Atul Luykx

888 total citations
20 papers, 99 citations indexed

About

Atul Luykx is a scholar working on Artificial Intelligence, Computer Vision and Pattern Recognition and Signal Processing. According to data from OpenAlex, Atul Luykx has authored 20 papers receiving a total of 99 indexed citations (citations by other indexed papers that have themselves been cited), including 17 papers in Artificial Intelligence, 13 papers in Computer Vision and Pattern Recognition and 3 papers in Signal Processing. Recurrent topics in Atul Luykx's work include Cryptographic Implementations and Security (14 papers), Chaos-based Image/Signal Encryption (13 papers) and Cryptography and Data Security (8 papers). Atul Luykx is often cited by papers focused on Cryptographic Implementations and Security (14 papers), Chaos-based Image/Signal Encryption (13 papers) and Cryptography and Data Security (8 papers). Atul Luykx collaborates with scholars based in Belgium, Netherlands and United States. Atul Luykx's co-authors include Leemon C. Baird, Bart Mennink, Elmar Tischhauser, Subhadeep Banik, Andrey Bogdanov, Andrey Bogdanov, Samuel Neves, Mridul Nandi, Nilanjan Datta and Bart Preneel and has published in prestigious journals such as SHILAP Revista de lepidopterología, IEEE Transactions on Information Theory and Lecture notes in computer science.

In The Last Decade

Atul Luykx

18 papers receiving 91 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Atul Luykx Belgium 6 67 40 28 28 11 20 99
Scott Fluhrer United States 6 79 1.2× 20 0.5× 29 1.0× 19 0.7× 18 1.6× 17 96
Thomas Pornin France 6 75 1.1× 47 1.2× 19 0.7× 12 0.4× 11 1.0× 9 83
Vesselin Velichkov Belgium 4 53 0.8× 27 0.7× 35 1.3× 23 0.8× 12 1.1× 9 78
Elad Barkan Israel 2 65 1.0× 39 1.0× 30 1.1× 26 0.9× 17 1.5× 4 90
Ted Krovetz United States 4 120 1.8× 65 1.6× 57 2.0× 18 0.6× 13 1.2× 11 153
Kazumaro Aoki Japan 6 111 1.7× 72 1.8× 23 0.8× 15 0.5× 9 0.8× 22 129
Jiqiang Lu Singapore 6 71 1.1× 67 1.7× 12 0.4× 12 0.4× 8 0.7× 20 92
Jaecheol Ha South Korea 6 98 1.5× 32 0.8× 20 0.7× 58 2.1× 8 0.7× 48 115
C. R. Kavitha India 7 48 0.7× 23 0.6× 31 1.1× 36 1.3× 7 0.6× 41 117
Abdelrahaman Aly Belgium 5 76 1.1× 16 0.4× 8 0.3× 26 0.9× 17 1.5× 7 95

Countries citing papers authored by Atul Luykx

Since Specialization
Citations

This map shows the geographic impact of Atul Luykx's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Atul Luykx with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Atul Luykx more than expected).

Fields of papers citing papers by Atul Luykx

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Atul Luykx. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Atul Luykx. The network helps show where Atul Luykx may publish in the future.

Co-authorship network of co-authors of Atul Luykx

This figure shows the co-authorship network connecting the top 25 collaborators of Atul Luykx. A scholar is included among the top collaborators of Atul Luykx based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Atul Luykx. Atul Luykx is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Andreeva, Elena, Andrey Bogdanov, Nilanjan Datta, et al.. (2024). The COLM Authenticated Encryption Scheme. Journal of Cryptology. 37(2). 1 indexed citations
2.
Luykx, Atul, et al.. (2021). Reducing HSM Reliance in Payments through Proxy Re-Encryption.. 2021. 94. 1 indexed citations
3.
Chen, Yu Long, Atul Luykx, Bart Mennink, & Bart Preneel. (2021). Systematic Security Analysis of Stream Encryption With Key Erasure. IEEE Transactions on Information Theory. 67(11). 7518–7534. 1 indexed citations
4.
Baird, Leemon C. & Atul Luykx. (2020). The Hashgraph Protocol: Efficient Asynchronous BFT for High-Throughput Distributed Ledgers. 1–7. 26 indexed citations
5.
Banik, Subhadeep, Andrey Bogdanov, Atul Luykx, & Elmar Tischhauser. (2018). SUNDAE: Small Universal Deterministic Authenticated Encryption for the Internet of Things. IACR Transactions on Symmetric Cryptology. 1–35. 14 indexed citations
6.
Jovanovic, Philipp, Atul Luykx, Bart Mennink, Yu Sasaki, & Kan Yasuda. (2018). Beyond Conventional Security in Sponge-Based Authenticated Encryption Modes. Journal of Cryptology. 32(3). 895–940. 6 indexed citations
7.
Banik, Subhadeep, Andrey Bogdanov, Atul Luykx, & Elmar Tischhauser. (2018). SUNDAE: Small Universal Deterministic Authenticated Encryption for the Internet of Things. SHILAP Revista de lepidopterología. 13 indexed citations
8.
Lee, Jooyoung, Atul Luykx, Bart Mennink, & Kazuhiko Minematsu. (2017). Connecting tweakable and multi-key blockcipher security. Designs Codes and Cryptography. 86(3). 623–640. 3 indexed citations
9.
Chen, Yu Long, Atul Luykx, Bart Mennink, & Bart Preneel. (2017). Efficient Length Doubling From Tweakable Block Ciphers. SHILAP Revista de lepidopterología. 4 indexed citations
10.
Datta, Nilanjan, Atul Luykx, Bart Mennink, & Mridul Nandi. (2017). Understanding RUP Integrity of COLM. IACR Transactions on Symmetric Cryptology. 143–161. 7 indexed citations
11.
Chen, Yu Long, Atul Luykx, Bart Mennink, & Bart Preneel. (2017). Efficient Length Doubling From Tweakable Block Ciphers. IACR Transactions on Symmetric Cryptology. 253–270. 5 indexed citations
12.
Datta, Nilanjan, Atul Luykx, Bart Mennink, & Mridul Nandi. (2017). Understanding RUP Integrity of COLM. SHILAP Revista de lepidopterología. 3 indexed citations
13.
Luykx, Atul, Bart Mennink, & Samuel Neves. (2016). Security Analysis of BLAKE2’s Modes of Operation. IACR Transactions on Symmetric Cryptology. 158–176. 7 indexed citations
14.
Luykx, Atul, Bart Mennink, & Samuel Neves. (2016). Security Analysis of BLAKE2’s Modes of Operation. SHILAP Revista de lepidopterología. 2 indexed citations
15.
Luykx, Atul. (2016). The Design and Analysis of Message Authentication and Authenticated Encryption Schemes. 1 indexed citations
16.
Mouha, Nicky & Atul Luykx. (2015). Multi-Key Security: The Even-Mansour Construction Revisited. Lecture notes in computer science. 2015. 101–223. 1 indexed citations
17.
Luykx, Atul, et al.. (2015). Two-permutation-based hashing with binary mixing. Journal of Mathematical Cryptology. 9(3). 139–150. 1 indexed citations
18.
Andreeva, Elena, Andrey Bogdanov, Atul Luykx, et al.. (2014). How to Securely Release Unverified Plaintext in Authenticated Encryption. Lecture notes in computer science. 2014. 105–125. 2 indexed citations
19.
Andreeva, Elena, Andrey Bogdanov, Atul Luykx, et al.. (2013). Parallelizable and Authenticated Online Ciphers. Lecture notes in computer science. 2013. 424–443.
20.
Andreeva, Elena, Atul Luykx, & Bart Mennink. (2012). Provable Security of BLAKE with Non-Ideal Compression Function. Lecture notes in computer science. 7707. 322–339. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026