Martijn Stam
Martijn Stam
Senior Researcher at Simula UiB, Norway
Verified email at simula.no
TitleCited byYear
Hardware and software normal basis arithmetic for pairing-based cryptography in characteristic three
R Granger, D Page, M Stam
IEEE Transactions on Computers 54 (7), 852-860, 2005
1012005
A new randomness extraction paradigm for hybrid encryption
E Kiltz, K Pietrzak, M Stam, M Yung
Annual International Conference on the Theory and Applications of†…, 2009
952009
On small characteristic algebraic tori in pairing-based cryptography
R Granger, D Page, M Stam
LMS Journal of Computation and Mathematics 9, 64-85, 2006
922006
Hash based digital signature schemes
C Dods, NP Smart, M Stam
IMA International Conference on Cryptography and Coding, 96-115, 2005
872005
Blockcipher-based hashing revisited
M Stam
International Workshop on Fast Software Encryption, 67-83, 2009
852009
Obfuscation for cryptographic purposes
D Hofheinz, J Malone-Lee, M Stam
Theory of Cryptography Conference, 214-232, 2007
832007
Speeding up XTR
M Stam, AK Lenstra
International Conference on the Theory and Application of Cryptology and†…, 2001
822001
An analysis of the blockcipher-based hash functions from PGV
J Black, P Rogaway, T Shrimpton, M Stam
Journal of Cryptology 23 (4), 519-545, 2010
672010
Random oracles with (out) programmability
M Fischlin, A Lehmann, T Ristenpart, T Shrimpton, M Stam, S Tessaro
International Conference on the Theory and Application of Cryptology and†…, 2010
622010
Building a collision-resistant compression function from non-compressing primitives
T Shrimpton, M Stam
International Colloquium on Automata, Languages, and Programming, 643-654, 2008
592008
Efficient subgroup exponentiation in quadratic and sixth degree extensions
M Stam, AK Lenstra
International Workshop on Cryptographic Hardware and Embedded Systems, 318-332, 2002
562002
Beyond uniformity: Better security/efficiency tradeoffs for compression functions
M Stam
Annual International Cryptology Conference, 397-412, 2008
522008
The collision security of Tandem-DM in the ideal cipher model
J Lee, M Stam, J Steinberger
Annual Cryptology Conference, 561-577, 2011
492011
Practical cryptography in high dimensional tori
M Van Dijk, R Granger, D Page, K Rubin, A Silverberg, M Stam, ...
Annual International Conference on the Theory and Applications of†…, 2005
492005
A comparison of CEILIDH and XTR
R Granger, D Page, M Stam
International Algorithmic Number Theory Symposium, 235-249, 2004
472004
MJH: A faster alternative to MDC-2
J Lee, M Stam
Cryptographers’ Track at the RSA Conference, 213-236, 2011
462011
Another glance at double-length hashing
O ÷zen, M Stam
IMA International Conference on Cryptography and Coding, 176-201, 2009
452009
Counting keys in parallel after a side channel attack
DP Martin, JF O’connell, E Oswald, M Stam
International Conference on the Theory and Application of Cryptology and†…, 2015
442015
On the joint security of encryption and signature, revisited
KG Paterson, JCN Schuldt, M Stam, S Thomson
International Conference on the Theory and Application of Cryptology and†…, 2011
442011
List signature schemes
S Canard, B Schoenmakers, M Stam, J Traorť
Discrete Applied Mathematics 154 (2), 189-201, 2006
412006
The system can't perform the operation now. Try again later.
Articles 1–20