dblp.uni-trier.dewww.uni-trier.de

Bart Preneel

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
246EEZhiguo Wan, Kui Ren, Bo Zhu, Bart Preneel, Ming Gu: Anonymous user communication for privacy protection in wireless metropolitan mesh networks. ASIACCS 2009: 368-371
2008
245 Viliam Geffert, Juhani Karhumäki, Alberto Bertoni, Bart Preneel, Pavol Návrat, Mária Bieliková: SOFSEM 2008: Theory and Practice of Computer Science, 34th Conference on Current Trends in Theory and Practice of Computer Science, Nový Smokovec, Slovakia, January 19-25, 2008, Volume II - Student Research Forum Safarik University, Kosice, Slovakia 2008
244 Viliam Geffert, Juhani Karhumäki, Alberto Bertoni, Bart Preneel, Pavol Návrat, Mária Bieliková: SOFSEM 2008: Theory and Practice of Computer Science, 34th Conference on Current Trends in Theory and Practice of Computer Science, Nový Smokovec, Slovakia, January 19-25, 2008, Proceedings Springer 2008
243EEDave Singelée, Benoît Latré, Bart Braem, Michael Peeters, Marijke De Soete, Peter De Cleyn, Bart Preneel, Ingrid Moerman, Chris Blondia: A Secure Cross-Layer Protocol for Multi-hop Wireless Body Area Networks. ADHOC-NOW 2008: 94-107
242EEChristophe De Cannière, Özgül Küçük, Bart Preneel: Analysis of Grain's Initialization Algorithm. AFRICACRYPT 2008: 276-289
241EEKarel Wouters, Koen Simoens, Danny Lathouwers, Bart Preneel: Secure and Privacy-Friendly Logging for eGovernment Services. ARES 2008: 1091-1096
240EEBenedikt Gierlichs, Lejla Batina, Pim Tuyls, Bart Preneel: Mutual Information Analysis. CHES 2008: 426-442
239EEHelena Handschuh, Bart Preneel: Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms. CRYPTO 2008: 144-161
238EEClaudia Díaz, Carmela Troncoso, Bart Preneel: A Framework for the Analysis of Mix-Based Steganographic File Systems. ESORICS 2008: 428-445
237EESebastiaan Indesteege, Nathan Keller, Orr Dunkelman, Eli Biham, Bart Preneel: A Practical Attack on KeeLoq. EUROCRYPT 2008: 1-18
236EEMina Deng, Bart Preneel: On Secure and Anonymous Buyer-Seller Watermarking Protocol. ICIW 2008: 524-529
235EESebastiaan Indesteege, Bart Preneel: Collisions for RC4-Hash. ISC 2008: 355-366
234EEMina Deng, Bart Preneel: Attacks on Two Buyer-Seller Watermarking Protocols and an Improvement for Revocable Anonymity. ISECS 2008: 923-929
233EEJan Cappaert, Bart Preneel, Bertrand Anckaert, Matias Madou, Koen De Bosschere: Towards Tamper Resistant Code Encryption: Practice and Experience. ISPEC 2008: 86-100
232EEBart Preneel: The State of Hash Functions and the NIST SHA-3 Competition. Inscrypt 2008: 1-11
231EEJong Hyuk Park, Bart Preneel, Ravi S. Sandhu, André Zúquete: IS 2008 PC Co-chairs' Message. OTM Conferences (2) 2008: 937
230EECarmela Troncoso, Benedikt Gierlichs, Bart Preneel, Ingrid Verbauwhede: Perfect Matching Disclosure Attacks. Privacy Enhancing Technologies 2008: 2-23
229EECarmela Troncoso, Danny De Cock, Bart Preneel: Improving secure long-term archival of digitally signed documents. StorageSS 2008: 27-36
228EEDries Schellekens, Pim Tuyls, Bart Preneel: Embedded Trusted Computing with Authenticated Non-volatile Memory. TRUST 2008: 60-74
227EEZhiguo Wan, Kui Ren, Wenjing Lou, Bart Preneel: Anonymous ID-Based Group Key Agreement for Wireless Networks. WCNC 2008: 2615-2620
226EEZhiguo Wan, Kui Ren, Bart Preneel: A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks. WISEC 2008: 62-67
225EEBenedikt Gierlichs, Carmela Troncoso, Claudia Díaz, Bart Preneel, Ingrid Verbauwhede: Revisiting a combinatorial approach toward measuring anonymity. WPES 2008: 111-116
224EEYoni De Mulder, George Danezis, Lejla Batina, Bart Preneel: Identification via location-profiling in GSM networks. WPES 2008: 23-32
223EEDries Schellekens, Brecht Wyseur, Bart Preneel: Remote Attestation on Legacy Operating Systems With Trusted Platform Modules. Electr. Notes Theor. Comput. Sci. 197(1): 59-72 (2008)
222 Liqun Chen, Willy Susilo, Huaxiong Wang, Duncan S. Wong, Ed Dawson, Xuejia Lai, Masahiro Mambo, Atsuko Miyaji, Yi Mu, David Pointcheval, Bart Preneel, Nigel P. Smart: Cryptography in Computer System Security. J. UCS 14(3): 314-317 (2008)
221EEDries Schellekens, Brecht Wyseur, Bart Preneel: Remote attestation on legacy operating systems with trusted platform modules. Sci. Comput. Program. 74(1-2): 13-22 (2008)
2007
220EEKazuo Sakiyama, Elke De Mulder, Bart Preneel, Ingrid Verbauwhede: Side-channel resistant system-level design flow for public-key cryptography. ACM Great Lakes Symposium on VLSI 2007: 144-147
219EENele Mentens, Kazuo Sakiyama, Bart Preneel, Ingrid Verbauwhede: Efficient pipelining for modular multiplication architectures in prime fields. ACM Great Lakes Symposium on VLSI 2007: 534-539
218EEElena Andreeva, Gregory Neven, Bart Preneel, Thomas Shrimpton: Seven-Property-Preserving Iterated Hashing: ROX. ASIACRYPT 2007: 130-146
217EEHirotaka Yoshida, Dai Watanabe, Katsuyuki Okeya, Jun Kitahara, Hongjun Wu, Özgül Küçük, Bart Preneel: MAME: A Compression Function with Reduced Hardware Requirements. CHES 2007: 148-165
216EEFlorian Mendel, Joseph Lano, Bart Preneel: Cryptanalysis of Reduced Variants of the FORK-256 Hash Function. CT-RSA 2007: 85-100
215EEDave Singelée, Bart Preneel: Distance Bounding in Noisy Environments. ESAS 2007: 101-115
214EEHongjun Wu, Bart Preneel: Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy. EUROCRYPT 2007: 276-290
213EEJongsung Kim, Seokhie Hong, Bart Preneel: Related-Key Rectangle Attacks on Reduced AES-192 and AES-256. FSE 2007: 225-241
212EEHongjun Wu, Bart Preneel: Differential-Linear Attacks Against the Stream Cipher Phelix. FSE 2007: 87-100
211EEZhiguo Wan, Robert H. Deng, Feng Bao, Bart Preneel: n PAKE + : A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords. ICICS 2007: 31-43
210EELi Weng, Bart Preneel: Attacking Some Perceptual Image Hash Algorithms. ICME 2007: 879-882
209EENele Mentens, Kazuo Sakiyama, Lejla Batina, Bart Preneel, Ingrid Verbauwhede: A Side-channel Attack Resistant Programmable PKC Coprocessor for Embedded Applications. ICSAMOS 2007: 194-200
208EEGautham Sekar, Souradyuti Paul, Bart Preneel: Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses. INDOCRYPT 2007: 58-72
207EEOrr Dunkelman, Gautham Sekar, Bart Preneel: Improved Meet-in-the-Middle Attacks on Reduced-Round DES. INDOCRYPT 2007: 86-100
206EEGautham Sekar, Souradyuti Paul, Bart Preneel: New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py. ISC 2007: 249-262
205EEGeorge Danezis, Claudia Díaz, Sebastian Faust, Emilia Käsper, Carmela Troncoso, Bart Preneel: Efficient Negative Databases from Cryptographic Hash Functions. ISC 2007: 423-436
204EELejla Batina, Nele Mentens, Kazuo Sakiyama, Bart Preneel, Ingrid Verbauwhede: Public-Key Cryptography on the Top of a Needle. ISCAS 2007: 1831-1834
203EECarmela Troncoso, Claudia Díaz, Orr Dunkelman, Bart Preneel: Traffic Analysis Attacks on a Continuously-Observable Steganographic File System. Information Hiding 2007: 220-236
202EEDave Singelée, Bart Preneel: Key Establishment Using Secure Distance Bounding Protocols. MobiQuitous 2007: 1-6
201EEMarkulf Kohlweiss, Sebastian Faust, Lothar Fritsch, Bartek Gedrojc, Bart Preneel: Efficient Oblivious Augmented Maps: Location-Based Services with a Payment Broker. Privacy Enhancing Technologies 2007: 77-94
200EEBertrand Anckaert, Matias Madou, Bjorn De Sutter, Bruno De Bus, Koen De Bosschere, Bart Preneel: Program obfuscation: a quantitative approach. QoP 2007: 15-20
199EEBrecht Wyseur, Wil Michiels, Paul Gorissen, Bart Preneel: Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings. Selected Areas in Cryptography 2007: 264-277
198EEDanny De Cock, Bart Preneel: Electronic Voting in Belgium: Past and Future. VOTE-ID 2007: 76-87
197EEGautham Sekar, Souradyuti Paul, Bart Preneel: New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B. WEWoRC 2007: 127-141
196EESebastiaan Indesteege, Bart Preneel: Preimages for Reduced-Round Tiger. WEWoRC 2007: 90-99
195EECarmela Troncoso, George Danezis, Eleni Kosta, Bart Preneel: Pripayd: privacy friendly pay-as-you-drive insurance. WPES 2007: 99-107
194EEBart Preneel: A survey of recent developments in cryptographic algorithms for smart cards. Computer Networks 51(9): 2223-2233 (2007)
193EEKazuo Sakiyama, Lejla Batina, Bart Preneel, Ingrid Verbauwhede: HW/SW co-design for public-key cryptosystems on the 8051 micro-controller. Computers & Electrical Engineering 33(5-6): 324-332 (2007)
192EEElke De Mulder, Siddika Berna Örs, Bart Preneel, Ingrid Verbauwhede: Differential power and electromagnetic attacks on a FPGA implementation of elliptic curve cryptosystems. Computers & Electrical Engineering 33(5-6): 367-382 (2007)
191EEKazuo Sakiyama, Lejla Batina, Bart Preneel, Ingrid Verbauwhede: Multicore Curve-Based Cryptoprocessor with Reconfigurable Modular Arithmetic Logic Units over GF(2n). IEEE Trans. Computers 56(9): 1269-1282 (2007)
190EEMichael Backes, Stefanos Gritzalis, Bart Preneel: Preface. Int. J. Inf. Sec. 6(6): 359-360 (2007)
189EEKazuo Sakiyama, Lejla Batina, Bart Preneel, Ingrid Verbauwhede: High-performance Public-key Cryptoprocessor for Wireless Mobile Applications. MONET 12(4): 245-258 (2007)
2006
188 Bart Preneel, Stafford E. Tavares: Selected Areas in Cryptography, 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers Springer 2006
187 Michele Bugliesi, Bart Preneel, Vladimiro Sassone, Ingo Wegener: Automata, Languages and Programming, 33rd International Colloquium, ICALP 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part I Springer 2006
186 Michele Bugliesi, Bart Preneel, Vladimiro Sassone, Ingo Wegener: Automata, Languages and Programming, 33rd International Colloquium, ICALP 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part II Springer 2006
185 Sokratis K. Katsikas, Javier Lopez, Michael Backes, Stefanos Gritzalis, Bart Preneel: Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings Springer 2006
184EEAn Braeken, Joseph Lano, Bart Preneel: Evaluating the Resistance of Stream Ciphers with Linear Feedback Against Fast Algebraic Attacks. ACISP 2006: 40-51
183EEDave Singelée, Bart Preneel: Improved Pairing Protocol for Bluetooth. ADHOC-NOW 2006: 252-265
182EEStefaan Seys, Bart Preneel: ARM: Anonymous Routing Protocol for Mobile Ad hoc Networks. AINA (2) 2006: 133-137
181EENele Mentens, Lejla Batina, Bart Preneel, Ingrid Verbauwhede: Time-Memory Trade-Off Attack on FPGA Platforms: UNIX Password Cracking. ARC 2006: 323-334
180EEKazuo Sakiyama, Nele Mentens, Lejla Batina, Bart Preneel, Ingrid Verbauwhede: Reconfigurable Modular Arithmetic Logic Unit for High-Performance Public-Key Cryptosystems. ARC 2006: 347-357
179EEVentzislav Nikov, Svetla Nikova, Bart Preneel: A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols. ASIACRYPT 2006: 348-363
178EESouradyuti Paul, Bart Preneel: On the (In)security of Stream Ciphers Based on Arrays and Modular Addition. ASIACRYPT 2006: 69-83
177EEKazuo Sakiyama, Lejla Batina, Bart Preneel, Ingrid Verbauwhede: Superscalar Coprocessor for High-Speed Curve-Based Cryptography. CHES 2006: 415-429
176EELejla Batina, Nele Mentens, Kazuo Sakiyama, Bart Preneel, Ingrid Verbauwhede: Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks. ESAS 2006: 6-17
175EEDries Schellekens, Bart Preneel, Ingrid Verbauwhede: FPGA Vendor Agnostic True Random Number Generator. FPL 2006: 1-6
174EENele Mentens, Kazuo Sakiyama, Lejla Batina, Ingrid Verbauwhede, Bart Preneel: Fpga-Oriented Secure Data Path Design: Implementation of a Public Key Coprocessor. FPL 2006: 1-6
173EEHongjun Wu, Bart Preneel: Cryptanalysis of the Stream Cipher DECIM. FSE 2006: 30-40
172EESouradyuti Paul, Bart Preneel, Gautham Sekar: Distinguishing Attacks on the Stream Cipher Py. FSE 2006: 405-421
171EEHongjun Wu, Bart Preneel: Resynchronization Attacks on WG and LEX. FSE 2006: 422-432
170EELi Weng, Karel Wouters, Bart Preneel: Extending the Selective MPEG Encryption Algorithm PVEA. IIH-MSP 2006: 117-120
169EEFlorian Mendel, Bart Preneel, Vincent Rijmen, Hirotaka Yoshida, Dai Watanabe: Update on Tiger. INDOCRYPT 2006: 63-79
168EEKazuo Sakiyama, Bart Preneel, Ingrid Verbauwhede: A fast dual-field modular arithmetic logic unit and its hardware implementation. ISCAS 2006
167EELejla Batina, Nele Mentens, Bart Preneel, Ingrid Verbauwhede: Flexible hardware architectures for curve-based cryptography. ISCAS 2006
166EEJongsung Kim, Alex Biryukov, Bart Preneel, Seokhie Hong: On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract). SCN 2006: 242-256
165EEHelena Handschuh, Bart Preneel: Blind Differential Cryptanalysis for Enhanced Power Attacks. Selected Areas in Cryptography 2006: 163-173
164EEHongjun Wu, Bart Preneel: Cryptanalysis of the Stream Cipher ABC v2. Selected Areas in Cryptography 2006: 56-66
163 Danny De Cock, Christopher Wolf, Bart Preneel: The Belgian Electronic Identity Card (Overview). Sicherheit 2006: 298-301
162 Matias Madou, Bertrand Anckaert, Bruno De Bus, Koen De Bosschere, Jan Cappaert, Bart Preneel: On the Effectiveness of Source Code Transformations for Binary Obfuscation. Software Engineering Research and Practice 2006: 527-533
161EEDave Singelée, Bart Preneel: Location privacy in wireless personal area networks. Workshop on Wireless Security 2006: 11-18
160EEChristopher Wolf, An Braeken, Bart Preneel: On the security of stepwise triangular systems. Des. Codes Cryptography 40(3): 285-302 (2006)
159EEAn Braeken, Yuri L. Borissov, Svetla Nikova, Bart Preneel: Classification of cubic (n-4)-resilient Boolean functions. IEEE Transactions on Information Theory 52(4): 1670-1676 (2006)
2005
158EESouradyuti Paul, Bart Preneel: Solving Systems of Differential Equations of Addition. ACISP 2005: 75-88
157EELejla Batina, Nele Mentens, Bart Preneel, Ingrid Verbauwhede: Side-channel aware design: Algorithms and Architectures for Elliptic Curve Cryptography over GF(2n). ASAP 2005: 350-355
156EELejla Batina, David Hwang, Alireza Hodjat, Bart Preneel, Ingrid Verbauwhede: Hardware/Software Co-design for Hyperelliptic Curve Cryptography (HECC) on the 8051µP. CHES 2005: 106-118
155EEAn Braeken, Christopher Wolf, Bart Preneel: A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes. CT-RSA 2005: 29-43
154EENele Mentens, Lejla Batina, Bart Preneel, Ingrid Verbauwhede: A Systematic Evaluation of Compact Hardware Implementations for the Rijndael S-Box. CT-RSA 2005: 323-333
153EESeokhie Hong, Jongsung Kim, Sangjin Lee, Bart Preneel: Related-Key Rectangle Attacks on Reduced Versions of SHACAL-1 and AES-192. FSE 2005: 368-383
152EEAn Braeken, Yuri L. Borissov, Svetla Nikova, Bart Preneel: Classification of Boolean Functions of 6 Variables or Less with Respect to Some Cryptographic Properties. ICALP 2005: 324-334
151EEStefaan Seys, Bart Preneel: The Wandering Nodes: Key Management for Low-Power Mobile Ad Hoc Networks. ICDCS Workshops 2005: 916-922
150EEJongsung Kim, Alex Biryukov, Bart Preneel, Sangjin Lee: On the Security of Encryption Modes of MD4, MD5 and HAVAL. ICICS 2005: 147-158
149EEAn Braeken, Christopher Wolf, Bart Preneel: Normality of Vectorial Functions. IMA Int. Conf. 2005: 186-200
148EEAn Braeken, Bart Preneel: Probabilistic Algebraic Attacks. IMA Int. Conf. 2005: 290-303
147EEAn Braeken, Bart Preneel: On the Algebraic Immunity of Symmetric Boolean Functions. INDOCRYPT 2005: 35-48
146EESouradyuti Paul, Bart Preneel: Near Optimal Algorithms for Solving Differential Equations of Addition with Batch Queries. INDOCRYPT 2005: 90-103
145EEChristopher Wolf, Bart Preneel: Equivalent Keys in HFE, C*, and Variations. Mycrypt 2005: 33-49
144EEChristopher Wolf, Bart Preneel: Large Superfluous Keys in Multivariate Quadratic Asymmetric Systems. Public Key Cryptography 2005: 275-287
143EEStefaan Seys, Bart Preneel: Efficient Cooperative Signatures: A Novel Authentication Scheme for Sensor Networks. SPC 2005: 86-100
142 Christopher Wolf, Bart Preneel: Applications of Multivariate Quadratic Public Key Systems. Sicherheit 2005: 413-424
141EEBart Preneel: CBC-MAC and Variants. Encyclopedia of Cryptography and Security 2005
140EEBart Preneel: Collision Attack. Encyclopedia of Cryptography and Security 2005
139EEBart Preneel: Collision resistance. Encyclopedia of Cryptography and Security 2005
138EEBart Preneel: Correcting-block attack. Encyclopedia of Cryptography and Security 2005
137EEBart Preneel: Davies-Meyer Hash Function. Encyclopedia of Cryptography and Security 2005
136EEBart Preneel: HMAC. Encyclopedia of Cryptography and Security 2005
135EEBart Preneel: Hash functions. Encyclopedia of Cryptography and Security 2005
134EEBart Preneel: MAC Algorithms. Encyclopedia of Cryptography and Security 2005
133EEBart Preneel: MDC-2 and MDC-4. Encyclopedia of Cryptography and Security 2005
132EEBart Preneel: Maa. Encyclopedia of Cryptography and Security 2005
131EEBart Preneel: Mash Hash Functions (Modular Arithmetic Secure Hash). Encyclopedia of Cryptography and Security 2005
130EEBart Preneel: Modes of Operation of a Block Cipher. Encyclopedia of Cryptography and Security 2005
129EEBart Preneel: NESSIE Project. Encyclopedia of Cryptography and Security 2005
128EEBart Preneel: PMAC. Encyclopedia of Cryptography and Security 2005
127EEBart Preneel: Preimage Resistance. Encyclopedia of Cryptography and Security 2005
126EEBart Preneel: Second preimage resistance. Encyclopedia of Cryptography and Security 2005
125EEBart Preneel: Universal One-Way Hash Functions. Encyclopedia of Cryptography and Security 2005
124EEAlex Biryukov, Joseph Lano, Bart Preneel: Recent attacks on alleged SecurID and their practical implications. Computers & Security 24(5): 364-370 (2005)
123EEYuri L. Borissov, An Braeken, Svetla Nikova, Bart Preneel: On the covering radii of binary Reed-Muller codes in the set of resilient Boolean functions. IEEE Transactions on Information Theory 51(3): 1182-1189 (2005)
122EEMichaël Quisquater, Bart Preneel, Joos Vandewalle: Spectral characterization of cryptographic Boolean functions satisfying the (extended) propagation criterion of degree l and order k. Inf. Process. Lett. 93(1): 25-28 (2005)
2004
121EEJorge Nakahara Jr., Bart Preneel, Joos Vandewalle: The Biryukov-Demirci Attack on Reduced-Round Versions of IDEA and MESH Ciphers. ACISP 2004: 98-109
120EENele Mentens, Siddika Berna Örs, Bart Preneel: An FPGA implementation of an elliptic curve processor GF(2m). ACM Great Lakes Symposium on VLSI 2004: 454-457
119EETaizo Shirai, Bart Preneel: On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds. ASIACRYPT 2004: 1-15
118EEDeukjo Hong, Bart Preneel, Sangjin Lee: Higher Order Universal One-Way Hash Functions. ASIACRYPT 2004: 201-213
117EEFrançois-Xavier Standaert, Siddika Berna Örs, Bart Preneel: Power Analysis of an FPGA: Implementation of Rijndael: Is Pipelining a DPA Countermeasure? CHES 2004: 30-44
116EEDanny De Cock, Karel Wouters, Bart Preneel: Introduction to the Belgian EID Card: BELPIC. EuroPKI 2004: 1-13
115EEFrançois-Xavier Standaert, Siddika Berna Örs, Jean-Jacques Quisquater, Bart Preneel: Power Analysis Attacks Against FPGA Implementations of the DES. FPL 2004: 84-94
114EESouradyuti Paul, Bart Preneel: A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher. FSE 2004: 245-259
113EEVentzislav Nikov, Svetla Nikova, Bart Preneel: Robust Metering Schemes for General Access Structures. ICICS 2004: 53-65
112 An Braeken, Christopher Wolf, Bart Preneel: A Randomised Algorithm for Checking the Normality of Cryptographic Boolean Functions. IFIP TCS 2004: 51-66
111EEAn Braeken, Ventzislav Nikov, Svetla Nikova, Bart Preneel: On Boolean Functions with Generalized Cryptographic Properties. INDOCRYPT 2004: 120-135
110EESiddika Berna Örs, Frank K. Gürkaynak, Elisabeth Oswald, Bart Preneel: Power-Analysis Attack on an ASIC AES implementation. ITCC (2) 2004: 546-552
109EEClaudia Díaz, Bart Preneel: Reasoning About the Anonymity Provided by Pool Mixes That Generate Dummy Traffic. Information Hiding 2004: 309-325
108 Claudia Díaz, Bart Preneel: Taxonomy of Mixes and Dummy Traffic. International Information Security Workshops 2004: 215-230
107EEBart Preneel: ECRYPT: The Cryptographic Research Challenges for the Next Decade. SCN 2004: 1-15
106EEVentzislav Nikov, Svetla Nikova, Bart Preneel: On the Size of Monotone Span Programs. SCN 2004: 249-262
105EEChristopher Wolf, An Braeken, Bart Preneel: Efficient Cryptanalysis of RSE(2)PKC and RSSE(2)PKC. SCN 2004: 294-309
104EEHirotaka Yoshida, Alex Biryukov, Christophe De Cannière, Joseph Lano, Bart Preneel: Non-randomness of the Full 4 and 5-Pass HAVAL. SCN 2004: 324-336
103EEFrederik Armknecht, Joseph Lano, Bart Preneel: Extending the Resynchronization Attack. Selected Areas in Cryptography 2004: 19-38
102 Nele Mentens, Siddika Berna Örs, Bart Preneel, Joos Vandewalle: An FPGA Implementation of a Montgomery Multiplier Over GF(2^m). Computers and Artificial Intelligence 23(5): (2004)
101EEDai Watanabe, Soichi Furuya, Hirotaka Yoshida, Kazuo Takaragi, Bart Preneel: A New Keystream Generator MUGI. IEICE Transactions 87-A(1): 37-45 (2004)
2003
100EEVentzislav Nikov, Svetla Nikova, Bart Preneel: Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case. ACNS 2003: 1-15
99EESiddika Berna Örs, Lejla Batina, Bart Preneel, Joos Vandewalle: Hardware Implementation of an Elliptic Curve Processor over GF(p). ASAP 2003: 433-443
98EEBart Van Rompay, Alex Biryukov, Bart Preneel, Joos Vandewalle: Cryptanalysis of 3-Pass HAVAL. ASIACRYPT 2003: 228-245
97EESiddika Berna Örs, Elisabeth Oswald, Bart Preneel: Power-Analysis Attacks on an FPGA - First Experimental Results. CHES 2003: 35-50
96EEAlex Biryukov, Christophe De Cannière, An Braeken, Bart Preneel: A Toolbox for Cryptanalysis: Linear and Affine Equivalence Algorithms. EUROCRYPT 2003: 33-50
95EESteve Babbage, Christophe De Cannière, Joseph Lano, Bart Preneel, Joos Vandewalle: Cryptanalysis of SOBER-t32. FSE 2003: 111-128
94EEDowon Hong, Ju-Sung Kang, Bart Preneel, Heuisu Ryu: A Concrete Security Analysis for 3GPP-MAC. FSE 2003: 154-169
93EEYuri L. Borissov, An Braeken, Svetla Nikova, Bart Preneel: On the Covering Radius of Second Order Binary Reed-Muller Code in the Set of Resilient Boolean Functions. IMA Int. Conf. 2003: 82-92
92EEVentzislav Nikov, Svetla Nikova, Bart Preneel: On Multiplicative Linear Secret Sharing Schemes. INDOCRYPT 2003: 135-147
91EESouradyuti Paul, Bart Preneel: Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator. INDOCRYPT 2003: 52-67
90EESiddika Berna Örs, Lejla Batina, Bart Preneel, Joos Vandewalle: Hardware Implementation of a Montgomery Modular Multiplier in a Systolic Array. IPDPS 2003: 184
89EEJorge Nakahara Jr., Bart Preneel, Joos Vandewalle: A Note on Weak Keys of PES, IDEA, and Some Extended Variants. ISC 2003: 267-279
88EEAlex Biryukov, Joseph Lano, Bart Preneel: Cryptanalysis of the Alleged SecurID Hash Function. Selected Areas in Cryptography 2003: 130-144
87EEJorge Nakahara Jr., Vincent Rijmen, Bart Preneel, Joos Vandewalle: The MESH Block Ciphers. WISA 2003: 458-473
86EEJoris Claessens, Bart Preneel, Joos Vandewalle: (How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions. ACM Trans. Internet Techn. 3(1): 28-48 (2003)
85EEJohn Iliadis, Stefanos Gritzalis, Diomidis Spinellis, Danny De Cock, Bart Preneel, Dimitris Gritzalis: Towards a framework for evaluating certificate status information mechanisms. Computer Communications 26(16): 1839-1850 (2003)
84 Claudia Díaz, Joris Claessens, Bart Preneel: APES - Anonymity and Privacy in Electronic Services. Datenschutz und Datensicherheit 27(3): (2003)
83 Michaël Quisquater, Bart Preneel, Joos Vandewalle: A new inequality in discrete Fourier theory. IEEE Transactions on Information Theory 49(8): 2038-2040 (2003)
82EELejla Batina, Siddika Berna Örs, Bart Preneel, Joos Vandewalle: Hardware architectures for public key cryptography. Integration 34(1-2): 1-64 (2003)
2002
81 Bart Preneel: Topics in Cryptology - CT-RSA 2002, The Cryptographer's Track at the RSA Conference, 2002, San Jose, CA, USA, February 18-22, 2002, Proceedings Springer 2002
80EEBart Preneel: Cryptographic Challenges: The Past and the Future. FASec 2002: 167-182
79EEDai Watanabe, Soichi Furuya, Hirotaka Yoshida, Kazuo Takaragi, Bart Preneel: A New Keystream Generator MUGI. FSE 2002: 179-194
78EEAlex Biryukov, Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle: New Weak-Key Classes of IDEA. ICICS 2002: 315-326
77EEVentzislav Nikov, Svetla Nikova, Bart Preneel, Joos Vandewalle: On Unconditionally Secure Distributed Oblivious Transfer. INDOCRYPT 2002: 395-408
76EEVentzislav Nikov, Svetla Nikova, Bart Preneel, Joos Vandewalle: On Distributed Key Distribution Centers and Unconditionally Secure Proactive Verifiable Secret Sharing Schemes Based on General Access Structure. INDOCRYPT 2002: 422-436
75EEClaudia Díaz, Stefaan Seys, Joris Claessens, Bart Preneel: Towards Measuring Anonymity. Privacy Enhancing Technologies 2002: 54-68
74EEMichaël Quisquater, Bart Preneel, Joos Vandewalle: On the Security of the Threshold Scheme Based on the Chinese Remainder Theorem. Public Key Cryptography 2002: 199-210
73EEBart Preneel: New European Schemes for Signature, Integrity and Encryption (NESSIE): A Status Report. Public Key Cryptography 2002: 297-309
72EEYuri L. Borissov, Svetla Nikova, Bart Preneel, Joos Vandewalle: On a Resynchronization Weakness in a Class of Combiners with Memory. SCN 2002: 164-173
71EEKarel Wouters, Bart Preneel, Ana Isabel González-Tablas Ferreres, Arturo Ribagorda: Towards an XML format for time-stamps. XML Security 2002: 61-70
70 Joris Claessens, Valentin Dem, Danny De Cock, Bart Preneel, Joos Vandewalle: On the Security of Today's Online Electronic Banking Systems. Computers & Security 21(3): 253-265 (2002)
69EEJoris Claessens, Bart Preneel, Joos Vandewalle: A Tangled World Wide Web of Security Issues. First Monday 7(3): (2002)
68 Lars R. Knudsen, Bart Preneel: Construction of secure and fast hash functions using nonbinary error-correcting codes. IEEE Transactions on Information Theory 48(9): 2524-2539 (2002)
67 Joris Claessens, Bart Preneel, Joos Vandewalle: Combining World Wide Web and wireless security. Informatica (Slovenia) 26(2): (2002)
2001
66 T. Herlea, Joris Claessens, Danny De Cock, Bart Preneel, Joos Vandewalle: Secure Meeting Scheduling with agenTA. Communications and Multimedia Security 2001
65EEJoris Claessens, Bart Preneel, Joos Vandewalle: Secure Communication for Secure Agent-Based Electronic Commerce Applications. E-Commerce Agents 2001: 180-190
64EEFrederik Vercauteren, Bart Preneel, Joos Vandewalle: A Memory Efficient Version of Satoh's Algorithm. EUROCRYPT 2001: 1-13
63EEPaulo S. L. M. Barreto, Vincent Rijmen, Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle, Hae Yong Kim: Improved SQUARE Attacks against Reduced-Round HIEROCRYPT. FSE 2001: 165-173
62EEBart Preneel: NESSIE: A European Approach to Evaluate Cryptographic Algorithms. FSE 2001: 267-276
61EEVincent Rijmen, Bart Van Rompay, Bart Preneel, Joos Vandewalle: Producing Collisions for PANAMA. FSE 2001: 37-51
60 Joris Claessens, Bart Preneel, Joos Vandewalle: Combining World Wide Web and Wireless Security. Network Security 2001: 153-172
59 T. Herlea, Joris Claessens, Bart Preneel, Gregory Neven, Frank Piessens, Bart De Decker: On Securely Scheduling a Meeting. SEC 2001: 183-198
58EEBert den Boer, Bart Van Rompay, Bart Preneel, Joos Vandewalle: New (Two-Track-)MAC Based on the Two Trails of RIPEMD. Selected Areas in Cryptography 2001: 314-324
57EEJohan Borst, Bart Preneel, Vincent Rijmen: Cryptography on smart cards. Computer Networks 36(4): 423-435 (2001)
2000
56 Bart Preneel: Advances in Cryptology - EUROCRYPT 2000, International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000, Proceeding Springer 2000
55EEJohn Iliadis, Diomidis Spinellis, Dimitris Gritzalis, Bart Preneel, Sokratis K. Katsikas: Evaluating certificate status information mechanisms. ACM Conference on Computer and Communications Security 2000: 1-8
54EEJorge Nakahara Jr., Bart Preneel, Joos Vandewalle: Linear Cryptanalysis of Reduced-Round Versions of the SAFER Block Cipher Family. FSE 2000: 244-261
53 Günther Horn, Bart Preneel: Authentication and Payment in Future Mobile Systems. Journal of Computer Security 8(2/3): (2000)
1999
52 Bart Preneel: Secure Information Networks: Communications and Multimedia Security, IFIP TC6/TC11 Joint Working Conference on Communications and Multimedia Security (CMS '99), September 20-21, 1999, Leuven, Belgium Kluwer 1999
51 Carl D'Halluin, Gert Bijnens, Bart Preneel, Vincent Rijmen: Equivalent Keys of HPC. ASIACRYPT 1999: 29-42
50EEWim Nevelsteen, Bart Preneel: Software Performance of Universal Hash Functions. EUROCRYPT 1999: 24-41
49EEJohan Borst, Bart Preneel, Joos Vandewalle: Linear Cryptanalysis of RC5 and RC6. FSE 1999: 16-30
48EEHelena Handschuh, Bart Preneel: On the Security of Double and 2-Key Triple Modes of Operation. FSE 1999: 215-230
47EECarl D'Halluin, Gert Bijnens, Vincent Rijmen, Bart Preneel: Attack on Six Rounds of Crypton. FSE 1999: 46-59
46EEBart Preneel: State-of-the-art ciphers for commercial applications. Computers & Security 18(1): 67-74 (1999)
45 Bart Preneel, Paul C. van Oorschot: On the Security of Iterated Message Authentication Codes. IEEE Transactions on Information Theory 45(1): 188-199 (1999)
44EEMárton Csapodi, Joos Vandewalle, Bart Preneel: CNN Algorithms for Video Authentication and Copyright Protection. VLSI Signal Processing 23(2-3): 449-463 (1999)
1998
43 Bart Preneel, Vincent Rijmen: State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997. Revised Lectures Springer 1998
42EEErik De Win, Serge Mister, Bart Preneel, Michael J. Wiener: On the Performance of Signature Schemes Based on Elliptic Curves. ANTS 1998: 252-266
41EELars R. Knudsen, Willi Meier, Bart Preneel, Vincent Rijmen, Sven Verdoolaege: Analysis Methods for (Alleged) RC4. ASIACRYPT 1998: 327-341
40EEGünther Horn, Bart Preneel: Authentication and Payment in Future Mobile Systems. ESORICS 1998: 277-293
39EEKeith M. Martin, Bart Preneel, Chris J. Mitchell, Hans-Joachim Hitz, Günther Horn, A. Poliakova, P. Howard: Secure Billing for Mobile Information Services in UMTS. IS&N 1998: 535-548
38EEBart Preneel: The State of Cryptographic Hash Functions. Lectures on Data Security 1998: 158-182
37EEBart Preneel: An Introduction to Cryptology. SOFSEM 1998: 204-221
36EEJoris Claessens, Mark Vandenwauver, Bart Preneel, Joos Vandewalle: Setting up a Secure Web Server and Clients on an Intranet. WETICE 1998: 295-300
35EELars R. Knudsen, Xuejia Lai, Bart Preneel: Attacks on Fast Double Block Length Hash Functions. J. Cryptology 11(1): 59-72 (1998)
1997
34EELars R. Knudsen, Bart Preneel: Fast and Secure Hashing Based on Codes. CRYPTO 1997: 485-498
33EEVincent Rijmen, Bart Preneel: A Family of Trapdoor Ciphers. FSE 1997: 139-148
32 Bart Preneel: Hash Functions and MAC Algorithms Based on Block Ciphers. IMA Int. Conf. 1997: 270-282
31 Bart Preneel: Cryptanalysis of Message Authentication Codes. ISW 1997: 55-65
30EEBart Preneel, Vincent Rijmen, Antoon Bosselaers: Recent Developments in the Design of Conventional Cryptographic Algorithms. State of the Art in Applied Cryptography 1997: 105-130
29EEErik De Win, Bart Preneel: Elliptic Curve Public-Key Cryptosystems - An Introduction. State of the Art in Applied Cryptography 1997: 131-141
28EEBart Preneel: Cryptographic Primitives for Information Authentication - State of the Art. State of the Art in Applied Cryptography 1997: 49-104
27 Vincent Rijmen, Bart Preneel, Erik De Win: On Weaknesses of Non-surjective Round Functions. Des. Codes Cryptography 12(3): 253-266 (1997)
1996
26 Lars R. Knudsen, Bart Preneel: Hash Functions Based on Block Ciphers and Quaternary Codes. ASIACRYPT 1996: 77-90
25EEBart Preneel, Paul C. van Oorschot: On the Security of Two MAC Algorithms. EUROCRYPT 1996: 19-32
24 Hans Dobbertin, Antoon Bosselaers, Bart Preneel: RIPEMD-160: A Strengthened Version of RIPEMD. FSE 1996: 71-82
23 Vincent Rijmen, Joan Daemen, Bart Preneel, Antoon Bosselaers, Erik De Win: The Cipher SHARK. FSE 1996: 99-111
22 Ross J. Anderson, Serge Vaudenay, Bart Preneel, Kaisa Nyberg: The Newton Channel. Information Hiding 1996: 151-156
1995
21 Antoon Bosselaers, Bart Preneel: Integrity Primitives for Secure Information Systems, Final Report of RACE Integrity Primitives Evaluation RIPE-RACE 1040 Springer 1995
20 Bart Preneel: Fast Software Encryption: Second International Workshop. Leuven, Belgium, 14-16 December 1994, Proceedings Springer 1995
19EEBart Preneel, Paul C. van Oorschot: MDx-MAC and Building Fast MACs from Hash Functions. CRYPTO 1995: 1-14
1994
18 Bart Preneel: FSE'94 - Introduction. FSE 1994: 1-5
17 Vincent Rijmen, Bart Preneel: Improved Characteristics for Differential Cryptanalysis of Hash Functions Based on Block Ciphers. FSE 1994: 242-248
16 Vincent Rijmen, Bart Preneel: Cryptanalysis of McGuffin. FSE 1994: 353-358
1993
15 Bart Preneel, René Govaerts, Joos Vandewalle: Computer Security and Industrial Cryptography - State of the Art and Evolution, ESAT Course, Leuven, Belgium, May 21-23, 1991 Springer 1993
14EEBart Preneel, René Govaerts, Joos Vandewalle: Differential Cryptanalysis of Hash Functions Based on Block Ciphers. ACM Conference on Computer and Communications Security 1993: 183-188
13EEBart Preneel, Marnix Nuttin, Vincent Rijmen, Johan Buelens: Cryptanalysis of the CFB Mode of the DES with a Reduced Number of Rounds. CRYPTO 1993: 212-223
12EEBart Preneel, René Govaerts, Joos Vandewalle: Hash Functions Based on Block Ciphers: A Synthetic Approach. CRYPTO 1993: 368-378
11 Bart Preneel: Design Principles for Dedicated Hash Functions. FSE 1993: 71-82
1992
10 Bart Preneel, René Govaerts, Joos Vandewalle: On the Power of Memory in the Design of Collision Resistant Hash Functions. AUSCRYPT 1992: 105-121
9 Bart Preneel, René Govaerts, Joos Vandewalle: An Attack on Two Hash Functions by Zheng-Matsumoto-Imai. AUSCRYPT 1992: 535-538
1991
8 Bart Preneel: Standardization of Cryptographic Techniques. Computer Security and Industrial Cryptography 1991: 162-173
7 Joos Vandewalle, René Govaerts, Bart Preneel: Technical Approaches to Thwart Computer Fraud. Computer Security and Industrial Cryptography 1991: 20-30
6 Bart Preneel, René Govaerts, Joos Vandewalle: Information Authentication: Hash Functions and Digital Signatures. Computer Security and Industrial Cryptography 1991: 87-131
5EEBart Preneel, René Govaerts, Joos Vandewalle: Boolean Functions Satisfying Higher Order Propagation Criteria. EUROCRYPT 1991: 141-152
4EEBart Preneel, David Chaum, Walter Fumy, Cees J. A. Jansen, Peter Landrock, Gert Roelofsen: Race Integrity Primitives Evaluation (RIPE): A Status Report. EUROCRYPT 1991: 547-551
1990
3EEBart Preneel, Werner Van Leekwijck, Luc Van Linden, René Govaerts, Joos Vandewalle: Propagation Characteristics of Boolean Functions. EUROCRYPT 1990: 161-173
2EEBart Preneel, Antoon Bosselaers, René Govaerts, Joos Vandewalle: Cryptanalysis of a fast cryptographic checksum algorithm. Computers & Security 9(3): 257-262 (1990)
1989
1EEBart Preneel, Antoon Bosselaers, René Govaerts, Joos Vandewalle: A Chosen Text Attack on The Modified Cryptographic Checksum Algorithm of Cohen and Huang. CRYPTO 1989: 154-163

Coauthor Index

1Bertrand Anckaert [162] [200] [233]
2Ross J. Anderson [22]
3Elena Andreeva [218]
4Frederik Armknecht [103]
5Steve Babbage [95]
6Michael Backes [185] [190]
7Feng Bao [211]
8Paulo S. L. M. Barreto [63]
9Lejla Batina [82] [90] [99] [154] [156] [157] [167] [174] [176] [177] [180] [181] [189] [191] [193] [204] [209] [224] [240]
10Alberto Bertoni [244] [245]
11Mária Bieliková [244] [245]
12Eli Biham [237]
13Gert Bijnens [47] [51]
14Alex Biryukov [78] [88] [96] [98] [104] [124] [150] [166]
15Chris Blondia [243]
16Bert den Boer [58]
17Yuri L. Borissov [72] [93] [123] [152] [159]
18Johan Borst [49] [57]
19Koen De Bosschere (Koenraad De Bosschere) [162] [200] [233]
20Antoon Bosselaers [1] [2] [21] [23] [24] [30]
21An Braeken [93] [96] [105] [111] [112] [123] [147] [148] [149] [152] [155] [159] [160] [184]
22Bart Braem [243]
23Johan Buelens [13]
24Michele Bugliesi [186] [187]
25Bruno De Bus [162] [200]
26Christophe De Cannière [95] [96] [104] [242]
27Jan Cappaert [162] [233]
28David Chaum [4]
29Liqun Chen [222]
30Joris Claessens [36] [59] [60] [65] [66] [67] [69] [70] [75] [84] [86]
31Peter De Cleyn [243]
32Danny De Cock [66] [70] [85] [116] [163] [198] [229]
33Márton Csapodi [44]
34Carl D'Halluin [47] [51]
35Joan Daemen [23]
36George Danezis [195] [205] [224]
37Ed Dawson [222]
38Bart De Decker [59]
39Valentin Dem [70]
40Mina Deng [234] [236]
41Robert H. Deng (Robert Huijie Deng) [211]
42Claudia Díaz [75] [84] [108] [109] [203] [205] [225] [238]
43Hans Dobbertin [24]
44Orr Dunkelman [203] [207] [237]
45Sebastian Faust [201] [205]
46Ana Isabel González-Tablas Ferreres [71]
47Lothar Fritsch [201]
48Walter Fumy [4]
49Soichi Furuya [79] [101]
50Bartek Gedrojc [201]
51Viliam Geffert [244] [245]
52Benedikt Gierlichs [225] [230] [240]
53Paul Gorissen [199]
54René Govaerts [1] [2] [3] [5] [6] [7] [9] [10] [12] [14] [15]
55Dimitris Gritzalis [55] [85]
56Stefanos Gritzalis [85] [185] [190]
57Ming Gu [246]
58Frank K. Gürkaynak [110]
59Helena Handschuh [48] [165] [239]
60T. Herlea [59] [66]
61Hans-Joachim Hitz [39]
62Alireza Hodjat [156]
63Deukjo Hong [118]
64Dowon Hong [94]
65Seokhie Hong [153] [166] [213]
66Günther Horn [39] [40] [53]
67P. Howard [39]
68David Hwang [156]
69John Iliadis [55] [85]
70Sebastiaan Indesteege [196] [235] [237]
71Cees J. A. Jansen [4]
72Ju-Sung Kang [94]
73Juhani Karhumäki [244] [245]
74Emilia Käsper [205]
75Sokratis K. Katsikas [55] [185]
76Nathan Keller [237]
77Hae Yong Kim [63]
78Jongsung Kim [150] [153] [166] [213]
79Jun Kitahara [217]
80Lars R. Knudsen [26] [34] [35] [41] [68]
81Markulf Kohlweiss [201]
82Eleni Kosta [195]
83Özgül Küçük [217] [242]
84Xuejia Lai [35] [222]
85Peter Landrock [4]
86Joseph Lano [88] [95] [103] [104] [124] [184] [216]
87Danny Lathouwers [241]
88Benoît Latré [243]
89Sangjin Lee [118] [150] [153]
90Werner Van Leekwijck [3]
91Luc Van Linden [3]
92Javier Lopez [185]
93Wenjing Lou [227]
94Matias Madou [162] [200] [233]
95Masahiro Mambo [222]
96Keith M. Martin [39]
97Willi Meier [41]
98Florian Mendel [169] [216]
99Nele Mentens [102] [120] [154] [157] [167] [174] [176] [180] [181] [204] [209] [219]
100Wil Michiels [199]
101Serge Mister [42]
102Chris J. Mitchell [39]
103Atsuko Miyaji [222]
104Ingrid Moerman [243]
105Yi Mu [222]
106Elke De Mulder [192] [220]
107Yoni De Mulder [224]
108Jorge Nakahara Jr. [54] [63] [78] [87] [89] [121]
109Pavol Návrat [244] [245]
110Wim Nevelsteen [50]
111Gregory Neven [59] [218]
112Ventzislav Nikov [76] [77] [92] [100] [106] [111] [113] [179]
113Svetla Nikova [72] [76] [77] [92] [93] [100] [106] [111] [113] [123] [152] [159] [179]
114Marnix Nuttin [13]
115Kaisa Nyberg [22]
116Katsuyuki Okeya [217]
117Paul C. van Oorschot [19] [25] [45]
118Siddika Berna Örs [82] [90] [97] [99] [102] [110] [115] [117] [120] [192]
119Elisabeth Oswald [97] [110]
120Jong Hyuk Park [231]
121Souradyuti Paul [91] [114] [146] [158] [172] [178] [197] [206] [208]
122Michael Peeters [243]
123Frank Piessens [59]
124David Pointcheval [222]
125A. Poliakova [39]
126Jean-Jacques Quisquater [115]
127Michaël Quisquater [74] [83] [122]
128Kui Ren [226] [227] [246]
129Arturo Ribagorda (Arturo Ribagorda Garnacho) [71]
130Vincent Rijmen [13] [16] [17] [23] [27] [30] [33] [41] [43] [47] [51] [57] [61] [63] [87] [169]
131Gert Roelofsen [4]
132Bart Van Rompay [58] [61] [98]
133Heuisu Ryu [94]
134Kazuo Sakiyama [168] [174] [176] [177] [180] [189] [191] [193] [204] [209] [219] [220]
135Ravi S. Sandhu [231]
136Vladimiro Sassone [186] [187]
137Dries Schellekens [175] [221] [223] [228]
138Gautham Sekar [172] [197] [206] [207] [208]
139Stefaan Seys [75] [143] [151] [182]
140Taizo Shirai [119]
141Thomas Shrimpton [218]
142Koen Simoens [241]
143Dave Singelée [161] [183] [202] [215] [243]
144Nigel P. Smart [222]
145Marijke De Soete [243]
146Diomidis Spinellis [55] [85]
147François-Xavier Standaert [115] [117]
148Willy Susilo [222]
149Bjorn De Sutter [200]
150Kazuo Takaragi [79] [101]
151Stafford E. Tavares [188]
152Carmela Troncoso [195] [203] [205] [225] [229] [230] [238]
153Pim Tuyls [228] [240]
154Mark Vandenwauver [36]
155Joos Vandewalle [1] [2] [3] [5] [6] [7] [9] [10] [12] [14] [15] [36] [44] [49] [54] [58] [60] [61] [63] [64] [65] [66] [67] [69] [70] [72] [74] [76] [77] [78] [82] [83] [86] [87] [89] [90] [95] [98] [99] [102] [121] [122]
156Serge Vaudenay [22]
157Ingrid Verbauwhede [154] [156] [157] [167] [168] [174] [175] [176] [177] [180] [181] [189] [191] [192] [193] [204] [209] [219] [220] [225] [230]
158Frederik Vercauteren [64]
159Sven Verdoolaege [41]
160Zhiguo Wan [211] [226] [227] [246]
161Huaxiong Wang [222]
162Dai Watanabe [79] [101] [169] [217]
163Ingo Wegener [186] [187]
164Li Weng [170] [210]
165Michael J. Wiener [42]
166Erik De Win [23] [27] [29] [42]
167Christopher Wolf [105] [112] [142] [144] [145] [149] [155] [160] [163]
168Duncan S. Wong [222]
169Karel Wouters [71] [116] [170] [241]
170Hongjun Wu [164] [171] [173] [212] [214] [217]
171Brecht Wyseur [199] [221] [223]
172Hirotaka Yoshida [79] [101] [104] [169] [217]
173Bo Zhu [246]
174André Zúquete (Andre Zuquete) [231]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)