2002 |
11 | EE | Bert den Boer,
Kerstin Lemke,
Guntram Wicke:
A DPA Attack against the Modular Reduction within a CRT Implementation of RSA.
CHES 2002: 228-243 |
2001 |
10 | EE | Bert den Boer,
Bart Van Rompay,
Bart Preneel,
Joos Vandewalle:
New (Two-Track-)MAC Based on the Two Trails of RIPEMD.
Selected Areas in Cryptography 2001: 314-324 |
1993 |
9 | EE | Bert den Boer,
Antoon Bosselaers:
Collisions for the Compressin Function of MD5.
EUROCRYPT 1993: 293-304 |
8 | | Bert den Boer:
A Simple and Key-Economical Unconditional Authentication Scheme.
Journal of Computer Security 2: 65-72 (1993) |
1991 |
7 | EE | Bert den Boer,
Antoon Bosselaers:
An Attack on the Last Two Rounds of MD4.
CRYPTO 1991: 194-203 |
1990 |
6 | EE | Bert den Boer:
Oblivous Transfer Protecting Secrecy.
EUROCRYPT 1990: 31-45 |
1989 |
5 | EE | Bert den Boer:
More Efficient Match-Making and Satisfiability: The Five Card Trick.
EUROCRYPT 1989: 208-217 |
4 | EE | David Chaum,
Bert den Boer,
Eugène van Heyst,
Stig Fr. Mjølsnes,
Adri Steenbeek:
Efficient Offline Electronic Checks (Extended Abstract).
EUROCRYPT 1989: 294-301 |
3 | EE | Jurjen N. Bos,
Bert den Boer:
Detection of Disrupters in the DC Protocol.
EUROCRYPT 1989: 320-327 |
1988 |
2 | EE | Bert den Boer:
Diffie-Hillman is as Strong as Discrete Log for Certain Primes.
CRYPTO 1988: 530-539 |
1 | EE | Bert den Boer:
Cryptanalysis of F.E.A.L.
EUROCRYPT 1988: 293-299 |