SHA-3 Candidates    
    Elena Andreeva, Bart Mennink, Bart Preneel
    Information Security Conference, ISC 2010. LNCS, vol. 6531, pp. 39-53. Springer (2010)
  5. On the Indifferentiability of the Grstl Hash Function    
    Elena Andreeva, Bart Mennink, Bart Preneel
    Security and Cryptography for Networks, SCN 2010. LNCS, vol. 6280, pp. 88-105. Springer (2010)
  6. Modulo Reduction for Paillier Encryptions and Application to Secure Statistical Analysis (extended abstract)    
    Jorge Guajardo, Bart Mennink, Berry Schoenmakers
    Financial Cryptography and Data Security, FC 2010. LNCS, vol. 6052, pp. 375-382. Springer (2010)
2009
  1. Encrypted certificate schemes and their security and privacy analysis
    Bart Mennink
    Master's thesis, TU Eindhoven, Jorge Guajardo, Berry Schoenmakers (promotors), xii+103 pages (2009)


(top) Last modified: July 13, 2019