Folgen
Martijn Stam
Martijn Stam
Senior Researcher at Simula UiB, Norway
Bestätigte E-Mail-Adresse bei simula.no
Titel
Zitiert von
Zitiert von
Jahr
Hash based digital signature schemes
C Dods, NP Smart, M Stam
Cryptography and Coding: 10th IMA International Conference, Cirencester, UK …, 2005
1542005
Hardware and software normal basis arithmetic for pairing-based cryptography in characteristic three
R Granger, D Page, M Stam
IEEE Transactions on Computers 54 (7), 852-860, 2005
1102005
A new randomness extraction paradigm for hybrid encryption
E Kiltz, K Pietrzak, M Stam, M Yung
Annual International Conference on the Theory and Applications of …, 2009
1042009
Random oracles with (out) programmability
M Fischlin, A Lehmann, T Ristenpart, T Shrimpton, M Stam, S Tessaro
International Conference on the Theory and Application of Cryptology and …, 2010
1022010
On small characteristic algebraic tori in pairing-based cryptography
R Granger, D Page, M Stam
LMS Journal of Computation and Mathematics 9, 64-85, 2006
972006
Blockcipher-based hashing revisited
M Stam
International Workshop on Fast Software Encryption, 67-83, 2009
952009
Obfuscation for cryptographic purposes
D Hofheinz, J Malone-Lee, M Stam
Theory of Cryptography: 4th Theory of Cryptography Conference, TCC 2007 …, 2007
952007
Speeding up XTR
M Stam, AK Lenstra
Advances in Cryptology—ASIACRYPT 2001: 7th International Conference on the …, 2001
862001
An analysis of the blockcipher-based hash functions from PGV
J Black, P Rogaway, T Shrimpton, M Stam
Journal of Cryptology 23 (4), 519-545, 2010
832010
Counting keys in parallel after a side channel attack
DP Martin, JF O’connell, E Oswald, M Stam
Advances in Cryptology–ASIACRYPT 2015: 21st International Conference on the …, 2015
792015
Building a collision-resistant compression function from non-compressing primitives
T Shrimpton, M Stam
Automata, Languages and Programming: 35th International Colloquium, ICALP …, 2008
702008
Efficient subgroup exponentiation in quadratic and sixth degree extensions
M Stam, AK Lenstra
Cryptographic Hardware and Embedded Systems-CHES 2002: 4th International …, 2003
642003
Authenticated encryption in the face of protocol and side channel leakage
G Barwell, DP Martin, E Oswald, M Stam
Advances in Cryptology–ASIACRYPT 2017: 23rd International Conference on the …, 2017
592017
On the joint security of encryption and signature, revisited
KG Paterson, JCN Schuldt, M Stam, S Thomson
International Conference on the Theory and Application of Cryptology and …, 2011
572011
Beyond uniformity: Better security/efficiency tradeoffs for compression functions
M Stam
Advances in Cryptology–CRYPTO 2008: 28th Annual International Cryptology …, 2008
572008
List signature schemes
S Canard, B Schoenmakers, M Stam, J Traoré
Discrete Applied Mathematics 154 (2), 189-201, 2006
542006
The preimage security of double-block-length compression functions
F Armknecht, E Fleischmann, M Krause, J Lee, M Stam, J Steinberger
Advances in Cryptology–ASIACRYPT 2011: 17th International Conference on the …, 2011
532011
On symmetric encryption with distinguishable decryption failures
A Boldyreva, JP Degabriele, KG Paterson, M Stam
Fast Software Encryption: 20th International Workshop, FSE 2013, Singapore …, 2014
522014
Practical cryptography in high dimensional tori
M Van Dijk, R Granger, D Page, K Rubin, A Silverberg, M Stam, ...
Advances in Cryptology–EUROCRYPT 2005: 24th Annual International Conference …, 2005
522005
A comparison of CEILIDH and XTR
R Granger, D Page, M Stam
International Algorithmic Number Theory Symposium, 235-249, 2004
522004
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20