Atul Luykx
ScholarGPS® ID: 12898026467300
Affiliation History
Discipline
Electrical and Computer Engineering
Top Specialties
Cryptography | Security Analysis
Metrics Summary
Publication Count
26
Predicted Citations
654
Predicted h-index
12
Ranking
Publications and Citation History
Publications based on Top Specialties
Types of Publication
- Publications
- Books
- Patents
- NIH/NSF
Add
Delete
|
---|
The COLM Authenticated Encryption Scheme (journal article) Journal of Cryptology, volume 37, issue 2 (2024). |
Systematic Security Analysis of Stream Encryption With Key Erasure (journal article) IEEE Transactions on Information Theory, volume 67, issue 11, pages 7518-7534 (2021). |
An Account of the ISO/IEC Standardization of the Simon and Speck Block Cipher Families (book chapter) In Security of Ubiquitous Computing Systems Springer International Publishing (2021) |
The Hashgraph Protocol: Efficient Asynchronous BFT for High-Throughput Distributed Ledgers (conference) 2020 International Conference on Omni-layer Intelligent Systems (COINS) (2020) Barcelona, Spain |
Journal of Cryptology, volume 32, issue 3, pages 895-940 (2019). |
SUNDAE: Small Universal Deterministic Authenticated Encryption for the Internet of Things (journal article) IACR Transactions on Symmetric Cryptology (2018). |
Connecting tweakable and multi-key blockcipher security (journal article) Designs, Codes and Cryptography, volume 86, issue 3, pages 623-640 (2018). |
Optimal Forgeries Against Polynomial-Based MACs and GCM (book chapter) In Advances in Cryptology – EUROCRYPT 2018 Springer International Publishing (2018) |
Efficient Length Doubling From Tweakable Block Ciphers (journal article) IACR Transactions on Symmetric Cryptology (2017). |
Understanding RUP Integrity of COLM (journal article) IACR Transactions on Symmetric Cryptology (2017). |
Understanding RUP Integrity of COLM (journal article) IACR Cryptology ePrint Archive, volume 2017, issue 2, pages 143-161 (2017). |
Efficient Length Doubling from Tweakable Block Ciphers (journal article) IACR Cryptology ePrint Archive, volume 2017, issue 3, pages 253-270 (2017). |
Analyzing Multi-key Security Degradation (book chapter) In Advances in Cryptology – ASIACRYPT 2017 Springer International Publishing (2017) |
Boosting Authenticated Encryption Robustness with Minimal Modifications (book chapter) In Advances in Cryptology – CRYPTO 2017 Springer International Publishing (2017) |
Security Analysis of BLAKE2's Modes of Operation (journal article) IACR Cryptology ePrint Archive, volume 2016, issue 1, pages 158-176 (2016). |
Security Analysis of BLAKE2’s Modes of Operation (journal article) IACR Transactions on Symmetric Cryptology (2016). |
A MAC Mode for Lightweight Block Ciphers (book chapter) In Fast Software Encryption Springer Berlin Heidelberg (2016) |
On the Influence of Message Length in PMAC’s Security Bounds (book chapter) In Advances in Cryptology – EUROCRYPT 2016 Springer Berlin Heidelberg (2016) |
Two-permutation-based hashing with binary mixing (journal article) Journal of Mathematical Cryptology, volume 9, issue 3, pages 139-150 (2015). |
Multi-key Security: The Even-Mansour Construction Revisited (book chapter) In Advances in Cryptology -- CRYPTO 2015 Springer Berlin Heidelberg (2015) |