2009 |
246 | EE | Zhiguo Wan,
Kui Ren,
Bo Zhu,
Bart Preneel,
Ming Gu:
Anonymous user communication for privacy protection in wireless metropolitan mesh networks.
ASIACCS 2009: 368-371 |
2008 |
245 | | Viliam Geffert,
Juhani Karhumäki,
Alberto Bertoni,
Bart Preneel,
Pavol Návrat,
Mária Bieliková:
SOFSEM 2008: Theory and Practice of Computer Science, 34th Conference on Current Trends in Theory and Practice of Computer Science, Nový Smokovec, Slovakia, January 19-25, 2008, Volume II - Student Research Forum
Safarik University, Kosice, Slovakia 2008 |
244 | | Viliam Geffert,
Juhani Karhumäki,
Alberto Bertoni,
Bart Preneel,
Pavol Návrat,
Mária Bieliková:
SOFSEM 2008: Theory and Practice of Computer Science, 34th Conference on Current Trends in Theory and Practice of Computer Science, Nový Smokovec, Slovakia, January 19-25, 2008, Proceedings
Springer 2008 |
243 | EE | Dave Singelée,
Benoît Latré,
Bart Braem,
Michael Peeters,
Marijke De Soete,
Peter De Cleyn,
Bart Preneel,
Ingrid Moerman,
Chris Blondia:
A Secure Cross-Layer Protocol for Multi-hop Wireless Body Area Networks.
ADHOC-NOW 2008: 94-107 |
242 | EE | Christophe De Cannière,
Özgül Küçük,
Bart Preneel:
Analysis of Grain's Initialization Algorithm.
AFRICACRYPT 2008: 276-289 |
241 | EE | Karel Wouters,
Koen Simoens,
Danny Lathouwers,
Bart Preneel:
Secure and Privacy-Friendly Logging for eGovernment Services.
ARES 2008: 1091-1096 |
240 | EE | Benedikt Gierlichs,
Lejla Batina,
Pim Tuyls,
Bart Preneel:
Mutual Information Analysis.
CHES 2008: 426-442 |
239 | EE | Helena Handschuh,
Bart Preneel:
Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms.
CRYPTO 2008: 144-161 |
238 | EE | Claudia Díaz,
Carmela Troncoso,
Bart Preneel:
A Framework for the Analysis of Mix-Based Steganographic File Systems.
ESORICS 2008: 428-445 |
237 | EE | Sebastiaan Indesteege,
Nathan Keller,
Orr Dunkelman,
Eli Biham,
Bart Preneel:
A Practical Attack on KeeLoq.
EUROCRYPT 2008: 1-18 |
236 | EE | Mina Deng,
Bart Preneel:
On Secure and Anonymous Buyer-Seller Watermarking Protocol.
ICIW 2008: 524-529 |
235 | EE | Sebastiaan Indesteege,
Bart Preneel:
Collisions for RC4-Hash.
ISC 2008: 355-366 |
234 | EE | Mina Deng,
Bart Preneel:
Attacks on Two Buyer-Seller Watermarking Protocols and an Improvement for Revocable Anonymity.
ISECS 2008: 923-929 |
233 | EE | Jan Cappaert,
Bart Preneel,
Bertrand Anckaert,
Matias Madou,
Koen De Bosschere:
Towards Tamper Resistant Code Encryption: Practice and Experience.
ISPEC 2008: 86-100 |
232 | EE | Bart Preneel:
The State of Hash Functions and the NIST SHA-3 Competition.
Inscrypt 2008: 1-11 |
231 | EE | Jong Hyuk Park,
Bart Preneel,
Ravi S. Sandhu,
André Zúquete:
IS 2008 PC Co-chairs' Message.
OTM Conferences (2) 2008: 937 |
230 | EE | Carmela Troncoso,
Benedikt Gierlichs,
Bart Preneel,
Ingrid Verbauwhede:
Perfect Matching Disclosure Attacks.
Privacy Enhancing Technologies 2008: 2-23 |
229 | EE | Carmela Troncoso,
Danny De Cock,
Bart Preneel:
Improving secure long-term archival of digitally signed documents.
StorageSS 2008: 27-36 |
228 | EE | Dries Schellekens,
Pim Tuyls,
Bart Preneel:
Embedded Trusted Computing with Authenticated Non-volatile Memory.
TRUST 2008: 60-74 |
227 | EE | Zhiguo Wan,
Kui Ren,
Wenjing Lou,
Bart Preneel:
Anonymous ID-Based Group Key Agreement for Wireless Networks.
WCNC 2008: 2615-2620 |
226 | EE | Zhiguo Wan,
Kui Ren,
Bart Preneel:
A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks.
WISEC 2008: 62-67 |
225 | EE | Benedikt Gierlichs,
Carmela Troncoso,
Claudia Díaz,
Bart Preneel,
Ingrid Verbauwhede:
Revisiting a combinatorial approach toward measuring anonymity.
WPES 2008: 111-116 |
224 | EE | Yoni De Mulder,
George Danezis,
Lejla Batina,
Bart Preneel:
Identification via location-profiling in GSM networks.
WPES 2008: 23-32 |
223 | EE | Dries Schellekens,
Brecht Wyseur,
Bart Preneel:
Remote Attestation on Legacy Operating Systems With Trusted Platform Modules.
Electr. Notes Theor. Comput. Sci. 197(1): 59-72 (2008) |
222 | | Liqun Chen,
Willy Susilo,
Huaxiong Wang,
Duncan S. Wong,
Ed Dawson,
Xuejia Lai,
Masahiro Mambo,
Atsuko Miyaji,
Yi Mu,
David Pointcheval,
Bart Preneel,
Nigel P. Smart:
Cryptography in Computer System Security.
J. UCS 14(3): 314-317 (2008) |
221 | EE | Dries Schellekens,
Brecht Wyseur,
Bart Preneel:
Remote attestation on legacy operating systems with trusted platform modules.
Sci. Comput. Program. 74(1-2): 13-22 (2008) |
2007 |
220 | EE | Kazuo Sakiyama,
Elke De Mulder,
Bart Preneel,
Ingrid Verbauwhede:
Side-channel resistant system-level design flow for public-key cryptography.
ACM Great Lakes Symposium on VLSI 2007: 144-147 |
219 | EE | Nele Mentens,
Kazuo Sakiyama,
Bart Preneel,
Ingrid Verbauwhede:
Efficient pipelining for modular multiplication architectures in prime fields.
ACM Great Lakes Symposium on VLSI 2007: 534-539 |
218 | EE | Elena Andreeva,
Gregory Neven,
Bart Preneel,
Thomas Shrimpton:
Seven-Property-Preserving Iterated Hashing: ROX.
ASIACRYPT 2007: 130-146 |
217 | EE | Hirotaka Yoshida,
Dai Watanabe,
Katsuyuki Okeya,
Jun Kitahara,
Hongjun Wu,
Özgül Küçük,
Bart Preneel:
MAME: A Compression Function with Reduced Hardware Requirements.
CHES 2007: 148-165 |
216 | EE | Florian Mendel,
Joseph Lano,
Bart Preneel:
Cryptanalysis of Reduced Variants of the FORK-256 Hash Function.
CT-RSA 2007: 85-100 |
215 | EE | Dave Singelée,
Bart Preneel:
Distance Bounding in Noisy Environments.
ESAS 2007: 101-115 |
214 | EE | Hongjun Wu,
Bart Preneel:
Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy.
EUROCRYPT 2007: 276-290 |
213 | EE | Jongsung Kim,
Seokhie Hong,
Bart Preneel:
Related-Key Rectangle Attacks on Reduced AES-192 and AES-256.
FSE 2007: 225-241 |
212 | EE | Hongjun Wu,
Bart Preneel:
Differential-Linear Attacks Against the Stream Cipher Phelix.
FSE 2007: 87-100 |
211 | EE | Zhiguo Wan,
Robert H. Deng,
Feng Bao,
Bart Preneel:
n PAKE + : A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords.
ICICS 2007: 31-43 |
210 | EE | Li Weng,
Bart Preneel:
Attacking Some Perceptual Image Hash Algorithms.
ICME 2007: 879-882 |
209 | EE | Nele Mentens,
Kazuo Sakiyama,
Lejla Batina,
Bart Preneel,
Ingrid Verbauwhede:
A Side-channel Attack Resistant Programmable PKC Coprocessor for Embedded Applications.
ICSAMOS 2007: 194-200 |
208 | EE | Gautham Sekar,
Souradyuti Paul,
Bart Preneel:
Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses.
INDOCRYPT 2007: 58-72 |
207 | EE | Orr Dunkelman,
Gautham Sekar,
Bart Preneel:
Improved Meet-in-the-Middle Attacks on Reduced-Round DES.
INDOCRYPT 2007: 86-100 |
206 | EE | Gautham Sekar,
Souradyuti Paul,
Bart Preneel:
New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py.
ISC 2007: 249-262 |
205 | EE | George Danezis,
Claudia Díaz,
Sebastian Faust,
Emilia Käsper,
Carmela Troncoso,
Bart Preneel:
Efficient Negative Databases from Cryptographic Hash Functions.
ISC 2007: 423-436 |
204 | EE | Lejla Batina,
Nele Mentens,
Kazuo Sakiyama,
Bart Preneel,
Ingrid Verbauwhede:
Public-Key Cryptography on the Top of a Needle.
ISCAS 2007: 1831-1834 |
203 | EE | Carmela Troncoso,
Claudia Díaz,
Orr Dunkelman,
Bart Preneel:
Traffic Analysis Attacks on a Continuously-Observable Steganographic File System.
Information Hiding 2007: 220-236 |
202 | EE | Dave Singelée,
Bart Preneel:
Key Establishment Using Secure Distance Bounding Protocols.
MobiQuitous 2007: 1-6 |
201 | EE | Markulf Kohlweiss,
Sebastian Faust,
Lothar Fritsch,
Bartek Gedrojc,
Bart Preneel:
Efficient Oblivious Augmented Maps: Location-Based Services with a Payment Broker.
Privacy Enhancing Technologies 2007: 77-94 |
200 | EE | Bertrand Anckaert,
Matias Madou,
Bjorn De Sutter,
Bruno De Bus,
Koen De Bosschere,
Bart Preneel:
Program obfuscation: a quantitative approach.
QoP 2007: 15-20 |
199 | EE | Brecht Wyseur,
Wil Michiels,
Paul Gorissen,
Bart Preneel:
Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings.
Selected Areas in Cryptography 2007: 264-277 |
198 | EE | Danny De Cock,
Bart Preneel:
Electronic Voting in Belgium: Past and Future.
VOTE-ID 2007: 76-87 |
197 | EE | Gautham Sekar,
Souradyuti Paul,
Bart Preneel:
New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B.
WEWoRC 2007: 127-141 |
196 | EE | Sebastiaan Indesteege,
Bart Preneel:
Preimages for Reduced-Round Tiger.
WEWoRC 2007: 90-99 |
195 | EE | Carmela Troncoso,
George Danezis,
Eleni Kosta,
Bart Preneel:
Pripayd: privacy friendly pay-as-you-drive insurance.
WPES 2007: 99-107 |
194 | EE | Bart Preneel:
A survey of recent developments in cryptographic algorithms for smart cards.
Computer Networks 51(9): 2223-2233 (2007) |
193 | EE | Kazuo Sakiyama,
Lejla Batina,
Bart Preneel,
Ingrid Verbauwhede:
HW/SW co-design for public-key cryptosystems on the 8051 micro-controller.
Computers & Electrical Engineering 33(5-6): 324-332 (2007) |
192 | EE | Elke De Mulder,
Siddika Berna Örs,
Bart Preneel,
Ingrid Verbauwhede:
Differential power and electromagnetic attacks on a FPGA implementation of elliptic curve cryptosystems.
Computers & Electrical Engineering 33(5-6): 367-382 (2007) |
191 | EE | Kazuo Sakiyama,
Lejla Batina,
Bart Preneel,
Ingrid Verbauwhede:
Multicore Curve-Based Cryptoprocessor with Reconfigurable Modular Arithmetic Logic Units over GF(2n).
IEEE Trans. Computers 56(9): 1269-1282 (2007) |
190 | EE | Michael Backes,
Stefanos Gritzalis,
Bart Preneel:
Preface.
Int. J. Inf. Sec. 6(6): 359-360 (2007) |
189 | EE | Kazuo Sakiyama,
Lejla Batina,
Bart Preneel,
Ingrid Verbauwhede:
High-performance Public-key Cryptoprocessor for Wireless Mobile Applications.
MONET 12(4): 245-258 (2007) |
2006 |
188 | | Bart Preneel,
Stafford E. Tavares:
Selected Areas in Cryptography, 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers
Springer 2006 |
187 | | Michele Bugliesi,
Bart Preneel,
Vladimiro Sassone,
Ingo Wegener:
Automata, Languages and Programming, 33rd International Colloquium, ICALP 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part I
Springer 2006 |
186 | | Michele Bugliesi,
Bart Preneel,
Vladimiro Sassone,
Ingo Wegener:
Automata, Languages and Programming, 33rd International Colloquium, ICALP 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part II
Springer 2006 |
185 | | Sokratis K. Katsikas,
Javier Lopez,
Michael Backes,
Stefanos Gritzalis,
Bart Preneel:
Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings
Springer 2006 |
184 | EE | An Braeken,
Joseph Lano,
Bart Preneel:
Evaluating the Resistance of Stream Ciphers with Linear Feedback Against Fast Algebraic Attacks.
ACISP 2006: 40-51 |
183 | EE | Dave Singelée,
Bart Preneel:
Improved Pairing Protocol for Bluetooth.
ADHOC-NOW 2006: 252-265 |
182 | EE | Stefaan Seys,
Bart Preneel:
ARM: Anonymous Routing Protocol for Mobile Ad hoc Networks.
AINA (2) 2006: 133-137 |
181 | EE | Nele Mentens,
Lejla Batina,
Bart Preneel,
Ingrid Verbauwhede:
Time-Memory Trade-Off Attack on FPGA Platforms: UNIX Password Cracking.
ARC 2006: 323-334 |
180 | EE | Kazuo Sakiyama,
Nele Mentens,
Lejla Batina,
Bart Preneel,
Ingrid Verbauwhede:
Reconfigurable Modular Arithmetic Logic Unit for High-Performance Public-Key Cryptosystems.
ARC 2006: 347-357 |
179 | EE | Ventzislav Nikov,
Svetla Nikova,
Bart Preneel:
A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols.
ASIACRYPT 2006: 348-363 |
178 | EE | Souradyuti Paul,
Bart Preneel:
On the (In)security of Stream Ciphers Based on Arrays and Modular Addition.
ASIACRYPT 2006: 69-83 |
177 | EE | Kazuo Sakiyama,
Lejla Batina,
Bart Preneel,
Ingrid Verbauwhede:
Superscalar Coprocessor for High-Speed Curve-Based Cryptography.
CHES 2006: 415-429 |
176 | EE | Lejla Batina,
Nele Mentens,
Kazuo Sakiyama,
Bart Preneel,
Ingrid Verbauwhede:
Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks.
ESAS 2006: 6-17 |
175 | EE | Dries Schellekens,
Bart Preneel,
Ingrid Verbauwhede:
FPGA Vendor Agnostic True Random Number Generator.
FPL 2006: 1-6 |
174 | EE | Nele Mentens,
Kazuo Sakiyama,
Lejla Batina,
Ingrid Verbauwhede,
Bart Preneel:
Fpga-Oriented Secure Data Path Design: Implementation of a Public Key Coprocessor.
FPL 2006: 1-6 |
173 | EE | Hongjun Wu,
Bart Preneel:
Cryptanalysis of the Stream Cipher DECIM.
FSE 2006: 30-40 |
172 | EE | Souradyuti Paul,
Bart Preneel,
Gautham Sekar:
Distinguishing Attacks on the Stream Cipher Py.
FSE 2006: 405-421 |
171 | EE | Hongjun Wu,
Bart Preneel:
Resynchronization Attacks on WG and LEX.
FSE 2006: 422-432 |
170 | EE | Li Weng,
Karel Wouters,
Bart Preneel:
Extending the Selective MPEG Encryption Algorithm PVEA.
IIH-MSP 2006: 117-120 |
169 | EE | Florian Mendel,
Bart Preneel,
Vincent Rijmen,
Hirotaka Yoshida,
Dai Watanabe:
Update on Tiger.
INDOCRYPT 2006: 63-79 |
168 | EE | Kazuo Sakiyama,
Bart Preneel,
Ingrid Verbauwhede:
A fast dual-field modular arithmetic logic unit and its hardware implementation.
ISCAS 2006 |
167 | EE | Lejla Batina,
Nele Mentens,
Bart Preneel,
Ingrid Verbauwhede:
Flexible hardware architectures for curve-based cryptography.
ISCAS 2006 |
166 | EE | Jongsung Kim,
Alex Biryukov,
Bart Preneel,
Seokhie Hong:
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract).
SCN 2006: 242-256 |
165 | EE | Helena Handschuh,
Bart Preneel:
Blind Differential Cryptanalysis for Enhanced Power Attacks.
Selected Areas in Cryptography 2006: 163-173 |
164 | EE | Hongjun Wu,
Bart Preneel:
Cryptanalysis of the Stream Cipher ABC v2.
Selected Areas in Cryptography 2006: 56-66 |
163 | | Danny De Cock,
Christopher Wolf,
Bart Preneel:
The Belgian Electronic Identity Card (Overview).
Sicherheit 2006: 298-301 |
162 | | Matias Madou,
Bertrand Anckaert,
Bruno De Bus,
Koen De Bosschere,
Jan Cappaert,
Bart Preneel:
On the Effectiveness of Source Code Transformations for Binary Obfuscation.
Software Engineering Research and Practice 2006: 527-533 |
161 | EE | Dave Singelée,
Bart Preneel:
Location privacy in wireless personal area networks.
Workshop on Wireless Security 2006: 11-18 |
160 | EE | Christopher Wolf,
An Braeken,
Bart Preneel:
On the security of stepwise triangular systems.
Des. Codes Cryptography 40(3): 285-302 (2006) |
159 | EE | An Braeken,
Yuri L. Borissov,
Svetla Nikova,
Bart Preneel:
Classification of cubic (n-4)-resilient Boolean functions.
IEEE Transactions on Information Theory 52(4): 1670-1676 (2006) |
2005 |
158 | EE | Souradyuti Paul,
Bart Preneel:
Solving Systems of Differential Equations of Addition.
ACISP 2005: 75-88 |
157 | EE | Lejla Batina,
Nele Mentens,
Bart Preneel,
Ingrid Verbauwhede:
Side-channel aware design: Algorithms and Architectures for Elliptic Curve Cryptography over GF(2n).
ASAP 2005: 350-355 |
156 | EE | Lejla Batina,
David Hwang,
Alireza Hodjat,
Bart Preneel,
Ingrid Verbauwhede:
Hardware/Software Co-design for Hyperelliptic Curve Cryptography (HECC) on the 8051µP.
CHES 2005: 106-118 |
155 | EE | An Braeken,
Christopher Wolf,
Bart Preneel:
A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes.
CT-RSA 2005: 29-43 |
154 | EE | Nele Mentens,
Lejla Batina,
Bart Preneel,
Ingrid Verbauwhede:
A Systematic Evaluation of Compact Hardware Implementations for the Rijndael S-Box.
CT-RSA 2005: 323-333 |
153 | EE | Seokhie Hong,
Jongsung Kim,
Sangjin Lee,
Bart Preneel:
Related-Key Rectangle Attacks on Reduced Versions of SHACAL-1 and AES-192.
FSE 2005: 368-383 |
152 | EE | An Braeken,
Yuri L. Borissov,
Svetla Nikova,
Bart Preneel:
Classification of Boolean Functions of 6 Variables or Less with Respect to Some Cryptographic Properties.
ICALP 2005: 324-334 |
151 | EE | Stefaan Seys,
Bart Preneel:
The Wandering Nodes: Key Management for Low-Power Mobile Ad Hoc Networks.
ICDCS Workshops 2005: 916-922 |
150 | EE | Jongsung Kim,
Alex Biryukov,
Bart Preneel,
Sangjin Lee:
On the Security of Encryption Modes of MD4, MD5 and HAVAL.
ICICS 2005: 147-158 |
149 | EE | An Braeken,
Christopher Wolf,
Bart Preneel:
Normality of Vectorial Functions.
IMA Int. Conf. 2005: 186-200 |
148 | EE | An Braeken,
Bart Preneel:
Probabilistic Algebraic Attacks.
IMA Int. Conf. 2005: 290-303 |
147 | EE | An Braeken,
Bart Preneel:
On the Algebraic Immunity of Symmetric Boolean Functions.
INDOCRYPT 2005: 35-48 |
146 | EE | Souradyuti Paul,
Bart Preneel:
Near Optimal Algorithms for Solving Differential Equations of Addition with Batch Queries.
INDOCRYPT 2005: 90-103 |
145 | EE | Christopher Wolf,
Bart Preneel:
Equivalent Keys in HFE, C*, and Variations.
Mycrypt 2005: 33-49 |
144 | EE | Christopher Wolf,
Bart Preneel:
Large Superfluous Keys in Multivariate Quadratic Asymmetric Systems.
Public Key Cryptography 2005: 275-287 |
143 | EE | Stefaan Seys,
Bart Preneel:
Efficient Cooperative Signatures: A Novel Authentication Scheme for Sensor Networks.
SPC 2005: 86-100 |
142 | | Christopher Wolf,
Bart Preneel:
Applications of Multivariate Quadratic Public Key Systems.
Sicherheit 2005: 413-424 |
141 | EE | Bart Preneel:
CBC-MAC and Variants.
Encyclopedia of Cryptography and Security 2005 |
140 | EE | Bart Preneel:
Collision Attack.
Encyclopedia of Cryptography and Security 2005 |
139 | EE | Bart Preneel:
Collision resistance.
Encyclopedia of Cryptography and Security 2005 |
138 | EE | Bart Preneel:
Correcting-block attack.
Encyclopedia of Cryptography and Security 2005 |
137 | EE | Bart Preneel:
Davies-Meyer Hash Function.
Encyclopedia of Cryptography and Security 2005 |
136 | EE | Bart Preneel:
HMAC.
Encyclopedia of Cryptography and Security 2005 |
135 | EE | Bart Preneel:
Hash functions.
Encyclopedia of Cryptography and Security 2005 |
134 | EE | Bart Preneel:
MAC Algorithms.
Encyclopedia of Cryptography and Security 2005 |
133 | EE | Bart Preneel:
MDC-2 and MDC-4.
Encyclopedia of Cryptography and Security 2005 |
132 | EE | Bart Preneel:
Maa.
Encyclopedia of Cryptography and Security 2005 |
131 | EE | Bart Preneel:
Mash Hash Functions (Modular Arithmetic Secure Hash).
Encyclopedia of Cryptography and Security 2005 |
130 | EE | Bart Preneel:
Modes of Operation of a Block Cipher.
Encyclopedia of Cryptography and Security 2005 |
129 | EE | Bart Preneel:
NESSIE Project.
Encyclopedia of Cryptography and Security 2005 |
128 | EE | Bart Preneel:
PMAC.
Encyclopedia of Cryptography and Security 2005 |
127 | EE | Bart Preneel:
Preimage Resistance.
Encyclopedia of Cryptography and Security 2005 |
126 | EE | Bart Preneel:
Second preimage resistance.
Encyclopedia of Cryptography and Security 2005 |
125 | EE | Bart Preneel:
Universal One-Way Hash Functions.
Encyclopedia of Cryptography and Security 2005 |
124 | EE | Alex Biryukov,
Joseph Lano,
Bart Preneel:
Recent attacks on alleged SecurID and their practical implications.
Computers & Security 24(5): 364-370 (2005) |
123 | EE | Yuri L. Borissov,
An Braeken,
Svetla Nikova,
Bart Preneel:
On the covering radii of binary Reed-Muller codes in the set of resilient Boolean functions.
IEEE Transactions on Information Theory 51(3): 1182-1189 (2005) |
122 | EE | Michaël Quisquater,
Bart Preneel,
Joos Vandewalle:
Spectral characterization of cryptographic Boolean functions satisfying the (extended) propagation criterion of degree l and order k.
Inf. Process. Lett. 93(1): 25-28 (2005) |
2004 |
121 | EE | Jorge Nakahara Jr.,
Bart Preneel,
Joos Vandewalle:
The Biryukov-Demirci Attack on Reduced-Round Versions of IDEA and MESH Ciphers.
ACISP 2004: 98-109 |
120 | EE | Nele Mentens,
Siddika Berna Örs,
Bart Preneel:
An FPGA implementation of an elliptic curve processor GF(2m).
ACM Great Lakes Symposium on VLSI 2004: 454-457 |
119 | EE | Taizo Shirai,
Bart Preneel:
On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds.
ASIACRYPT 2004: 1-15 |
118 | EE | Deukjo Hong,
Bart Preneel,
Sangjin Lee:
Higher Order Universal One-Way Hash Functions.
ASIACRYPT 2004: 201-213 |
117 | EE | François-Xavier Standaert,
Siddika Berna Örs,
Bart Preneel:
Power Analysis of an FPGA: Implementation of Rijndael: Is Pipelining a DPA Countermeasure?
CHES 2004: 30-44 |
116 | EE | Danny De Cock,
Karel Wouters,
Bart Preneel:
Introduction to the Belgian EID Card: BELPIC.
EuroPKI 2004: 1-13 |
115 | EE | François-Xavier Standaert,
Siddika Berna Örs,
Jean-Jacques Quisquater,
Bart Preneel:
Power Analysis Attacks Against FPGA Implementations of the DES.
FPL 2004: 84-94 |
114 | EE | Souradyuti Paul,
Bart Preneel:
A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher.
FSE 2004: 245-259 |
113 | EE | Ventzislav Nikov,
Svetla Nikova,
Bart Preneel:
Robust Metering Schemes for General Access Structures.
ICICS 2004: 53-65 |
112 | | An Braeken,
Christopher Wolf,
Bart Preneel:
A Randomised Algorithm for Checking the Normality of Cryptographic Boolean Functions.
IFIP TCS 2004: 51-66 |
111 | EE | An Braeken,
Ventzislav Nikov,
Svetla Nikova,
Bart Preneel:
On Boolean Functions with Generalized Cryptographic Properties.
INDOCRYPT 2004: 120-135 |
110 | EE | Siddika Berna Örs,
Frank K. Gürkaynak,
Elisabeth Oswald,
Bart Preneel:
Power-Analysis Attack on an ASIC AES implementation.
ITCC (2) 2004: 546-552 |
109 | EE | Claudia Díaz,
Bart Preneel:
Reasoning About the Anonymity Provided by Pool Mixes That Generate Dummy Traffic.
Information Hiding 2004: 309-325 |
108 | | Claudia Díaz,
Bart Preneel:
Taxonomy of Mixes and Dummy Traffic.
International Information Security Workshops 2004: 215-230 |
107 | EE | Bart Preneel:
ECRYPT: The Cryptographic Research Challenges for the Next Decade.
SCN 2004: 1-15 |
106 | EE | Ventzislav Nikov,
Svetla Nikova,
Bart Preneel:
On the Size of Monotone Span Programs.
SCN 2004: 249-262 |
105 | EE | Christopher Wolf,
An Braeken,
Bart Preneel:
Efficient Cryptanalysis of RSE(2)PKC and RSSE(2)PKC.
SCN 2004: 294-309 |
104 | EE | Hirotaka Yoshida,
Alex Biryukov,
Christophe De Cannière,
Joseph Lano,
Bart Preneel:
Non-randomness of the Full 4 and 5-Pass HAVAL.
SCN 2004: 324-336 |
103 | EE | Frederik Armknecht,
Joseph Lano,
Bart Preneel:
Extending the Resynchronization Attack.
Selected Areas in Cryptography 2004: 19-38 |
102 | | Nele Mentens,
Siddika Berna Örs,
Bart Preneel,
Joos Vandewalle:
An FPGA Implementation of a Montgomery Multiplier Over GF(2^m).
Computers and Artificial Intelligence 23(5): (2004) |
101 | EE | Dai Watanabe,
Soichi Furuya,
Hirotaka Yoshida,
Kazuo Takaragi,
Bart Preneel:
A New Keystream Generator MUGI.
IEICE Transactions 87-A(1): 37-45 (2004) |
2003 |
100 | EE | Ventzislav Nikov,
Svetla Nikova,
Bart Preneel:
Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case.
ACNS 2003: 1-15 |
99 | EE | Siddika Berna Örs,
Lejla Batina,
Bart Preneel,
Joos Vandewalle:
Hardware Implementation of an Elliptic Curve Processor over GF(p).
ASAP 2003: 433-443 |
98 | EE | Bart Van Rompay,
Alex Biryukov,
Bart Preneel,
Joos Vandewalle:
Cryptanalysis of 3-Pass HAVAL.
ASIACRYPT 2003: 228-245 |
97 | EE | Siddika Berna Örs,
Elisabeth Oswald,
Bart Preneel:
Power-Analysis Attacks on an FPGA - First Experimental Results.
CHES 2003: 35-50 |
96 | EE | Alex Biryukov,
Christophe De Cannière,
An Braeken,
Bart Preneel:
A Toolbox for Cryptanalysis: Linear and Affine Equivalence Algorithms.
EUROCRYPT 2003: 33-50 |
95 | EE | Steve Babbage,
Christophe De Cannière,
Joseph Lano,
Bart Preneel,
Joos Vandewalle:
Cryptanalysis of SOBER-t32.
FSE 2003: 111-128 |
94 | EE | Dowon Hong,
Ju-Sung Kang,
Bart Preneel,
Heuisu Ryu:
A Concrete Security Analysis for 3GPP-MAC.
FSE 2003: 154-169 |
93 | EE | Yuri L. Borissov,
An Braeken,
Svetla Nikova,
Bart Preneel:
On the Covering Radius of Second Order Binary Reed-Muller Code in the Set of Resilient Boolean Functions.
IMA Int. Conf. 2003: 82-92 |
92 | EE | Ventzislav Nikov,
Svetla Nikova,
Bart Preneel:
On Multiplicative Linear Secret Sharing Schemes.
INDOCRYPT 2003: 135-147 |
91 | EE | Souradyuti Paul,
Bart Preneel:
Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator.
INDOCRYPT 2003: 52-67 |
90 | EE | Siddika Berna Örs,
Lejla Batina,
Bart Preneel,
Joos Vandewalle:
Hardware Implementation of a Montgomery Modular Multiplier in a Systolic Array.
IPDPS 2003: 184 |
89 | EE | Jorge Nakahara Jr.,
Bart Preneel,
Joos Vandewalle:
A Note on Weak Keys of PES, IDEA, and Some Extended Variants.
ISC 2003: 267-279 |
88 | EE | Alex Biryukov,
Joseph Lano,
Bart Preneel:
Cryptanalysis of the Alleged SecurID Hash Function.
Selected Areas in Cryptography 2003: 130-144 |
87 | EE | Jorge Nakahara Jr.,
Vincent Rijmen,
Bart Preneel,
Joos Vandewalle:
The MESH Block Ciphers.
WISA 2003: 458-473 |
86 | EE | Joris Claessens,
Bart Preneel,
Joos Vandewalle:
(How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions.
ACM Trans. Internet Techn. 3(1): 28-48 (2003) |
85 | EE | John Iliadis,
Stefanos Gritzalis,
Diomidis Spinellis,
Danny De Cock,
Bart Preneel,
Dimitris Gritzalis:
Towards a framework for evaluating certificate status information mechanisms.
Computer Communications 26(16): 1839-1850 (2003) |
84 | | Claudia Díaz,
Joris Claessens,
Bart Preneel:
APES - Anonymity and Privacy in Electronic Services.
Datenschutz und Datensicherheit 27(3): (2003) |
83 | | Michaël Quisquater,
Bart Preneel,
Joos Vandewalle:
A new inequality in discrete Fourier theory.
IEEE Transactions on Information Theory 49(8): 2038-2040 (2003) |
82 | EE | Lejla Batina,
Siddika Berna Örs,
Bart Preneel,
Joos Vandewalle:
Hardware architectures for public key cryptography.
Integration 34(1-2): 1-64 (2003) |
2002 |
81 | | Bart Preneel:
Topics in Cryptology - CT-RSA 2002, The Cryptographer's Track at the RSA Conference, 2002, San Jose, CA, USA, February 18-22, 2002, Proceedings
Springer 2002 |
80 | EE | Bart Preneel:
Cryptographic Challenges: The Past and the Future.
FASec 2002: 167-182 |
79 | EE | Dai Watanabe,
Soichi Furuya,
Hirotaka Yoshida,
Kazuo Takaragi,
Bart Preneel:
A New Keystream Generator MUGI.
FSE 2002: 179-194 |
78 | EE | Alex Biryukov,
Jorge Nakahara Jr.,
Bart Preneel,
Joos Vandewalle:
New Weak-Key Classes of IDEA.
ICICS 2002: 315-326 |
77 | EE | Ventzislav Nikov,
Svetla Nikova,
Bart Preneel,
Joos Vandewalle:
On Unconditionally Secure Distributed Oblivious Transfer.
INDOCRYPT 2002: 395-408 |
76 | EE | Ventzislav Nikov,
Svetla Nikova,
Bart Preneel,
Joos Vandewalle:
On Distributed Key Distribution Centers and Unconditionally Secure Proactive Verifiable Secret Sharing Schemes Based on General Access Structure.
INDOCRYPT 2002: 422-436 |
75 | EE | Claudia Díaz,
Stefaan Seys,
Joris Claessens,
Bart Preneel:
Towards Measuring Anonymity.
Privacy Enhancing Technologies 2002: 54-68 |
74 | EE | Michaël Quisquater,
Bart Preneel,
Joos Vandewalle:
On the Security of the Threshold Scheme Based on the Chinese Remainder Theorem.
Public Key Cryptography 2002: 199-210 |
73 | EE | Bart Preneel:
New European Schemes for Signature, Integrity and Encryption (NESSIE): A Status Report.
Public Key Cryptography 2002: 297-309 |
72 | EE | Yuri L. Borissov,
Svetla Nikova,
Bart Preneel,
Joos Vandewalle:
On a Resynchronization Weakness in a Class of Combiners with Memory.
SCN 2002: 164-173 |
71 | EE | Karel Wouters,
Bart Preneel,
Ana Isabel González-Tablas Ferreres,
Arturo Ribagorda:
Towards an XML format for time-stamps.
XML Security 2002: 61-70 |
70 | | Joris Claessens,
Valentin Dem,
Danny De Cock,
Bart Preneel,
Joos Vandewalle:
On the Security of Today's Online Electronic Banking Systems.
Computers & Security 21(3): 253-265 (2002) |
69 | EE | Joris Claessens,
Bart Preneel,
Joos Vandewalle:
A Tangled World Wide Web of Security Issues.
First Monday 7(3): (2002) |
68 | | Lars R. Knudsen,
Bart Preneel:
Construction of secure and fast hash functions using nonbinary error-correcting codes.
IEEE Transactions on Information Theory 48(9): 2524-2539 (2002) |
67 | | Joris Claessens,
Bart Preneel,
Joos Vandewalle:
Combining World Wide Web and wireless security.
Informatica (Slovenia) 26(2): (2002) |
2001 |
66 | | T. Herlea,
Joris Claessens,
Danny De Cock,
Bart Preneel,
Joos Vandewalle:
Secure Meeting Scheduling with agenTA.
Communications and Multimedia Security 2001 |
65 | EE | Joris Claessens,
Bart Preneel,
Joos Vandewalle:
Secure Communication for Secure Agent-Based Electronic Commerce Applications.
E-Commerce Agents 2001: 180-190 |
64 | EE | Frederik Vercauteren,
Bart Preneel,
Joos Vandewalle:
A Memory Efficient Version of Satoh's Algorithm.
EUROCRYPT 2001: 1-13 |
63 | EE | Paulo S. L. M. Barreto,
Vincent Rijmen,
Jorge Nakahara Jr.,
Bart Preneel,
Joos Vandewalle,
Hae Yong Kim:
Improved SQUARE Attacks against Reduced-Round HIEROCRYPT.
FSE 2001: 165-173 |
62 | EE | Bart Preneel:
NESSIE: A European Approach to Evaluate Cryptographic Algorithms.
FSE 2001: 267-276 |
61 | EE | Vincent Rijmen,
Bart Van Rompay,
Bart Preneel,
Joos Vandewalle:
Producing Collisions for PANAMA.
FSE 2001: 37-51 |
60 | | Joris Claessens,
Bart Preneel,
Joos Vandewalle:
Combining World Wide Web and Wireless Security.
Network Security 2001: 153-172 |
59 | | T. Herlea,
Joris Claessens,
Bart Preneel,
Gregory Neven,
Frank Piessens,
Bart De Decker:
On Securely Scheduling a Meeting.
SEC 2001: 183-198 |
58 | EE | Bert den Boer,
Bart Van Rompay,
Bart Preneel,
Joos Vandewalle:
New (Two-Track-)MAC Based on the Two Trails of RIPEMD.
Selected Areas in Cryptography 2001: 314-324 |
57 | EE | Johan Borst,
Bart Preneel,
Vincent Rijmen:
Cryptography on smart cards.
Computer Networks 36(4): 423-435 (2001) |
2000 |
56 | | Bart Preneel:
Advances in Cryptology - EUROCRYPT 2000, International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000, Proceeding
Springer 2000 |
55 | EE | John Iliadis,
Diomidis Spinellis,
Dimitris Gritzalis,
Bart Preneel,
Sokratis K. Katsikas:
Evaluating certificate status information mechanisms.
ACM Conference on Computer and Communications Security 2000: 1-8 |
54 | EE | Jorge Nakahara Jr.,
Bart Preneel,
Joos Vandewalle:
Linear Cryptanalysis of Reduced-Round Versions of the SAFER Block Cipher Family.
FSE 2000: 244-261 |
53 | | Günther Horn,
Bart Preneel:
Authentication and Payment in Future Mobile Systems.
Journal of Computer Security 8(2/3): (2000) |
1999 |
52 | | Bart Preneel:
Secure Information Networks: Communications and Multimedia Security, IFIP TC6/TC11 Joint Working Conference on Communications and Multimedia Security (CMS '99), September 20-21, 1999, Leuven, Belgium
Kluwer 1999 |
51 | | Carl D'Halluin,
Gert Bijnens,
Bart Preneel,
Vincent Rijmen:
Equivalent Keys of HPC.
ASIACRYPT 1999: 29-42 |
50 | EE | Wim Nevelsteen,
Bart Preneel:
Software Performance of Universal Hash Functions.
EUROCRYPT 1999: 24-41 |
49 | EE | Johan Borst,
Bart Preneel,
Joos Vandewalle:
Linear Cryptanalysis of RC5 and RC6.
FSE 1999: 16-30 |
48 | EE | Helena Handschuh,
Bart Preneel:
On the Security of Double and 2-Key Triple Modes of Operation.
FSE 1999: 215-230 |
47 | EE | Carl D'Halluin,
Gert Bijnens,
Vincent Rijmen,
Bart Preneel:
Attack on Six Rounds of Crypton.
FSE 1999: 46-59 |
46 | EE | Bart Preneel:
State-of-the-art ciphers for commercial applications.
Computers & Security 18(1): 67-74 (1999) |
45 | | Bart Preneel,
Paul C. van Oorschot:
On the Security of Iterated Message Authentication Codes.
IEEE Transactions on Information Theory 45(1): 188-199 (1999) |
44 | EE | Márton Csapodi,
Joos Vandewalle,
Bart Preneel:
CNN Algorithms for Video Authentication and Copyright Protection.
VLSI Signal Processing 23(2-3): 449-463 (1999) |
1998 |
43 | | Bart Preneel,
Vincent Rijmen:
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997. Revised Lectures
Springer 1998 |
42 | EE | Erik De Win,
Serge Mister,
Bart Preneel,
Michael J. Wiener:
On the Performance of Signature Schemes Based on Elliptic Curves.
ANTS 1998: 252-266 |
41 | EE | Lars R. Knudsen,
Willi Meier,
Bart Preneel,
Vincent Rijmen,
Sven Verdoolaege:
Analysis Methods for (Alleged) RC4.
ASIACRYPT 1998: 327-341 |
40 | EE | Günther Horn,
Bart Preneel:
Authentication and Payment in Future Mobile Systems.
ESORICS 1998: 277-293 |
39 | EE | Keith M. Martin,
Bart Preneel,
Chris J. Mitchell,
Hans-Joachim Hitz,
Günther Horn,
A. Poliakova,
P. Howard:
Secure Billing for Mobile Information Services in UMTS.
IS&N 1998: 535-548 |
38 | EE | Bart Preneel:
The State of Cryptographic Hash Functions.
Lectures on Data Security 1998: 158-182 |
37 | EE | Bart Preneel:
An Introduction to Cryptology.
SOFSEM 1998: 204-221 |
36 | EE | Joris Claessens,
Mark Vandenwauver,
Bart Preneel,
Joos Vandewalle:
Setting up a Secure Web Server and Clients on an Intranet.
WETICE 1998: 295-300 |
35 | EE | Lars R. Knudsen,
Xuejia Lai,
Bart Preneel:
Attacks on Fast Double Block Length Hash Functions.
J. Cryptology 11(1): 59-72 (1998) |
1997 |
34 | EE | Lars R. Knudsen,
Bart Preneel:
Fast and Secure Hashing Based on Codes.
CRYPTO 1997: 485-498 |
33 | EE | Vincent Rijmen,
Bart Preneel:
A Family of Trapdoor Ciphers.
FSE 1997: 139-148 |
32 | | Bart Preneel:
Hash Functions and MAC Algorithms Based on Block Ciphers.
IMA Int. Conf. 1997: 270-282 |
31 | | Bart Preneel:
Cryptanalysis of Message Authentication Codes.
ISW 1997: 55-65 |
30 | EE | Bart Preneel,
Vincent Rijmen,
Antoon Bosselaers:
Recent Developments in the Design of Conventional Cryptographic Algorithms.
State of the Art in Applied Cryptography 1997: 105-130 |
29 | EE | Erik De Win,
Bart Preneel:
Elliptic Curve Public-Key Cryptosystems - An Introduction.
State of the Art in Applied Cryptography 1997: 131-141 |
28 | EE | Bart Preneel:
Cryptographic Primitives for Information Authentication - State of the Art.
State of the Art in Applied Cryptography 1997: 49-104 |
27 | | Vincent Rijmen,
Bart Preneel,
Erik De Win:
On Weaknesses of Non-surjective Round Functions.
Des. Codes Cryptography 12(3): 253-266 (1997) |
1996 |
26 | | Lars R. Knudsen,
Bart Preneel:
Hash Functions Based on Block Ciphers and Quaternary Codes.
ASIACRYPT 1996: 77-90 |
25 | EE | Bart Preneel,
Paul C. van Oorschot:
On the Security of Two MAC Algorithms.
EUROCRYPT 1996: 19-32 |
24 | | Hans Dobbertin,
Antoon Bosselaers,
Bart Preneel:
RIPEMD-160: A Strengthened Version of RIPEMD.
FSE 1996: 71-82 |
23 | | Vincent Rijmen,
Joan Daemen,
Bart Preneel,
Antoon Bosselaers,
Erik De Win:
The Cipher SHARK.
FSE 1996: 99-111 |
22 | | Ross J. Anderson,
Serge Vaudenay,
Bart Preneel,
Kaisa Nyberg:
The Newton Channel.
Information Hiding 1996: 151-156 |
1995 |
21 | | Antoon Bosselaers,
Bart Preneel:
Integrity Primitives for Secure Information Systems, Final Report of RACE Integrity Primitives Evaluation RIPE-RACE 1040
Springer 1995 |
20 | | Bart Preneel:
Fast Software Encryption: Second International Workshop. Leuven, Belgium, 14-16 December 1994, Proceedings
Springer 1995 |
19 | EE | Bart Preneel,
Paul C. van Oorschot:
MDx-MAC and Building Fast MACs from Hash Functions.
CRYPTO 1995: 1-14 |
1994 |
18 | | Bart Preneel:
FSE'94 - Introduction.
FSE 1994: 1-5 |
17 | | Vincent Rijmen,
Bart Preneel:
Improved Characteristics for Differential Cryptanalysis of Hash Functions Based on Block Ciphers.
FSE 1994: 242-248 |
16 | | Vincent Rijmen,
Bart Preneel:
Cryptanalysis of McGuffin.
FSE 1994: 353-358 |
1993 |
15 | | Bart Preneel,
René Govaerts,
Joos Vandewalle:
Computer Security and Industrial Cryptography - State of the Art and Evolution, ESAT Course, Leuven, Belgium, May 21-23, 1991
Springer 1993 |
14 | EE | Bart Preneel,
René Govaerts,
Joos Vandewalle:
Differential Cryptanalysis of Hash Functions Based on Block Ciphers.
ACM Conference on Computer and Communications Security 1993: 183-188 |
13 | EE | Bart Preneel,
Marnix Nuttin,
Vincent Rijmen,
Johan Buelens:
Cryptanalysis of the CFB Mode of the DES with a Reduced Number of Rounds.
CRYPTO 1993: 212-223 |
12 | EE | Bart Preneel,
René Govaerts,
Joos Vandewalle:
Hash Functions Based on Block Ciphers: A Synthetic Approach.
CRYPTO 1993: 368-378 |
11 | | Bart Preneel:
Design Principles for Dedicated Hash Functions.
FSE 1993: 71-82 |
1992 |
10 | | Bart Preneel,
René Govaerts,
Joos Vandewalle:
On the Power of Memory in the Design of Collision Resistant Hash Functions.
AUSCRYPT 1992: 105-121 |
9 | | Bart Preneel,
René Govaerts,
Joos Vandewalle:
An Attack on Two Hash Functions by Zheng-Matsumoto-Imai.
AUSCRYPT 1992: 535-538 |
1991 |
8 | | Bart Preneel:
Standardization of Cryptographic Techniques.
Computer Security and Industrial Cryptography 1991: 162-173 |
7 | | Joos Vandewalle,
René Govaerts,
Bart Preneel:
Technical Approaches to Thwart Computer Fraud.
Computer Security and Industrial Cryptography 1991: 20-30 |
6 | | Bart Preneel,
René Govaerts,
Joos Vandewalle:
Information Authentication: Hash Functions and Digital Signatures.
Computer Security and Industrial Cryptography 1991: 87-131 |
5 | EE | Bart Preneel,
René Govaerts,
Joos Vandewalle:
Boolean Functions Satisfying Higher Order Propagation Criteria.
EUROCRYPT 1991: 141-152 |
4 | EE | Bart Preneel,
David Chaum,
Walter Fumy,
Cees J. A. Jansen,
Peter Landrock,
Gert Roelofsen:
Race Integrity Primitives Evaluation (RIPE): A Status Report.
EUROCRYPT 1991: 547-551 |
1990 |
3 | EE | Bart Preneel,
Werner Van Leekwijck,
Luc Van Linden,
René Govaerts,
Joos Vandewalle:
Propagation Characteristics of Boolean Functions.
EUROCRYPT 1990: 161-173 |
2 | EE | Bart Preneel,
Antoon Bosselaers,
René Govaerts,
Joos Vandewalle:
Cryptanalysis of a fast cryptographic checksum algorithm.
Computers & Security 9(3): 257-262 (1990) |
1989 |
1 | EE | Bart Preneel,
Antoon Bosselaers,
René Govaerts,
Joos Vandewalle:
A Chosen Text Attack on The Modified Cryptographic Checksum Algorithm of Cohen and Huang.
CRYPTO 1989: 154-163 |