| How to securely release unverified plaintext in authenticated encryption E Andreeva, A Bogdanov, A Luykx, B Mennink, N Mouha, K Yasuda International Conference on the Theory and Application of Cryptology and …, 2014 | 182 | 2014 |
| Parallelizable and authenticated online ciphers E Andreeva, A Bogdanov, A Luykx, B Mennink, E Tischhauser, K Yasuda ASIACRYPT 8269, 424-443, 2013 | 157 | 2013 |
| Beyond 2c/2 Security in Sponge-Based Authenticated Encryption Modes P Jovanovic, A Luykx, B Mennink International Conference on the Theory and Application of Cryptology and …, 2014 | 138 | 2014 |
| A MAC mode for lightweight block ciphers A Luykx, B Preneel, E Tischhauser, K Yasuda International Conference on Fast Software Encryption, 43-59, 2016 | 121 | 2016 |
| Multi-key security: The Even-Mansour construction revisited N Mouha, A Luykx Annual Cryptology Conference, 209-223, 2015 | 106 | 2015 |
| APE: authenticated permutation-based encryption for lightweight cryptography E Andreeva, B Bilgin, A Bogdanov, A Luykx, B Mennink, N Mouha, ... International Workshop on Fast Software Encryption, 168-186, 2014 | 100 | 2014 |
| How to abuse and fix authenticated encryption without key commitment A Albertini, T Duong, S Gueron, S Kölbl, A Luykx, S Schmieg 31st USENIX Security Symposium (USENIX Security 22), 3291-3308, 2022 | 94 | 2022 |
| Boosting authenticated encryption robustness with minimal modifications T Ashur, O Dunkelman, A Luykx Annual International Cryptology Conference, 3-33, 2017 | 90 | 2017 |
| COLM v1, 2016 E Andreeva, A Bogdanov, N Datta, A Luykx, B Mennink, M Nandi, ... Submission to CAESAR competition, 0 | 80* | |
| Analyzing multi-key security degradation A Luykx, B Mennink, KG Paterson International Conference on the Theory and Application of Cryptology and …, 2017 | 65 | 2017 |
| PRIMATEs v1 E Andreeva, B Bilgin, A Bogdanov, A Luykx, F Mendel, B Mennink, ... Submission to the CAESAR Competition, 2014 | 63* | 2014 |
| SUNDAE: small universal deterministic authenticated encryption for the internet of things S Banik, A Bogdanov, A Luykx, E Tischhauser IACR Transactions on Symmetric Cryptology 2018 (3), 1-35, 2018 | 52 | 2018 |
| Limits on authenticated encryption use in TLS A Luykx, KG Paterson Personal webpage: http://www. isg. rhul. ac. uk/~ kp/TLS-AEbounds. pdf, 2016 | 41* | 2016 |
| Beyond conventional security in sponge-based authenticated encryption modes P Jovanovic, A Luykx, B Mennink, Y Sasaki, K Yasuda Journal of Cryptology 32, 895-940, 2023 | 30 | 2023 |
| Algorithms, key size and protocols report (2018) N Smart, M Abdalla, E Bjørstad, C Cid, B Gierlichs, A Hülsing, A Luykx, ... ECRYPT—CSA, H2020-ICT-2014—Project 645421, 2018 | 26 | 2018 |
| Security analysis of BLAKE2’s modes of operation A Luykx, B Mennink, S Neves IACR Transactions on Symmetric Cryptology, 158-176, 2016 | 24 | 2016 |
| Provable security of BLAKE with non-ideal compression function E Andreeva, A Luykx, B Mennink International Conference on Selected Areas in Cryptography, 321-338, 2012 | 22 | 2012 |
| COBRA: A parallelizable authenticated online cipher without block cipher inverse E Andreeva, A Luykx, B Mennink, K Yasuda International Workshop on Fast Software Encryption, 187-204, 2014 | 19 | 2014 |
| PRIMATEs v1. 02 Submission to the CAESAR Competition E Andreeva, B Bilgin, A Bogdanov, A Luykx, F Mendel, B Mennink, ... Sep, 2014 | 18 | 2014 |
| Understanding RUP integrity of COLM N Datta, A Luykx, B Mennink, M Nandi IACR Transactions on Symmetric Cryptology, 143-161, 2017 | 17 | 2017 |