default search action
BibTeX records: Bart Preneel
@article{DBLP:journals/tches/SchildAP24, author = {Leonard Schild and Aysajan Abidin and Bart Preneel}, title = {Fast Transciphering Via Batched And Reconfigurable {LUT} Evaluation}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {4}, pages = {205--230}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i4.205-230}, doi = {10.46586/TCHES.V2024.I4.205-230}, timestamp = {Thu, 19 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/SchildAP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/PohleAP24, author = {Erik Pohle and Aysajan Abidin and Bart Preneel}, title = {Fast Evaluation of S-Boxes With Garbled Circuits}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {5530--5544}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3402145}, doi = {10.1109/TIFS.2024.3402145}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/PohleAP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/WuFPWW24, author = {Lixuan Wu and Yanhong Fan and Bart Preneel and Weijia Wang and Meiqin Wang}, editor = {Martin Andreoni}, title = {Automated Generation of Masked Nonlinear Components: - From Lookup Tables to Private Circuits}, booktitle = {Applied Cryptography and Network Security Workshops - {ACNS} 2024 Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14586}, pages = {319--339}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-61486-6\_19}, doi = {10.1007/978-3-031-61486-6\_19}, timestamp = {Wed, 10 Jul 2024 20:46:37 +0200}, biburl = {https://dblp.org/rec/conf/acns/WuFPWW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/BhatiD00P24, author = {Amit Singh Bhati and Antonin Dufka and Elena Andreeva and Arnab Roy and Bart Preneel}, editor = {Jianying Zhou and Tony Q. S. Quek and Debin Gao and Alvaro A. C{\'{a}}rdenas}, title = {Skye: An Expanding {PRF} based Fast {KDF} and its Applications}, booktitle = {Proceedings of the 19th {ACM} Asia Conference on Computer and Communications Security, {ASIA} {CCS} 2024, Singapore, July 1-5, 2024}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3634737.3637673}, doi = {10.1145/3634737.3637673}, timestamp = {Fri, 16 Aug 2024 09:08:03 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/BhatiD00P24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/Preneel24, author = {Bart Preneel}, editor = {Jo{\~{a}}o P. Vilela and Haya Schulmann and Ninghui Li}, title = {The Encryption Debate: An Enduring Struggle}, booktitle = {Proceedings of the Fourteenth {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2024, Porto, Portugal, June 19-21, 2024}, pages = {1--3}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3626232.3655998}, doi = {10.1145/3626232.3655998}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/Preneel24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vnc/YoshizawaBP24, author = {Takahito Yoshizawa and An Braeken and Bart Preneel}, title = {Toward Viable Security Solution for VRUs in {V2X} Communication}, booktitle = {{IEEE} Vehicular Networking Conference, {VNC} 2024, Kobe, Japan, May 29-31, 2024}, pages = {33--40}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/VNC61989.2024.10576015}, doi = {10.1109/VNC61989.2024.10576015}, timestamp = {Wed, 17 Jul 2024 16:01:33 +0200}, biburl = {https://dblp.org/rec/conf/vnc/YoshizawaBP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vnc/YoshizawaAHUSP24, author = {Takahito Yoshizawa and Alireza Aghabagherloo and {\'{A}}rp{\'{a}}d Husz{\'{a}}k and Csongor Ujv{\'{a}}rosi and Dave Singel{\'{e}}e and Bart Preneel}, title = {Security-Focused Training Model of Reinforcement Learning in Autonomous Vehicles}, booktitle = {{IEEE} Vehicular Networking Conference, {VNC} 2024, Kobe, Japan, May 29-31, 2024}, pages = {215--218}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/VNC61989.2024.10575985}, doi = {10.1109/VNC61989.2024.10575985}, timestamp = {Wed, 17 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vnc/YoshizawaAHUSP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2405-20713, author = {Erik Pohle and Aysajan Abidin and Bart Preneel}, title = {Fast Evaluation of S-boxes with Garbled Circuits}, journal = {CoRR}, volume = {abs/2405.20713}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2405.20713}, doi = {10.48550/ARXIV.2405.20713}, eprinttype = {arXiv}, eprint = {2405.20713}, timestamp = {Mon, 24 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2405-20713.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2406-11326, author = {Ilja Siros and Dave Singel{\'{e}}e and Bart Preneel}, title = {GitHub Copilot: the perfect Code compLeeter?}, journal = {CoRR}, volume = {abs/2406.11326}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2406.11326}, doi = {10.48550/ARXIV.2406.11326}, eprinttype = {arXiv}, eprint = {2406.11326}, timestamp = {Thu, 18 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2406-11326.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2407-19479, author = {Roozbeh Sarenche and Ertem Nusret Tas and Barnab{\'{e}} Monnot and Caspar Schwarz{-}Schilling and Bart Preneel}, title = {Breaking the Balance of Power: Commitment Attacks on Ethereum's Reward Mechanism}, journal = {CoRR}, volume = {abs/2407.19479}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2407.19479}, doi = {10.48550/ARXIV.2407.19479}, eprinttype = {arXiv}, eprint = {2407.19479}, timestamp = {Wed, 21 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2407-19479.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SarencheZNP24, author = {Roozbeh Sarenche and Ren Zhang and Svetla Nikova and Bart Preneel}, title = {Time-Averaged Analysis of Selfish Mining in Bitcoin}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {363}, year = {2024}, url = {https://eprint.iacr.org/2024/363}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/SarencheZNP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SarencheNP24, author = {Roozbeh Sarenche and Svetla Nikova and Bart Preneel}, title = {Deep Selfish Proposing in Longest-Chain Proof-of-Stake Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {622}, year = {2024}, url = {https://eprint.iacr.org/2024/622}, timestamp = {Wed, 29 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SarencheNP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZbudilaPAP24, author = {Martin Zbudila and Erik Pohle and Aysajan Abidin and Bart Preneel}, title = {MaSTer: Maliciously Secure Truncation for Replicated Secret Sharing without Pre-Processing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1026}, year = {2024}, url = {https://eprint.iacr.org/2024/1026}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZbudilaPAP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/YoshizawaSMDTHP23, author = {Takahito Yoshizawa and Dave Singel{\'{e}}e and Jan Tobias M{\"{u}}hlberg and St{\'{e}}phane Delbruel and Amir Taherkordi and Danny Hughes and Bart Preneel}, title = {A Survey of Security and Privacy Issues in {V2X} Communication Systems}, journal = {{ACM} Comput. Surv.}, volume = {55}, number = {9}, pages = {185:1--185:36}, year = {2023}, url = {https://doi.org/10.1145/3558052}, doi = {10.1145/3558052}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/YoshizawaSMDTHP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WangNLLPW23, author = {Jinliang Wang and Chao Niu and Qun Liu and Muzhou Li and Bart Preneel and Meiqin Wang}, editor = {Leonie Simpson and Mir Ali Rezazadeh Baee}, title = {Cryptanalysis of {SPEEDY}}, booktitle = {Information Security and Privacy - 28th Australasian Conference, {ACISP} 2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13915}, pages = {124--156}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-35486-1\_7}, doi = {10.1007/978-3-031-35486-1\_7}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WangNLLPW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MadhusudanSTCP23, author = {Akash Madhusudan and Mahdi Sedaghat and Samarth Tiwari and Kelong Cong and Bart Preneel}, editor = {Leonie Simpson and Mir Ali Rezazadeh Baee}, title = {Reusable, Instant and Private Payment Guarantees for Cryptocurrencies}, booktitle = {Information Security and Privacy - 28th Australasian Conference, {ACISP} 2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13915}, pages = {580--605}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-35486-1\_25}, doi = {10.1007/978-3-031-35486-1\_25}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MadhusudanSTCP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/LiuPZW23, author = {Qun Liu and Bart Preneel and Zheng Zhao and Meiqin Wang}, editor = {Jian Guo and Ron Steinfeld}, title = {Improved Quantum Circuits for {AES:} Reducing the Depth and the Number of Qubits}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14440}, pages = {67--98}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8727-6\_3}, doi = {10.1007/978-981-99-8727-6\_3}, timestamp = {Sun, 07 Jan 2024 14:24:24 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/LiuPZW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/CritesKPSS23, author = {Elizabeth C. Crites and Markulf Kohlweiss and Bart Preneel and Mahdi Sedaghat and Daniel Slamanig}, editor = {Jian Guo and Ron Steinfeld}, title = {Threshold Structure-Preserving Signatures}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14439}, pages = {348--382}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8724-5\_11}, doi = {10.1007/978-981-99-8724-5\_11}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/CritesKPSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BhatiPA0P23, author = {Amit Singh Bhati and Erik Pohle and Aysajan Abidin and Elena Andreeva and Bart Preneel}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {Let's Go Eevee! {A} Friendly and Suitable Family of {AEAD} Modes for IoT-to-Cloud Secure Computation}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {2546--2560}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3623091}, doi = {10.1145/3576915.3623091}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BhatiPA0P23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cf/HellemansRPM23, author = {Wouter Hellemans and Md Masoom Rabbani and Bart Preneel and Nele Mentens}, editor = {Andrea Bartolini and Kristian F. D. Rietveld and Catherine D. Schuman and Jose Moreira}, title = {Yes we CAN!: Towards bringing security to legacy-restricted Controller Area Networks. {A} review}, booktitle = {Proceedings of the 20th {ACM} International Conference on Computing Frontiers, {CF} 2023, Bologna, Italy, May 9-11, 2023}, pages = {352--357}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3587135.3592818}, doi = {10.1145/3587135.3592818}, timestamp = {Sat, 30 Sep 2023 09:36:30 +0200}, biburl = {https://dblp.org/rec/conf/cf/HellemansRPM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/DuttaguptaMSP23, author = {Sayon Duttagupta and Eduard Marin and Dave Singel{\'{e}}e and Bart Preneel}, editor = {Mohamed Shehab and Maribel Fern{\'{a}}ndez and Ninghui Li}, title = {{HAT:} Secure and Practical Key Establishment for Implantable Medical Devices}, booktitle = {Proceedings of the Thirteenth {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2023, Charlotte, NC, USA, April 24-26, 2023}, pages = {213--224}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3577923.3583646}, doi = {10.1145/3577923.3583646}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/DuttaguptaMSP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscn/YoshizawaP23, author = {Takahito Yoshizawa and Bart Preneel}, title = {Open Questions in {VRU} Standards from Security and Privacy Perspectives}, booktitle = {{IEEE} Conference on Standards for Communications and Networking, {CSCN} 2023, Munich, Germany, November 6-8, 2023}, pages = {284--289}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CSCN60443.2023.10453165}, doi = {10.1109/CSCN60443.2023.10453165}, timestamp = {Wed, 13 Mar 2024 13:47:04 +0100}, biburl = {https://dblp.org/rec/conf/cscn/YoshizawaP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AbidinPP23, author = {Aysajan Abidin and Erik Pohle and Bart Preneel}, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {Arithmetic Circuit Implementations of S-boxes for {SKINNY} and {PHOTON} in {MPC}}, booktitle = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14344}, pages = {86--105}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-50594-2\_5}, doi = {10.1007/978-3-031-50594-2\_5}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/AbidinPP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/AghabagherlooGP23, author = {Alireza Aghabagherloo and Rafa G{\'{a}}lvez and Davy Preuveneers and Bart Preneel}, title = {On the Brittleness of Robust Features: An Exploratory Analysis of Model Robustness and Illusionary Robust Features}, booktitle = {2023 {IEEE} Security and Privacy Workshops (SPW), San Francisco, CA, USA, May 25, 2023}, pages = {38--44}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SPW59333.2023.00009}, doi = {10.1109/SPW59333.2023.00009}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/AghabagherlooGP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vnc/YoshizawaP23, author = {Takahito Yoshizawa and Bart Preneel}, editor = {Sinem Coleri and Onur Altintas and Frank Kargl and Takamasa Higuchi and Michele Segata and Florian Klingler}, title = {A New Approach To Pseudonym Certificate Management in {V2X} Communication}, booktitle = {{IEEE} Vehicular Networking Conference, {VNC} 2023, Istanbul, Turkey, April 26-28, 2023}, pages = {25--32}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/VNC57357.2023.10136349}, doi = {10.1109/VNC57357.2023.10136349}, timestamp = {Fri, 09 Jun 2023 15:18:18 +0200}, biburl = {https://dblp.org/rec/conf/vnc/YoshizawaP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/YoshizawaP23, author = {Takahito Yoshizawa and Bart Preneel}, title = {Post-Quantum Impacts on {V2X} Certificates - Already at The End of The Road}, booktitle = {97th {IEEE} Vehicular Technology Conference, {VTC} Spring 2023, Florence, Italy, June 20-23, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/VTC2023-Spring57618.2023.10199793}, doi = {10.1109/VTC2023-SPRING57618.2023.10199793}, timestamp = {Fri, 25 Aug 2023 08:20:01 +0200}, biburl = {https://dblp.org/rec/conf/vtc/YoshizawaP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MadhusudanSTCP23, author = {Akash Madhusudan and Mahdi Sedaghat and Samarth Tiwari and Kelong Cong and Bart Preneel}, title = {Reusable, Instant and Private Payment Guarantees for Cryptocurrencies}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {583}, year = {2023}, url = {https://eprint.iacr.org/2023/583}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MadhusudanSTCP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangNLLPW23, author = {Jinliang Wang and Chao Niu and Qun Liu and Muzhou Li and Bart Preneel and Meiqin Wang}, title = {Cryptanalysis of {SPEEDY}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {612}, year = {2023}, url = {https://eprint.iacr.org/2023/612}, timestamp = {Wed, 21 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangNLLPW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BhatiDARP23, author = {Amit Singh Bhati and Antonin Dufka and Elena Andreeva and Arnab Roy and Bart Preneel}, title = {Skye: {A} Fast {KDF} based on Expanding {PRF} and its Application to Signal}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {781}, year = {2023}, url = {https://eprint.iacr.org/2023/781}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BhatiDARP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WuFPWW23, author = {Lixuan Wu and Yanhong Fan and Bart Preneel and Weijia Wang and Meiqin Wang}, title = {An automated generation tool of hardware masked S-box: AGEMA\({}^{\mbox{+}}\)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {831}, year = {2023}, url = {https://eprint.iacr.org/2023/831}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WuFPWW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BhatiPAAP23, author = {Amit Singh Bhati and Erik Pohle and Aysajan Abidin and Elena Andreeva and Bart Preneel}, title = {Let's Go Eevee! {A} Friendly and Suitable Family of {AEAD} Modes for IoT-to-Cloud Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1361}, year = {2023}, url = {https://eprint.iacr.org/2023/1361}, timestamp = {Sat, 07 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BhatiPAAP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuPZW23, author = {Qun Liu and Bart Preneel and Zheng Zhao and Meiqin Wang}, title = {Improved Quantum Circuits for {AES:} Reducing the Depth and the Number of Qubits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1417}, year = {2023}, url = {https://eprint.iacr.org/2023/1417}, timestamp = {Sat, 07 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuPZW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbidinPP23, author = {Aysajan Abidin and Erik Pohle and Bart Preneel}, title = {Arithmetic Circuit Implementations of S-boxes for {SKINNY} and {PHOTON} in {MPC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1426}, year = {2023}, url = {https://eprint.iacr.org/2023/1426}, timestamp = {Sat, 07 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbidinPP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AghabagherlooDM22, author = {Alireza Aghabagherloo and Mahshid Delavar and Javad Mohajeri and Mahmoud Salmasizadeh and Bart Preneel}, title = {An Efficient and Physically Secure Privacy-Preserving Authentication Scheme for Vehicular Ad-hoc NETworks (VANETs)}, journal = {{IEEE} Access}, volume = {10}, pages = {93831--93844}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3203580}, doi = {10.1109/ACCESS.2022.3203580}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/AghabagherlooDM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/TroncosoBBCCGHJ22, author = {Carmela Troncoso and Dan Bogdanov and Edouard Bugnion and Sylvain Chatel and Cas Cremers and Seda F. G{\"{u}}rses and Jean{-}Pierre Hubaux and Dennis Jackson and James R. Larus and Wouter Lueks and Rui Oliveira and Mathias Payer and Bart Preneel and Apostolos Pyrgelis and Marcel Salath{\'{e}} and Theresa Stadler and Michael Veale}, title = {Deploying decentralized, privacy-preserving proximity tracing}, journal = {Commun. {ACM}}, volume = {65}, number = {9}, pages = {48--57}, year = {2022}, url = {https://doi.org/10.1145/3524107}, doi = {10.1145/3524107}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacm/TroncosoBBCCGHJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imwut/AyalonLPR22, author = {Oshrat Ayalon and Sophie Li and Bart Preneel and Elissa M. Redmiles}, title = {Not Only for Contact Tracing: Use of Belgium's Contact Tracing App among Young Adults}, journal = {Proc. {ACM} Interact. Mob. Wearable Ubiquitous Technol.}, volume = {6}, number = {4}, pages = {202:1--202:26}, year = {2022}, url = {https://doi.org/10.1145/3570348}, doi = {10.1145/3570348}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imwut/AyalonLPR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/SymeonidisRMMPP22, author = {Iraklis Symeonidis and Dragos Rotaru and Mustafa A. Mustafa and Bart Mennink and Bart Preneel and Panos Papadimitratos}, title = {{HERMES:} Scalable, Secure, and Privacy-Enhancing Vehicular Sharing-Access System}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {1}, pages = {129--151}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2021.3094930}, doi = {10.1109/JIOT.2021.3094930}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/SymeonidisRMMPP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/VandersmissenRP22, author = {Joachim Vandersmissen and Adri{\'{a}}n Ranea and Bart Preneel}, editor = {Giuseppe Ateniese and Daniele Venturi}, title = {A White-Box Speck Implementation Using Self-equivalence Encodings}, booktitle = {Applied Cryptography and Network Security - 20th International Conference, {ACNS} 2022, Rome, Italy, June 20-23, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13269}, pages = {771--791}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-09234-3\_38}, doi = {10.1007/978-3-031-09234-3\_38}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/VandersmissenRP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/HeHPW22, author = {Jiahui He and Kai Hu and Bart Preneel and Meiqin Wang}, editor = {Shweta Agrawal and Dongdai Lin}, title = {Stretching Cube Attacks: Improved Methods to Recover Massive Superpolies}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {13794}, pages = {537--566}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22972-5\_19}, doi = {10.1007/978-3-031-22972-5\_19}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/HeHPW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccnc/DuttaguptaSP22, author = {Sayon Duttagupta and Dave Singel{\'{e}}e and Bart Preneel}, title = {{T-HIBE:} {A} Novel Key Establishment Solution for Decentralized, Multi-Tenant IoT Systems}, booktitle = {19th {IEEE} Annual Consumer Communications {\&} Networking Conference, {CCNC} 2022, Las Vegas, NV, USA, January 8-11, 2022}, pages = {766--774}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CCNC49033.2022.9700537}, doi = {10.1109/CCNC49033.2022.9700537}, timestamp = {Mon, 28 Aug 2023 21:17:27 +0200}, biburl = {https://dblp.org/rec/conf/ccnc/DuttaguptaSP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/WoutersGP22, author = {Lennert Wouters and Benedikt Gierlichs and Bart Preneel}, editor = {Josep Balasch and Colin O'Flynn}, title = {On the Susceptibility of Texas Instruments SimpleLink Platform Microcontrollers to Non-invasive Physical Attacks}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 13th International Workshop, {COSADE} 2022, Leuven, Belgium, April 11-12, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13211}, pages = {143--163}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-99766-3\_7}, doi = {10.1007/978-3-030-99766-3\_7}, timestamp = {Fri, 01 Apr 2022 15:49:26 +0200}, biburl = {https://dblp.org/rec/conf/cosade/WoutersGP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/BeckersWGPV22, author = {Arthur Beckers and Lennert Wouters and Benedikt Gierlichs and Bart Preneel and Ingrid Verbauwhede}, editor = {Josep Balasch and Colin O'Flynn}, title = {Provable Secure Software Masking in the Real-World}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 13th International Workshop, {COSADE} 2022, Leuven, Belgium, April 11-12, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13211}, pages = {215--235}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-99766-3\_10}, doi = {10.1007/978-3-030-99766-3\_10}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cosade/BeckersWGPV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/RaneaVP22, author = {Adri{\'{a}}n Ranea and Joachim Vandersmissen and Bart Preneel}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Implicit White-Box Implementations: White-Boxing {ARX} Ciphers}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13507}, pages = {33--63}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15802-5\_2}, doi = {10.1007/978-3-031-15802-5\_2}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/RaneaVP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscn/YoshizawaP22, author = {Takahito Yoshizawa and Bart Preneel}, title = {Misbehaviour Reporting in {ETSI} {ITS} Standard Considered Broken}, booktitle = {{IEEE} Conference on Standards for Communications and Networking, {CSCN} 2022, Thessaloniki, Greece, November 28-30, 2022}, pages = {144--150}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CSCN57023.2022.10050926}, doi = {10.1109/CSCN57023.2022.10050926}, timestamp = {Fri, 03 Mar 2023 14:29:58 +0100}, biburl = {https://dblp.org/rec/conf/cscn/YoshizawaP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/SunPWW22, author = {Ling Sun and Bart Preneel and Wei Wang and Meiqin Wang}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {A Greater {GIFT:} Strengthening {GIFT} Against Statistical Cryptanalysis}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13277}, pages = {115--144}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07082-2\_5}, doi = {10.1007/978-3-031-07082-2\_5}, timestamp = {Tue, 27 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/SunPWW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/0003ZWWXP22, author = {Ren Zhang and Dingwei Zhang and Quake Wang and Shichen Wu and Jan Xie and Bart Preneel}, title = {NC-Max: Breaking the Security-Performance Tradeoff in Nakamoto Consensus}, booktitle = {29th Annual Network and Distributed System Security Symposium, {NDSS} 2022, San Diego, California, USA, April 24-28, 2022}, publisher = {The Internet Society}, year = {2022}, url = {https://www.ndss-symposium.org/ndss-paper/auto-draft-255/}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/0003ZWWXP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wimob/YoshizawaP22, author = {Takahito Yoshizawa and Bart Preneel}, title = {On Handling of Certificate Digest in {V2X} Communication}, booktitle = {18th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2022, Thessaloniki, Greece, October 10-12, 2022}, pages = {160--165}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/WiMob55322.2022.9941683}, doi = {10.1109/WIMOB55322.2022.9941683}, timestamp = {Fri, 18 Nov 2022 20:51:17 +0100}, biburl = {https://dblp.org/rec/conf/wimob/YoshizawaP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-14674, author = {Takahito Yoshizawa and Dave Singel{\'{e}}e and Jan Tobias M{\"{u}}hlberg and St{\'{e}}phane Delbruel and Amir Taherkordi and Danny Hughes and Bart Preneel}, title = {A Survey of Security and Privacy Issues in {V2X} Communication Systems}, journal = {CoRR}, volume = {abs/2208.14674}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.14674}, doi = {10.48550/ARXIV.2208.14674}, eprinttype = {arXiv}, eprint = {2208.14674}, timestamp = {Thu, 01 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-14674.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SunPWW22, author = {Ling Sun and Bart Preneel and Wei Wang and Meiqin Wang}, title = {A Greater {GIFT:} Strengthening {GIFT} against Statistical Cryptanalysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {243}, year = {2022}, url = {https://eprint.iacr.org/2022/243}, timestamp = {Tue, 27 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/SunPWW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeckersWGPV22, author = {Arthur Beckers and Lennert Wouters and Benedikt Gierlichs and Bart Preneel and Ingrid Verbauwhede}, title = {Provable Secure Software Masking in the Real-World}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {327}, year = {2022}, url = {https://eprint.iacr.org/2022/327}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeckersWGPV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WoutersGP22, author = {Lennert Wouters and Benedikt Gierlichs and Bart Preneel}, title = {On the susceptibility of Texas Instruments SimpleLink platform microcontrollers to non-invasive physical attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {328}, year = {2022}, url = {https://eprint.iacr.org/2022/328}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WoutersGP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RaneaVP22, author = {Adri{\'{a}}n Ranea and Joachim Vandersmissen and Bart Preneel}, title = {Implicit White-Box Implementations: White-Boxing {ARX} Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {428}, year = {2022}, url = {https://eprint.iacr.org/2022/428}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RaneaVP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/VandersmissenRP22, author = {Joachim Vandersmissen and Adri{\'{a}}n Ranea and Bart Preneel}, title = {A White-Box Speck Implementation using Self-Equivalence Encodings (Full Version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {444}, year = {2022}, url = {https://eprint.iacr.org/2022/444}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/VandersmissenRP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SedaghatSKP22, author = {Mahdi Sedaghat and Daniel Slamanig and Markulf Kohlweiss and Bart Preneel}, title = {Structure-Preserving Threshold Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {839}, year = {2022}, url = {https://eprint.iacr.org/2022/839}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SedaghatSKP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MadhusudanSJP22, author = {Akash Madhusudan and Mahdi Sedaghat and Philipp Jovanovic and Bart Preneel}, title = {Nirvana: Instant and Anonymous Payment-Guarantees}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {872}, year = {2022}, url = {https://eprint.iacr.org/2022/872}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MadhusudanSJP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChaumCCLNPSYYZZ22, author = {David Chaum and Richard Carback and Jeremy Clark and Chao Liu and Mahdi Nejadgholi and Bart Preneel and Alan T. Sherman and Mario Yaksetig and Zeyuan Yin and Filip Zag{\'{o}}rski and Bingsheng Zhang}, title = {VoteXX: {A} Solution to Improper Influence in Voter-Verifiable Elections}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1212}, year = {2022}, url = {https://eprint.iacr.org/2022/1212}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChaumCCLNPSYYZZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/He0PW22, author = {Jiahui He and Kai Hu and Bart Preneel and Meiqin Wang}, title = {Stretching Cube Attacks: Improved Methods to Recover Massive Superpolies}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1218}, year = {2022}, url = {https://eprint.iacr.org/2022/1218}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/He0PW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PohleAP22, author = {Erik Pohle and Aysajan Abidin and Bart Preneel}, title = {Fast Evaluation of S-boxes with Garbled Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1278}, year = {2022}, url = {https://eprint.iacr.org/2022/1278}, timestamp = {Sat, 22 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PohleAP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fdgth/LueksBBKL0PSTW21, author = {Wouter Lueks and Justus Benzler and Dan Bogdanov and G{\"{o}}ran Kirchner and Raquel Lucas and Rui Oliveira and Bart Preneel and Marcel Salath{\'{e}} and Carmela Troncoso and Viktor von Wyl}, title = {Toward a Common Performance and Effectiveness Terminology for Digital Proximity Tracing Applications}, journal = {Frontiers Digit. Health}, volume = {3}, pages = {677929}, year = {2021}, url = {https://doi.org/10.3389/fdgth.2021.677929}, doi = {10.3389/FDGTH.2021.677929}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fdgth/LueksBBKL0PSTW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/WoutersGP21, author = {Lennert Wouters and Benedikt Gierlichs and Bart Preneel}, title = {My other car is your car: compromising the Tesla Model {X} keyless entry system}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {4}, pages = {149--172}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i4.149-172}, doi = {10.46586/TCHES.V2021.I4.149-172}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/WoutersGP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/ChenLMP21, author = {Yu Long Chen and Atul Luykx and Bart Mennink and Bart Preneel}, title = {Systematic Security Analysis of Stream Encryption With Key Erasure}, journal = {{IEEE} Trans. Inf. Theory}, volume = {67}, number = {11}, pages = {7518--7534}, year = {2021}, url = {https://doi.org/10.1109/TIT.2021.3109302}, doi = {10.1109/TIT.2021.3109302}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/ChenLMP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/0001BPV21, author = {Elena Andreeva and Amit Singh Bhati and Bart Preneel and Damian Viz{\'{a}}r}, title = {1, 2, 3, Fork: Counter Mode Variants based on a Generalized Forkcipher}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2021}, number = {3}, pages = {1--35}, year = {2021}, url = {https://doi.org/10.46586/tosc.v2021.i3.1-35}, doi = {10.46586/TOSC.V2021.I3.1-35}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/0001BPV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ChenMP21, author = {Yu Long Chen and Bart Mennink and Bart Preneel}, editor = {Mehdi Tibouchi and Huaxiong Wang}, title = {Categorization of Faulty Nonce Misuse Resistant Message Authentication}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13092}, pages = {520--550}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92078-4\_18}, doi = {10.1007/978-3-030-92078-4\_18}, timestamp = {Fri, 03 Dec 2021 17:36:40 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/ChenMP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/SedaghatP21, author = {Mahdi Sedaghat and Bart Preneel}, editor = {Mauro Conti and Marc Stevens and Stephan Krenn}, title = {Cross-Domain Attribute-Based Access Control Encryption}, booktitle = {Cryptology and Network Security - 20th International Conference, {CANS} 2021, Vienna, Austria, December 13-15, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13099}, pages = {3--23}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92548-2\_1}, doi = {10.1007/978-3-030-92548-2\_1}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/SedaghatP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/YoshizawaSP21, author = {Takahito Yoshizawa and Dave Singel{\'{e}}e and Bart Preneel}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Jose Luis Mu{\~{n}}oz{-}Tapia and Guillermo Navarro{-}Arribas and Miguel Soriano}, title = {A New Privacy Enhancing Beacon Scheme in {V2X} Communication}, booktitle = {Data Privacy Management, Cryptocurrencies and Blockchain Technology - {ESORICS} 2021 International Workshops, {DPM} 2021 and {CBT} 2021, Darmstadt, Germany, October 8, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13140}, pages = {139--151}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-93944-1\_9}, doi = {10.1007/978-3-030-93944-1\_9}, timestamp = {Tue, 08 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/YoshizawaSP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isgt/0002MEP21, author = {Clemens Brunner and Akash Madhusudan and Dominik Engel and Bart Preneel}, title = {Off-chain state channels in the energy domain}, booktitle = {{IEEE} Power {\&} Energy Society Innovative Smart Grid Technologies Conference, {ISGT} 2021, Washington, DC, USA, February 16-18, 2021}, pages = {1--5}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISGT49243.2021.9372246}, doi = {10.1109/ISGT49243.2021.9372246}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isgt/0002MEP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/FigueiredoMRNP21, author = {Sammy de Figueiredo and Akash Madhusudan and Vincent Reniers and Svetla Nikova and Bart Preneel}, editor = {Chih{-}Cheng Hung and Jiman Hong and Alessio Bechini and Eunjee Song}, title = {Exploring the storj network: a security analysis}, booktitle = {{SAC} '21: The 36th {ACM/SIGAPP} Symposium on Applied Computing, Virtual Event, Republic of Korea, March 22-26, 2021}, pages = {257--264}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3412841.3441908}, doi = {10.1145/3412841.3441908}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/FigueiredoMRNP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/indocrypt/2021, editor = {Avishek Adhikari and Ralf K{\"{u}}sters and Bart Preneel}, title = {Progress in Cryptology - {INDOCRYPT} 2021 - 22nd International Conference on Cryptology in India, Jaipur, India, December 12-15, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13143}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92518-5}, doi = {10.1007/978-3-030-92518-5}, isbn = {978-3-030-92517-8}, timestamp = {Mon, 13 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/indocrypt/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SedaghatP21, author = {Mahdi Sedaghat and Bart Preneel}, title = {Cross-Domain Attribute-Based Access Control Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {74}, year = {2021}, url = {https://eprint.iacr.org/2021/074}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/SedaghatP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AndreevaBPV21, author = {Elena Andreeva and Amit Singh Bhati and Bart Preneel and Damian Viz{\'{a}}r}, title = {1, 2, 3, Fork: Counter Mode Variants based on a Generalized Forkcipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1154}, year = {2021}, url = {https://eprint.iacr.org/2021/1154}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AndreevaBPV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenMP21, author = {Yu Long Chen and Bart Mennink and Bart Preneel}, title = {Categorization of Faulty Nonce Misuse Resistant Message Authentication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1696}, year = {2021}, url = {https://eprint.iacr.org/2021/1696}, timestamp = {Thu, 13 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChenMP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/GorodilovaACHIK20, author = {Anastasiya Gorodilova and Sergey Agievich and Claude Carlet and Xiang{-}dong Hou and Valeriya Idrisova and Nikolay Kolomeec and Alexandr Kutsenko and Luca Mariot and Alexey Oblaukhov and Stjepan Picek and Bart Preneel and Razvan Rosie and Natalia N. Tokareva}, title = {The Fifth International Students' Olympiad in cryptography - {NSUCRYPTO:} Problems and their solutions}, journal = {Cryptologia}, volume = {44}, number = {3}, pages = {223--256}, year = {2020}, url = {https://doi.org/10.1080/01611194.2019.1670282}, doi = {10.1080/01611194.2019.1670282}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/GorodilovaACHIK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/debu/TroncosoPHSLLSP20, author = {Carmela Troncoso and Mathias Payer and Jean{-}Pierre Hubaux and Marcel Salath{\'{e}} and James R. Larus and Wouter Lueks and Theresa Stadler and Apostolos Pyrgelis and Daniele Antonioli and Ludovic Barman and Sylvain Chatel and Kenneth G. Paterson and Srdjan Capkun and David A. Basin and Jan Beutel and Dennis Jackson and Marc Roeschlin and Patrick Leu and Bart Preneel and Nigel P. Smart and Aysajan Abidin and Seda Gurses and Michael Veale and Cas Cremers and Michael Backes and Nils Ole Tippenhauer and Reuben Binns and Ciro Cattuto and Alain Barrat and Dario Fiore and Manuel Barbosa and Rui Oliveira and Jos{\'{e}} Pereira}, title = {Decentralized Privacy-Preserving Proximity Tracing}, journal = {{IEEE} Data Eng. Bull.}, volume = {43}, number = {2}, pages = {36--66}, year = {2020}, url = {http://sites.computer.org/debull/A20june/p36.pdf}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/debu/TroncosoPHSLLSP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/WoutersHGOGP20, author = {Lennert Wouters and Jan Van den Herrewegen and Flavio D. Garcia and David F. Oswald and Benedikt Gierlichs and Bart Preneel}, title = {Dismantling DST80-based Immobiliser Systems}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {2}, pages = {99--127}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i2.99-127}, doi = {10.13154/TCHES.V2020.I2.99-127}, timestamp = {Thu, 07 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/WoutersHGOGP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/WoutersAGP20, author = {Lennert Wouters and Victor Arribas and Benedikt Gierlichs and Bart Preneel}, title = {Revisiting a Methodology for Efficient {CNN} Architectures in Profiling Attacks}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {3}, pages = {147--168}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i3.147-168}, doi = {10.13154/TCHES.V2020.I3.147-168}, timestamp = {Thu, 02 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/WoutersAGP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aiccsa/Preneel20, author = {Bart Preneel}, title = {Big Data against Corona: Mass Surveillance or Privacy by Design? Keynote}, booktitle = {17th {IEEE/ACS} International Conference on Computer Systems and Applications, {AICCSA} 2020, Antalya, Turkey, November 2-5, 2020}, pages = {1}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/AICCSA50499.2020.9316509}, doi = {10.1109/AICCSA50499.2020.9316509}, timestamp = {Mon, 01 Feb 2021 12:21:59 +0100}, biburl = {https://dblp.org/rec/conf/aiccsa/Preneel20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobiwac/YoshizawaP20, author = {Takahito Yoshizawa and Bart Preneel}, editor = {Frank Y. Li and Albert Y. Zomaya and Rodolfo W. L. Coutinho}, title = {Verification Schemes of Multi-SIM Devices in Mobile Communication Systems}, booktitle = {Proceedings of the 18th {ACM} International Symposium on Mobility Management and Wireless Access, MobiWac 2020, Alicante, Spain, November 16-20, 2020}, pages = {91--97}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3416012.3424620}, doi = {10.1145/3416012.3424620}, timestamp = {Wed, 16 Dec 2020 16:07:17 +0100}, biburl = {https://dblp.org/rec/conf/mobiwac/YoshizawaP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/ReniersG00MLNLL20, author = {Vincent Reniers and Yuan Gao and Ren Zhang and Paolo Viviani and Akash Madhusudan and Bert Lagaisse and Svetla Nikova and Dimitri Van Landuyt and Riccardo Lombardi and Bart Preneel and Wouter Joosen}, editor = {Chih{-}Cheng Hung and Tom{\'{a}}s Cern{\'{y}} and Dongwan Shin and Alessio Bechini}, title = {Authenticated and auditable data sharing via smart contract}, booktitle = {{SAC} '20: The 35th {ACM/SIGAPP} Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30 - April 3, 2020}, pages = {324--331}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3341105.3373957}, doi = {10.1145/3341105.3373957}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sac/ReniersG00MLNLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/RaneaP20, author = {Adri{\'{a}}n Ranea and Bart Preneel}, editor = {Orr Dunkelman and Michael J. Jacobson Jr. and Colin O'Flynn}, title = {On Self-equivalence Encodings in White-Box Implementations}, booktitle = {Selected Areas in Cryptography - {SAC} 2020 - 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12804}, pages = {639--669}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-81652-0\_25}, doi = {10.1007/978-3-030-81652-0\_25}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/RaneaP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-12273, author = {Carmela Troncoso and Mathias Payer and Jean{-}Pierre Hubaux and Marcel Salath{\'{e}} and James R. Larus and Edouard Bugnion and Wouter Lueks and Theresa Stadler and Apostolos Pyrgelis and Daniele Antonioli and Ludovic Barman and Sylvain Chatel and Kenneth G. Paterson and Srdjan Capkun and David A. Basin and Jan Beutel and Dennis Jackson and Marc Roeschlin and Patrick Leu and Bart Preneel and Nigel P. Smart and Aysajan Abidin and Seda F. G{\"{u}}rses and Michael Veale and Cas Cremers and Michael Backes and Nils Ole Tippenhauer and Reuben Binns and Ciro Cattuto and Alain Barrat and Dario Fiore and Manuel Barbosa and Rui Oliveira and Jos{\'{e}} Pereira}, title = {Decentralized Privacy-Preserving Proximity Tracing}, journal = {CoRR}, volume = {abs/2005.12273}, year = {2020}, url = {https://arxiv.org/abs/2005.12273}, eprinttype = {arXiv}, eprint = {2005.12273}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-12273.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-12927, author = {Justus Benzler and Dan Bogdanov and G{\"{o}}ran Kirchner and Wouter Lueks and Raquel Lucas and Rui Oliveira and Bart Preneel and Marcel Salath{\'{e}} and Carmela Troncoso and Viktor von Wyl}, title = {Towards a common performance and effectiveness terminology for digital proximity tracing applications}, journal = {CoRR}, volume = {abs/2012.12927}, year = {2020}, url = {https://arxiv.org/abs/2012.12927}, eprinttype = {arXiv}, eprint = {2012.12927}, timestamp = {Tue, 05 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-12927.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangZWXP20, author = {Ren Zhang and Dingwei Zhang and Quake Wang and Jan Xie and Bart Preneel}, title = {NC-Max: Breaking the Throughput Limit of Nakamoto Consensus}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1101}, year = {2020}, url = {https://eprint.iacr.org/2020/1101}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangZWXP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RaneaP20, author = {Adri{\'{a}}n Ranea and Bart Preneel}, title = {On Self-Equivalence Encodings in White-Box Implementations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1325}, year = {2020}, url = {https://eprint.iacr.org/2020/1325}, timestamp = {Fri, 30 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/RaneaP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/GorodilovaACGIK19, author = {Anastasiya Gorodilova and Sergey Agievich and Claude Carlet and Evgeny Gorkunov and Valeriya Idrisova and Nikolay Kolomeec and Alexandr Kutsenko and Svetla Nikova and Alexey Oblaukhov and Stjepan Picek and Bart Preneel and Vincent Rijmen and Natalia N. Tokareva}, title = {Problems and solutions from the fourth International Students' Olympiad in Cryptography {(NSUCRYPTO)}}, journal = {Cryptologia}, volume = {43}, number = {2}, pages = {138--174}, year = {2019}, url = {https://doi.org/10.1080/01611194.2018.1517834}, doi = {10.1080/01611194.2018.1517834}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/GorodilovaACGIK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/WoutersMAGP19, author = {Lennert Wouters and Eduard Marin and Tomer Ashur and Benedikt Gierlichs and Bart Preneel}, title = {Fast, Furious and Insecure: Passive Keyless Entry and Start Systems in Modern Supercars}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {3}, pages = {66--85}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i3.66-85}, doi = {10.13154/TCHES.V2019.I3.66-85}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/WoutersMAGP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscn/YoshizawaP19, author = {Takahito Yoshizawa and Bart Preneel}, title = {Survey of Security Aspect of {V2X} Standards and Related Issues}, booktitle = {2019 {IEEE} Conference on Standards for Communications and Networking, {CSCN} 2019, Granada, Spain, October 28-30, 2019}, pages = {1--5}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CSCN.2019.8931311}, doi = {10.1109/CSCN.2019.8931311}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cscn/YoshizawaP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MadhusudanSMZP19, author = {Akash Madhusudan and Iraklis Symeonidis and Mustafa A. Mustafa and Ren Zhang and Bart Preneel}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {SC2Share: Smart Contract for Secure Car Sharing}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {163--171}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007703601630171}, doi = {10.5220/0007703601630171}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MadhusudanSMZP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/MarinASP19, author = {Eduard Marin and Enrique Argones{-}R{\'{u}}a and Dave Singel{\'{e}}e and Bart Preneel}, editor = {Florian Kerschbaum and Atefeh Mashatan and Jianwei Niu and Adam J. Lee}, title = {On the Difficulty of Using Patient's Physiological Signals in Cryptographic Protocols}, booktitle = {Proceedings of the 24th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2019, Toronto, ON, Canada, June 03-06, 2019}, pages = {113--122}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3322431.3325099}, doi = {10.1145/3322431.3325099}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/MarinASP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/LiP19, author = {Chaoyun Li and Bart Preneel}, editor = {Kenneth G. Paterson and Douglas Stebila}, title = {Improved Interpolation Attacks on Cryptographic Primitives of Low Algebraic Degree}, booktitle = {Selected Areas in Cryptography - {SAC} 2019 - 26th International Conference, Waterloo, ON, Canada, August 12-16, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11959}, pages = {171--193}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-38471-5\_8}, doi = {10.1007/978-3-030-38471-5\_8}, timestamp = {Tue, 07 May 2024 20:12:23 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/LiP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/SzepieniecP19, author = {Alan Szepieniec and Bart Preneel}, editor = {Kenneth G. Paterson and Douglas Stebila}, title = {Block-Anti-Circulant Unbalanced Oil and Vinegar}, booktitle = {Selected Areas in Cryptography - {SAC} 2019 - 26th International Conference, Waterloo, ON, Canada, August 12-16, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11959}, pages = {574--588}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-38471-5\_23}, doi = {10.1007/978-3-030-38471-5\_23}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/SzepieniecP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/0003P19, author = {Ren Zhang and Bart Preneel}, title = {Lay Down the Common Metrics: Evaluating Proof-of-Work Consensus Protocols' Security}, booktitle = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco, CA, USA, May 19-23, 2019}, pages = {175--192}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SP.2019.00086}, doi = {10.1109/SP.2019.00086}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/0003P19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-04480, author = {Anastasiya Gorodilova and Sergey Agievich and Claude Carlet and Xiang{-}dong Hou and Valeriya Idrisova and Nikolay Kolomeec and Alexandr Kutsenko and Luca Mariot and Alexey Oblaukhov and Stjepan Picek and Bart Preneel and Razvan Rosie and Natalia N. Tokareva}, title = {The Fifth International Students' Olympiad in Cryptography - {NSUCRYPTO:} problems and their solutions}, journal = {CoRR}, volume = {abs/1906.04480}, year = {2019}, url = {http://arxiv.org/abs/1906.04480}, eprinttype = {arXiv}, eprint = {1906.04480}, timestamp = {Fri, 14 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-04480.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SzepieniecP19, author = {Alan Szepieniec and Bart Preneel}, title = {Block-Anti-Circulant Unbalanced Oil and Vinegar}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {46}, year = {2019}, url = {https://eprint.iacr.org/2019/046}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SzepieniecP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiP19, author = {Chaoyun Li and Bart Preneel}, title = {Improved Interpolation Attacks on Cryptographic Primitives of Low Algebraic Degree}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {812}, year = {2019}, url = {https://eprint.iacr.org/2019/812}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/HellesethP18, author = {Tor Helleseth and Bart Preneel}, title = {Editorial: Special issue on recent trends in cryptography}, journal = {Cryptogr. Commun.}, volume = {10}, number = {1}, pages = {1--3}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0269-y}, doi = {10.1007/S12095-017-0269-Y}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/HellesethP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SymeonidisBSPSP18, author = {Iraklis Symeonidis and Gergely Bicz{\'{o}}k and Fatemeh Shirazi and Cristina P{\'{e}}rez{-}Sol{\`{a}} and Jessica Schroers and Bart Preneel}, title = {Collateral damage of Facebook third-party applications: a comprehensive study}, journal = {Comput. Secur.}, volume = {77}, pages = {179--208}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2018.03.015}, doi = {10.1016/J.COSE.2018.03.015}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SymeonidisBSPSP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BiesmansBRPV18, author = {Wouter Biesmans and Josep Balasch and Alfredo Rial and Bart Preneel and Ingrid Verbauwhede}, title = {Private Mobile Pay-TV From Priced Oblivious Transfer}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {2}, pages = {280--291}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2746058}, doi = {10.1109/TIFS.2017.2746058}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BiesmansBRPV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/MarinS0VVNP18, author = {Eduard Marin and Dave Singel{\'{e}}e and Bohan Yang and Vladimir Volskiy and Guy A. E. Vandenbosch and Bart Nuttin and Bart Preneel}, editor = {Ziming Zhao and Gail{-}Joon Ahn and Ram Krishnan and Gabriel Ghinita}, title = {Securing Wireless Neurostimulators}, booktitle = {Proceedings of the Eighth {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2018, Tempe, AZ, USA, March 19-21, 2018}, pages = {287--298}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3176258.3176310}, doi = {10.1145/3176258.3176310}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/MarinS0VVNP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LuykxP18, author = {Atul Luykx and Bart Preneel}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Optimal Forgeries Against Polynomial-Based MACs and {GCM}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10820}, pages = {445--467}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78381-9\_17}, doi = {10.1007/978-3-319-78381-9\_17}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LuykxP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/giots/CleemputMMP18, author = {Sara Cleemput and Mustafa A. Mustafa and Eduard Marin and Bart Preneel}, title = {De-pseudonymization of Smart Metering Data: Analysis and Countermeasures}, booktitle = {2018 Global Internet of Things Summit, GIoTS 2018, Bilbao, Spain, June 4-7, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/GIOTS.2018.8534430}, doi = {10.1109/GIOTS.2018.8534430}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/giots/CleemputMMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ToliP18, author = {Christina{-}Angeliki Toli and Bart Preneel}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Privacy-preserving Biometric Authentication Model for e-Finance Applications}, booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal, January 22-24, 2018}, pages = {353--360}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006611303530360}, doi = {10.5220/0006611303530360}, timestamp = {Wed, 11 Apr 2018 15:27:25 +0200}, biburl = {https://dblp.org/rec/conf/icissp/ToliP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BeullensPS18, author = {Ward Beullens and Bart Preneel and Alan Szepieniec}, editor = {Carlos Cid and Michael J. Jacobson Jr.}, title = {Public Key Compression for Constrained Linear Signature Schemes}, booktitle = {Selected Areas in Cryptography - {SAC} 2018 - 25th International Conference, Calgary, AB, Canada, August 15-17, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11349}, pages = {300--321}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-10970-7\_14}, doi = {10.1007/978-3-030-10970-7\_14}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/BeullensPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acns/2018, editor = {Bart Preneel and Frederik Vercauteren}, title = {Applied Cryptography and Network Security - 16th International Conference, {ACNS} 2018, Leuven, Belgium, July 2-4, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10892}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93387-0}, doi = {10.1007/978-3-319-93387-0}, isbn = {978-3-319-93386-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1806-02059, author = {Anastasiya Gorodilova and Sergey Agievich and Claude Carlet and Evgeny Gorkunov and Valeriya Idrisova and Nikolay Kolomeec and Alexandr Kutsenko and Svetla Nikova and Alexey Oblaukhov and Stjepan Picek and Bart Preneel and Vincent Rijmen and Natalia N. Tokareva}, title = {Problems and solutions of the Fourth International Students' Olympiad in Cryptography {NSUCRYPTO}}, journal = {CoRR}, volume = {abs/1806.02059}, year = {2018}, url = {http://arxiv.org/abs/1806.02059}, eprinttype = {arXiv}, eprint = {1806.02059}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1806-02059.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuykxP18, author = {Atul Luykx and Bart Preneel}, title = {Optimal Forgeries Against Polynomial-Based MACs and {GCM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {166}, year = {2018}, url = {http://eprint.iacr.org/2018/166}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuykxP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SymeonidisBSPSP18, author = {Iraklis Symeonidis and Gergely Bicz{\'{o}}k and Fatemeh Shirazi and Cristina P{\'{e}}rez{-}Sol{\`{a}} and Jessica Schroers and Bart Preneel}, title = {Collateral Damage of Facebook Applications: a Comprehensive Study}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {285}, year = {2018}, url = {https://eprint.iacr.org/2018/285}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SymeonidisBSPSP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeullensPS18, author = {Ward Beullens and Bart Preneel and Alan Szepieniec}, title = {Public Key Compression for Constrained Linear Signature Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {670}, year = {2018}, url = {https://eprint.iacr.org/2018/670}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeullensPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SzepieniecRP18, author = {Alan Szepieniec and Reza Reyhanitabar and Bart Preneel}, title = {Key Encapsulation from Noisy Key Agreement in the Quantum Random Oracle Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {884}, year = {2018}, url = {https://eprint.iacr.org/2018/884}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SzepieniecRP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/NoormanBMPMPVGM17, author = {Job Noorman and Jo Van Bulck and Jan Tobias M{\"{u}}hlberg and Frank Piessens and Pieter Maene and Bart Preneel and Ingrid Verbauwhede and Johannes G{\"{o}}tzfried and Tilo M{\"{u}}ller and Felix C. Freiling}, title = {Sancus 2.0: {A} Low-Cost Security Architecture for IoT Devices}, journal = {{ACM} Trans. Priv. Secur.}, volume = {20}, number = {3}, pages = {7:1--7:33}, year = {2017}, url = {https://doi.org/10.1145/3079763}, doi = {10.1145/3079763}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/NoormanBMPMPVGM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/Naya-PlasenciaP17, author = {Mar{\'{\i}}a Naya{-}Plasencia and Bart Preneel}, title = {Preface}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {1}, pages = {1--3}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i1.1-3}, doi = {10.13154/TOSC.V2017.I1.1-3}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/Naya-PlasenciaP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ChenLMP17, author = {Yu Long Chen and Atul Luykx and Bart Mennink and Bart Preneel}, title = {Efficient Length Doubling From Tweakable Block Ciphers}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {3}, pages = {253--270}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i3.253-270}, doi = {10.13154/TOSC.V2017.I3.253-270}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/ChenLMP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/AshurDLMMNRRS0P17, author = {Tomer Ashur and Jeroen Delvaux and Sanghan Lee and Pieter Maene and Eduard Marin and Svetla Nikova and Oscar Reparaz and Vladimir Rozic and Dave Singel{\'{e}}e and Bohan Yang and Bart Preneel}, editor = {Srdjan Capkun and Sherman S. M. Chow}, title = {A Privacy-Preserving Device Tracking System Using a Low-Power Wide-Area Network}, booktitle = {Cryptology and Network Security - 16th International Conference, {CANS} 2017, Hong Kong, China, November 30 - December 2, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11261}, pages = {347--369}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-030-02641-7\_16}, doi = {10.1007/978-3-030-02641-7\_16}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cans/AshurDLMMNRRS0P17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ClercqKMPSV17, author = {Ruan de Clercq and Ronald De Keulenaer and Pieter Maene and Bart Preneel and Bjorn De Sutter and Ingrid Verbauwhede}, editor = {Ramesh Karri and Ozgur Sinanoglu and Ahmad{-}Reza Sadeghi and Xun Yi}, title = {{SCM:} Secure Code Memory Architecture}, booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017}, pages = {771--776}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3052973.3053044}, doi = {10.1145/3052973.3053044}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ClercqKMPSV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/conext/ZhangP17, author = {Ren Zhang and Bart Preneel}, title = {On the Necessity of a Prescribed Block Validity Consensus: Analyzing Bitcoin Unlimited Mining Protocol}, booktitle = {Proceedings of the 13th International Conference on emerging Networking EXperiments and Technologies, CoNEXT 2017, Incheon, Republic of Korea, December 12 - 15, 2017}, pages = {108--119}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3143361.3143389}, doi = {10.1145/3143361.3143389}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/conext/ZhangP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/ZhangP17, author = {Ren Zhang and Bart Preneel}, editor = {Helena Handschuh}, title = {Publish or Perish: {A} Backward-Compatible Defense Against Selfish Mining in Bitcoin}, booktitle = {Topics in Cryptology - {CT-RSA} 2017 - The Cryptographers' Track at the {RSA} Conference 2017, San Francisco, CA, USA, February 14-17, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10159}, pages = {277--292}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-52153-4\_16}, doi = {10.1007/978-3-319-52153-4\_16}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/ZhangP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/SymeonidisAMMDP17, author = {Iraklis Symeonidis and Abdelrahaman Aly and Mustafa A. Mustafa and Bart Mennink and Siemen Dhooghe and Bart Preneel}, editor = {Simon N. Foley and Dieter Gollmann and Einar Snekkenes}, title = {SePCAR: {A} Secure and Privacy-Enhancing Protocol for Car Access Provision}, booktitle = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10493}, pages = {475--493}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66399-9\_26}, doi = {10.1007/978-3-319-66399-9\_26}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/SymeonidisAMMDP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/EtemadBKP17, author = {Mohammad Etemad and Filipe Beato and Alptekin K{\"{u}}p{\c{c}}{\"{u}} and Bart Preneel}, title = {Are You Really My Friend? Efficient and Secure Friend-Matching in Mobile Social Networks}, booktitle = {2017 {IEEE} European Symposium on Security and Privacy Workshops, EuroS{\&}P Workshops 2017, Paris, France, April 26-28, 2017}, pages = {122--131}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/EuroSPW.2017.61}, doi = {10.1109/EUROSPW.2017.61}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/EtemadBKP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Preneel17, author = {Bart Preneel}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {The Future of Information Security}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {9}, publisher = {SciTePress}, year = {2017}, timestamp = {Thu, 18 May 2017 14:22:34 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Preneel17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/BeullensP17, author = {Ward Beullens and Bart Preneel}, editor = {Arpita Patra and Nigel P. Smart}, title = {Field Lifting for Smaller {UOV} Public Keys}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2017 - 18th International Conference on Cryptology in India, Chennai, India, December 10-13, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10698}, pages = {227--246}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71667-1\_12}, doi = {10.1007/978-3-319-71667-1\_12}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/BeullensP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isvlsi/KimHPV17, author = {Hyunmin Kim and Seokhie Hong and Bart Preneel and Ingrid Verbauwhede}, title = {{STBC:} Side Channel Attack Tolerant Balanced Circuit with Reduced Propagation Delay}, booktitle = {2017 {IEEE} Computer Society Annual Symposium on VLSI, {ISVLSI} 2017, Bochum, Germany, July 3-5, 2017}, pages = {74--79}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/ISVLSI.2017.22}, doi = {10.1109/ISVLSI.2017.22}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isvlsi/KimHPV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nutmic/SzepieniecP17, author = {Alan Szepieniec and Bart Preneel}, editor = {Jerzy Kaczorowski and Josef Pieprzyk and Jacek Pomykala}, title = {Short Solutions to Nonlinear Systems of Equations}, booktitle = {Number-Theoretic Methods in Cryptology - First International Conference, NuTMiC 2017, Warsaw, Poland, September 11-13, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10737}, pages = {71--90}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-76620-1\_5}, doi = {10.1007/978-3-319-76620-1\_5}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nutmic/SzepieniecP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/SzepieniecBP17, author = {Alan Szepieniec and Ward Beullens and Bart Preneel}, editor = {Tanja Lange and Tsuyoshi Takagi}, title = {{MQ} Signatures for {PKI}}, booktitle = {Post-Quantum Cryptography - 8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10346}, pages = {224--240}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59879-6\_13}, doi = {10.1007/978-3-319-59879-6\_13}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pqcrypto/SzepieniecBP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/RobynsMLQSP17, author = {Pieter Robyns and Eduard Marin and Wim Lamotte and Peter Quax and Dave Singel{\'{e}}e and Bart Preneel}, editor = {Guevara Noubir and Mauro Conti and Sneha Kumar Kasera}, title = {Physical-layer fingerprinting of LoRa devices using supervised and zero-shot learning}, booktitle = {Proceedings of the 10th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20, 2017}, pages = {58--63}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098243.3098267}, doi = {10.1145/3098243.3098267}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/RobynsMLQSP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2016, editor = {Jens Grossklags and Bart Preneel}, title = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9603}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54970-4}, doi = {10.1007/978-3-662-54970-4}, isbn = {978-3-662-54969-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SymeonidisAMP17, author = {Iraklis Symeonidis and Abdelrahaman Aly and Mustafa A. Mustafa and Bart Preneel}, title = {PePTCAP: {A} Privacy-enhancing Protocol for(Temporary) Car Access Provision}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {39}, year = {2017}, url = {http://eprint.iacr.org/2017/039}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SymeonidisAMP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SzepieniecBP17, author = {Alan Szepieniec and Ward Beullens and Bart Preneel}, title = {{MQ} Signatures for {PKI}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {327}, year = {2017}, url = {http://eprint.iacr.org/2017/327}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SzepieniecBP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangP17, author = {Ren Zhang and Bart Preneel}, title = {On the Necessity of a Prescribed Block Validity Consensus: Analyzing Bitcoin Unlimited Mining Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {686}, year = {2017}, url = {http://eprint.iacr.org/2017/686}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeullensP17, author = {Ward Beullens and Bart Preneel}, title = {Field lifting for smaller {UOV} public keys}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {776}, year = {2017}, url = {http://eprint.iacr.org/2017/776}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeullensP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenLMP17, author = {Yu Long Chen and Atul Luykx and Bart Mennink and Bart Preneel}, title = {Efficient Length Doubling From Tweakable Block Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {841}, year = {2017}, url = {http://eprint.iacr.org/2017/841}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenLMP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SzepieniecP17, author = {Alan Szepieniec and Bart Preneel}, title = {Short Solutions to Nonlinear Systems of Equations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1175}, year = {2017}, url = {http://eprint.iacr.org/2017/1175}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SzepieniecP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/BeatoMP16, author = {Filipe Beato and Stijn Meul and Bart Preneel}, title = {Practical identity-based private sharing for online social networks}, journal = {Comput. Commun.}, volume = {73}, pages = {243--250}, year = {2016}, url = {https://doi.org/10.1016/j.comcom.2015.07.009}, doi = {10.1016/J.COMCOM.2015.07.009}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/BeatoMP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/MenninkP16, author = {Bart Mennink and Bart Preneel}, title = {Efficient parallelizable hashing using small non-compressing primitives}, journal = {Int. J. Inf. Sec.}, volume = {15}, number = {3}, pages = {285--300}, year = {2016}, url = {https://doi.org/10.1007/s10207-015-0288-7}, doi = {10.1007/S10207-015-0288-7}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/MenninkP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/OttoyHPSG16, author = {Geoffrey Ottoy and Tom Hamelinckx and Bart Preneel and Lieven De Strycker and Jean{-}Pierre Goemaere}, title = {On the choice of the appropriate {AES} data encryption method for ZigBee nodes}, journal = {Secur. Commun. Networks}, volume = {9}, number = {2}, pages = {87--93}, year = {2016}, url = {https://doi.org/10.1002/sec.267}, doi = {10.1002/SEC.267}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/OttoyHPSG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MarinSGCWP16, author = {Eduard Marin and Dave Singel{\'{e}}e and Flavio D. Garcia and Tom Chothia and Rik Willems and Bart Preneel}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {On the (in)security of the latest generation implantable cardiac defibrillators and how to secure them}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {226--236}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991094}, timestamp = {Tue, 06 Nov 2018 16:59:24 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MarinSGCWP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/adhoc-now/MarinMSP16, author = {Eduard Marin and Mustafa A. Mustafa and Dave Singel{\'{e}}e and Bart Preneel}, editor = {Nathalie Mitton and Valeria Loscr{\`{\i}} and Alexandre Mouradian}, title = {A Privacy-Preserving Remote Healthcare System Offering End-to-End Security}, booktitle = {Ad-hoc, Mobile, and Wireless Networks - 15th International Conference, {ADHOC-NOW} 2016, Lille, France, July 4-6, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9724}, pages = {237--250}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40509-4\_17}, doi = {10.1007/978-3-319-40509-4\_17}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/adhoc-now/MarinMSP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/AbidinAP16, author = {Aysajan Abidin and Enrique Argones{-}R{\'{u}}a and Bart Preneel}, editor = {Sara Foresti and Giuseppe Persiano}, title = {An Efficient Entity Authentication Protocol with Enhanced Security and Privacy Properties}, booktitle = {Cryptology and Network Security - 15th International Conference, {CANS} 2016, Milan, Italy, November 14-16, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10052}, pages = {335--349}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48965-0\_20}, doi = {10.1007/978-3-319-48965-0\_20}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/AbidinAP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/ToliAP16, author = {Christina{-}Angeliki Toli and Abdelrahaman Aly and Bart Preneel}, editor = {Sara Foresti and Giuseppe Persiano}, title = {A Privacy-Preserving Model for Biometric Fusion}, booktitle = {Cryptology and Network Security - 15th International Conference, {CANS} 2016, Milan, Italy, November 14-16, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10052}, pages = {743--748}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48965-0\_54}, doi = {10.1007/978-3-319-48965-0\_54}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/ToliAP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/MarinS0VP16, author = {Eduard Marin and Dave Singel{\'{e}}e and Bohan Yang and Ingrid Verbauwhede and Bart Preneel}, editor = {Elisa Bertino and Ravi S. Sandhu and Alexander Pretschner}, title = {On the Feasibility of Cryptography for a Wireless Insulin Pump System}, booktitle = {Proceedings of the Sixth {ACM} on Conference on Data and Application Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March 9-11, 2016}, pages = {113--120}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2857705.2857746}, doi = {10.1145/2857705.2857746}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/MarinS0VP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/ClercqKC0MBPSV16, author = {Ruan de Clercq and Ronald De Keulenaer and Bart Coppens and Bohan Yang and Pieter Maene and Koen De Bosschere and Bart Preneel and Bjorn De Sutter and Ingrid Verbauwhede}, editor = {Luca Fanucci and J{\"{u}}rgen Teich}, title = {{SOFIA:} Software and control flow integrity architecture}, booktitle = {2016 Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2016, Dresden, Germany, March 14-18, 2016}, pages = {1172--1177}, publisher = {{IEEE}}, year = {2016}, url = {https://ieeexplore.ieee.org/document/7459489/}, timestamp = {Mon, 07 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/date/ClercqKC0MBPSV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LuykxPSY16, author = {Atul Luykx and Bart Preneel and Alan Szepieniec and Kan Yasuda}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {On the Influence of Message Length in PMAC's Security Bounds}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9665}, pages = {596--621}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49890-3\_23}, doi = {10.1007/978-3-662-49890-3\_23}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LuykxPSY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/LuykxPTY16, author = {Atul Luykx and Bart Preneel and Elmar Tischhauser and Kan Yasuda}, editor = {Thomas Peyrin}, title = {A {MAC} Mode for Lightweight Block Ciphers}, booktitle = {Fast Software Encryption - 23rd International Conference, {FSE} 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9783}, pages = {43--59}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-52993-5\_3}, doi = {10.1007/978-3-662-52993-5\_3}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/LuykxPTY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hase/CleemputMP16, author = {Sara Cleemput and Mustafa A. Mustafa and Bart Preneel}, editor = {Radu F. Babiceanu and H{\'{e}}l{\`{e}}ne Waeselynck and Raymond A. Paul and Bojan Cukic and Jie Xu}, title = {High Assurance Smart Metering}, booktitle = {17th {IEEE} International Symposium on High Assurance Systems Engineering, {HASE} 2016, Orlando, FL, USA, January 7-9, 2016}, pages = {294--297}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/HASE.2016.41}, doi = {10.1109/HASE.2016.41}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hase/CleemputMP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SymeonidisTP16, author = {Iraklis Symeonidis and Pagona Tsormpatzoudi and Bart Preneel}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Collateral Damage of Online Social Network Applications}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {536--541}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005806705360541}, doi = {10.5220/0005806705360541}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SymeonidisTP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iit/Preneel16, author = {Bart Preneel}, title = {Keynote speakers: The future of information security}, booktitle = {2016 12th International Conference on Innovations in Information Technology (IIT), Al-Ain, United Arab Emirates, November 28-30, 2016}, pages = {xiv--xx}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/INNOVATIONS.2016.7879991}, doi = {10.1109/INNOVATIONS.2016.7879991}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iit/Preneel16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iolts/KimHPV16, author = {Hyunmin Kim and Seokhie Hong and Bart Preneel and Ingrid Verbauwhede}, title = {Binary decision diagram to design balanced secure logic styles}, booktitle = {22nd {IEEE} International Symposium on On-Line Testing and Robust System Design, {IOLTS} 2016, Sant Feliu de Guixols, Spain, July 4-6, 2016}, pages = {239--244}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/IOLTS.2016.7604710}, doi = {10.1109/IOLTS.2016.7604710}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iolts/KimHPV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isc2/SymeonidisMP16, author = {Iraklis Symeonidis and Mustafa A. Mustafa and Bart Preneel}, title = {Keyless car sharing system: {A} security and privacy analysis}, booktitle = {{IEEE} International Smart Cities Conference, {ISC2} 2016, Trento, Italy, September 12-15, 2016}, pages = {1--7}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISC2.2016.7580758}, doi = {10.1109/ISC2.2016.7580758}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/isc2/SymeonidisMP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/SzepieniecDP16, author = {Alan Szepieniec and Jintai Ding and Bart Preneel}, editor = {Tsuyoshi Takagi}, title = {Extension Field Cancellation: {A} New Central Trapdoor for Multivariate Quadratic Systems}, booktitle = {Post-Quantum Cryptography - 7th International Workshop, PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9606}, pages = {182--196}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-29360-8\_12}, doi = {10.1007/978-3-319-29360-8\_12}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pqcrypto/SzepieniecDP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rfidsec/AbidinMSP16, author = {Aysajan Abidin and Eduard Marin and Dave Singel{\'{e}}e and Bart Preneel}, editor = {Gerhard P. Hancke and Konstantinos Markantonakis}, title = {Towards Quantum Distance Bounding Protocols}, booktitle = {Radio Frequency Identification and IoT Security - 12th International Workshop, RFIDSec 2016, Hong Kong, China, November 30 - December 2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10155}, pages = {151--162}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62024-4\_11}, doi = {10.1007/978-3-319-62024-4\_11}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rfidsec/AbidinMSP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/SymeonidisSBPP16, author = {Iraklis Symeonidis and Fatemeh Shirazi and Gergely Bicz{\'{o}}k and Cristina P{\'{e}}rez{-}Sol{\`{a}} and Bart Preneel}, editor = {Jaap{-}Henk Hoepman and Stefan Katzenbeisser}, title = {Collateral Damage of Facebook Apps: Friends, Providers, and Privacy Interdependence}, booktitle = {{ICT} Systems Security and Privacy Protection - 31st {IFIP} {TC} 11 International Conference, {SEC} 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {471}, pages = {194--208}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-33630-5\_14}, doi = {10.1007/978-3-319-33630-5\_14}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/SymeonidisSBPP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/RazaviGBPGB16, author = {Kaveh Razavi and Ben Gras and Erik Bosman and Bart Preneel and Cristiano Giuffrida and Herbert Bos}, editor = {Thorsten Holz and Stefan Savage}, title = {Flip Feng Shui: Hammering a Needle in the Software Stack}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {1--18}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/razavi}, timestamp = {Mon, 01 Feb 2021 08:43:18 +0100}, biburl = {https://dblp.org/rec/conf/uss/RazaviGBPGB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/MuhlbergCMBPP16, author = {Jan Tobias M{\"{u}}hlberg and Sara Cleemput and Mustafa A. Mustafa and Jo Van Bulck and Bart Preneel and Frank Piessens}, editor = {Sara Foresti and Javier L{\'{o}}pez}, title = {An Implementation of a High Assurance Smart Meter Using Protected Module Architectures}, booktitle = {Information Security Theory and Practice - 10th {IFIP} {WG} 11.2 International Conference, {WISTP} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9895}, pages = {53--69}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45931-8\_4}, doi = {10.1007/978-3-319-45931-8\_4}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/MuhlbergCMBPP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-reports/ArmknechtINP16, author = {Frederik Armknecht and Tetsu Iwata and Kaisa Nyberg and Bart Preneel}, title = {Symmetric Cryptography (Dagstuhl Seminar 16021)}, journal = {Dagstuhl Reports}, volume = {6}, number = {1}, pages = {34--54}, year = {2016}, url = {https://doi.org/10.4230/DagRep.6.1.34}, doi = {10.4230/DAGREP.6.1.34}, timestamp = {Wed, 07 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/ArmknechtINP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-reports/Danezis0PP16, author = {George Danezis and Stefan Katzenbeisser and Christiane Peters and Bart Preneel}, title = {Privacy and Security in Smart Energy Grids (Dagstuhl Seminar 16032)}, journal = {Dagstuhl Reports}, volume = {6}, number = {1}, pages = {99--107}, year = {2016}, url = {https://doi.org/10.4230/DagRep.6.1.99}, doi = {10.4230/DAGREP.6.1.99}, timestamp = {Wed, 07 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/Danezis0PP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SymeonidsP16, author = {Iraklis Symeonidis and Bart Preneel}, title = {Collateral Damage in Online Social Networks: computing the significance of information collection}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {38}, year = {2016}, url = {http://eprint.iacr.org/2016/038}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SymeonidsP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuykxPSY16, author = {Atul Luykx and Bart Preneel and Alan Szepieniec and Kan Yasuda}, title = {On the Influence of Message Length in PMAC's Security Bounds}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {185}, year = {2016}, url = {http://eprint.iacr.org/2016/185}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuykxPSY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuykxPTY16, author = {Atul Luykx and Bart Preneel and Elmar Tischhauser and Kan Yasuda}, title = {A {MAC} Mode for Lightweight Block Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {190}, year = {2016}, url = {http://eprint.iacr.org/2016/190}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuykxPTY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MarinASP16, author = {Eduard Marin and Enrique Argones{-}R{\'{u}}a and Dave Singel{\'{e}}e and Bart Preneel}, title = {A survey on physiological-signal-based security for medical devices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {867}, year = {2016}, url = {http://eprint.iacr.org/2016/867}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MarinASP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-manifestos/PreneelRRR15, author = {Bart Preneel and Phillip Rogaway and Mark Dermot Ryan and Peter Y. A. Ryan}, title = {Privacy and Security in an Age of Surveillance (Dagstuhl Perspectives Workshop 14401)}, journal = {Dagstuhl Manifestos}, volume = {5}, number = {1}, pages = {25--37}, year = {2015}, url = {https://doi.org/10.4230/DagMan.5.1.25}, doi = {10.4230/DAGMAN.5.1.25}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dagstuhl-manifestos/PreneelRRR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AndreevaMP15, author = {Elena Andreeva and Bart Mennink and Bart Preneel}, title = {Open problems in hash function security}, journal = {Des. Codes Cryptogr.}, volume = {77}, number = {2-3}, pages = {611--631}, year = {2015}, url = {https://doi.org/10.1007/s10623-015-0096-0}, doi = {10.1007/S10623-015-0096-0}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AndreevaMP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/LuykxMPW15, author = {Atul Luykx and Bart Mennink and Bart Preneel and Laura Winnen}, title = {Two-permutation-based hashing with binary mixing}, journal = {J. Math. Cryptol.}, volume = {9}, number = {3}, pages = {139--150}, year = {2015}, url = {http://www.degruyter.com/view/j/jmc.2015.9.issue-3/jmc-2015-0015/jmc-2015-0015.xml}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/LuykxMPW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tecs/ScheirBRPV15, author = {Marijn Scheir and Josep Balasch and Alfredo Rial and Bart Preneel and Ingrid Verbauwhede}, title = {Anonymous Split E-Cash - Toward Mobile Anonymous Payments}, journal = {{ACM} Trans. Embed. Comput. Syst.}, volume = {14}, number = {4}, pages = {85:1--85:25}, year = {2015}, url = {https://doi.org/10.1145/2783439}, doi = {10.1145/2783439}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tecs/ScheirBRPV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/MenninkP15, author = {Bart Mennink and Bart Preneel}, editor = {Tal Malkin and Vladimir Kolesnikov and Allison Bishop Lewko and Michalis Polychronakis}, title = {On the {XOR} of Multiple Random Permutations}, booktitle = {Applied Cryptography and Network Security - 13th International Conference, {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9092}, pages = {619--634}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28166-7\_30}, doi = {10.1007/978-3-319-28166-7\_30}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/MenninkP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/MenninkP15, author = {Bart Mennink and Bart Preneel}, editor = {Tetsu Iwata and Jung Hee Cheon}, title = {On the Impact of Known-Key Attacks on Hash Functions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9453}, pages = {59--84}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48800-3\_3}, doi = {10.1007/978-3-662-48800-3\_3}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/MenninkP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/Preneel15, author = {Bart Preneel}, editor = {Paolo Falcarin and Brecht Wyseur}, title = {Software Security: Squaring the Circle?}, booktitle = {1st {IEEE/ACM} International Workshop on Software Protection, {SPRO} 2015, Florence, Italy, May 19, 2015}, pages = {1}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SPRO.2015.8}, doi = {10.1109/SPRO.2015.8}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/Preneel15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/Preneel15a, author = {Bart Preneel}, editor = {Ilaria Matteucci and Paolo Mori and Marinella Petrocchi}, title = {Cryptography and Information Security in the Post-Snowden Era}, booktitle = {1st {IEEE/ACM} International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity, {TELERISE} 2015, Florence, Italy, May 18, 2015}, pages = {1}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/TELERISE.2015.8}, doi = {10.1109/TELERISE.2015.8}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/Preneel15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/Preneel15, author = {Bart Preneel}, editor = {Edgar R. Weippl and Florian Kerschbaum and Adam J. Lee}, title = {Post-Snowden Threat Models}, booktitle = {Proceedings of the 20th {ACM} Symposium on Access Control Models and Technologies, Vienna, Austria, June 1-3, 2015}, pages = {1}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2752952.2752978}, doi = {10.1145/2752952.2752978}, timestamp = {Mon, 26 Jun 2023 20:45:28 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/Preneel15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/SchroeM0P15, author = {Willem Schro{\'{e}} and Bart Mennink and Elena Andreeva and Bart Preneel}, editor = {Orr Dunkelman and Liam Keliher}, title = {Forgery and Subkey Recovery on {CAESAR} Candidate iFeed}, booktitle = {Selected Areas in Cryptography - {SAC} 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9566}, pages = {197--204}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31301-6\_11}, doi = {10.1007/978-3-319-31301-6\_11}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/SchroeM0P15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/worldcis/ToliP15, author = {Christina{-}Angeliki Toli and Bart Preneel}, title = {Provoking security: Spoofing attacks against crypto-biometric systems}, booktitle = {2015 World Congress on Internet Security, WorldCIS 2015, Dublin, Ireland, October 19-21, 2015}, pages = {67--72}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/WorldCIS.2015.7359416}, doi = {10.1109/WORLDCIS.2015.7359416}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/worldcis/ToliP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/balkancryptsec/2014, editor = {Berna {\"{O}}rs and Bart Preneel}, title = {Cryptography and Information Security in the Balkans - First International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9024}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-21356-9}, doi = {10.1007/978-3-319-21356-9}, isbn = {978-3-319-21355-2}, timestamp = {Tue, 16 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/balkancryptsec/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SymeonidsBTP15, author = {Iraklis Symeonidis and Filipe Beato and Pagona Tsormpatzoudi and Bart Preneel}, title = {Collateral damage of Facebook Apps: an enhanced privacy scoring model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {456}, year = {2015}, url = {http://eprint.iacr.org/2015/456}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SymeonidsBTP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgievichGKNPRST15, author = {Sergey Agievich and Anastasiya Gorodilova and Nikolay Kolomeec and Svetla Nikova and Bart Preneel and Vincent Rijmen and George Shushuev and Natalia N. Tokareva and Valeriya Vitkup}, title = {Problems, solutions and experience of the first international student's Olympiad in cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {534}, year = {2015}, url = {http://eprint.iacr.org/2015/534}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgievichGKNPRST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SzepieniecP15, author = {Alan Szepieniec and Bart Preneel}, title = {New Techniques for Electronic Voting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {809}, year = {2015}, url = {http://eprint.iacr.org/2015/809}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SzepieniecP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MenninkP15, author = {Bart Mennink and Bart Preneel}, title = {On the Impact of Known-Key Attacks on Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {909}, year = {2015}, url = {http://eprint.iacr.org/2015/909}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MenninkP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SzepieniecDP15, author = {Alan Szepieniec and Jintai Ding and Bart Preneel}, title = {Extension Field Cancellation: a New Central Trapdoor for Multivariate Quadratic Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1184}, year = {2015}, url = {http://eprint.iacr.org/2015/1184}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SzepieniecDP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Preneel14, author = {Bart Preneel}, title = {Attacking a problem from the middle: technical perspective}, journal = {Commun. {ACM}}, volume = {57}, number = {10}, pages = {97}, year = {2014}, url = {https://doi.org/10.1145/2661432}, doi = {10.1145/2661432}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacm/Preneel14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/IdeguchiTP14, author = {Kota Ideguchi and Elmar Tischhauser and Bart Preneel}, title = {Internal differential collision attacks on the reduced-round Gr{\o}stl-0 hash function}, journal = {Des. Codes Cryptogr.}, volume = {70}, number = {3}, pages = {251--271}, year = {2014}, url = {https://doi.org/10.1007/s10623-012-9674-6}, doi = {10.1007/S10623-012-9674-6}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/IdeguchiTP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/MavrogiannopoulosPP14, author = {Nikos Mavrogiannopoulos and Andreas Pashalidis and Bart Preneel}, title = {Toward a secure Kerberos key exchange with smart cards}, journal = {Int. J. Inf. Sec.}, volume = {13}, number = {3}, pages = {217--228}, year = {2014}, url = {https://doi.org/10.1007/s10207-013-0213-x}, doi = {10.1007/S10207-013-0213-X}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/MavrogiannopoulosPP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/HermansPP14, author = {Jens Hermans and Roel Peeters and Bart Preneel}, title = {Proper {RFID} Privacy: Model and Protocols}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {13}, number = {12}, pages = {2888--2902}, year = {2014}, url = {https://doi.org/10.1109/TMC.2014.2314127}, doi = {10.1109/TMC.2014.2314127}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmc/HermansPP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/MenninkP14, author = {Bart Mennink and Bart Preneel}, editor = {Dimitris Gritzalis and Aggelos Kiayias and Ioannis G. Askoxylakis}, title = {Breaking and Fixing Cryptophia's Short Combiner}, booktitle = {Cryptology and Network Security - 13th International Conference, {CANS} 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8813}, pages = {50--63}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12280-9\_4}, doi = {10.1007/978-3-319-12280-9\_4}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/cans/MenninkP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/BeatoCPV14, author = {Filipe Beato and Mauro Conti and Bart Preneel and Dario Vettore}, title = {VirtualFriendship: Hiding interactions on Online Social Networks}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {328--336}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997501}, doi = {10.1109/CNS.2014.6997501}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/BeatoCPV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/p2p/HerrmannZNDP14, author = {Michael Herrmann and Ren Zhang and Kai{-}Chun Ning and Claudia D{\'{\i}}az and Bart Preneel}, title = {Censorship-resistant and privacy-preserving distributed web search}, booktitle = {14th {IEEE} International Conference on Peer-to-Peer Computing, {P2P} 2014, London, United Kingdom, September 9-11, 2014, Proceedings}, pages = {1--10}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/P2P.2014.6934312}, doi = {10.1109/P2P.2014.6934312}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/p2p/HerrmannZNDP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/primelife/ToliP14, author = {Christina{-}Angeliki Toli and Bart Preneel}, editor = {Jan Camenisch and Simone Fischer{-}H{\"{u}}bner and Marit Hansen}, title = {A Survey on Multimodal Biometrics and the Protection of Their Templates}, booktitle = {Privacy and Identity Management for the Future Internet in the Age of Globalisation - 9th {IFIP} {WG} 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Patras, Greece, September 7-12, 2014, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {457}, pages = {169--184}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-18621-4\_12}, doi = {10.1007/978-3-319-18621-4\_12}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/primelife/ToliP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/MouhaMHWPV14, author = {Nicky Mouha and Bart Mennink and Anthony Van Herrewege and Dai Watanabe and Bart Preneel and Ingrid Verbauwhede}, editor = {Antoine Joux and Amr M. Youssef}, title = {Chaskey: An Efficient {MAC} Algorithm for 32-bit Microcontrollers}, booktitle = {Selected Areas in Cryptography - {SAC} 2014 - 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8781}, pages = {306--323}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13051-4\_19}, doi = {10.1007/978-3-319-13051-4\_19}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/MouhaMHWPV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/HerrmannRDP14, author = {Michael Herrmann and Alfredo Rial and Claudia D{\'{\i}}az and Bart Preneel}, editor = {Gergely {\'{A}}cs and Andrew P. Martin and Ivan Martinovic and Claude Castelluccia and Patrick Traynor}, title = {Practical privacy-preserving location-sharing based services with aggregate statistics}, booktitle = {7th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014}, pages = {87--98}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2627393.2627414}, doi = {10.1145/2627393.2627414}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/HerrmannRDP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/apf/2012, editor = {Bart Preneel and Demosthenes Ikonomou}, title = {Privacy Technologies and Policy - First Annual Privacy Forum, {APF} 2012, Limassol, Cyprus, October 10-11, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8319}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54069-1}, doi = {10.1007/978-3-642-54069-1}, isbn = {978-3-642-54068-4}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/apf/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/apf/2014, editor = {Bart Preneel and Demosthenes Ikonomou}, title = {Privacy Technologies and Policy - Second Annual Privacy Forum, {APF} 2014, Athens, Greece, May 20-21, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8450}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06749-0}, doi = {10.1007/978-3-319-06749-0}, isbn = {978-3-319-06748-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/apf/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sofsem/2014, editor = {Viliam Geffert and Bart Preneel and Branislav Rovan and Julius Stuller and A Min Tjoa}, title = {{SOFSEM} 2014: Theory and Practice of Computer Science - 40th International Conference on Current Trends in Theory and Practice of Computer Science, Nov{\'{y}} Smokovec, Slovakia, January 26-29, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8327}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-04298-5}, doi = {10.1007/978-3-319-04298-5}, isbn = {978-3-319-04297-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sofsem/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-reports/ArmknechtHIP14, author = {Frederik Armknecht and Helena Handschuh and Tetsu Iwata and Bart Preneel}, title = {Symmetric Cryptography (Dagstuhl Seminar 14021)}, journal = {Dagstuhl Reports}, volume = {4}, number = {1}, pages = {1--16}, year = {2014}, url = {https://doi.org/10.4230/DagRep.4.1.1}, doi = {10.4230/DAGREP.4.1.1}, timestamp = {Wed, 07 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/ArmknechtHIP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-reports/PreneelRRR14, author = {Bart Preneel and Phillip Rogaway and Mark Dermot Ryan and Peter Y. A. Ryan}, title = {Privacy and Security in an Age of Surveillance (Dagstuhl Perspectives Workshop 14401)}, journal = {Dagstuhl Reports}, volume = {4}, number = {9}, pages = {106--123}, year = {2014}, url = {https://doi.org/10.4230/DagRep.4.9.106}, doi = {10.4230/DAGREP.4.9.106}, timestamp = {Wed, 07 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/PreneelRRR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MenninkP14, author = {Bart Mennink and Bart Preneel}, title = {Triple and Quadruple Encryption: Bridging the Gaps}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {16}, year = {2014}, url = {http://eprint.iacr.org/2014/016}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MenninkP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MouhaMHWPV14, author = {Nicky Mouha and Bart Mennink and Anthony Van Herrewege and Dai Watanabe and Bart Preneel and Ingrid Verbauwhede}, title = {Chaskey: An Efficient {MAC} Algorithm for 32-bit Microcontrollers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {386}, year = {2014}, url = {http://eprint.iacr.org/2014/386}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MouhaMHWPV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cma/LopezNPPP13, author = {Javier L{\'{o}}pez and Svetla Nikova and Andreas Pashalidis and G{\"{u}}nther Pernul and Bart Preneel}, title = {Preface}, journal = {Comput. Math. Appl.}, volume = {65}, number = {5}, pages = {747}, year = {2013}, url = {https://doi.org/10.1016/j.camwa.2013.02.001}, doi = {10.1016/J.CAMWA.2013.02.001}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cma/LopezNPPP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spm/BohoWDCBSPW13, author = {Andras Boho and Glenn Van Wallendael and Ann Dooms and Jan De Cock and Geert Braeckman and Peter Schelkens and Bart Preneel and Rik Van de Walle}, title = {End-To-End Security for Video Distribution: The Combination of Encryption, Watermarking, and Video Adaptation}, journal = {{IEEE} Signal Process. Mag.}, volume = {30}, number = {2}, pages = {97--107}, year = {2013}, url = {https://doi.org/10.1109/MSP.2012.2230220}, doi = {10.1109/MSP.2012.2230220}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spm/BohoWDCBSPW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/arc/OttoyPGS13, author = {Geoffrey Ottoy and Bart Preneel and Jean{-}Pierre Goemaere and Lieven De Strycker}, editor = {Philip Brisk and Jos{\'{e}} Gabriel F. Coutinho and Pedro C. Diniz}, title = {Flexible Design of a Modular Simultaneous Exponentiation Core for Embedded Platforms}, booktitle = {Reconfigurable Computing: Architectures, Tools and Applications - 9th International Symposium, {ARC} 2013, Los Angeles, CA, USA, March 25-27, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7806}, pages = {115--121}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36812-7\_11}, doi = {10.1007/978-3-642-36812-7\_11}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/arc/OttoyPGS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AcarJNDGPP13, author = {Gunes Acar and Marc Juarez and Nick Nikiforakis and Claudia D{\'{\i}}az and Seda F. G{\"{u}}rses and Frank Piessens and Bart Preneel}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {FPDetective: dusting the web for fingerprinters}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1129--1140}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516674}, doi = {10.1145/2508859.2516674}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AcarJNDGPP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/OttoyLNPS13, author = {Geoffrey Ottoy and Jorn Lapon and Vincent Naessens and Bart Preneel and Lieven De Strycker}, editor = {Bart De Decker and Jana Dittmann and Christian Kraetzer and Claus Vielhauer}, title = {Dedicated Hardware for Attribute-Based Credential Verification}, booktitle = {Communications and Multimedia Security - 14th {IFIP} {TC} 6/TC 11 International Conference, {CMS} 2013, Magdeburg, Germany, September 25-26, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8099}, pages = {50--65}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40779-6\_4}, doi = {10.1007/978-3-642-40779-6\_4}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cms/OttoyLNPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/BeatoICPL13, author = {Filipe Beato and Iulia Ion and Srdjan Capkun and Bart Preneel and Marc Langheinrich}, editor = {Elisa Bertino and Ravi S. Sandhu and Lujo Bauer and Jaehong Park}, title = {For some eyes only: protecting online information sharing}, booktitle = {Third {ACM} Conference on Data and Application Security and Privacy, CODASPY'13, San Antonio, TX, USA, February 18-20, 2013}, pages = {1--12}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2435349.2435351}, doi = {10.1145/2435349.2435351}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/BeatoICPL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/WallendaelCLBLPW13, author = {Glenn Van Wallendael and Jan De Cock and Sebastiaan Van Leuven and Andras Boho and Peter Lambert and Bart Preneel and Rik Van de Walle}, title = {Format-compliant encryption techniques for high efficiency video coding}, booktitle = {{IEEE} International Conference on Image Processing, {ICIP} 2013, Melbourne, Australia, September 15-18, 2013}, pages = {4583--4587}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICIP.2013.6738944}, doi = {10.1109/ICIP.2013.6738944}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icip/WallendaelCLBLPW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/StrackxNVPP13, author = {Raoul Strackx and Job Noorman and Ingrid Verbauwhede and Bart Preneel and Frank Piessens}, editor = {Helmut Reimer and Norbert Pohlmann and Wolfgang Schneider}, title = {Protected Software Module Architectures}, booktitle = {{ISSE} 2013 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2013 Conference, Brussels, Belgium, October 22-23, 2013}, pages = {241--251}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-658-03371-2\_21}, doi = {10.1007/978-3-658-03371-2\_21}, timestamp = {Wed, 24 Apr 2019 16:36:13 +0200}, biburl = {https://dblp.org/rec/conf/isse/StrackxNVPP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/BeatoCP13, author = {Filipe Beato and Mauro Conti and Bart Preneel}, title = {Friend in the Middle (FiM): Tackling de-anonymization in social networks}, booktitle = {2013 {IEEE} International Conference on Pervasive Computing and Communications Workshops, {PERCOM} 2013 Workshops, San Diego, CA, USA, March 18-22, 2013}, pages = {279--284}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/PerComW.2013.6529495}, doi = {10.1109/PERCOMW.2013.6529495}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/BeatoCP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/WuP13, author = {Hongjun Wu and Bart Preneel}, editor = {Tanja Lange and Kristin E. Lauter and Petr Lisonek}, title = {{AEGIS:} {A} Fast Authenticated Encryption Algorithm}, booktitle = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8282}, pages = {185--201}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43414-7\_10}, doi = {10.1007/978-3-662-43414-7\_10}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/WuP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/LepointRMRP13, author = {Tancr{\`{e}}de Lepoint and Matthieu Rivain and Yoni De Mulder and Peter Roelse and Bart Preneel}, editor = {Tanja Lange and Kristin E. Lauter and Petr Lisonek}, title = {Two Attacks on a White-Box {AES} Implementation}, booktitle = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8282}, pages = {265--285}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43414-7\_14}, doi = {10.1007/978-3-662-43414-7\_14}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/LepointRMRP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/Preneel13, author = {Bart Preneel}, editor = {Willem Jonker and Milan Petkovic}, title = {The Future of Information Security Research: Cryptology and Beyond}, booktitle = {Secure Data Management - 10th {VLDB} Workshop, {SDM} 2013, Trento, Italy, August 30, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8425}, pages = {23--27}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-06811-4\_5}, doi = {10.1007/978-3-319-06811-4\_5}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/Preneel13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/Preneel13, author = {Bart Preneel}, editor = {Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Oleg B. Makarevich}, title = {The {SHA-3} competition: lessons learned}, booktitle = {The 6th International Conference on Security of Information and Networks, {SIN} '13, Aksaray, Turkey, November 26-28, 2013}, pages = {16--19}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523514.2523592}, doi = {10.1145/2523514.2523592}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/Preneel13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/NoormanADSHHPVP13, author = {Job Noorman and Pieter Agten and Wilfried Daniels and Raoul Strackx and Anthony Van Herrewege and Christophe Huygens and Bart Preneel and Ingrid Verbauwhede and Frank Piessens}, editor = {Samuel T. King}, title = {Sancus: Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base}, booktitle = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC, USA, August 14-16, 2013}, pages = {479--494}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/noorman}, timestamp = {Mon, 01 Feb 2021 08:42:56 +0100}, biburl = {https://dblp.org/rec/conf/uss/NoormanADSHHPVP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/HerrmannTDP13, author = {Michael Herrmann and Carmela Troncoso and Claudia D{\'{\i}}az and Bart Preneel}, editor = {Ahmad{-}Reza Sadeghi and Sara Foresti}, title = {Optimal sporadic location privacy preserving systems in presence of bandwidth constraints}, booktitle = {Proceedings of the 12th annual {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2013, Berlin, Germany, November 4, 2013}, pages = {167--178}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517840.2517853}, doi = {10.1145/2517840.2517853}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wpes/HerrmannTDP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MouhaP13, author = {Nicky Mouha and Bart Preneel}, title = {A Proof that the {ARX} Cipher Salsa20 is Secure against Differential Cryptanalysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {328}, year = {2013}, url = {http://eprint.iacr.org/2013/328}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MouhaP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MulderRP13, author = {Yoni De Mulder and Peter Roelse and Bart Preneel}, title = {Revisiting the {BGE} Attack on a White-Box {AES} Implementation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {450}, year = {2013}, url = {http://eprint.iacr.org/2013/450}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MulderRP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WuP13, author = {Hongjun Wu and Bart Preneel}, title = {{AEGIS:} {A} Fast Authenticated Encryption Algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {695}, year = {2013}, url = {http://eprint.iacr.org/2013/695}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/WuP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/HiroseIKOPY12, author = {Shoichi Hirose and Kota Ideguchi and Hidenori Kuwakado and Toru Owada and Bart Preneel and Hirotaka Yoshida}, title = {An {AES} Based 256-bit Hash Function for Lightweight Applications: Lesamnta-LW}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {95-A}, number = {1}, pages = {89--99}, year = {2012}, url = {https://doi.org/10.1587/transfun.E95.A.89}, doi = {10.1587/TRANSFUN.E95.A.89}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/HiroseIKOPY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/AndreevaBMPR12, author = {Elena Andreeva and Andrey Bogdanov and Bart Mennink and Bart Preneel and Christian Rechberger}, title = {On security arguments of the second round {SHA-3} candidates}, journal = {Int. J. Inf. Sec.}, volume = {11}, number = {2}, pages = {103--120}, year = {2012}, url = {https://doi.org/10.1007/s10207-012-0156-7}, doi = {10.1007/S10207-012-0156-7}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/AndreevaBMPR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/AndreevaMP12, author = {Elena Andreeva and Bart Mennink and Bart Preneel}, title = {The parazoa family: generalizing the sponge hash functions}, journal = {Int. J. Inf. Sec.}, volume = {11}, number = {3}, pages = {149--165}, year = {2012}, url = {https://doi.org/10.1007/s10207-012-0157-6}, doi = {10.1007/S10207-012-0157-6}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/AndreevaMP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/MouhaSP12, author = {Nicky Mouha and Gautham Sekar and Bart Preneel}, title = {Challenging the increased resistance of regular hash functions against birthday attacks}, journal = {J. Math. Cryptol.}, volume = {6}, number = {3-4}, pages = {229--248}, year = {2012}, url = {https://doi.org/10.1515/jmc-2011-0010}, doi = {10.1515/JMC-2011-0010}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/MouhaSP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/AertsBMMDIKPVV12, author = {Wim Aerts and Eli Biham and Dieter De Moitie and Elke De Mulder and Orr Dunkelman and Sebastiaan Indesteege and Nathan Keller and Bart Preneel and Guy A. E. Vandenbosch and Ingrid Verbauwhede}, title = {A Practical Attack on KeeLoq}, journal = {J. Cryptol.}, volume = {25}, number = {1}, pages = {136--157}, year = {2012}, url = {https://doi.org/10.1007/s00145-010-9091-9}, doi = {10.1007/S00145-010-9091-9}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/AertsBMMDIKPVV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mcm/PreneelKS12, author = {Bart Preneel and Jongsung Kim and Damien Sauveron}, title = {Advanced theory and practice for cryptography and future security}, journal = {Math. Comput. Model.}, volume = {55}, number = {1-2}, pages = {1--2}, year = {2012}, url = {https://doi.org/10.1016/j.mcm.2011.09.020}, doi = {10.1016/J.MCM.2011.09.020}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mcm/PreneelKS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pervasive/PeetersSP12, author = {Roel Peeters and Dave Singel{\'{e}}e and Bart Preneel}, title = {Toward More Secure and Reliable Access Control}, journal = {{IEEE} Pervasive Comput.}, volume = {11}, number = {3}, pages = {76--83}, year = {2012}, url = {https://doi.org/10.1109/MPRV.2011.42}, doi = {10.1109/MPRV.2011.42}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pervasive/PeetersSP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/KimHPBDK12, author = {Jongsung Kim and Seokhie Hong and Bart Preneel and Eli Biham and Orr Dunkelman and Nathan Keller}, title = {Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis}, journal = {{IEEE} Trans. Inf. Theory}, volume = {58}, number = {7}, pages = {4948--4966}, year = {2012}, url = {https://doi.org/10.1109/TIT.2012.2191655}, doi = {10.1109/TIT.2012.2191655}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/KimHPBDK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/PashalidisP12, author = {Andreas Pashalidis and Bart Preneel}, title = {Evaluating Tag-Based Preference Obfuscation Systems}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {24}, number = {9}, pages = {1613--1623}, year = {2012}, url = {https://doi.org/10.1109/TKDE.2011.118}, doi = {10.1109/TKDE.2011.118}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/PashalidisP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/ChenWP12, author = {Jiazhe Chen and Meiqin Wang and Bart Preneel}, editor = {Aikaterini Mitrokotsa and Serge Vaudenay}, title = {Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, {XTEA} and {HIGHT}}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2012 - 5th International Conference on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7374}, pages = {117--137}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31410-0\_8}, doi = {10.1007/978-3-642-31410-0\_8}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/ChenWP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/AndreevaMPS12, author = {Elena Andreeva and Bart Mennink and Bart Preneel and Marjan Skrobot}, editor = {Aikaterini Mitrokotsa and Serge Vaudenay}, title = {Security Analysis and Comparison of the {SHA-3} Finalists BLAKE, Gr{\o}stl, JH, Keccak, and Skein}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2012 - 5th International Conference on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7374}, pages = {287--305}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31410-0\_18}, doi = {10.1007/978-3-642-31410-0\_18}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/AndreevaMPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asap/UhsadelUVP12, author = {Leif Uhsadel and Markus Ullrich and Ingrid Verbauwhede and Bart Preneel}, title = {Interface Design for Mapping a Variety of {RSA} Exponentiation Algorithms on a {HW/SW} Co-design Platform}, booktitle = {23rd {IEEE} International Conference on Application-Specific Systems, Architectures and Processors, {ASAP} 2012, Delft, The Netherlands, July 9-11, 2012}, pages = {109--116}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ASAP.2012.11}, doi = {10.1109/ASAP.2012.11}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asap/UhsadelUVP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/IndesteegeP12, author = {Sebastiaan Indesteege and Bart Preneel}, editor = {David Naccache}, title = {{DES} Collisions Revisited}, booktitle = {Cryptography and Security: From Theory to Applications - Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday}, series = {Lecture Notes in Computer Science}, volume = {6805}, pages = {13--24}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28368-0\_4}, doi = {10.1007/978-3-642-28368-0\_4}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/birthday/IndesteegeP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MavrogiannopoulosPP12, author = {Nikos Mavrogiannopoulos and Andreas Pashalidis and Bart Preneel}, editor = {Heung Youl Youm and Yoojae Won}, title = {Security implications in Kerberos by the introduction of smart cards}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {59--60}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414490}, doi = {10.1145/2414456.2414490}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MavrogiannopoulosPP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MavrogiannopoulosVVP12, author = {Nikos Mavrogiannopoulos and Frederik Vercauteren and Vesselin Velichkov and Bart Preneel}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {A cross-protocol attack on the {TLS} protocol}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {62--72}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382206}, doi = {10.1145/2382196.2382206}, timestamp = {Tue, 12 Apr 2022 13:28:49 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MavrogiannopoulosVVP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/LeestPS12, author = {Vincent van der Leest and Bart Preneel and Erik van der Sluis}, editor = {Emmanuel Prouff and Patrick Schaumont}, title = {Soft Decision Error Correction for Compact Memory-Based PUFs Using a Single Enrollment}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7428}, pages = {268--282}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33027-8\_16}, doi = {10.1007/978-3-642-33027-8\_16}, timestamp = {Mon, 15 Jun 2020 17:09:16 +0200}, biburl = {https://dblp.org/rec/conf/ches/LeestPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MenninkP12, author = {Bart Mennink and Bart Preneel}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Hash Functions Based on Three Permutations: {A} Generic Security Analysis}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {330--347}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_20}, doi = {10.1007/978-3-642-32009-5\_20}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/MenninkP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/Preneel12, author = {Bart Preneel}, editor = {Guido Bertoni and Benedikt Gierlichs}, title = {It's Not My Fault - On Fault Attacks on Symmetric Cryptography}, booktitle = {2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, Leuven, Belgium, September 9, 2012}, pages = {57--60}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/FDTC.2012.20}, doi = {10.1109/FDTC.2012.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fdtc/Preneel12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/WangSTP12, author = {Meiqin Wang and Yue Sun and Elmar Tischhauser and Bart Preneel}, editor = {Anne Canteaut}, title = {A Model for Structure Attacks, with Applications to {PRESENT} and Serpent}, booktitle = {Fast Software Encryption - 19th International Workshop, {FSE} 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7549}, pages = {49--68}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34047-5\_4}, doi = {10.1007/978-3-642-34047-5\_4}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/WangSTP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/VelichkovMCP12, author = {Vesselin Velichkov and Nicky Mouha and Christophe De Canni{\`{e}}re and Bart Preneel}, editor = {Anne Canteaut}, title = {{UNAF:} {A} Special Set of Additive Differences with Application to the Differential Analysis of {ARX}}, booktitle = {Fast Software Encryption - 19th International Workshop, {FSE} 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7549}, pages = {287--305}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34047-5\_17}, doi = {10.1007/978-3-642-34047-5\_17}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/VelichkovMCP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icb/SimoensYZBBNP12, author = {Koen Simoens and Bian Yang and Xuebing Zhou and Filipe Beato and Christoph Busch and Elaine M. Newton and Bart Preneel}, editor = {Anil K. Jain and Arun Ross and Salil Prabhakar and Jaihie Kim}, title = {Criteria towards metrics for benchmarking template protection algorithms}, booktitle = {5th {IAPR} International Conference on Biometrics, {ICB} 2012, New Delhi, India, March 29 - April 1, 2012}, pages = {498--505}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ICB.2012.6199799}, doi = {10.1109/ICB.2012.6199799}, timestamp = {Wed, 06 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icb/SimoensYZBBNP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/WengBDPS12, author = {Li Weng and Geert Braeckman and Ann Dooms and Bart Preneel and Peter Schelkens}, title = {Robust Image Content Authentication with Tamper Location}, booktitle = {Proceedings of the 2012 {IEEE} International Conference on Multimedia and Expo, {ICME} 2012, Melbourne, Australia, July 9-13, 2012}, pages = {380--385}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ICME.2012.163}, doi = {10.1109/ICME.2012.163}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icmcs/WengBDPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pcm/WengDPMD12, author = {Li Weng and Rony Darazi and Bart Preneel and Beno{\^{\i}}t Macq and Ann Dooms}, editor = {Weisi Lin and Dong Xu and Anthony T. S. Ho and Jianxin Wu and Ying He and Jianfei Cai and Mohan S. Kankanhalli and Ming{-}Ting Sun}, title = {Robust Image Content Authentication Using Perceptual Hashing and Watermarking}, booktitle = {Advances in Multimedia Information Processing - {PCM} 2012 - 13th Pacific-Rim Conference on Multimedia, Singapore, December 4-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7674}, pages = {315--326}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34778-8\_29}, doi = {10.1007/978-3-642-34778-8\_29}, timestamp = {Mon, 19 Sep 2022 15:19:36 +0200}, biburl = {https://dblp.org/rec/conf/pcm/WengDPMD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/MavrogiannopoulosTP12, author = {Nikos Mavrogiannopoulos and Miloslav Trmac and Bart Preneel}, editor = {Sascha Ossowski and Paola Lecca}, title = {A linux kernel cryptographic framework: decoupling cryptographic keys from applications}, booktitle = {Proceedings of the {ACM} Symposium on Applied Computing, {SAC} 2012, Riva, Trento, Italy, March 26-30, 2012}, pages = {1435--1442}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2245276.2232006}, doi = {10.1145/2245276.2232006}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/MavrogiannopoulosTP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/MulderRP12, author = {Yoni De Mulder and Peter Roelse and Bart Preneel}, editor = {Lars R. Knudsen and Huapeng Wu}, title = {Cryptanalysis of the Xiao - Lai White-Box {AES} Implementation}, booktitle = {Selected Areas in Cryptography, 19th International Conference, {SAC} 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7707}, pages = {34--49}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35999-6\_3}, doi = {10.1007/978-3-642-35999-6\_3}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/MulderRP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-reports/ArmknechtLPR12, author = {Frederik Armknecht and Stefan Lucks and Bart Preneel and Phillip Rogaway}, title = {Symmetric Cryptography (Dagstuhl Seminar 12031)}, journal = {Dagstuhl Reports}, volume = {2}, number = {1}, pages = {39--49}, year = {2012}, url = {https://doi.org/10.4230/DagRep.2.1.39}, doi = {10.4230/DAGREP.2.1.39}, timestamp = {Wed, 07 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/ArmknechtLPR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AndreevaBMPR12, author = {Elena Andreeva and Andrey Bogdanov and Bart Mennink and Bart Preneel and Christian Rechberger}, title = {On Security Arguments of the Second Round {SHA-3} Candidates}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {147}, year = {2012}, url = {http://eprint.iacr.org/2012/147}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AndreevaBMPR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuykxAMP12, author = {Atul Luykx and Elena Andreeva and Bart Mennink and Bart Preneel}, title = {Impossibility Results for Indifferentiability with Resets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {644}, year = {2012}, url = {http://eprint.iacr.org/2012/644}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuykxAMP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MavrogiannopoulosKP11, author = {Nikos Mavrogiannopoulos and Nessim Kisserli and Bart Preneel}, title = {A taxonomy of self-modifying code for obfuscation}, journal = {Comput. Secur.}, volume = {30}, number = {8}, pages = {679--691}, year = {2011}, url = {https://doi.org/10.1016/j.cose.2011.08.007}, doi = {10.1016/J.COSE.2011.08.007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MavrogiannopoulosKP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijhcr/PeetersSP11, author = {Roel Peeters and Dave Singel{\'{e}}e and Bart Preneel}, title = {Threshold-Based Location-Aware Access Control}, journal = {Int. J. Handheld Comput. Res.}, volume = {2}, number = {3}, pages = {22--37}, year = {2011}, url = {https://doi.org/10.4018/jhcr.2011070102}, doi = {10.4018/JHCR.2011070102}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijhcr/PeetersSP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/integration/SakiyamaKFPV11, author = {Kazuo Sakiyama and Miroslav Knezevic and Junfeng Fan and Bart Preneel and Ingrid Verbauwhede}, title = {Tripartite modular multiplication}, journal = {Integr.}, volume = {44}, number = {4}, pages = {259--269}, year = {2011}, url = {https://doi.org/10.1016/j.vlsi.2011.03.008}, doi = {10.1016/J.VLSI.2011.03.008}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/integration/SakiyamaKFPV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/WolfP11, author = {Christopher Wolf and Bart Preneel}, title = {Equivalent keys in {\(\mathscr{M}\)}ultivariate uadratic public key systems}, journal = {J. Math. Cryptol.}, volume = {4}, number = {4}, pages = {375--415}, year = {2011}, url = {https://doi.org/10.1515/jmc.2011.004}, doi = {10.1515/JMC.2011.004}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/WolfP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/IndesteegeP11, author = {Sebastiaan Indesteege and Bart Preneel}, title = {Practical Collisions for EnRUPT}, journal = {J. Cryptol.}, volume = {24}, number = {1}, pages = {1--23}, year = {2011}, url = {https://doi.org/10.1007/s00145-010-9058-x}, doi = {10.1007/S00145-010-9058-X}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/IndesteegeP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/re/DengWSPJ11, author = {Mina Deng and Kim Wuyts and Riccardo Scandariato and Bart Preneel and Wouter Joosen}, title = {A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements}, journal = {Requir. Eng.}, volume = {16}, number = {1}, pages = {3--32}, year = {2011}, url = {https://doi.org/10.1007/s00766-010-0115-7}, doi = {10.1007/S00766-010-0115-7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/re/DengWSPJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/software/GuWPAS11, author = {Yuan Xiang Gu and Brecht Wyseur and Bart Preneel and Jean{-}Daniel Aussel and Reiner Sailer}, title = {Point/Counterpoint}, journal = {{IEEE} Softw.}, volume = {28}, number = {2}, pages = {56--59}, year = {2011}, url = {https://doi.org/10.1109/MS.2011.39}, doi = {10.1109/MS.2011.39}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/software/GuWPAS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/TroncosoDKBP11, author = {Carmela Troncoso and George Danezis and Eleni Kosta and Josep Balasch and Bart Preneel}, title = {PriPAYD: Privacy-Friendly Pay-As-You-Drive Insurance}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {8}, number = {5}, pages = {742--755}, year = {2011}, url = {https://doi.org/10.1109/TDSC.2010.71}, doi = {10.1109/TDSC.2010.71}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/TroncosoDKBP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/RialBP11, author = {Alfredo Rial and Josep Balasch and Bart Preneel}, title = {A Privacy-Preserving Buyer-Seller Watermarking Protocol Based on Priced Oblivious Transfer}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {6}, number = {1}, pages = {202--212}, year = {2011}, url = {https://doi.org/10.1109/TIFS.2010.2095844}, doi = {10.1109/TIFS.2010.2095844}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/RialBP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WangSMP11, author = {Meiqin Wang and Yue Sun and Nicky Mouha and Bart Preneel}, editor = {Udaya Parampalli and Philip Hawkes}, title = {Algebraic Techniques in Differential Cryptanalysis Revisited}, booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP} 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6812}, pages = {120--141}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22497-3\_9}, doi = {10.1007/978-3-642-22497-3\_9}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WangSMP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PreneelYW11, author = {Bart Preneel and Hirotaka Yoshida and Dai Watanabe}, editor = {Udaya Parampalli and Philip Hawkes}, title = {Finding Collisions for Reduced \emph{Luffa}-256 v2 (Poster)}, booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP} 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6812}, pages = {423--427}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22497-3\_29}, doi = {10.1007/978-3-642-22497-3\_29}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PreneelYW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/Preneel11, author = {Bart Preneel}, editor = {Abderrahmane Nitaj and David Pointcheval}, title = {The {NIST} {SHA-3} Competition: {A} Perspective on the Final Year}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2011 - 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6737}, pages = {383--386}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21969-6\_26}, doi = {10.1007/978-3-642-21969-6\_26}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/Preneel11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/MouhaWGP11, author = {Nicky Mouha and Qingju Wang and Dawu Gu and Bart Preneel}, editor = {Chuankun Wu and Moti Yung and Dongdai Lin}, title = {Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming}, booktitle = {Information Security and Cryptology - 7th International Conference, Inscrypt 2011, Beijing, China, November 30 - December 3, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7537}, pages = {57--76}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-34704-7\_5}, doi = {10.1007/978-3-642-34704-7\_5}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/MouhaWGP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/WengP11, author = {Li Weng and Bart Preneel}, editor = {Bart De Decker and Jorn Lapon and Vincent Naessens and Andreas Uhl}, title = {A Secure Perceptual Hash Algorithm for Image Content Authentication}, booktitle = {Communications and Multimedia Security, 12th {IFIP} {TC} 6 / {TC} 11 International Conference, {CMS} 2011, Ghent, Belgium, October 19-21,2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7025}, pages = {108--121}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24712-5\_9}, doi = {10.1007/978-3-642-24712-5\_9}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cms/WengP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/OttoyMSPSGH11, author = {Geoffrey Ottoy and Jeroen Martens and Nick Saeys and Bart Preneel and Lieven De Strycker and Jean{-}Pierre Goemaere and Tom Hamelinckx}, editor = {Bart De Decker and Jorn Lapon and Vincent Naessens and Andreas Uhl}, title = {A Modular Test Platform for Evaluation of Security Protocols in {NFC} Applications}, booktitle = {Communications and Multimedia Security, 12th {IFIP} {TC} 6 / {TC} 11 International Conference, {CMS} 2011, Ghent, Belgium, October 19-21,2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7025}, pages = {171--177}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24712-5\_15}, doi = {10.1007/978-3-642-24712-5\_15}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cms/OttoyMSPSGH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/NguyenWP11, author = {Dung Q. Nguyen and Li Weng and Bart Preneel}, editor = {Bart De Decker and Jorn Lapon and Vincent Naessens and Andreas Uhl}, title = {Radon Transform-Based Secure Image Hashing}, booktitle = {Communications and Multimedia Security, 12th {IFIP} {TC} 6 / {TC} 11 International Conference, {CMS} 2011, Ghent, Belgium, October 19-21,2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7025}, pages = {186--193}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24712-5\_17}, doi = {10.1007/978-3-642-24712-5\_17}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cms/NguyenWP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/SekarMVP11, author = {Gautham Sekar and Nicky Mouha and Vesselin Velichkov and Bart Preneel}, editor = {Aggelos Kiayias}, title = {Meet-in-the-Middle Attacks on Reduced-Round {XTEA}}, booktitle = {Topics in Cryptology - {CT-RSA} 2011 - The Cryptographers' Track at the {RSA} Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6558}, pages = {250--267}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19074-2\_17}, doi = {10.1007/978-3-642-19074-2\_17}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/SekarMVP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/HermansPVP11, author = {Jens Hermans and Andreas Pashalidis and Frederik Vercauteren and Bart Preneel}, editor = {Vijay Atluri and Claudia D{\'{\i}}az}, title = {A New {RFID} Privacy Model}, booktitle = {Computer Security - {ESORICS} 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6879}, pages = {568--587}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23822-2\_31}, doi = {10.1007/978-3-642-23822-2\_31}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/HermansPVP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/VelichkovMCP11, author = {Vesselin Velichkov and Nicky Mouha and Christophe De Canni{\`{e}}re and Bart Preneel}, editor = {Antoine Joux}, title = {The Additive Differential Probability of {ARX}}, booktitle = {Fast Software Encryption - 18th International Workshop, {FSE} 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6733}, pages = {342--358}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21702-9\_20}, doi = {10.1007/978-3-642-21702-9\_20}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/VelichkovMCP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmm/WengP11, author = {Li Weng and Bart Preneel}, editor = {Kuo{-}Tien Lee and Wen{-}Hsiang Tsai and Hong{-}Yuan Mark Liao and Tsuhan Chen and Jun{-}Wei Hsieh and Chien{-}Cheng Tseng}, title = {Image Distortion Estimation by Hash Comparison}, booktitle = {Advances in Multimedia Modeling - 17th International Multimedia Modeling Conference, {MMM} 2011, Taipei, Taiwan, January 5-7, 2011, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {6523}, pages = {62--72}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-17832-0\_7}, doi = {10.1007/978-3-642-17832-0\_7}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmm/WengP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sofsem/MulderWP11, author = {Yoni De Mulder and Karel Wouters and Bart Preneel}, editor = {Ivana Cern{\'{a}} and Tibor Gyim{\'{o}}thy and Juraj Hromkovic and Keith G. Jeffery and Rastislav Kr{\'{a}}lovic and Marko Vukolic and Stefan Wolf}, title = {A Privacy-Preserving ID-Based Group Key Agreement Scheme Applied in {VPAN}}, booktitle = {{SOFSEM} 2011: Theory and Practice of Computer Science - 37th Conference on Current Trends in Theory and Practice of Computer Science, Nov{\'{y}} Smokovec, Slovakia, January 22-28, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6543}, pages = {214--225}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-18381-2\_18}, doi = {10.1007/978-3-642-18381-2\_18}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sofsem/MulderWP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/SekarP11, author = {Gautham Sekar and Bart Preneel}, editor = {Souhwan Jung and Moti Yung}, title = {Practical Attacks on a Cryptosystem Proposed in Patent {WO/2009/066313}}, booktitle = {Information Security Applications - 12th International Workshop, {WISA} 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7115}, pages = {1--12}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27890-7\_1}, doi = {10.1007/978-3-642-27890-7\_1}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/SekarP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ches/2011, editor = {Bart Preneel and Tsuyoshi Takagi}, title = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6917}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23951-9}, doi = {10.1007/978-3-642-23951-9}, isbn = {978-3-642-23950-2}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Preneel11, author = {Bart Preneel}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {{AHS} Competition/SHA-3}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {27--29}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_546}, doi = {10.1007/978-1-4419-5906-5\_546}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Preneel11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Preneel11a, author = {Bart Preneel}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {{CBC-MAC} and Variants}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {184--188}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_555}, doi = {10.1007/978-1-4419-5906-5\_555}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Preneel11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Preneel11b, author = {Bart Preneel}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {{CMAC}}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {214--215}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_562}, doi = {10.1007/978-1-4419-5906-5\_562}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Preneel11b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Preneel11c, author = {Bart Preneel}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Collision Attack}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {220--221}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_564}, doi = {10.1007/978-1-4419-5906-5\_564}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Preneel11c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Preneel11d, author = {Bart Preneel}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Collision Resistance}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {221--222}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_565}, doi = {10.1007/978-1-4419-5906-5\_565}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Preneel11d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Preneel11e, author = {Bart Preneel}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Correcting-Block Attack}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {259--260}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_566}, doi = {10.1007/978-1-4419-5906-5\_566}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Preneel11e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Preneel11f, author = {Bart Preneel}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Davies-Meyer}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {312--313}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_569}, doi = {10.1007/978-1-4419-5906-5\_569}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Preneel11f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Preneel11g, author = {Bart Preneel}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {{GMAC}}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {513--514}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_578}, doi = {10.1007/978-1-4419-5906-5\_578}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Preneel11g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Preneel11h, author = {Bart Preneel}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Hash Functions}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {543--553}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_580}, doi = {10.1007/978-1-4419-5906-5\_580}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Preneel11h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Preneel11i, author = {Bart Preneel}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {{HMAC}}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {559--560}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_581}, doi = {10.1007/978-1-4419-5906-5\_581}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Preneel11i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Preneel11j, author = {Bart Preneel}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {{MAA}}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {741--742}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_591}, doi = {10.1007/978-1-4419-5906-5\_591}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Preneel11j.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Preneel11k, author = {Bart Preneel}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {{MAC} Algorithms}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {742--748}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_592}, doi = {10.1007/978-1-4419-5906-5\_592}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Preneel11k.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Preneel11l, author = {Bart Preneel}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {{MASH} Hash Functions (Modular Arithmetic Secure Hash)}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {761}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_594}, doi = {10.1007/978-1-4419-5906-5\_594}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Preneel11l.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Preneel11m, author = {Bart Preneel}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {{MDC-2} and {MDC-4}}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {771--772}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_596}, doi = {10.1007/978-1-4419-5906-5\_596}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Preneel11m.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Preneel11n, author = {Bart Preneel}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Modes of Operation of a Block Cipher}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {789--794}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_599}, doi = {10.1007/978-1-4419-5906-5\_599}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Preneel11n.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Preneel11o, author = {Bart Preneel}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {{NESSIE} Project}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {831--836}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_602}, doi = {10.1007/978-1-4419-5906-5\_602}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Preneel11o.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Preneel11p, author = {Bart Preneel}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {{PMAC}}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {941--942}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_603}, doi = {10.1007/978-1-4419-5906-5\_603}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Preneel11p.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Preneel11q, author = {Bart Preneel}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Preimage Resistance}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {952--953}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_604}, doi = {10.1007/978-1-4419-5906-5\_604}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Preneel11q.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Preneel11r, author = {Bart Preneel}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Second Preimage Resistance}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {1093}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_613}, doi = {10.1007/978-1-4419-5906-5\_613}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Preneel11r.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Preneel11s, author = {Bart Preneel}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Universal One-Way Hash Functions {(UOWHF)}}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {1349--1350}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_624}, doi = {10.1007/978-1-4419-5906-5\_624}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Preneel11s.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-reports/KatzenbeisserKPS11, author = {Stefan Katzenbeisser and Klaus Kursawe and Bart Preneel and Ahmad{-}Reza Sadeghi}, title = {Privacy and Security in Smart Energy Grids (Dagstuhl Seminar 11511)}, journal = {Dagstuhl Reports}, volume = {1}, number = {12}, pages = {62--68}, year = {2011}, url = {https://doi.org/10.4230/DagRep.1.12.62}, doi = {10.4230/DAGREP.1.12.62}, timestamp = {Wed, 07 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/KatzenbeisserKPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AndreevaMP11, author = {Elena Andreeva and Bart Mennink and Bart Preneel}, title = {The Parazoa Family: Generalizing the Sponge Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {28}, year = {2011}, url = {http://eprint.iacr.org/2011/028}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AndreevaMP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MenninkP11, author = {Bart Mennink and Bart Preneel}, title = {Hash Functions Based on Three Permutations: {A} Generic Security Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {532}, year = {2011}, url = {http://eprint.iacr.org/2011/532}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MenninkP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenWP11, author = {Jiazhe Chen and Meiqin Wang and Bart Preneel}, title = {Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, {XTEA} and {HIGHT}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {616}, year = {2011}, url = {http://eprint.iacr.org/2011/616}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenWP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ahswn/SingeleeLBPSCPMB10, author = {Dave Singel{\'{e}}e and Beno{\^{\i}}t Latr{\'{e}} and Bart Braem and Micha{\"{e}}l Peeters and Marijke De Soete and Peter De Cleyn and Bart Preneel and Ingrid Moerman and Chris Blondia}, title = {A Secure Low-Delay Protocol for Wireless Body Area Networks}, journal = {Ad Hoc Sens. Wirel. Networks}, volume = {9}, number = {1-2}, pages = {53--72}, year = {2010}, url = {http://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-9-number-1-2/ahswn-9-1-2-p-53-72/}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ahswn/SingeleeLBPSCPMB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BeuleEKKNPSS10, author = {Jan De Beule and Yves Edel and Emilia K{\"{a}}sper and Andreas Klein and Svetla Nikova and Bart Preneel and Jeroen Schillewaert and Leo Storme}, title = {Galois geometries and applications}, journal = {Des. Codes Cryptogr.}, volume = {56}, number = {2-3}, pages = {85--86}, year = {2010}, url = {https://doi.org/10.1007/s10623-010-9410-z}, doi = {10.1007/S10623-010-9410-Z}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BeuleEKKNPSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/VelichkovRP10, author = {Vesselin Velichkov and Vincent Rijmen and Bart Preneel}, title = {Algebraic cryptanalysis of a small-scale version of stream cipher Lex}, journal = {{IET} Inf. Secur.}, volume = {4}, number = {2}, pages = {49--61}, year = {2010}, url = {https://doi.org/10.1049/iet-ifs.2009.0118}, doi = {10.1049/IET-IFS.2009.0118}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/VelichkovRP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jips/AndreevaMP10, author = {Elena Andreeva and Bart Mennink and Bart Preneel}, title = {Security Properties of Domain Extenders for Cryptographic Hash Functions}, journal = {J. Inf. Process. Syst.}, volume = {6}, number = {4}, pages = {453--480}, year = {2010}, url = {https://doi.org/10.3745/JIPS.2010.6.4.453}, doi = {10.3745/JIPS.2010.6.4.453}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jips/AndreevaMP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/RialDBPP10, author = {Alfredo Rial and Mina Deng and Tiziano Bianchi and Alessandro Piva and Bart Preneel}, title = {A Provably Secure Anonymous Buyer-Seller Watermarking Protocol}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {5}, number = {4}, pages = {920--931}, year = {2010}, url = {https://doi.org/10.1109/TIFS.2010.2072830}, doi = {10.1109/TIFS.2010.2072830}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/RialDBPP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/WanRZPG10, author = {Zhiguo Wan and Kui Ren and Bo Zhu and Bart Preneel and Ming Gu}, title = {Anonymous User Communication for Privacy Protection in Wireless Metropolitan Mesh Networks}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {59}, number = {2}, pages = {519--532}, year = {2010}, url = {https://doi.org/10.1109/TVT.2009.2028892}, doi = {10.1109/TVT.2009.2028892}, timestamp = {Wed, 14 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/WanRZPG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/HermansSBVP10, author = {Jens Hermans and Michael Schneider and Johannes Buchmann and Frederik Vercauteren and Bart Preneel}, editor = {Daniel J. Bernstein and Tanja Lange}, title = {Parallel Shortest Lattice Vector Enumeration on Graphics Cards}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6055}, pages = {52--68}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12678-9\_4}, doi = {10.1007/978-3-642-12678-9\_4}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/africacrypt/HermansSBVP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/RialP10, author = {Alfredo Rial and Bart Preneel}, editor = {Daniel J. Bernstein and Tanja Lange}, title = {Optimistic Fair Priced Oblivious Transfer}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6055}, pages = {131--147}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12678-9\_9}, doi = {10.1007/978-3-642-12678-9\_9}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/RialP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/btas/SimoensCP10, author = {Koen Simoens and Chi{-}Ming Chang and Bart Preneel}, title = {Reversing protected minutiae vicinities}, booktitle = {Fourth {IEEE} International Conference on Biometrics: Theory Applications and Systems, {BTAS} 2010, Washington, DC, USA, 27-29 September, 2010}, pages = {1--8}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/BTAS.2010.5634506}, doi = {10.1109/BTAS.2010.5634506}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/btas/SimoensCP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/Preneel10, author = {Bart Preneel}, editor = {Josef Pieprzyk}, title = {The First 30 Years of Cryptographic Hash Functions and the {NIST} {SHA-3} Competition}, booktitle = {Topics in Cryptology - {CT-RSA} 2010, The Cryptographers' Track at the {RSA} Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5985}, pages = {1--14}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11925-5\_1}, doi = {10.1007/978-3-642-11925-5\_1}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/Preneel10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/HermansVP10, author = {Jens Hermans and Frederik Vercauteren and Bart Preneel}, editor = {Josef Pieprzyk}, title = {Speed Records for {NTRU}}, booktitle = {Topics in Cryptology - {CT-RSA} 2010, The Cryptographers' Track at the {RSA} Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5985}, pages = {73--88}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11925-5\_6}, doi = {10.1007/978-3-642-11925-5\_6}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/HermansVP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/GierlichsBPV10, author = {Benedikt Gierlichs and Lejla Batina and Bart Preneel and Ingrid Verbauwhede}, editor = {Josef Pieprzyk}, title = {Revisiting Higher-Order {DPA} Attacks:}, booktitle = {Topics in Cryptology - {CT-RSA} 2010, The Cryptographers' Track at the {RSA} Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5985}, pages = {221--234}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11925-5\_16}, doi = {10.1007/978-3-642-11925-5\_16}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/GierlichsBPV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/BalaschVP10, author = {Josep Balasch and Ingrid Verbauwhede and Bart Preneel}, editor = {Giovanni De Micheli and Bashir M. Al{-}Hashimi and Wolfgang M{\"{u}}ller and Enrico Macii}, title = {An embedded platform for privacy-friendly road charging applications}, booktitle = {Design, Automation and Test in Europe, {DATE} 2010, Dresden, Germany, March 8-12, 2010}, pages = {867--872}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/DATE.2010.5456931}, doi = {10.1109/DATE.2010.5456931}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/date/BalaschVP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/CappaertP10, author = {Jan Cappaert and Bart Preneel}, editor = {Ehab Al{-}Shaer and Hongxia Jin and Marc Joye}, title = {A general model for hiding control flow}, booktitle = {Proceedings of the 10th {ACM} Workshop on Digital Rights Management, Chicago, Illinois, USA, October 4, 2010}, pages = {35--42}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866870.1866877}, doi = {10.1145/1866870.1866877}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/CappaertP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/FanGMSPV10, author = {Junfeng Fan and Xu Guo and Elke De Mulder and Patrick Schaumont and Bart Preneel and Ingrid Verbauwhede}, editor = {Jim Plusquellic and Ken Mai}, title = {State-of-the-art of Secure {ECC} Implementations: {A} Survey on Known Side-channel Attacks and Countermeasures}, booktitle = {{HOST} 2010, Proceedings of the 2010 {IEEE} International Symposium on Hardware-Oriented Security and Trust (HOST), 13-14 June 2010, Anaheim Convention Center, California, {USA}}, pages = {76--87}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/HST.2010.5513110}, doi = {10.1109/HST.2010.5513110}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/FanGMSPV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/Preneel10, author = {Bart Preneel}, editor = {Miguel Soriano and Sihan Qing and Javier L{\'{o}}pez}, title = {Cryptographic Hash Functions: Theory and Practice}, booktitle = {Information and Communications Security - 12th International Conference, {ICICS} 2010, Barcelona, Spain, December 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6476}, pages = {1--3}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17650-0\_1}, doi = {10.1007/978-3-642-17650-0\_1}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/Preneel10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/HiroseIKOPY10, author = {Shoichi Hirose and Kota Ideguchi and Hidenori Kuwakado and Toru Owada and Bart Preneel and Hirotaka Yoshida}, editor = {Kyung Hyune Rhee and DaeHun Nyang}, title = {A Lightweight 256-Bit Hash Function for Hardware and Low-End Devices: Lesamnta-LW}, booktitle = {Information Security and Cryptology - {ICISC} 2010 - 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6829}, pages = {151--168}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-24209-0\_10}, doi = {10.1007/978-3-642-24209-0\_10}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/HiroseIKOPY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/Preneel10, author = {Bart Preneel}, editor = {Guang Gong and Kishan Chand Gupta}, title = {Cryptographic Hash Functions: Theory and Practice}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2010 - 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6498}, pages = {115--117}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17401-8\_9}, doi = {10.1007/978-3-642-17401-8\_9}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/Preneel10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/MulderWP10, author = {Yoni De Mulder and Brecht Wyseur and Bart Preneel}, editor = {Guang Gong and Kishan Chand Gupta}, title = {Cryptanalysis of a Perturbated White-Box {AES} Implementation}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2010 - 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6498}, pages = {292--310}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17401-8\_21}, doi = {10.1007/978-3-642-17401-8\_21}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/MulderWP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/IdeguchiTP10, author = {Kota Ideguchi and Elmar Tischhauser and Bart Preneel}, editor = {Mike Burmester and Gene Tsudik and Spyros S. Magliveras and Ivana Ilic}, title = {Improved Collision Attacks on the Reduced-Round Gr{\o}stl Hash Function}, booktitle = {Information Security - 13th International Conference, {ISC} 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6531}, pages = {1--16}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-18178-8\_1}, doi = {10.1007/978-3-642-18178-8\_1}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/IdeguchiTP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/AndreevaMP10, author = {Elena Andreeva and Bart Mennink and Bart Preneel}, editor = {Mike Burmester and Gene Tsudik and Spyros S. Magliveras and Ivana Ilic}, title = {Security Reductions of the Second Round {SHA-3} Candidates}, booktitle = {Information Security - 13th International Conference, {ISC} 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6531}, pages = {39--53}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-18178-8\_5}, doi = {10.1007/978-3-642-18178-8\_5}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/AndreevaMP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mm/WengP10, author = {Li Weng and Bart Preneel}, editor = {Alberto Del Bimbo and Shih{-}Fu Chang and Arnold W. M. Smeulders}, title = {A novel video hash algorithm}, booktitle = {Proceedings of the 18th International Conference on Multimedia 2010, Firenze, Italy, October 25-29, 2010}, pages = {739--742}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1873951.1874066}, doi = {10.1145/1873951.1874066}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mm/WengP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmm/WengP10, author = {Li Weng and Bart Preneel}, editor = {Susanne Boll and Qi Tian and Lei Zhang and Zili Zhang and Yi{-}Ping Phoebe Chen}, title = {From Image Hashing to Video Hashing}, booktitle = {Advances in Multimedia Modeling, 16th International Multimedia Modeling Conference, {MMM} 2010, Chongqing, China, January 6-8, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5916}, pages = {662--668}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11301-7\_66}, doi = {10.1007/978-3-642-11301-7\_66}, timestamp = {Mon, 19 Aug 2024 08:37:55 +0200}, biburl = {https://dblp.org/rec/conf/mmm/WengP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/Preneel10, author = {Bart Preneel}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Cryptography for Network Security: Failures, Successes and Challenges}, booktitle = {Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6258}, pages = {36--54}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14706-7\_4}, doi = {10.1007/978-3-642-14706-7\_4}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/Preneel10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisec/OttoyHPSG10, author = {Geoffrey Ottoy and Tom Hamelinckx and Bart Preneel and Lieven De Strycker and Jean{-}Pierre Goemaere}, editor = {Andreas U. Schmidt and Giovanni Russello and Antonio Lioy and Neeli R. Prasad and Shiguo Lian}, title = {{AES} Data Encryption in a ZigBee Network: Software or Hardware?}, booktitle = {Security and Privacy in Mobile Information and Communication Systems - Second International {ICST} Conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {47}, pages = {163--173}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17502-2\_14}, doi = {10.1007/978-3-642-17502-2\_14}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobisec/OttoyHPSG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pairing/SimoensPP10, author = {Koen Simoens and Roel Peeters and Bart Preneel}, editor = {Marc Joye and Atsuko Miyaji and Akira Otsuka}, title = {Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares}, booktitle = {Pairing-Based Cryptography - Pairing 2010 - 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6487}, pages = {116--135}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17455-1\_8}, doi = {10.1007/978-3-642-17455-1\_8}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pairing/SimoensPP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/MouhaVCP10, author = {Nicky Mouha and Vesselin Velichkov and Christophe De Canni{\`{e}}re and Bart Preneel}, editor = {Alex Biryukov and Guang Gong and Douglas R. Stinson}, title = {The Differential Analysis of S-Functions}, booktitle = {Selected Areas in Cryptography - 17th International Workshop, {SAC} 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6544}, pages = {36--56}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-19574-7\_3}, doi = {10.1007/978-3-642-19574-7\_3}, timestamp = {Sun, 25 Oct 2020 22:46:42 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/MouhaVCP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/AndreevaMP10, author = {Elena Andreeva and Bart Mennink and Bart Preneel}, editor = {Juan A. Garay and Roberto De Prisco}, title = {On the Indifferentiability of the Gr{\o}stl Hash Function}, booktitle = {Security and Cryptography for Networks, 7th International Conference, {SCN} 2010, Amalfi, Italy, September 13-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6280}, pages = {88--105}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15317-4\_7}, doi = {10.1007/978-3-642-15317-4\_7}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/AndreevaMP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/StrackxPP10, author = {Raoul Strackx and Frank Piessens and Bart Preneel}, editor = {Sushil Jajodia and Jianying Zhou}, title = {Efficient Isolation of Trusted Subsystems in Embedded Systems}, booktitle = {Security and Privacy in Communication Networks - 6th Iternational {ICST} Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {50}, pages = {344--361}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16161-2\_20}, doi = {10.1007/978-3-642-16161-2\_20}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/StrackxPP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BalaschRTPVG10, author = {Josep Balasch and Alfredo Rial and Carmela Troncoso and Bart Preneel and Ingrid Verbauwhede and Christophe Geuens}, title = {PrETP: Privacy-Preserving Electronic Toll Pricing}, booktitle = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13, 2010, Proceedings}, pages = {63--78}, publisher = {{USENIX} Association}, year = {2010}, url = {http://www.usenix.org/events/sec10/tech/full\_papers/Balasch.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/BalaschRTPVG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/LeeBSPV10, author = {Yong Ki Lee and Lejla Batina and Dave Singel{\'{e}}e and Bart Preneel and Ingrid Verbauwhede}, editor = {Ahmad{-}Reza Sadeghi and David Naccache}, title = {Anti-counterfeiting, Untraceability and Other Security Challenges for {RFID} Systems: Public-Key-Based Protocols and Hardware}, booktitle = {Towards Hardware-Intrinsic Security - Foundations and Practice}, series = {Information Security and Cryptography}, pages = {237--257}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14452-3\_11}, doi = {10.1007/978-3-642-14452-3\_11}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/LeeBSPV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2010, editor = {Dimitris Gritzalis and Bart Preneel and Marianthi Theoharidou}, title = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6345}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15497-3}, doi = {10.1007/978-3-642-15497-3}, isbn = {978-3-642-15496-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/europki/2009, editor = {Fabio Martinelli and Bart Preneel}, title = {Public Key Infrastructures, Services and Applications - 6th European Workshop, EuroPKI 2009, Pisa, Italy, September 10-11, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6391}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16441-5}, doi = {10.1007/978-3-642-16441-5}, isbn = {978-3-642-16440-8}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/europki/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimHPBDK10, author = {Jongsung Kim and Seokhie Hong and Bart Preneel and Eli Biham and Orr Dunkelman and Nathan Keller}, title = {Related-Key Boomerang and Rectangle Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {19}, year = {2010}, url = {http://eprint.iacr.org/2010/019}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimHPBDK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WolfP10, author = {Christopher Wolf and Bart Preneel}, title = {MQ\({}^{\mbox{*}}\)-IP: An Identity-based Identification Scheme without Number-theoretic Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {87}, year = {2010}, url = {http://eprint.iacr.org/2010/087}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WolfP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SimoensPP10, author = {Koen Simoens and Roel Peeters and Bart Preneel}, title = {Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {207}, year = {2010}, url = {http://eprint.iacr.org/2010/207}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SimoensPP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AndreevaMP10, author = {Elena Andreeva and Bart Mennink and Bart Preneel}, title = {On the Indifferentiability of the Gr{\"{o}}stl Hash Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {298}, year = {2010}, url = {http://eprint.iacr.org/2010/298}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AndreevaMP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IdeguchiTP10, author = {Kota Ideguchi and Elmar Tischhauser and Bart Preneel}, title = {Improved Collision Attacks on the Reduced-Round Gr{\"{o}}stl Hash Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {375}, year = {2010}, url = {http://eprint.iacr.org/2010/375}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IdeguchiTP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AndreevaMP10a, author = {Elena Andreeva and Bart Mennink and Bart Preneel}, title = {Security Reductions of the Second Round {SHA-3} Candidates}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {381}, year = {2010}, url = {http://eprint.iacr.org/2010/381}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AndreevaMP10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/AlsenoyCSDP09, author = {Brendan Van Alsenoy and Danny De Cock and Koen Simoens and Jos Dumortier and Bart Preneel}, title = {Delegation and digital mandates: Legal requirements and security objectives}, journal = {Comput. Law Secur. Rev.}, volume = {25}, number = {5}, pages = {415--431}, year = {2009}, url = {https://doi.org/10.1016/j.clsr.2009.07.007}, doi = {10.1016/J.CLSR.2009.07.007}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/AlsenoyCSDP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijwmc/SeysP09, author = {Stefaan Seys and Bart Preneel}, title = {{ARM:} anonymous routing protocol for mobile ad hoc networks}, journal = {Int. J. Wirel. Mob. Comput.}, volume = {3}, number = {3}, pages = {145--155}, year = {2009}, url = {https://doi.org/10.1504/IJWMC.2009.028896}, doi = {10.1504/IJWMC.2009.028896}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijwmc/SeysP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/WanDBPG09, author = {Zhiguo Wan and Robert H. Deng and Feng Bao and Bart Preneel and Ming Gu}, title = {\emph{n} PAKE\({}^{\mbox{+}}\): {A} Tree-Based Group Password-Authenticated Key Exchange Protocol Using Different Passwords}, journal = {J. Comput. Sci. Technol.}, volume = {24}, number = {1}, pages = {138--151}, year = {2009}, url = {https://doi.org/10.1007/s11390-009-9207-6}, doi = {10.1007/S11390-009-9207-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcst/WanDBPG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/oir/DengCP09, author = {Mina Deng and Danny De Cock and Bart Preneel}, title = {Towards a cross-context identity management framework in e-health}, journal = {Online Inf. Rev.}, volume = {33}, number = {3}, pages = {422--442}, year = {2009}, url = {https://doi.org/10.1108/14684520910969880}, doi = {10.1108/14684520910969880}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/oir/DengCP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/RivestCPRSV09, author = {Ronald L. Rivest and David Chaum and Bart Preneel and Aviel D. Rubin and Donald G. Saari and Poorvi L. Vora}, title = {Guest editorial: special issue on electronic voting}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {4}, pages = {593--596}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2034721}, doi = {10.1109/TIFS.2009.2034721}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/RivestCPRSV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WanRZPG09, author = {Zhiguo Wan and Kui Ren and Bo Zhu and Bart Preneel and Ming Gu}, editor = {Wanqing Li and Willy Susilo and Udaya Kiran Tupakula and Reihaneh Safavi{-}Naini and Vijay Varadharajan}, title = {Anonymous user communication for privacy protection in wireless metropolitan mesh networks}, booktitle = {Proceedings of the 2009 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2009, Sydney, Australia, March 10-12, 2009}, pages = {368--371}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1533057.1533106}, doi = {10.1145/1533057.1533106}, timestamp = {Fri, 18 Mar 2022 11:47:58 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WanRZPG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/MouhaSAPTTP09, author = {Nicky Mouha and Gautham Sekar and Jean{-}Philippe Aumasson and Thomas Peyrin and S{\o}ren S. Thomsen and Meltem S{\"{o}}nmez Turan and Bart Preneel}, editor = {Feng Bao and Moti Yung and Dongdai Lin and Jiwu Jing}, title = {Cryptanalysis of the {ESSENCE} Family of Hash Functions}, booktitle = {Information Security and Cryptology - 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6151}, pages = {15--34}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-16342-5\_2}, doi = {10.1007/978-3-642-16342-5\_2}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/MouhaSAPTTP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ddecs/MulderAPVV09, author = {Elke De Mulder and Wim Aerts and Bart Preneel and Ingrid Verbauwhede and Guy A. E. Vandenbosch}, title = {Case Study : {A} class {E} power amplifier for {ISO-14443A}}, booktitle = {Proceedings of the 2009 {IEEE} Symposium on Design and Diagnostics of Electronic Circuits and Systems, {DDECS} 2009, April 15-17, 2009, Liberec, Czech Republic}, pages = {20--23}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/DDECS.2009.5012091}, doi = {10.1109/DDECS.2009.5012091}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ddecs/MulderAPVV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecctd/GierlichsMPV09, author = {Benedikt Gierlichs and Elke De Mulder and Bart Preneel and Ingrid Verbauwhede}, title = {Empirical comparison of side channel analysis distinguishers on {DES} in hardware}, booktitle = {19th European Conference on Circuit Theory and Design, {ECCTD} 2009, Antalya, Turkey, August 23-27, 2009}, pages = {391--394}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ECCTD.2009.5275003}, doi = {10.1109/ECCTD.2009.5275003}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecctd/GierlichsMPV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/IndesteegeP09, author = {Sebastiaan Indesteege and Bart Preneel}, editor = {Orr Dunkelman}, title = {Practical Collisions for EnRUPT}, booktitle = {Fast Software Encryption, 16th International Workshop, {FSE} 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5665}, pages = {246--259}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03317-9\_15}, doi = {10.1007/978-3-642-03317-9\_15}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/IndesteegeP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/WengP09, author = {Li Weng and Bart Preneel}, title = {Shape-based features for image hashing}, booktitle = {Proceedings of the 2009 {IEEE} International Conference on Multimedia and Expo, {ICME} 2009, June 28 - July 2, 2009, New York City, NY, {USA}}, pages = {1074--1077}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICME.2009.5202684}, doi = {10.1109/ICME.2009.5202684}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icmcs/WengP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-4/PeetersKP09, author = {Roel Peeters and Markulf Kohlweiss and Bart Preneel}, editor = {Jan Camenisch and Dogan Kesdogan}, title = {Threshold Things That Think: Authorisation for Resharing}, booktitle = {iNetSec 2009 - Open Research Problems in Network Security - {IFIP} {WG} 11.4 International Workshop, Zurich, Switzerland, April 23-24, 2009, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {309}, pages = {111--124}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-05437-2\_11}, doi = {10.1007/978-3-642-05437-2\_11}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-4/PeetersKP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/NakaharaSFCSP09, author = {Jorge Nakahara Jr. and Gautham Sekar and Daniel Santana de Freitas and Chang Chiann and Ramon Hugo de Souza and Bart Preneel}, editor = {Pierangela Samarati and Moti Yung and Fabio Martinelli and Claudio A. Ardagna}, title = {A New Approach to \emph{chi}\({}^{\mbox{2}}\) Cryptanalysis of Block Ciphers}, booktitle = {Information Security, 12th International Conference, {ISC} 2009, Pisa, Italy, September 7-9, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5735}, pages = {1--16}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04474-8\_1}, doi = {10.1007/978-3-642-04474-8\_1}, timestamp = {Mon, 21 Mar 2022 18:09:53 +0100}, biburl = {https://dblp.org/rec/conf/isw/NakaharaSFCSP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/SaxenaWP09, author = {Amitabh Saxena and Brecht Wyseur and Bart Preneel}, editor = {Pierangela Samarati and Moti Yung and Fabio Martinelli and Claudio A. Ardagna}, title = {Towards Security Notions for White-Box Cryptography}, booktitle = {Information Security, 12th International Conference, {ISC} 2009, Pisa, Italy, September 7-9, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5735}, pages = {49--58}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04474-8\_4}, doi = {10.1007/978-3-642-04474-8\_4}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/SaxenaWP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/Preneel09, author = {Bart Preneel}, editor = {Tsuyoshi Takagi and Masahiro Mambo}, title = {The Future of Cryptographic Algorithms}, booktitle = {Advances in Information and Computer Security, 4th International Workshop on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5824}, pages = {1--2}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04846-3\_1}, doi = {10.1007/978-3-642-04846-3\_1}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/Preneel09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SekarP09, author = {Gautham Sekar and Bart Preneel}, editor = {Tsuyoshi Takagi and Masahiro Mambo}, title = {Improved Distinguishing Attacks on {HC-256}}, booktitle = {Advances in Information and Computer Security, 4th International Workshop on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5824}, pages = {38--52}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04846-3\_4}, doi = {10.1007/978-3-642-04846-3\_4}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/SekarP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/DengBPP09, author = {Mina Deng and Tiziano Bianchi and Alessandro Piva and Bart Preneel}, editor = {Edward W. Felten and Jana Dittmann and Jessica J. Fridrich and Scott Craver}, title = {An efficient buyer-seller watermarking protocol based on composite signal representation}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2009, Princeton, NJ, USA, September 07 - 08, 2009}, pages = {9--18}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1597817.1597820}, doi = {10.1145/1597817.1597820}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/DengBPP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pairing/RialKP09, author = {Alfredo Rial and Markulf Kohlweiss and Bart Preneel}, editor = {Hovav Shacham and Brent Waters}, title = {Universally Composable Adaptive Priced Oblivious Transfer}, booktitle = {Pairing-Based Cryptography - Pairing 2009, Third International Conference, Palo Alto, CA, USA, August 12-14, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5671}, pages = {231--247}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03298-1\_15}, doi = {10.1007/978-3-642-03298-1\_15}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pairing/RialKP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/IndesteegeMPS09, author = {Sebastiaan Indesteege and Florian Mendel and Bart Preneel and Martin Schl{\"{a}}ffer}, editor = {Michael J. Jacobson Jr. and Vincent Rijmen and Reihaneh Safavi{-}Naini}, title = {Practical Collisions for {SHAMATA-256}}, booktitle = {Selected Areas in Cryptography, 16th Annual International Workshop, {SAC} 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5867}, pages = {1--15}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-05445-7\_1}, doi = {10.1007/978-3-642-05445-7\_1}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/IndesteegeMPS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/AumassonDIP09, author = {Jean{-}Philippe Aumasson and Orr Dunkelman and Sebastiaan Indesteege and Bart Preneel}, editor = {Michael J. Jacobson Jr. and Vincent Rijmen and Reihaneh Safavi{-}Naini}, title = {Cryptanalysis of Dynamic {SHA(2)}}, booktitle = {Selected Areas in Cryptography, 16th Annual International Workshop, {SAC} 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5867}, pages = {415--432}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-05445-7\_26}, doi = {10.1007/978-3-642-05445-7\_26}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/AumassonDIP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/DammeWKP09, author = {Gauthier Van Damme and Karel Wouters and Hakan Karahan and Bart Preneel}, editor = {Suman Banerjee}, title = {Offline {NFC} payments with electronic vouchers}, booktitle = {Proceedings of the 1st {ACM} {SIGCOMM} Workshop on Networking, Systems, and Applications for Mobile Handhelds, MobiHeld 2009, Barcelona, Spain, August 17, 2009}, pages = {25--30}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1592606.1592613}, doi = {10.1145/1592606.1592613}, timestamp = {Thu, 27 Apr 2023 08:33:19 +0200}, biburl = {https://dblp.org/rec/conf/sigcomm/DammeWKP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/PeetersKPS09, author = {Roel Peeters and Markulf Kohlweiss and Bart Preneel and Nicky Sulmon}, editor = {Lorrie Faith Cranor}, title = {Threshold things that think: usable authorization for resharing}, booktitle = {Proceedings of the 5th Symposium on Usable Privacy and Security, {SOUPS} 2009, Mountain View, California, USA, July 15-17, 2009}, series = {{ACM} International Conference Proceeding Series}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1572532.1572557}, doi = {10.1145/1572532.1572557}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/soups/PeetersKPS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/SimoensTP09, author = {Koen Simoens and Pim Tuyls and Bart Preneel}, title = {Privacy Weaknesses in Biometric Sketches}, booktitle = {30th {IEEE} Symposium on Security and Privacy {(SP} 2009), 17-20 May 2009, Oakland, California, {USA}}, pages = {188--203}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/SP.2009.24}, doi = {10.1109/SP.2009.24}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/SimoensTP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/SterckxGPV09, author = {Micha{\"{e}}l Sterckx and Benedikt Gierlichs and Bart Preneel and Ingrid Verbauwhede}, title = {Efficient implementation of anonymous credentials on Java Card smart cards}, booktitle = {First {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2009, London, UK, December 6-9, 2009}, pages = {106--110}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/WIFS.2009.5386474}, doi = {10.1109/WIFS.2009.5386474}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/SterckxGPV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/MulderGPV09, author = {Elke De Mulder and Benedikt Gierlichs and Bart Preneel and Ingrid Verbauwhede}, title = {Practical {DPA} attacks on {MDPL}}, booktitle = {First {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2009, London, UK, December 6-9, 2009}, pages = {191--195}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/WIFS.2009.5386455}, doi = {10.1109/WIFS.2009.5386455}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/MulderGPV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/MouhaCIP09, author = {Nicky Mouha and Christophe De Canni{\`{e}}re and Sebastiaan Indesteege and Bart Preneel}, editor = {Heung Youl Youm and Moti Yung}, title = {Finding Collisions for a 45-Step Simplified {HAS-V}}, booktitle = {Information Security Applications, 10th International Workshop, {WISA} 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5932}, pages = {206--225}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10838-9\_16}, doi = {10.1007/978-3-642-10838-9\_16}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/MouhaCIP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/natosec/IndesteegeP09, author = {Sebastiaan Indesteege and Bart Preneel}, editor = {Bart Preneel and Stefan M. Dodunekov and Vincent Rijmen and Svetla Nikova}, title = {Coding Theory and Hash Function Design - {A} Case Study: The Lane Hash Function}, booktitle = {Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes}, series = {{NATO} Science for Peace and Security Series - {D:} Information and Communication Security}, volume = {23}, pages = {63--68}, publisher = {{IOS} Press}, year = {2009}, url = {https://doi.org/10.3233/978-1-60750-002-5-63}, doi = {10.3233/978-1-60750-002-5-63}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/natosec/IndesteegeP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/africacrypt/2009, editor = {Bart Preneel}, title = {Progress in Cryptology - {AFRICACRYPT} 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5580}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02384-2}, doi = {10.1007/978-3-642-02384-2}, isbn = {978-3-642-02383-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dagstuhl/2009P9031, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, title = {Symmetric Cryptography, 11.01. - 16.01.2009}, series = {Dagstuhl Seminar Proceedings}, volume = {09031}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany}, year = {2009}, url = {http://drops.dagstuhl.de/portals/09031/}, timestamp = {Thu, 10 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/2009P9031.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dagstuhl/2009P9282, editor = {Jorge Guajardo and Bart Preneel and Ahmad{-}Reza Sadeghi and Pim Tuyls}, title = {Foundations for Forgery-Resilient Cryptographic Hardware, 05.07. - 08.07.2009}, series = {Dagstuhl Seminar Proceedings}, volume = {09282}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany}, year = {2009}, url = {http://drops.dagstuhl.de/portals/09282/}, timestamp = {Thu, 10 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/2009P9282.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/natosec/23, editor = {Bart Preneel and Stefan M. Dodunekov and Vincent Rijmen and Svetla Nikova}, title = {Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes}, series = {{NATO} Science for Peace and Security Series - {D:} Information and Communication Security}, volume = {23}, publisher = {{IOS} Press}, year = {2009}, url = {http://www.booksonline.iospress.nl/Content/View.aspx?piid=12139}, isbn = {978-1-60750-002-5}, timestamp = {Wed, 11 May 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/natosec/23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/GuajardoPST09, author = {Jorge Guajardo and Bart Preneel and Ahmad{-}Reza Sadeghi and Pim Tuyls}, editor = {Jorge Guajardo and Bart Preneel and Ahmad{-}Reza Sadeghi and Pim Tuyls}, title = {09282 Executive Summary - Foundations for Forgery-Resilient Cryptographic Hardware}, booktitle = {Foundations for Forgery-Resilient Cryptographic Hardware, 05.07. - 08.07.2009}, series = {Dagstuhl Seminar Proceedings}, volume = {09282}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany}, year = {2009}, url = {http://drops.dagstuhl.de/opus/volltexte/2010/2408/}, timestamp = {Thu, 10 Jun 2021 13:02:11 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/GuajardoPST09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/GuajardoPTS09, author = {Jorge Guajardo and Bart Preneel and Pim Tuyls and Ahmad{-}Reza Sadeghi}, editor = {Jorge Guajardo and Bart Preneel and Ahmad{-}Reza Sadeghi and Pim Tuyls}, title = {09282 Abstracts Collection - Foundations for Forgery-Resilient Cryptographic Hardware}, booktitle = {Foundations for Forgery-Resilient Cryptographic Hardware, 05.07. - 08.07.2009}, series = {Dagstuhl Seminar Proceedings}, volume = {09282}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany}, year = {2009}, url = {http://drops.dagstuhl.de/opus/volltexte/2010/2407/}, timestamp = {Thu, 23 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/GuajardoPTS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/HandschuhLPR09, author = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, title = {09031 Abstracts Collection - Symmetric Cryptography}, booktitle = {Symmetric Cryptography, 11.01. - 16.01.2009}, series = {Dagstuhl Seminar Proceedings}, volume = {09031}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany}, year = {2009}, url = {http://drops.dagstuhl.de/opus/volltexte/2009/1960/}, timestamp = {Thu, 10 Jun 2021 13:02:06 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/HandschuhLPR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/HandschuhLPR09a, author = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, title = {09031 Executive Summary - Symmetric Cryptography}, booktitle = {Symmetric Cryptography, 11.01. - 16.01.2009}, series = {Dagstuhl Seminar Proceedings}, volume = {09031}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany}, year = {2009}, url = {http://drops.dagstuhl.de/opus/volltexte/2009/1959/}, timestamp = {Thu, 23 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/HandschuhLPR09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/IndesteegeACDKN09, author = {Sebastiaan Indesteege and Elena Andreeva and Christophe De Canni{\`{e}}re and Orr Dunkelman and Emilia K{\"{a}}sper and Svetla Nikova and Bart Preneel and Elmar Tischhauser}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, title = {The Lane hash function}, booktitle = {Symmetric Cryptography, 11.01. - 16.01.2009}, series = {Dagstuhl Seminar Proceedings}, volume = {09031}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany}, year = {2009}, url = {http://drops.dagstuhl.de/opus/volltexte/2009/1952/}, timestamp = {Thu, 23 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/IndesteegeACDKN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/IndesteegeP09, author = {Sebastiaan Indesteege and Bart Preneel}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, title = {Practical Collisions for EnRUPT}, booktitle = {Symmetric Cryptography, 11.01. - 16.01.2009}, series = {Dagstuhl Seminar Proceedings}, volume = {09031}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany}, year = {2009}, url = {http://drops.dagstuhl.de/opus/volltexte/2009/1950/}, timestamp = {Thu, 23 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/IndesteegeP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/IndesteegeP09a, author = {Sebastiaan Indesteege and Bart Preneel}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, title = {Practical Preimages for Maraca}, booktitle = {Symmetric Cryptography, 11.01. - 16.01.2009}, series = {Dagstuhl Seminar Proceedings}, volume = {09031}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany}, year = {2009}, url = {http://drops.dagstuhl.de/opus/volltexte/2009/1951/}, timestamp = {Thu, 23 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/IndesteegeP09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AumassonDIP09, author = {Jean{-}Philippe Aumasson and Orr Dunkelman and Sebastiaan Indesteege and Bart Preneel}, title = {Cryptanalysis of Dynamic {SHA(2)}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {184}, year = {2009}, url = {http://eprint.iacr.org/2009/184}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AumassonDIP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GierlichsBPV09, author = {Benedikt Gierlichs and Lejla Batina and Bart Preneel and Ingrid Verbauwhede}, title = {Revisiting Higher-Order {DPA} Attacks: Multivariate Mutual Information Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {228}, year = {2009}, url = {http://eprint.iacr.org/2009/228}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GierlichsBPV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MulderGPV09, author = {Elke De Mulder and Benedikt Gierlichs and Bart Preneel and Ingrid Verbauwhede}, title = {Practical {DPA} Attacks on {MDPL}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {231}, year = {2009}, url = {http://eprint.iacr.org/2009/231}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MulderGPV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DingGP09, author = {Ning Ding and Dawu Gu and Bart Preneel}, title = {Precise Bounded-Concurrent Zero-Knowledge in Almost Constant Rounds}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {448}, year = {2009}, url = {http://eprint.iacr.org/2009/448}, timestamp = {Tue, 24 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DingGP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Hermans0BVP09, author = {Jens Hermans and Michael Schneider and Johannes Buchmann and Frederik Vercauteren and Bart Preneel}, title = {Parallel Shortest Lattice Vector Enumeration on Graphics Cards}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {601}, year = {2009}, url = {http://eprint.iacr.org/2009/601}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/Hermans0BVP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijes/OrsBPV08, author = {Siddika Berna {\"{O}}rs and Lejla Batina and Bart Preneel and Joos Vandewalle}, title = {Hardware implementation of an elliptic curve processor over GF(p) with Montgomery modular multiplier}, journal = {Int. J. Embed. Syst.}, volume = {3}, number = {4}, pages = {229--240}, year = {2008}, url = {https://doi.org/10.1504/IJES.2008.022394}, doi = {10.1504/IJES.2008.022394}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijes/OrsBPV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/CockSP08, author = {Danny De Cock and Koen Simoens and Bart Preneel}, title = {Insights on identity documents based on the Belgian case study}, journal = {Inf. Secur. Tech. Rep.}, volume = {13}, number = {2}, pages = {54--60}, year = {2008}, url = {https://doi.org/10.1016/j.istr.2008.06.004}, doi = {10.1016/J.ISTR.2008.06.004}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/CockSP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jucs/ChenSWWDLMMMPPS08, author = {Liqun Chen and Willy Susilo and Huaxiong Wang and Duncan S. Wong and Ed Dawson and Xuejia Lai and Masahiro Mambo and Atsuko Miyaji and Yi Mu and David Pointcheval and Bart Preneel and Nigel P. Smart}, title = {Cryptography in Computer System Security}, journal = {J. Univers. Comput. Sci.}, volume = {14}, number = {3}, pages = {314--317}, year = {2008}, url = {http://www.jucs.org/jucs\_14\_3/cryptography\_in\_computer\_system}, timestamp = {Mon, 05 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jucs/ChenSWWDLMMMPPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scp/SchellekensWP08, author = {Dries Schellekens and Brecht Wyseur and Bart Preneel}, title = {Remote attestation on legacy operating systems with trusted platform modules}, journal = {Sci. Comput. Program.}, volume = {74}, number = {1-2}, pages = {13--22}, year = {2008}, url = {https://doi.org/10.1016/j.scico.2008.09.005}, doi = {10.1016/J.SCICO.2008.09.005}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scp/SchellekensWP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/WoutersSLP08, author = {Karel Wouters and Koen Simoens and Danny Lathouwers and Bart Preneel}, title = {Secure and Privacy-Friendly Logging for eGovernment Services}, booktitle = {Proceedings of the The Third International Conference on Availability, Reliability and Security, {ARES} 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain}, pages = {1091--1096}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ARES.2008.41}, doi = {10.1109/ARES.2008.41}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/WoutersSLP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/adhoc-now/SingeleeLBPSCPMB08, author = {Dave Singel{\'{e}}e and Beno{\^{\i}}t Latr{\'{e}} and Bart Braem and Micha{\"{e}}l Peeters and Marijke De Soete and Peter De Cleyn and Bart Preneel and Ingrid Moerman and Chris Blondia}, editor = {David Coudert and David Simplot{-}Ryl and Ivan Stojmenovic}, title = {A Secure Cross-Layer Protocol for Multi-hop Wireless Body Area Networks}, booktitle = {Ad-hoc, Mobile and Wireless Networks, 7th International Conference, {ADHOC-NOW} 2008, Sophia-Antipolis, France, September 10-12, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5198}, pages = {94--107}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85209-4\_8}, doi = {10.1007/978-3-540-85209-4\_8}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/adhoc-now/SingeleeLBPSCPMB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/CanniereKP08, author = {Christophe De Canni{\`{e}}re and {\"{O}}zg{\"{u}}l K{\"{u}}{\c{c}}{\"{u}}k and Bart Preneel}, editor = {Serge Vaudenay}, title = {Analysis of Grain's Initialization Algorithm}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2008, First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5023}, pages = {276--289}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68164-9\_19}, doi = {10.1007/978-3-540-68164-9\_19}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/CanniereKP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/biosig/PeetersSCP08, author = {Roel Peeters and Koen Simoens and Danny De Cock and Bart Preneel}, editor = {Arslan Br{\"{o}}mme and Christoph Busch and Detlef H{\"{u}}hnlein}, title = {Cross-Context Delegation through Identity Federation}, booktitle = {{BIOSIG} 2008 - Proceedings of the Special Interest Group on Biometrics and Electronic Signatures, 11.-12. September 2008 in Darmstadt, Germany}, series = {{LNI}}, volume = {{P-137}}, pages = {79--92}, publisher = {{GI}}, year = {2008}, url = {https://dl.gi.de/handle/20.500.12116/21200}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/biosig/PeetersSCP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GierlichsBTP08, author = {Benedikt Gierlichs and Lejla Batina and Pim Tuyls and Bart Preneel}, editor = {Elisabeth Oswald and Pankaj Rohatgi}, title = {Mutual Information Analysis}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5154}, pages = {426--442}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85053-3\_27}, doi = {10.1007/978-3-540-85053-3\_27}, timestamp = {Thu, 14 Oct 2021 10:28:51 +0200}, biburl = {https://dblp.org/rec/conf/ches/GierlichsBTP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/Preneel08, author = {Bart Preneel}, editor = {Moti Yung and Peng Liu and Dongdai Lin}, title = {The State of Hash Functions and the {NIST} {SHA-3} Competition}, booktitle = {Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5487}, pages = {1--11}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-01440-6\_1}, doi = {10.1007/978-3-642-01440-6\_1}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/Preneel08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HandschuhP08, author = {Helena Handschuh and Bart Preneel}, editor = {David A. Wagner}, title = {Key-Recovery Attacks on Universal Hash Function Based {MAC} Algorithms}, booktitle = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5157}, pages = {144--161}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85174-5\_9}, doi = {10.1007/978-3-540-85174-5\_9}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HandschuhP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/DiazTP08, author = {Claudia D{\'{\i}}az and Carmela Troncoso and Bart Preneel}, editor = {Sushil Jajodia and Javier L{\'{o}}pez}, title = {A Framework for the Analysis of Mix-Based Steganographic File Systems}, booktitle = {Computer Security - {ESORICS} 2008, 13th European Symposium on Research in Computer Security, M{\'{a}}laga, Spain, October 6-8, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5283}, pages = {428--445}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88313-5\_28}, doi = {10.1007/978-3-540-88313-5\_28}, timestamp = {Thu, 29 Aug 2019 08:09:59 +0200}, biburl = {https://dblp.org/rec/conf/esorics/DiazTP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euc/ZhangGP08, author = {Yuanyuan Zhang and Dawu Gu and Bart Preneel}, editor = {Cheng{-}Zhong Xu and Minyi Guo}, title = {Reliable Key Establishment Scheme Exploiting Unidirectional Links in Wireless Sensor Networks}, booktitle = {2008 {IEEE/IPIP} International Conference on Embedded and Ubiquitous Computing {(EUC} 2008), Shanghai, China, December 17-20, 2008, Volume {I}}, pages = {272--279}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/EUC.2008.10}, doi = {10.1109/EUC.2008.10}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/euc/ZhangGP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/IndesteegeKDBP08, author = {Sebastiaan Indesteege and Nathan Keller and Orr Dunkelman and Eli Biham and Bart Preneel}, editor = {Nigel P. Smart}, title = {A Practical Attack on KeeLoq}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4965}, pages = {1--18}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78967-3\_1}, doi = {10.1007/978-3-540-78967-3\_1}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/IndesteegeKDBP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciw/DengP08, author = {Mina Deng and Bart Preneel}, editor = {Abdelhamid Mellouk and Jun Bi and Guadalupe Ortiz and Dickson K. W. Chiu and Manuela Popescu}, title = {On Secure and Anonymous Buyer-Seller Watermarking Protocol}, booktitle = {Third International Conference on Internet and Web Applications and Services, {ICIW} 2008, 8-13 June 2008, Athens, Greece}, pages = {524--529}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ICIW.2008.28}, doi = {10.1109/ICIW.2008.28}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iciw/DengP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isecs/DengP08, author = {Mina Deng and Bart Preneel}, editor = {Fei Yu and Qi Luo and Yongjun Chen and Zhigang Chen}, title = {Attacks on Two Buyer-Seller Watermarking Protocols and an Improvement for Revocable Anonymity}, booktitle = {Proceedings of The International Symposium on Electronic Commerce and Security, {ISECS} 2008, August 3-5, 2008, Guangzhou, China}, pages = {923--929}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ISECS.2008.103}, doi = {10.1109/ISECS.2008.103}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isecs/DengP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/CappaertPAMB08, author = {Jan Cappaert and Bart Preneel and Bertrand Anckaert and Matias Madou and Koen De Bosschere}, editor = {Liqun Chen and Yi Mu and Willy Susilo}, title = {Towards Tamper Resistant Code Encryption: Practice and Experience}, booktitle = {Information Security Practice and Experience, 4th International Conference, {ISPEC} 2008, Sydney, Australia, April 21-23, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4991}, pages = {86--100}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79104-1\_7}, doi = {10.1007/978-3-540-79104-1\_7}, timestamp = {Tue, 20 Aug 2024 07:54:43 +0200}, biburl = {https://dblp.org/rec/conf/ispec/CappaertPAMB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/IndesteegeP08, author = {Sebastiaan Indesteege and Bart Preneel}, editor = {Tzong{-}Chen Wu and Chin{-}Laung Lei and Vincent Rijmen and Der{-}Tsai Lee}, title = {Collisions for RC4-Hash}, booktitle = {Information Security, 11th International Conference, {ISC} 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5222}, pages = {355--366}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85886-7\_25}, doi = {10.1007/978-3-540-85886-7\_25}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/IndesteegeP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/otm/ParkPSZ08, author = {Jong Hyuk Park and Bart Preneel and Ravi S. Sandhu and Andr{\'{e}} Z{\'{u}}quete}, editor = {Robert Meersman and Zahir Tari}, title = {{IS} 2008 {PC} Co-chairs' Message}, booktitle = {On the Move to Meaningful Internet Systems: {OTM} 2008, {OTM} 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and {ODBASE} 2008, Monterrey, Mexico, November 9-14, 2008, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {5332}, pages = {937}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88873-4\_1}, doi = {10.1007/978-3-540-88873-4\_1}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/otm/ParkPSZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/TroncosoGPV08, author = {Carmela Troncoso and Benedikt Gierlichs and Bart Preneel and Ingrid Verbauwhede}, editor = {Nikita Borisov and Ian Goldberg}, title = {Perfect Matching Disclosure Attacks}, booktitle = {Privacy Enhancing Technologies, 8th International Symposium, {PETS} 2008, Leuven, Belgium, July 23-25, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5134}, pages = {2--23}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70630-4\_2}, doi = {10.1007/978-3-540-70630-4\_2}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/pet/TroncosoGPV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/AndreevaP08, author = {Elena Andreeva and Bart Preneel}, editor = {Roberto Maria Avanzi and Liam Keliher and Francesco Sica}, title = {A Three-Property-Secure Hash Function}, booktitle = {Selected Areas in Cryptography, 15th International Workshop, {SAC} 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5381}, pages = {228--244}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-04159-4\_15}, doi = {10.1007/978-3-642-04159-4\_15}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/AndreevaP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/IndesteegeMPR08, author = {Sebastiaan Indesteege and Florian Mendel and Bart Preneel and Christian Rechberger}, editor = {Roberto Maria Avanzi and Liam Keliher and Francesco Sica}, title = {Collisions and Other Non-random Properties for Step-Reduced {SHA-256}}, booktitle = {Selected Areas in Cryptography, 15th International Workshop, {SAC} 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5381}, pages = {276--293}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-04159-4\_18}, doi = {10.1007/978-3-642-04159-4\_18}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/IndesteegeMPR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Preneel08, author = {Bart Preneel}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Cryptographic Algorithms - Successes, Failures and Challenges}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {21--27}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 13:20:36 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Preneel08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigmap/DengWP08, author = {Mina Deng and Li Weng and Bart Preneel}, editor = {Pedro A. Amado Assun{\c{c}}{\~{a}}o and S{\'{e}}rgio M. M. de Faria}, title = {Anonymous Buyer-Seller Watermarking Protocol wth Additive Homomorphism}, booktitle = {{SIGMAP} 2008 - Proceedings of the International Conference on Signal Processing and Multimedia Applications, Porto, Portugal, July 26-29, 2008, {SIGMAP} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {300--307}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 13:52:49 +0200}, biburl = {https://dblp.org/rec/conf/sigmap/DengWP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/storagess/TroncosoCP08, author = {Carmela Troncoso and Danny De Cock and Bart Preneel}, editor = {Yongdae Kim and William Yurcik}, title = {Improving secure long-term archival of digitally signed documents}, booktitle = {Proceedings of the 2008 {ACM} Workshop On Storage Security And Survivability, StorageSS 2008, Alexandria, VA, USA, October 31, 2008}, pages = {27--36}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456469.1456476}, doi = {10.1145/1456469.1456476}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/storagess/TroncosoCP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/SchellekensTP08, author = {Dries Schellekens and Pim Tuyls and Bart Preneel}, editor = {Peter Lipp and Ahmad{-}Reza Sadeghi and Klaus{-}Michael Koch}, title = {Embedded Trusted Computing with Authenticated Non-volatile Memory}, booktitle = {Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4968}, pages = {60--74}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68979-9\_5}, doi = {10.1007/978-3-540-68979-9\_5}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/trust/SchellekensTP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/WanRLP08, author = {Zhiguo Wan and Kui Ren and Wenjing Lou and Bart Preneel}, title = {Anonymous ID-Based Group Key Agreement for Wireless Networks}, booktitle = {{WCNC} 2008, {IEEE} Wireless Communications {\&} Networking Conference, March 31 2008 - April 3 2008, Las Vegas, Nevada, USA, Conference Proceedings}, pages = {2615--2620}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/WCNC.2008.459}, doi = {10.1109/WCNC.2008.459}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/wcnc/WanRLP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wd/DengSCPJ08, author = {Mina Deng and Riccardo Scandariato and Danny De Cock and Bart Preneel and Wouter Joosen}, title = {Identity in federated electronic healthcare}, booktitle = {1st {IFIP} Wireless Days, {WD} 2008, Dubai, UAE, November 24-27, 2008}, pages = {1--5}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/WD.2008.4812919}, doi = {10.1109/WD.2008.4812919}, timestamp = {Mon, 09 Aug 2021 14:54:04 +0200}, biburl = {https://dblp.org/rec/conf/wd/DengSCPJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/winsys/KnezevicVPV08, author = {Miroslav Knezevic and Vesselin Velichkov and Bart Preneel and Ingrid Verbauwhede}, editor = {Mohammad S. Obaidat and Rafael F. S. Caldeirinha}, title = {On the Practical Performance of Rateless Codes}, booktitle = {{WINSYS} 2008 - Proceedings of the International Conference on Wireless Information Networks and Systems, Porto, Portugal, July 26-29, 2008, {WINSYS} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {173--176}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Wed, 09 Sep 2009 08:25:31 +0200}, biburl = {https://dblp.org/rec/conf/winsys/KnezevicVPV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/WanRP08, author = {Zhiguo Wan and Kui Ren and Bart Preneel}, editor = {Virgil D. Gligor and Jean{-}Pierre Hubaux and Radha Poovendran}, title = {A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks}, booktitle = {Proceedings of the First {ACM} Conference on Wireless Network Security, {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008}, pages = {62--67}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1352533.1352544}, doi = {10.1145/1352533.1352544}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/WanRP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/MulderDBP08, author = {Yoni De Mulder and George Danezis and Lejla Batina and Bart Preneel}, editor = {Vijay Atluri and Marianne Winslett}, title = {Identification via location-profiling in {GSM} networks}, booktitle = {Proceedings of the 2008 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2008, Alexandria, VA, USA, October 27, 2008}, pages = {23--32}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456403.1456409}, doi = {10.1145/1456403.1456409}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/MulderDBP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/GierlichsTDPV08, author = {Benedikt Gierlichs and Carmela Troncoso and Claudia D{\'{\i}}az and Bart Preneel and Ingrid Verbauwhede}, editor = {Vijay Atluri and Marianne Winslett}, title = {Revisiting a combinatorial approach toward measuring anonymity}, booktitle = {Proceedings of the 2008 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2008, Alexandria, VA, USA, October 27, 2008}, pages = {111--116}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456403.1456422}, doi = {10.1145/1456403.1456422}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wpes/GierlichsTDPV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/CanniereP08, author = {Christophe De Canni{\`{e}}re and Bart Preneel}, editor = {Matthew J. B. Robshaw and Olivier Billet}, title = {Trivium}, booktitle = {New Stream Cipher Designs - The eSTREAM Finalists}, series = {Lecture Notes in Computer Science}, volume = {4986}, pages = {244--266}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68351-3\_18}, doi = {10.1007/978-3-540-68351-3\_18}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/series/lncs/CanniereP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sofsem/2008, editor = {Viliam Geffert and Juhani Karhum{\"{a}}ki and Alberto Bertoni and Bart Preneel and Pavol N{\'{a}}vrat and M{\'{a}}ria Bielikov{\'{a}}}, title = {{SOFSEM} 2008: Theory and Practice of Computer Science, 34th Conference on Current Trends in Theory and Practice of Computer Science, Nov{\'{y}} Smokovec, Slovakia, January 19-25, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4910}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-77566-9}, doi = {10.1007/978-3-540-77566-9}, isbn = {978-3-540-77565-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sofsem/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sofsem/2008-2, editor = {Viliam Geffert and Juhani Karhum{\"{a}}ki and Alberto Bertoni and Bart Preneel and Pavol N{\'{a}}vrat and M{\'{a}}ria Bielikov{\'{a}}}, title = {{SOFSEM} 2008: Theory and Practice of Computer Science, 34th Conference on Current Trends in Theory and Practice of Computer Science, Nov{\'{y}} Smokovec, Slovakia, January 19-25, 2008, Volume {II} - Student Research Forum}, publisher = {Safarik University, Kosice, Slovakia}, year = {2008}, isbn = {978-80-7097-697-5}, timestamp = {Tue, 25 Nov 2008 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sofsem/2008-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IndesteegeMPR08, author = {Sebastiaan Indesteege and Florian Mendel and Bart Preneel and Christian Rechberger}, title = {Collisions and other Non-Random Properties for Step-Reduced {SHA-256}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {131}, year = {2008}, url = {http://eprint.iacr.org/2008/131}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IndesteegeMPR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SaxenaWP08, author = {Amitabh Saxena and Brecht Wyseur and Bart Preneel}, title = {White-Box Cryptography: Formal Notions and (Im)possibility Results}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {273}, year = {2008}, url = {http://eprint.iacr.org/2008/273}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SaxenaWP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/SakiyamaBPV07, author = {Kazuo Sakiyama and Lejla Batina and Bart Preneel and Ingrid Verbauwhede}, title = {{HW/SW} co-design for public-key cryptosystems on the 8051 micro-controller}, journal = {Comput. Electr. Eng.}, volume = {33}, number = {5-6}, pages = {324--332}, year = {2007}, url = {https://doi.org/10.1016/j.compeleceng.2007.05.005}, doi = {10.1016/J.COMPELECENG.2007.05.005}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/SakiyamaBPV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/MulderOPV07, author = {Elke De Mulder and Siddika Berna {\"{O}}rs and Bart Preneel and Ingrid Verbauwhede}, title = {Differential power and electromagnetic attacks on a {FPGA} implementation of elliptic curve cryptosystems}, journal = {Comput. Electr. Eng.}, volume = {33}, number = {5-6}, pages = {367--382}, year = {2007}, url = {https://doi.org/10.1016/j.compeleceng.2007.05.009}, doi = {10.1016/J.COMPELECENG.2007.05.009}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/MulderOPV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Preneel07, author = {Bart Preneel}, title = {A survey of recent developments in cryptographic algorithms for smart cards}, journal = {Comput. Networks}, volume = {51}, number = {9}, pages = {2223--2233}, year = {2007}, url = {https://doi.org/10.1016/j.comnet.2007.01.008}, doi = {10.1016/J.COMNET.2007.01.008}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/Preneel07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BackesGP07, author = {Michael Backes and Stefanos Gritzalis and Bart Preneel}, title = {Preface}, journal = {Int. J. Inf. Sec.}, volume = {6}, number = {6}, pages = {359--360}, year = {2007}, url = {https://doi.org/10.1007/s10207-007-0034-x}, doi = {10.1007/S10207-007-0034-X}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/BackesGP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/SakiyamaBPV07, author = {Kazuo Sakiyama and Lejla Batina and Bart Preneel and Ingrid Verbauwhede}, title = {High-performance Public-key Cryptoprocessor for Wireless Mobile Applications}, journal = {Mob. Networks Appl.}, volume = {12}, number = {4}, pages = {245--258}, year = {2007}, url = {https://doi.org/10.1007/s11036-007-0020-6}, doi = {10.1007/S11036-007-0020-6}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/monet/SakiyamaBPV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/SakiyamaBPV07, author = {Kazuo Sakiyama and Lejla Batina and Bart Preneel and Ingrid Verbauwhede}, title = {Multicore Curve-Based Cryptoprocessor with Reconfigurable Modular Arithmetic Logic Units over GF(2\({}^{\mbox{n}}\))}, journal = {{IEEE} Trans. Computers}, volume = {56}, number = {9}, pages = {1269--1282}, year = {2007}, url = {https://doi.org/10.1109/TC.2007.1071}, doi = {10.1109/TC.2007.1071}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/SakiyamaBPV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AndreevaNPS07, author = {Elena Andreeva and Gregory Neven and Bart Preneel and Thomas Shrimpton}, editor = {Kaoru Kurosawa}, title = {Seven-Property-Preserving Iterated Hashing: {ROX}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4833}, pages = {130--146}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76900-2\_8}, doi = {10.1007/978-3-540-76900-2\_8}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/AndreevaNPS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AnckaertMSBBP07, author = {Bertrand Anckaert and Matias Madou and Bjorn De Sutter and Bruno De Bus and Koen De Bosschere and Bart Preneel}, editor = {G{\"{u}}nter Karjoth and Ketil St{\o}len}, title = {Program obfuscation: a quantitative approach}, booktitle = {Proceedings of the 3th {ACM} Workshop on Quality of Protection, QoP 2007, Alexandria, VA, USA, October 29, 2007}, pages = {15--20}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1314257.1314263}, doi = {10.1145/1314257.1314263}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AnckaertMSBBP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/YoshidaWOKWKP07, author = {Hirotaka Yoshida and Dai Watanabe and Katsuyuki Okeya and Jun Kitahara and Hongjun Wu and {\"{O}}zg{\"{u}}l K{\"{u}}{\c{c}}{\"{u}}k and Bart Preneel}, editor = {Pascal Paillier and Ingrid Verbauwhede}, title = {{MAME:} {A} Compression Function with Reduced Hardware Requirements}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4727}, pages = {148--165}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74735-2\_11}, doi = {10.1007/978-3-540-74735-2\_11}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/YoshidaWOKWKP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/MendelLP07, author = {Florian Mendel and Joseph Lano and Bart Preneel}, editor = {Masayuki Abe}, title = {Cryptanalysis of Reduced Variants of the {FORK-256} Hash Function}, booktitle = {Topics in Cryptology - {CT-RSA} 2007, The Cryptographers' Track at the {RSA} Conference 2007, San Francisco, CA, USA, February 5-9, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4377}, pages = {85--100}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/11967668\_6}, doi = {10.1007/11967668\_6}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/MendelLP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/SingeleeP07, author = {Dave Singel{\'{e}}e and Bart Preneel}, editor = {Frank Stajano and Catherine Meadows and Srdjan Capkun and Tyler Moore}, title = {Distance Bounding in Noisy Environments}, booktitle = {Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, {ESAS} 2007, Cambridge, UK, July 2-3, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4572}, pages = {101--115}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73275-4\_8}, doi = {10.1007/978-3-540-73275-4\_8}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/esas/SingeleeP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/WuP07, author = {Hongjun Wu and Bart Preneel}, editor = {Moni Naor}, title = {Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4515}, pages = {276--290}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72540-4\_16}, doi = {10.1007/978-3-540-72540-4\_16}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/WuP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/WuP07, author = {Hongjun Wu and Bart Preneel}, editor = {Alex Biryukov}, title = {Differential-Linear Attacks Against the Stream Cipher Phelix}, booktitle = {Fast Software Encryption, 14th International Workshop, {FSE} 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4593}, pages = {87--100}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74619-5\_6}, doi = {10.1007/978-3-540-74619-5\_6}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/WuP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KimHP07, author = {Jongsung Kim and Seokhie Hong and Bart Preneel}, editor = {Alex Biryukov}, title = {Related-Key Rectangle Attacks on Reduced {AES-192} and {AES-256}}, booktitle = {Fast Software Encryption, 14th International Workshop, {FSE} 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4593}, pages = {225--241}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74619-5\_15}, doi = {10.1007/978-3-540-74619-5\_15}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/KimHP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/glvlsi/SakiyamaMPV07, author = {Kazuo Sakiyama and Elke De Mulder and Bart Preneel and Ingrid Verbauwhede}, editor = {Hai Zhou and Enrico Macii and Zhiyuan Yan and Yehia Massoud}, title = {Side-channel resistant system-level design flow for public-key cryptography}, booktitle = {Proceedings of the 17th {ACM} Great Lakes Symposium on {VLSI} 2007, Stresa, Lago Maggiore, Italy, March 11-13, 2007}, pages = {144--147}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1228784.1228822}, doi = {10.1145/1228784.1228822}, timestamp = {Wed, 16 Aug 2023 21:16:32 +0200}, biburl = {https://dblp.org/rec/conf/glvlsi/SakiyamaMPV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/glvlsi/MentensSPV07, author = {Nele Mentens and Kazuo Sakiyama and Bart Preneel and Ingrid Verbauwhede}, editor = {Hai Zhou and Enrico Macii and Zhiyuan Yan and Yehia Massoud}, title = {Efficient pipelining for modular multiplication architectures in prime fields}, booktitle = {Proceedings of the 17th {ACM} Great Lakes Symposium on {VLSI} 2007, Stresa, Lago Maggiore, Italy, March 11-13, 2007}, pages = {534--539}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1228784.1228911}, doi = {10.1145/1228784.1228911}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/glvlsi/MentensSPV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/WanDBP07, author = {Zhiguo Wan and Robert H. Deng and Feng Bao and Bart Preneel}, editor = {Sihan Qing and Hideki Imai and Guilin Wang}, title = {\emph{n} PAKE\({}^{\mbox{ + }}\): {A} Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords}, booktitle = {Information and Communications Security, 9th International Conference, {ICICS} 2007, Zhengzhou, China, December 12-15, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4861}, pages = {31--43}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77048-0\_3}, doi = {10.1007/978-3-540-77048-0\_3}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/WanDBP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/WengP07, author = {Li Weng and Bart Preneel}, title = {Attacking Some Perceptual Image Hash Algorithms}, booktitle = {Proceedings of the 2007 {IEEE} International Conference on Multimedia and Expo, {ICME} 2007, July 2-5, 2007, Beijing, China}, pages = {879--882}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICME.2007.4284791}, doi = {10.1109/ICME.2007.4284791}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icmcs/WengP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/TroncosoDDP07, author = {Carmela Troncoso and Claudia D{\'{\i}}az and Orr Dunkelman and Bart Preneel}, editor = {Teddy Furon and Fran{\c{c}}ois Cayre and Gwena{\"{e}}l J. Do{\"{e}}rr and Patrick Bas}, title = {Traffic Analysis Attacks on a Continuously-Observable Steganographic File System}, booktitle = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4567}, pages = {220--236}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77370-2\_15}, doi = {10.1007/978-3-540-77370-2\_15}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ih/TroncosoDDP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/SekarPP07, author = {Gautham Sekar and Souradyuti Paul and Bart Preneel}, editor = {K. Srinathan and C. Pandu Rangan and Moti Yung}, title = {Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4859}, pages = {58--72}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77026-8\_6}, doi = {10.1007/978-3-540-77026-8\_6}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/SekarPP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/DunkelmanSP07, author = {Orr Dunkelman and Gautham Sekar and Bart Preneel}, editor = {K. Srinathan and C. Pandu Rangan and Moti Yung}, title = {Improved Meet-in-the-Middle Attacks on Reduced-Round {DES}}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4859}, pages = {86--100}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77026-8\_8}, doi = {10.1007/978-3-540-77026-8\_8}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/DunkelmanSP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/BatinaMSPV07, author = {Lejla Batina and Nele Mentens and Kazuo Sakiyama and Bart Preneel and Ingrid Verbauwhede}, title = {Public-Key Cryptography on the Top of a Needle}, booktitle = {International Symposium on Circuits and Systems {(ISCAS} 2007), 27-20 May 2007, New Orleans, Louisiana, {USA}}, pages = {1831--1834}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/ISCAS.2007.378270}, doi = {10.1109/ISCAS.2007.378270}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscas/BatinaMSPV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/SekarPP07, author = {Gautham Sekar and Souradyuti Paul and Bart Preneel}, editor = {Juan A. Garay and Arjen K. Lenstra and Masahiro Mambo and Ren{\'{e}} Peralta}, title = {New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py}, booktitle = {Information Security, 10th International Conference, {ISC} 2007, Valpara{\'{\i}}so, Chile, October 9-12, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4779}, pages = {249--262}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75496-1\_17}, doi = {10.1007/978-3-540-75496-1\_17}, timestamp = {Fri, 03 Feb 2023 21:39:19 +0100}, biburl = {https://dblp.org/rec/conf/isw/SekarPP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/DanezisDFKTP07, author = {George Danezis and Claudia D{\'{\i}}az and Sebastian Faust and Emilia K{\"{a}}sper and Carmela Troncoso and Bart Preneel}, editor = {Juan A. Garay and Arjen K. Lenstra and Masahiro Mambo and Ren{\'{e}} Peralta}, title = {Efficient Negative Databases from Cryptographic Hash Functions}, booktitle = {Information Security, 10th International Conference, {ISC} 2007, Valpara{\'{\i}}so, Chile, October 9-12, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4779}, pages = {423--436}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75496-1\_28}, doi = {10.1007/978-3-540-75496-1\_28}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/DanezisDFKTP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobiquitous/SingeleeP07, author = {Dave Singel{\'{e}}e and Bart Preneel}, title = {Key Establishment Using Secure Distance Bounding Protocols}, booktitle = {4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), August 6-10, 2007, Philadelphia, PA, {USA}}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/MOBIQ.2007.4451066}, doi = {10.1109/MOBIQ.2007.4451066}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobiquitous/SingeleeP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/KohlweissFFGP07, author = {Markulf Kohlweiss and Sebastian Faust and Lothar Fritsch and Bartek Gedrojc and Bart Preneel}, editor = {Nikita Borisov and Philippe Golle}, title = {Efficient Oblivious Augmented Maps: Location-Based Services with a Payment Broker}, booktitle = {Privacy Enhancing Technologies, 7th International Symposium, {PET} 2007 Ottawa, Canada, June 20-22, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4776}, pages = {77--94}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75551-7\_6}, doi = {10.1007/978-3-540-75551-7\_6}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pet/KohlweissFFGP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/WyseurMGP07, author = {Brecht Wyseur and Wil Michiels and Paul Gorissen and Bart Preneel}, editor = {Carlisle M. Adams and Ali Miri and Michael J. Wiener}, title = {Cryptanalysis of White-Box {DES} Implementations with Arbitrary External Encodings}, booktitle = {Selected Areas in Cryptography, 14th International Workshop, {SAC} 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4876}, pages = {264--277}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77360-3\_17}, doi = {10.1007/978-3-540-77360-3\_17}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/WyseurMGP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/samos/MentensSBPV07, author = {Nele Mentens and Kazuo Sakiyama and Lejla Batina and Bart Preneel and Ingrid Verbauwhede}, editor = {Holger Blume and Georgi Gaydadjiev and C. John Glossner and Peter M. W. Knijnenburg}, title = {A Side-channel Attack Resistant Programmable {PKC} Coprocessor for Embedded Applications}, booktitle = {Proceedings of the 2007 International Conference on Embedded Computer Systems: Architectures, Modeling and Simulation {(IC-SAMOS} 2007), Samos, Greece, July 16-19, 2007}, pages = {194--200}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/ICSAMOS.2007.4285751}, doi = {10.1109/ICSAMOS.2007.4285751}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/samos/MentensSBPV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigmap/WengP07, author = {Li Weng and Bart Preneel}, editor = {S{\'{e}}rgio M. M. de Faria and Pedro A. Amado Assun{\c{c}}{\~{a}}o}, title = {On Encryption and Authentication of the {DC} {DCT} Coefficient}, booktitle = {{SIGMAP} 2007 - Proceedings of the Second International Conference on Signal Processing and Multimedia Applications, Barcelona, Spain, July 28-31, 2007, {SIGMAP} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {375--379}, publisher = {{INSTICC} Press}, year = {2007}, timestamp = {Fri, 04 Sep 2009 14:41:26 +0200}, biburl = {https://dblp.org/rec/conf/sigmap/WengP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/voteid/CockP07, author = {Danny De Cock and Bart Preneel}, editor = {Ammar Alkassar and Melanie Volkamer}, title = {Electronic Voting in Belgium: Past and Future}, booktitle = {E-Voting and Identity, First International Conference, {VOTE-ID} 2007, Bochum, Germany, October 4-5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4896}, pages = {76--87}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77493-8\_7}, doi = {10.1007/978-3-540-77493-8\_7}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/voteid/CockP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/weworc/IndesteegeP07, author = {Sebastiaan Indesteege and Bart Preneel}, editor = {Stefan Lucks and Ahmad{-}Reza Sadeghi and Christopher Wolf}, title = {Preimages for Reduced-Round Tiger}, booktitle = {Research in Cryptology, Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4945}, pages = {90--99}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-88353-1\_8}, doi = {10.1007/978-3-540-88353-1\_8}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/weworc/IndesteegeP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/weworc/SekarPP07, author = {Gautham Sekar and Souradyuti Paul and Bart Preneel}, editor = {Stefan Lucks and Ahmad{-}Reza Sadeghi and Christopher Wolf}, title = {New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B}, booktitle = {Research in Cryptology, Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4945}, pages = {127--141}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-88353-1\_11}, doi = {10.1007/978-3-540-88353-1\_11}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/weworc/SekarPP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/TroncosoDKP07, author = {Carmela Troncoso and George Danezis and Eleni Kosta and Bart Preneel}, editor = {Peng Ning and Ting Yu}, title = {Pripayd: privacy friendly pay-as-you-drive insurance}, booktitle = {Proceedings of the 2007 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2007, Alexandria, VA, USA, October 29, 2007}, pages = {99--107}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1314333.1314353}, doi = {10.1145/1314333.1314353}, timestamp = {Mon, 04 Apr 2022 16:00:14 +0200}, biburl = {https://dblp.org/rec/conf/wpes/TroncosoDKP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/SchellekensWP08, author = {Dries Schellekens and Brecht Wyseur and Bart Preneel}, editor = {Fabio Massacci and Frank Piessens}, title = {Remote Attestation on Legacy Operating Systems With Trusted Platform Modules}, booktitle = {Proceedings of the First International Workshop on Run Time Enforcement for Mobile and Distributed Systems, REM@ESORICS 2007, Dresden, Germany, September 27, 2007}, series = {Electronic Notes in Theoretical Computer Science}, volume = {197}, number = {1}, pages = {59--72}, publisher = {Elsevier}, year = {2007}, url = {https://doi.org/10.1016/j.entcs.2007.10.014}, doi = {10.1016/J.ENTCS.2007.10.014}, timestamp = {Mon, 13 Feb 2023 09:09:10 +0100}, biburl = {https://dblp.org/rec/journals/entcs/SchellekensWP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/07/DiazP07, author = {Claudia D{\'{\i}}az and Bart Preneel}, editor = {Milan Petkovic and Willem Jonker}, title = {Accountable Anonymous Communication}, booktitle = {Security, Privacy, and Trust in Modern Data Management}, series = {Data-Centric Systems and Applications}, pages = {239--253}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-69861-6\_16}, doi = {10.1007/978-3-540-69861-6\_16}, timestamp = {Tue, 16 May 2017 14:01:42 +0200}, biburl = {https://dblp.org/rec/books/sp/07/DiazP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SekarPP07, author = {Gautham Sekar and Souradyuti Paul and Bart Preneel}, title = {Weaknesses in the Pseudorandom Bit Generation Algorithms of the Stream Ciphers TPypy and TPy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {75}, year = {2007}, url = {http://eprint.iacr.org/2007/075}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SekarPP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WyseurMGP07, author = {Brecht Wyseur and Wil Michiels and Paul Gorissen and Bart Preneel}, title = {Cryptanalysis of White-Box {DES} Implementations with Arbitrary External Encodings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {104}, year = {2007}, url = {http://eprint.iacr.org/2007/104}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WyseurMGP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AndreevaNPS07, author = {Elena Andreeva and Gregory Neven and Bart Preneel and Thomas Shrimpton}, title = {Seven-Property-Preserving Iterated Hashing: {ROX}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {176}, year = {2007}, url = {http://eprint.iacr.org/2007/176}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AndreevaNPS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SekarPP07a, author = {Gautham Sekar and Souradyuti Paul and Bart Preneel}, title = {New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {230}, year = {2007}, url = {http://eprint.iacr.org/2007/230}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SekarPP07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SekarPP07b, author = {Gautham Sekar and Souradyuti Paul and Bart Preneel}, title = {New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {436}, year = {2007}, url = {http://eprint.iacr.org/2007/436}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SekarPP07b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/WolfBP06, author = {Christopher Wolf and An Braeken and Bart Preneel}, title = {On the security of stepwise triangular systems}, journal = {Des. Codes Cryptogr.}, volume = {40}, number = {3}, pages = {285--302}, year = {2006}, url = {https://doi.org/10.1007/s10623-006-0015-5}, doi = {10.1007/S10623-006-0015-5}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/WolfBP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pieee/CanniereBP06, author = {Christophe De Canni{\`{e}}re and Alex Biryukov and Bart Preneel}, title = {An introduction to Block Cipher Cryptanalysis}, journal = {Proc. {IEEE}}, volume = {94}, number = {2}, pages = {346--356}, year = {2006}, url = {https://doi.org/10.1109/JPROC.2005.862300}, doi = {10.1109/JPROC.2005.862300}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pieee/CanniereBP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/BraekenBNP06, author = {An Braeken and Yuri L. Borissov and Svetla Nikova and Bart Preneel}, title = {Classification of cubic (n-4)-resilient Boolean functions}, journal = {{IEEE} Trans. Inf. Theory}, volume = {52}, number = {4}, pages = {1670--1676}, year = {2006}, url = {https://doi.org/10.1109/TIT.2006.871063}, doi = {10.1109/TIT.2006.871063}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/BraekenBNP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BraekenLP06, author = {An Braeken and Joseph Lano and Bart Preneel}, editor = {Lynn Margaret Batten and Reihaneh Safavi{-}Naini}, title = {Evaluating the Resistance of Stream Ciphers with Linear Feedback Against Fast Algebraic Attacks}, booktitle = {Information Security and Privacy, 11th Australasian Conference, {ACISP} 2006, Melbourne, Australia, July 3-5, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4058}, pages = {40--51}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11780656\_4}, doi = {10.1007/11780656\_4}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BraekenLP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/adhoc-now/SingeleeP06, author = {Dave Singel{\'{e}}e and Bart Preneel}, editor = {Thomas Kunz and S. S. Ravi}, title = {Improved Pairing Protocol for Bluetooth}, booktitle = {Ad-Hoc, Mobile, and Wireless Networks, 5th International Conference, {ADHOC-NOW} 2006, Ottawa, Canada, August 17-19, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4104}, pages = {252--265}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11814764\_21}, doi = {10.1007/11814764\_21}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/adhoc-now/SingeleeP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/SeysP06, author = {Stefaan Seys and Bart Preneel}, title = {{ARM:} Anonymous Routing Protocol for Mobile Ad hoc Networks}, booktitle = {20th International Conference on Advanced Information Networking and Applications {(AINA} 2006), 18-20 April 2006, Vienna, Austria}, pages = {133--137}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/AINA.2006.104}, doi = {10.1109/AINA.2006.104}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/SeysP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/arc/MentensBPV06, author = {Nele Mentens and Lejla Batina and Bart Preneel and Ingrid Verbauwhede}, editor = {Koen Bertels and Jo{\~{a}}o M. P. Cardoso and Stamatis Vassiliadis}, title = {Time-Memory Trade-Off Attack on {FPGA} Platforms: {UNIX} Password Cracking}, booktitle = {Reconfigurable Computing: Architectures and Applications, Second International Workshop, {ARC} 2006, Delft, The Netherlands, March 1-3, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3985}, pages = {323--334}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11802839\_41}, doi = {10.1007/11802839\_41}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/arc/MentensBPV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/arc/SakiyamaMBPV06, author = {Kazuo Sakiyama and Nele Mentens and Lejla Batina and Bart Preneel and Ingrid Verbauwhede}, editor = {Koen Bertels and Jo{\~{a}}o M. P. Cardoso and Stamatis Vassiliadis}, title = {Reconfigurable Modular Arithmetic Logic Unit for High-Performance Public-Key Cryptosystems}, booktitle = {Reconfigurable Computing: Architectures and Applications, Second International Workshop, {ARC} 2006, Delft, The Netherlands, March 1-3, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3985}, pages = {347--357}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11802839\_43}, doi = {10.1007/11802839\_43}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/arc/SakiyamaMBPV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/PaulP06, author = {Souradyuti Paul and Bart Preneel}, editor = {Xuejia Lai and Kefei Chen}, title = {On the (In)security of Stream Ciphers Based on Arrays and Modular Addition}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4284}, pages = {69--83}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935230\_5}, doi = {10.1007/11935230\_5}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/PaulP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/NikovNP06, author = {Ventzislav Nikov and Svetla Nikova and Bart Preneel}, editor = {Xuejia Lai and Kefei Chen}, title = {A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4284}, pages = {348--363}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935230\_23}, doi = {10.1007/11935230\_23}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/NikovNP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/SakiyamaBPV06, author = {Kazuo Sakiyama and Lejla Batina and Bart Preneel and Ingrid Verbauwhede}, editor = {Louis Goubin and Mitsuru Matsui}, title = {Superscalar Coprocessor for High-Speed Curve-Based Cryptography}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4249}, pages = {415--429}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11894063\_33}, doi = {10.1007/11894063\_33}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/SakiyamaBPV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/BatinaMSPV06, author = {Lejla Batina and Nele Mentens and Kazuo Sakiyama and Bart Preneel and Ingrid Verbauwhede}, editor = {Levente Butty{\'{a}}n and Virgil D. Gligor and Dirk Westhoff}, title = {Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks}, booktitle = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4357}, pages = {6--17}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11964254\_3}, doi = {10.1007/11964254\_3}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/BatinaMSPV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpl/MentensSBVP06, author = {Nele Mentens and Kazuo Sakiyama and Lejla Batina and Ingrid Verbauwhede and Bart Preneel}, title = {Fpga-Oriented Secure Data Path Design: Implementation of a Public Key Coprocessor}, booktitle = {Proceedings of the 2006 International Conference on Field Programmable Logic and Applications (FPL), Madrid, Spain, August 28-30, 2006}, pages = {1--6}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/FPL.2006.311205}, doi = {10.1109/FPL.2006.311205}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fpl/MentensSBVP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpl/SchellekensPV06, author = {Dries Schellekens and Bart Preneel and Ingrid Verbauwhede}, title = {{FPGA} Vendor Agnostic True Random Number Generator}, booktitle = {Proceedings of the 2006 International Conference on Field Programmable Logic and Applications (FPL), Madrid, Spain, August 28-30, 2006}, pages = {1--6}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/FPL.2006.311206}, doi = {10.1109/FPL.2006.311206}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fpl/SchellekensPV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/WuP06, author = {Hongjun Wu and Bart Preneel}, editor = {Matthew J. B. Robshaw}, title = {Cryptanalysis of the Stream Cipher {DECIM}}, booktitle = {Fast Software Encryption, 13th International Workshop, {FSE} 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4047}, pages = {30--40}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11799313\_3}, doi = {10.1007/11799313\_3}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/WuP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/PaulPS06, author = {Souradyuti Paul and Bart Preneel and Gautham Sekar}, editor = {Matthew J. B. Robshaw}, title = {Distinguishing Attacks on the Stream Cipher Py}, booktitle = {Fast Software Encryption, 13th International Workshop, {FSE} 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4047}, pages = {405--421}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11799313\_26}, doi = {10.1007/11799313\_26}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/PaulPS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/WuP06a, author = {Hongjun Wu and Bart Preneel}, editor = {Matthew J. B. Robshaw}, title = {Resynchronization Attacks on {WG} and {LEX}}, booktitle = {Fast Software Encryption, 13th International Workshop, {FSE} 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4047}, pages = {422--432}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11799313\_27}, doi = {10.1007/11799313\_27}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/WuP06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/SakiyamaMPV06, author = {Kazuo Sakiyama and Elke De Mulder and Bart Preneel and Ingrid Verbauwhede}, title = {A Parallel Processing Hardware Architecture for Elliptic Curve Cryptosystems}, booktitle = {2006 {IEEE} International Conference on Acoustics Speech and Signal Processing, {ICASSP} 2006, Toulouse, France, May 14-19, 2006}, pages = {904--907}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ICASSP.2006.1660801}, doi = {10.1109/ICASSP.2006.1660801}, timestamp = {Mon, 22 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icassp/SakiyamaMPV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/WengWP06, author = {Li Weng and Karel Wouters and Bart Preneel}, title = {Extending the Selective {MPEG} Encryption Algorithm {PVEA}}, booktitle = {Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing {(IIH-MSP} 2006), Pasadena, California, USA, December 18-20, 2006, Proceedings}, pages = {117--120}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/IIH-MSP.2006.264968}, doi = {10.1109/IIH-MSP.2006.264968}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iih-msp/WengWP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/MendelPRYW06, author = {Florian Mendel and Bart Preneel and Vincent Rijmen and Hirotaka Yoshida and Dai Watanabe}, editor = {Rana Barua and Tanja Lange}, title = {Update on Tiger}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4329}, pages = {63--79}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11941378\_6}, doi = {10.1007/11941378\_6}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/indocrypt/MendelPRYW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/BatinaMPV06, author = {Lejla Batina and Nele Mentens and Bart Preneel and Ingrid Verbauwhede}, title = {Flexible hardware architectures for curve-based cryptography}, booktitle = {International Symposium on Circuits and Systems {(ISCAS} 2006), 21-24 May 2006, Island of Kos, Greece}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ISCAS.2006.1693714}, doi = {10.1109/ISCAS.2006.1693714}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscas/BatinaMPV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/SakiyamaPV06, author = {Kazuo Sakiyama and Bart Preneel and Ingrid Verbauwhede}, title = {A fast dual-field modular arithmetic logic unit and its hardware implementation}, booktitle = {International Symposium on Circuits and Systems {(ISCAS} 2006), 21-24 May 2006, Island of Kos, Greece}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ISCAS.2006.1692703}, doi = {10.1109/ISCAS.2006.1692703}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscas/SakiyamaPV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/WuP06, author = {Hongjun Wu and Bart Preneel}, editor = {Eli Biham and Amr M. Youssef}, title = {Cryptanalysis of the Stream Cipher {ABC} v2}, booktitle = {Selected Areas in Cryptography, 13th International Workshop, {SAC} 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4356}, pages = {56--66}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-74462-7\_5}, doi = {10.1007/978-3-540-74462-7\_5}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/WuP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/HandschuhP06, author = {Helena Handschuh and Bart Preneel}, editor = {Eli Biham and Amr M. Youssef}, title = {Blind Differential Cryptanalysis for Enhanced Power Attacks}, booktitle = {Selected Areas in Cryptography, 13th International Workshop, {SAC} 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4356}, pages = {163--173}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-74462-7\_12}, doi = {10.1007/978-3-540-74462-7\_12}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/HandschuhP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/KimBPH06, author = {Jongsung Kim and Alex Biryukov and Bart Preneel and Seokhie Hong}, editor = {Roberto De Prisco and Moti Yung}, title = {On the Security of {HMAC} and {NMAC} Based on HAVAL, MD4, MD5, {SHA-0} and {SHA-1} (Extended Abstract)}, booktitle = {Security and Cryptography for Networks, 5th International Conference, {SCN} 2006, Maiori, Italy, September 6-8, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4116}, pages = {242--256}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11832072\_17}, doi = {10.1007/11832072\_17}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/KimBPH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/serp/MadouABBCP06, author = {Matias Madou and Bertrand Anckaert and Bruno De Bus and Koen De Bosschere and Jan Cappaert and Bart Preneel}, editor = {Hamid R. Arabnia and Hassan Reza}, title = {On the Effectiveness of Source Code Transformations for Binary Obfuscation}, booktitle = {Proceedings of the International Conference on Software Engineering Research and Practice {\&} Conference on Programming Languages and Compilers, {SERP} 2006, Las Vegas, Nevada, USA, June 26-29, 2006, Volume 2}, pages = {527--533}, publisher = {{CSREA} Press}, year = {2006}, timestamp = {Wed, 29 Nov 2006 15:18:21 +0100}, biburl = {https://dblp.org/rec/conf/serp/MadouABBCP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/CockWP06, author = {Danny De Cock and Christopher Wolf and Bart Preneel}, editor = {Jana Dittmann}, title = {The Belgian Electronic Identity Card (Overview)}, booktitle = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg}, series = {{LNI}}, volume = {{P-77}}, pages = {298--301}, publisher = {{GI}}, year = {2006}, url = {https://dl.gi.de/handle/20.500.12116/24786}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/CockWP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ws/SingeleeP06, author = {Dave Singel{\'{e}}e and Bart Preneel}, editor = {Radha Poovendran and Ari Juels}, title = {Location privacy in wireless personal area networks}, booktitle = {Proceedings of the 2006 {ACM} Workshop on Wireless Security, Los Angeles, California, USA, September 29, 2006}, pages = {11--18}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1161289.1161292}, doi = {10.1145/1161289.1161292}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ws/SingeleeP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icalp/2006-1, editor = {Michele Bugliesi and Bart Preneel and Vladimiro Sassone and Ingo Wegener}, title = {Automata, Languages and Programming, 33rd International Colloquium, {ICALP} 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {4051}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11786986}, doi = {10.1007/11786986}, isbn = {3-540-35904-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icalp/2006-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icalp/2006-2, editor = {Michele Bugliesi and Bart Preneel and Vladimiro Sassone and Ingo Wegener}, title = {Automata, Languages and Programming, 33rd International Colloquium, {ICALP} 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {4052}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11787006}, doi = {10.1007/11787006}, isbn = {3-540-35907-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icalp/2006-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isw/2006, editor = {Sokratis K. Katsikas and Javier L{\'{o}}pez and Michael Backes and Stefanos Gritzalis and Bart Preneel}, title = {Information Security, 9th International Conference, {ISC} 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4176}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11836810}, doi = {10.1007/11836810}, isbn = {3-540-38341-7}, timestamp = {Thu, 29 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sacrypt/2005, editor = {Bart Preneel and Stafford E. Tavares}, title = {Selected Areas in Cryptography, 12th International Workshop, {SAC} 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3897}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11693383}, doi = {10.1007/11693383}, isbn = {3-540-33108-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimBPH06, author = {Jongsung Kim and Alex Biryukov and Bart Preneel and Seokhie Hong}, title = {On the Security of {HMAC} and {NMAC} Based on HAVAL, MD4, MD5, {SHA-0} and {SHA-1}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {187}, year = {2006}, url = {http://eprint.iacr.org/2006/187}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimBPH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BiryukovLP05, author = {Alex Biryukov and Joseph Lano and Bart Preneel}, title = {Recent attacks on alleged SecurID and their practical implications}, journal = {Comput. Secur.}, volume = {24}, number = {5}, pages = {364--370}, year = {2005}, url = {https://doi.org/10.1016/j.cose.2005.04.006}, doi = {10.1016/J.COSE.2005.04.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BiryukovLP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejasp/CanniereLP05, author = {Christophe De Canni{\`{e}}re and Joseph Lano and Bart Preneel}, title = {Cryptanalysis of the Two-Dimensional Circulation Encryption Algorithm}, journal = {{EURASIP} J. Adv. Signal Process.}, volume = {2005}, number = {12}, pages = {1923--1927}, year = {2005}, url = {https://doi.org/10.1155/ASP.2005.1923}, doi = {10.1155/ASP.2005.1923}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejasp/CanniereLP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/SingeleeP05, author = {Dave Singel{\'{e}}e and Bart Preneel}, title = {The Wireless Application Protocol}, journal = {Int. J. Netw. Secur.}, volume = {1}, number = {3}, pages = {161--165}, year = {2005}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v1-n3/ijns-2005-v1-n3-p161-165.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/SingeleeP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/QuisquaterPV05, author = {Micha{\"{e}}l Quisquater and Bart Preneel and Joos Vandewalle}, title = {Spectral characterization of cryptographic Boolean functions satisfying the (extended) propagation criterion of degree \emph{l} and order \emph{k}}, journal = {Inf. Process. Lett.}, volume = {93}, number = {1}, pages = {25--28}, year = {2005}, url = {https://doi.org/10.1016/j.ipl.2004.08.011}, doi = {10.1016/J.IPL.2004.08.011}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/QuisquaterPV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/YuBorissovBNP05, author = {Yuri L. Borissov and An Braeken and Svetla Nikova and Bart Preneel}, title = {On the covering radii of binary Reed-Muller codes in the set of resilient Boolean functions}, journal = {{IEEE} Trans. Inf. Theory}, volume = {51}, number = {3}, pages = {1182--1189}, year = {2005}, url = {https://doi.org/10.1109/TIT.2004.842779}, doi = {10.1109/TIT.2004.842779}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/YuBorissovBNP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PaulP05, author = {Souradyuti Paul and Bart Preneel}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Solving Systems of Differential Equations of Addition}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {75--88}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_7}, doi = {10.1007/11506157\_7}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PaulP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asap/BatinaMPV05, author = {Lejla Batina and Nele Mentens and Bart Preneel and Ingrid Verbauwhede}, title = {Side-channel aware design: Algorithms and Architectures for Elliptic Curve Cryptography over GF(2\({}^{\mbox{n}}\))}, booktitle = {16th {IEEE} International Conference on Application-Specific Systems, Architectures, and Processors {(ASAP} 2005), 23-25 July 2005, Samos, Greece}, pages = {350--355}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ASAP.2005.57}, doi = {10.1109/ASAP.2005.57}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asap/BatinaMPV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BatinaHHPV05, author = {Lejla Batina and David Hwang and Alireza Hodjat and Bart Preneel and Ingrid Verbauwhede}, editor = {Josyula R. Rao and Berk Sunar}, title = {Hardware/Software Co-design for Hyperelliptic Curve Cryptography {(HECC)} on the 8051{\(\mathrm{\mu}\)}P}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {106--118}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_8}, doi = {10.1007/11545262\_8}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BatinaHHPV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/BraekenWP05, author = {An Braeken and Christopher Wolf and Bart Preneel}, editor = {Alfred Menezes}, title = {A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes}, booktitle = {Topics in Cryptology - {CT-RSA} 2005, The Cryptographers' Track at the {RSA} Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3376}, pages = {29--43}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30574-3\_4}, doi = {10.1007/978-3-540-30574-3\_4}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/BraekenWP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/MentensBPV05, author = {Nele Mentens and Lejla Batina and Bart Preneel and Ingrid Verbauwhede}, editor = {Alfred Menezes}, title = {A Systematic Evaluation of Compact Hardware Implementations for the Rijndael S-Box}, booktitle = {Topics in Cryptology - {CT-RSA} 2005, The Cryptographers' Track at the {RSA} Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3376}, pages = {323--333}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30574-3\_22}, doi = {10.1007/978-3-540-30574-3\_22}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/MentensBPV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/HongKLP05, author = {Seokhie Hong and Jongsung Kim and Sangjin Lee and Bart Preneel}, editor = {Henri Gilbert and Helena Handschuh}, title = {Related-Key Rectangle Attacks on Reduced Versions of {SHACAL-1} and {AES-192}}, booktitle = {Fast Software Encryption: 12th International Workshop, {FSE} 2005, Paris, France, February 21-23, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3557}, pages = {368--383}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11502760\_25}, doi = {10.1007/11502760\_25}, timestamp = {Sat, 26 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/HongKLP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/BraekenBNP05, author = {An Braeken and Yuri L. Borissov and Svetla Nikova and Bart Preneel}, editor = {Lu{\'{\i}}s Caires and Giuseppe F. Italiano and Lu{\'{\i}}s Monteiro and Catuscia Palamidessi and Moti Yung}, title = {Classification of Boolean Functions of 6 Variables or Less with Respect to Some Cryptographic Properties}, booktitle = {Automata, Languages and Programming, 32nd International Colloquium, {ICALP} 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3580}, pages = {324--334}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11523468\_27}, doi = {10.1007/11523468\_27}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/BraekenBNP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcsw/SeysP05, author = {Stefaan Seys and Bart Preneel}, title = {The Wandering Nodes: Key Management for Low-Power Mobile Ad Hoc Networks}, booktitle = {25th International Conference on Distributed Computing Systems Workshops {(ICDCS} 2005 Workshops), 6-10 June 2005, Columbus, OH, {USA}}, pages = {916--922}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ICDCSW.2005.134}, doi = {10.1109/ICDCSW.2005.134}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcsw/SeysP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/KimBPL05, author = {Jongsung Kim and Alex Biryukov and Bart Preneel and Sangjin Lee}, editor = {Sihan Qing and Wenbo Mao and Javier L{\'{o}}pez and Guilin Wang}, title = {On the Security of Encryption Modes of MD4, {MD5} and {HAVAL}}, booktitle = {Information and Communications Security, 7th International Conference, {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3783}, pages = {147--158}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11602897\_13}, doi = {10.1007/11602897\_13}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/KimBPL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/BraekenWP05, author = {An Braeken and Christopher Wolf and Bart Preneel}, editor = {Nigel P. Smart}, title = {Normality of Vectorial Functions}, booktitle = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester, UK, December 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3796}, pages = {186--200}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11586821\_13}, doi = {10.1007/11586821\_13}, timestamp = {Wed, 18 Mar 2020 16:00:57 +0100}, biburl = {https://dblp.org/rec/conf/ima/BraekenWP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/BraekenP05, author = {An Braeken and Bart Preneel}, editor = {Nigel P. Smart}, title = {Probabilistic Algebraic Attacks}, booktitle = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester, UK, December 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3796}, pages = {290--303}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11586821\_20}, doi = {10.1007/11586821\_20}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/BraekenP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/BraekenP05, author = {An Braeken and Bart Preneel}, editor = {Subhamoy Maitra and C. E. Veni Madhavan and Ramarathnam Venkatesan}, title = {On the Algebraic Immunity of Symmetric Boolean Functions}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2005, 6th International Conference on Cryptology in India, Bangalore, India, December 10-12, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3797}, pages = {35--48}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596219\_4}, doi = {10.1007/11596219\_4}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/BraekenP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/PaulP05, author = {Souradyuti Paul and Bart Preneel}, editor = {Subhamoy Maitra and C. E. Veni Madhavan and Ramarathnam Venkatesan}, title = {Near Optimal Algorithms for Solving Differential Equations of Addition with Batch Queries}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2005, 6th International Conference on Cryptology in India, Bangalore, India, December 10-12, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3797}, pages = {90--103}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596219\_8}, doi = {10.1007/11596219\_8}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/PaulP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mass/SingeleeP05, author = {Dave Singel{\'{e}}e and Bart Preneel}, title = {Location verification using secure distance bounding protocols}, booktitle = {{IEEE} 2nd International Conference on Mobile Adhoc and Sensor Systems, {MASS} 2005, November 7-10, 2005, The City Center Hotel, Washington, {USA}}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/MAHSS.2005.1542879}, doi = {10.1109/MAHSS.2005.1542879}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mass/SingeleeP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/WolfP05, author = {Christopher Wolf and Bart Preneel}, editor = {Ed Dawson and Serge Vaudenay}, title = {Equivalent Keys in HFE, C\({}^{\mbox{*}}\), and Variations}, booktitle = {Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3715}, pages = {33--49}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11554868\_4}, doi = {10.1007/11554868\_4}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/WolfP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/WolfP05, author = {Christopher Wolf and Bart Preneel}, editor = {Serge Vaudenay}, title = {Large Superfluous Keys in Multivariate Quadratic Asymmetric Systems}, booktitle = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3386}, pages = {275--287}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30580-4\_19}, doi = {10.1007/978-3-540-30580-4\_19}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/WolfP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sicherheit/WolfP05, author = {Christopher Wolf and Bart Preneel}, editor = {Hannes Federrath}, title = {Applications of Multivariate Quadratic Public Key Systems}, booktitle = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit, Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April 2005 in Regensburg}, series = {{LNI}}, volume = {{P-62}}, pages = {413--424}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/28398}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sicherheit/WolfP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/SeysP05, author = {Stefaan Seys and Bart Preneel}, editor = {Dieter Hutter and Markus Ullmann}, title = {Efficient Cooperative Signatures: {A} Novel Authentication Scheme for Sensor Networks}, booktitle = {Security in Pervasive Computing, Second International Conference, {SPC} 2005, Boppard, Germany, April 6-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3450}, pages = {86--100}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-32004-3\_11}, doi = {10.1007/978-3-540-32004-3\_11}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spc/SeysP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wimob/SeysP05, author = {Stefaan Seys and Bart Preneel}, title = {Power consumption evaluation of efficient digital signature schemes for low power devices}, booktitle = {2005 {IEEE} International Conference on Wireless And Mobile Computing, Networking And Communications, WiMob 2005, Montreal, Canada, August 22-14, 2005, Volume 1}, pages = {79--86}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/WIMOB.2005.1512820}, doi = {10.1109/WIMOB.2005.1512820}, timestamp = {Thu, 12 Aug 2021 09:49:22 +0200}, biburl = {https://dblp.org/rec/conf/wimob/SeysP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cms/2004, editor = {David Chadwick and Bart Preneel}, title = {Communications and Multimedia Security - 8th {IFIP} {TC-6} {TC-11} Conference on Communications and Multimedia Security, Sept. 15-18, 2004, Windermere, The Lake District, United Kingdom}, series = {{IFIP}}, volume = {175}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/b105674}, doi = {10.1007/B105674}, isbn = {978-0-387-24485-3}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cms/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Preneel05, author = {Bart Preneel}, editor = {Henk C. A. van Tilborg}, title = {{CBC-MAC} and Variants}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_46}, doi = {10.1007/0-387-23483-7\_46}, timestamp = {Thu, 27 Jun 2019 15:50:13 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Preneel05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Preneel05a, author = {Bart Preneel}, editor = {Henk C. A. van Tilborg}, title = {Collision Attack}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_68}, doi = {10.1007/0-387-23483-7\_68}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Preneel05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Preneel05b, author = {Bart Preneel}, editor = {Henk C. A. van Tilborg}, title = {Collision resistance}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_69}, doi = {10.1007/0-387-23483-7\_69}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Preneel05b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Preneel05c, author = {Bart Preneel}, editor = {Henk C. A. van Tilborg}, title = {Correcting-block attack}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_79}, doi = {10.1007/0-387-23483-7\_79}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Preneel05c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Preneel05d, author = {Bart Preneel}, editor = {Henk C. A. van Tilborg}, title = {Davies-Meyer Hash Function}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_96}, doi = {10.1007/0-387-23483-7\_96}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Preneel05d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Preneel05e, author = {Bart Preneel}, editor = {Henk C. A. van Tilborg}, title = {Hash functions}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_186}, doi = {10.1007/0-387-23483-7\_186}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Preneel05e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Preneel05f, author = {Bart Preneel}, editor = {Henk C. A. van Tilborg}, title = {{HMAC}}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_187}, doi = {10.1007/0-387-23483-7\_187}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Preneel05f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Preneel05g, author = {Bart Preneel}, editor = {Henk C. A. van Tilborg}, title = {Maa}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_239}, doi = {10.1007/0-387-23483-7\_239}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Preneel05g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Preneel05h, author = {Bart Preneel}, editor = {Henk C. A. van Tilborg}, title = {{MAC} Algorithms}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_240}, doi = {10.1007/0-387-23483-7\_240}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Preneel05h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Preneel05i, author = {Bart Preneel}, editor = {Henk C. A. van Tilborg}, title = {Mash Hash Functions (Modular Arithmetic Secure Hash)}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_243}, doi = {10.1007/0-387-23483-7\_243}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Preneel05i.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Preneel05j, author = {Bart Preneel}, editor = {Henk C. A. van Tilborg}, title = {{MDC-2} and {MDC-4}}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_250}, doi = {10.1007/0-387-23483-7\_250}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Preneel05j.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Preneel05k, author = {Bart Preneel}, editor = {Henk C. A. van Tilborg}, title = {Modes of Operation of a Block Cipher}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_258}, doi = {10.1007/0-387-23483-7\_258}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Preneel05k.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Preneel05l, author = {Bart Preneel}, editor = {Henk C. A. van Tilborg}, title = {{NESSIE} Project}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_271}, doi = {10.1007/0-387-23483-7\_271}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Preneel05l.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Preneel05m, author = {Bart Preneel}, editor = {Henk C. A. van Tilborg}, title = {{PMAC}}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_304}, doi = {10.1007/0-387-23483-7\_304}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Preneel05m.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Preneel05n, author = {Bart Preneel}, editor = {Henk C. A. van Tilborg}, title = {Preimage Resistance}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_309}, doi = {10.1007/0-387-23483-7\_309}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Preneel05n.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Preneel05o, author = {Bart Preneel}, editor = {Henk C. A. van Tilborg}, title = {Second preimage resistance}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_372}, doi = {10.1007/0-387-23483-7\_372}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Preneel05o.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Preneel05p, author = {Bart Preneel}, editor = {Henk C. A. van Tilborg}, title = {Universal One-Way Hash Functions}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_447}, doi = {10.1007/0-387-23483-7\_447}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Preneel05p.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WolfP05, author = {Christopher Wolf and Bart Preneel}, title = {Taxonomy of Public Key Schemes based on the problem of Multivariate Quadratic equations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {77}, year = {2005}, url = {http://eprint.iacr.org/2005/077}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WolfP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BraekenP05, author = {An Braeken and Bart Preneel}, title = {On the Algebraic Immunity of Symmetric Boolean Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {245}, year = {2005}, url = {http://eprint.iacr.org/2005/245}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BraekenP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimBPL05, author = {Jongsung Kim and Alex Biryukov and Bart Preneel and Sangjin Lee}, title = {On the Security of Encryption Modes of MD4, {MD5} and {HAVAL}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {327}, year = {2005}, url = {http://eprint.iacr.org/2005/327}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimBPL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BraekenBNP05, author = {An Braeken and Yuri L. Borissov and Svetla Nikova and Bart Preneel}, title = {Classification of Cubic (n-4)-resilient Boolean Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {332}, year = {2005}, url = {http://eprint.iacr.org/2005/332}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BraekenBNP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PaulP05, author = {Souradyuti Paul and Bart Preneel}, title = {On the (In)security of Stream Ciphers Based on Arrays and Modular Addition (Full Version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {448}, year = {2005}, url = {http://eprint.iacr.org/2005/448}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PaulP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WolfP05a, author = {Christopher Wolf and Bart Preneel}, title = {Equivalent Keys in Multivariate Quadratic Public Key Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {464}, year = {2005}, url = {http://eprint.iacr.org/2005/464}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WolfP05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cai/MentensOPV04, author = {Nele Mentens and Siddika Berna {\"{O}}rs and Bart Preneel and Joos Vandewalle}, title = {An {FPGA} Implementation of a Montgomery Multiplier Over GF(2{\^{}}m)}, journal = {Comput. Artif. Intell.}, volume = {23}, number = {5}, pages = {487--499}, year = {2004}, url = {http://www.cai.sk/ojs/index.php/cai/article/view/441}, timestamp = {Mon, 14 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cai/MentensOPV04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/WatanabeFYTP04, author = {Dai Watanabe and Soichi Furuya and Hirotaka Yoshida and Kazuo Takaragi and Bart Preneel}, title = {A New Keystream Generator {MUGI}}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {87-A}, number = {1}, pages = {37--45}, year = {2004}, url = {http://search.ieice.org/bin/summary.php?id=e87-a\_1\_37\&\#38;category=D\&\#38;year=2004\&\#38;lang=E\&\#38;abst=}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/WatanabeFYTP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/NakaharaPV04, author = {Jorge Nakahara Jr. and Bart Preneel and Joos Vandewalle}, editor = {Huaxiong Wang and Josef Pieprzyk and Vijay Varadharajan}, title = {The Biryukov-Demirci Attack on Reduced-Round Versions of {IDEA} and {MESH} Ciphers}, booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP} 2004, Sydney, Australia, July 13-15, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3108}, pages = {98--109}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27800-9\_9}, doi = {10.1007/978-3-540-27800-9\_9}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/NakaharaPV04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ShiraiP04, author = {Taizo Shirai and Bart Preneel}, editor = {Pil Joong Lee}, title = {On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3329}, pages = {1--15}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30539-2\_1}, doi = {10.1007/978-3-540-30539-2\_1}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/ShiraiP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/HongPL04, author = {Deukjo Hong and Bart Preneel and Sangjin Lee}, editor = {Pil Joong Lee}, title = {Higher Order Universal One-Way Hash Functions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3329}, pages = {201--213}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30539-2\_15}, doi = {10.1007/978-3-540-30539-2\_15}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/HongPL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/StandaertOP04, author = {Fran{\c{c}}ois{-}Xavier Standaert and Siddika Berna {\"{O}}rs and Bart Preneel}, editor = {Marc Joye and Jean{-}Jacques Quisquater}, title = {Power Analysis of an {FPGA:} Implementation of Rijndael: Is Pipelining a {DPA} Countermeasure?}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3156}, pages = {30--44}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28632-5\_3}, doi = {10.1007/978-3-540-28632-5\_3}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/StandaertOP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/CockWSSP04, author = {Danny De Cock and Karel Wouters and Dries Schellekens and Dave Singel{\'{e}}e and Bart Preneel}, editor = {David Chadwick and Bart Preneel}, title = {Threat Modelling for Security Tokens in Web Applications}, booktitle = {Communications and Multimedia Security - 8th {IFIP} {TC-6} {TC-11} Conference on Communications and Multimedia Security, Sept. 15-18, 2004, Windermere, The Lake District, United Kingdom}, series = {{IFIP}}, volume = {175}, pages = {183--193}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/0-387-24486-7\_14}, doi = {10.1007/0-387-24486-7\_14}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cms/CockWSSP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/CockWP04, author = {Danny De Cock and Karel Wouters and Bart Preneel}, editor = {Sokratis K. Katsikas and Stefanos Gritzalis and Javier L{\'{o}}pez}, title = {Introduction to the Belgian {EID} Card: {BELPIC}}, booktitle = {Public Key Infrastructure, First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3093}, pages = {1--13}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25980-0\_1}, doi = {10.1007/978-3-540-25980-0\_1}, timestamp = {Thu, 29 Aug 2019 08:09:59 +0200}, biburl = {https://dblp.org/rec/conf/europki/CockWP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpl/StandaertOQP04, author = {Fran{\c{c}}ois{-}Xavier Standaert and Siddika Berna {\"{O}}rs and Jean{-}Jacques Quisquater and Bart Preneel}, editor = {J{\"{u}}rgen Becker and Marco Platzner and Serge Vernalde}, title = {Power Analysis Attacks Against {FPGA} Implementations of the {DES}}, booktitle = {Field Programmable Logic and Application, 14th International Conference , {FPL} 2004, Leuven, Belgium, August 30-September 1, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3203}, pages = {84--94}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30117-2\_11}, doi = {10.1007/978-3-540-30117-2\_11}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fpl/StandaertOQP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/PaulP04, author = {Souradyuti Paul and Bart Preneel}, editor = {Bimal K. Roy and Willi Meier}, title = {A New Weakness in the {RC4} Keystream Generator and an Approach to Improve the Security of the Cipher}, booktitle = {Fast Software Encryption, 11th International Workshop, {FSE} 2004, Delhi, India, February 5-7, 2004, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3017}, pages = {245--259}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25937-4\_16}, doi = {10.1007/978-3-540-25937-4\_16}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/PaulP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/glvlsi/MentensOP04, author = {Nele Mentens and Siddika Berna {\"{O}}rs and Bart Preneel}, editor = {David Garrett and John C. Lach and Charles A. Zukowski}, title = {An {FPGA} implementation of an elliptic curve processor GF(2\({}^{\mbox{m}}\))}, booktitle = {Proceedings of the 14th {ACM} Great Lakes Symposium on {VLSI} 2004, Boston, MA, USA, April 26-28, 2004}, pages = {454--457}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/988952.989062}, doi = {10.1145/988952.989062}, timestamp = {Fri, 20 Aug 2021 16:30:37 +0200}, biburl = {https://dblp.org/rec/conf/glvlsi/MentensOP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/NikovNP04, author = {Ventzislav Nikov and Svetla Nikova and Bart Preneel}, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {Robust Metering Schemes for General Access Structures}, booktitle = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, pages = {53--65}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30191-2\_5}, doi = {10.1007/978-3-540-30191-2\_5}, timestamp = {Thu, 29 Aug 2019 08:10:01 +0200}, biburl = {https://dblp.org/rec/conf/icics/NikovNP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11/DiazP04, author = {Claudia D{\'{\i}}az and Bart Preneel}, editor = {Yves Deswarte and Fr{\'{e}}d{\'{e}}ric Cuppens and Sushil Jajodia and Lingyu Wang}, title = {Taxonomy of Mixes and Dummy Traffic}, booktitle = {Information Security Management, Education and Privacy, {IFIP} 18th World Computer Congress, {TC11} 19th International Information Security Workshops, 22-27 August 2004, Toulouse, France}, series = {{IFIP}}, volume = {148}, pages = {215--230}, publisher = {Kluwer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8145-6\_18}, doi = {10.1007/1-4020-8145-6\_18}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11/DiazP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifipTCS/BraekenWP04, author = {An Braeken and Christopher Wolf and Bart Preneel}, editor = {Jean{-}Jacques L{\'{e}}vy and Ernst W. Mayr and John C. Mitchell}, title = {A Randomised Algorithm for Checking the Normality of Cryptographic Boolean Functions}, booktitle = {Exploring New Frontiers of Theoretical Informatics, {IFIP} 18th World Computer Congress, {TC1} 3rd International Conference on Theoretical Computer Science (TCS2004), 22-27 August 2004, Toulouse, France}, series = {{IFIP}}, volume = {155}, pages = {51--66}, publisher = {Kluwer/Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8141-3\_7}, doi = {10.1007/1-4020-8141-3\_7}, timestamp = {Fri, 27 Sep 2019 10:35:17 +0200}, biburl = {https://dblp.org/rec/conf/ifipTCS/BraekenWP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/DiazP04, author = {Claudia D{\'{\i}}az and Bart Preneel}, editor = {Jessica J. Fridrich}, title = {Reasoning About the Anonymity Provided by Pool Mixes That Generate Dummy Traffic}, booktitle = {Information Hiding, 6th International Workshop, {IH} 2004, Toronto, Canada, May 23-25, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3200}, pages = {309--325}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30114-1\_22}, doi = {10.1007/978-3-540-30114-1\_22}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ih/DiazP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/BraekenNNP04, author = {An Braeken and Ventzislav Nikov and Svetla Nikova and Bart Preneel}, editor = {Anne Canteaut and Kapalee Viswanathan}, title = {On Boolean Functions with Generalized Cryptographic Properties}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2004, 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3348}, pages = {120--135}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30556-9\_11}, doi = {10.1007/978-3-540-30556-9\_11}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/BraekenNNP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itcc/OrsGOP04, author = {Siddika Berna {\"{O}}rs and Frank K. G{\"{u}}rkaynak and Elisabeth Oswald and Bart Preneel}, title = {Power-Analysis Attack on an {ASIC} {AES} implementation}, booktitle = {International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 2, April 5-7, 2004, Las Vegas, Nevada, {USA}}, pages = {546--552}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/ITCC.2004.1286711}, doi = {10.1109/ITCC.2004.1286711}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itcc/OrsGOP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/ArmknechtLP04, author = {Frederik Armknecht and Joseph Lano and Bart Preneel}, editor = {Helena Handschuh and M. Anwar Hasan}, title = {Extending the Resynchronization Attack}, booktitle = {Selected Areas in Cryptography, 11th International Workshop, {SAC} 2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3357}, pages = {19--38}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30564-4\_2}, doi = {10.1007/978-3-540-30564-4\_2}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/ArmknechtLP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/Preneel04, author = {Bart Preneel}, editor = {Carlo Blundo and Stelvio Cimato}, title = {{ECRYPT:} The Cryptographic Research Challenges for the Next Decade}, booktitle = {Security in Communication Networks, 4th International Conference, {SCN} 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3352}, pages = {1--15}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30598-9\_1}, doi = {10.1007/978-3-540-30598-9\_1}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/scn/Preneel04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/NikovNP04, author = {Ventzislav Nikov and Svetla Nikova and Bart Preneel}, editor = {Carlo Blundo and Stelvio Cimato}, title = {On the Size of Monotone Span Programs}, booktitle = {Security in Communication Networks, 4th International Conference, {SCN} 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3352}, pages = {249--262}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30598-9\_18}, doi = {10.1007/978-3-540-30598-9\_18}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/NikovNP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/WolfBP04, author = {Christopher Wolf and An Braeken and Bart Preneel}, editor = {Carlo Blundo and Stelvio Cimato}, title = {Efficient Cryptanalysis of {RSE(2)PKC} and {RSSE(2)PKC}}, booktitle = {Security in Communication Networks, 4th International Conference, {SCN} 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3352}, pages = {294--309}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30598-9\_21}, doi = {10.1007/978-3-540-30598-9\_21}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/WolfBP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/YoshidaBCLP04, author = {Hirotaka Yoshida and Alex Biryukov and Christophe De Canni{\`{e}}re and Joseph Lano and Bart Preneel}, editor = {Carlo Blundo and Stelvio Cimato}, title = {Non-randomness of the Full 4 and 5-Pass {HAVAL}}, booktitle = {Security in Communication Networks, 4th International Conference, {SCN} 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3352}, pages = {324--336}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30598-9\_23}, doi = {10.1007/978-3-540-30598-9\_23}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/YoshidaBCLP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WolfP04, author = {Christopher Wolf and Bart Preneel}, title = {Asymmetric Cryptography: Hidden Field Equations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {72}, year = {2004}, url = {http://eprint.iacr.org/2004/072}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WolfP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BraekenWP04, author = {An Braeken and Christopher Wolf and Bart Preneel}, title = {Classification of Highly Nonlinear Boolean Power Functions with a Randomised Algorithm for Checking Normality}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {214}, year = {2004}, url = {http://eprint.iacr.org/2004/214}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BraekenWP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BraekenWP04a, author = {An Braeken and Christopher Wolf and Bart Preneel}, title = {A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {222}, year = {2004}, url = {http://eprint.iacr.org/2004/222}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BraekenWP04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArmknechtLP04, author = {Frederik Armknecht and Joseph Lano and Bart Preneel}, title = {Extending the Resynchronization Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {232}, year = {2004}, url = {http://eprint.iacr.org/2004/232}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArmknechtLP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WolfBP04, author = {Christopher Wolf and An Braeken and Bart Preneel}, title = {Efficient Cryptanalysis of {RSE(2)PKC} and {RSSE(2)PKC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {237}, year = {2004}, url = {http://eprint.iacr.org/2004/237}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WolfBP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BraekenBNP04, author = {An Braeken and Yuri L. Borissov and Svetla Nikova and Bart Preneel}, title = {Classification of Boolean Functions of 6 Variables or Less with Respect to Cryptographic Properties}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {248}, year = {2004}, url = {http://eprint.iacr.org/2004/248}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BraekenBNP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BraekenNNP04, author = {An Braeken and Ventzislav Nikov and Svetla Nikova and Bart Preneel}, title = {On Boolean Functions with Generalized Cryptographic Properties}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {259}, year = {2004}, url = {http://eprint.iacr.org/2004/259}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BraekenNNP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WolfP04a, author = {Christopher Wolf and Bart Preneel}, title = {Applications of Multivariate Quadratic Public Key Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {263}, year = {2004}, url = {http://eprint.iacr.org/2004/263}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WolfP04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PaulP04, author = {Souradyuti Paul and Bart Preneel}, title = {Solving Systems of Differential Equations of Addition}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {294}, year = {2004}, url = {http://eprint.iacr.org/2004/294}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PaulP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WolfP04b, author = {Christopher Wolf and Bart Preneel}, title = {Equivalent Keys in HFE, C\({}^{\mbox{*}}\), and variations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {360}, year = {2004}, url = {http://eprint.iacr.org/2004/360}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WolfP04b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WolfP04c, author = {Christopher Wolf and Bart Preneel}, title = {Superfluous Keys in Multivariate Quadratic Asymmetric Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {361}, year = {2004}, url = {http://eprint.iacr.org/2004/361}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WolfP04c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/IliadisGSCPG03, author = {John Iliadis and Stefanos Gritzalis and Diomidis Spinellis and Danny De Cock and Bart Preneel and Dimitris Gritzalis}, title = {Towards a framework for evaluating certificate status information mechanisms}, journal = {Comput. Commun.}, volume = {26}, number = {16}, pages = {1839--1850}, year = {2003}, url = {https://doi.org/10.1016/S0140-3664(03)00079-3}, doi = {10.1016/S0140-3664(03)00079-3}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/IliadisGSCPG03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/DiazCP03, author = {Claudia D{\'{\i}}az and Joris Claessens and Bart Preneel}, title = {{APES} - Anonymity and Privacy in Electronic Services}, journal = {Datenschutz und Datensicherheit}, volume = {27}, number = {3}, year = {2003}, timestamp = {Fri, 17 Dec 2004 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/DiazCP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/integration/BatinaOPV03, author = {Lejla Batina and Siddika Berna {\"{O}}rs and Bart Preneel and Joos Vandewalle}, title = {Hardware architectures for public key cryptography}, journal = {Integr.}, volume = {34}, number = {1-2}, pages = {1--64}, year = {2003}, url = {https://doi.org/10.1016/S0167-9260(02)00053-6}, doi = {10.1016/S0167-9260(02)00053-6}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/integration/BatinaOPV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/intr/ClaessensDGDPV03, author = {Joris Claessens and Claudia D{\'{\i}}az and Caroline Goemans and Jos Dumortier and Bart Preneel and Joos Vandewalle}, title = {Revocable anonymous access to the Internet?}, journal = {Internet Res.}, volume = {13}, number = {4}, pages = {242--258}, year = {2003}, url = {https://doi.org/10.1108/10662240310488933}, doi = {10.1108/10662240310488933}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/intr/ClaessensDGDPV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/QuisquaterPV03, author = {Micha{\"{e}}l Quisquater and Bart Preneel and Joos Vandewalle}, title = {A new inequality in discrete Fourier theory}, journal = {{IEEE} Trans. Inf. Theory}, volume = {49}, number = {8}, pages = {2038--2040}, year = {2003}, url = {https://doi.org/10.1109/TIT.2003.814492}, doi = {10.1109/TIT.2003.814492}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/QuisquaterPV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toit/ClaessensPV03, author = {Joris Claessens and Bart Preneel and Joos Vandewalle}, title = {(How) can mobile agents do secure electronic transactions on untrusted hosts? {A} survey of the security issues and the current solutions}, journal = {{ACM} Trans. Internet Techn.}, volume = {3}, number = {1}, pages = {28--48}, year = {2003}, url = {https://doi.org/10.1145/643477.643479}, doi = {10.1145/643477.643479}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/toit/ClaessensPV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/NikovNP03, author = {Ventzislav Nikov and Svetla Nikova and Bart Preneel}, editor = {Jianying Zhou and Moti Yung and Yongfei Han}, title = {Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case}, booktitle = {Applied Cryptography and Network Security, First International Conference, {ACNS} 2003. Kunming, China, October 16-19, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2846}, pages = {1--15}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45203-4\_1}, doi = {10.1007/978-3-540-45203-4\_1}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/acns/NikovNP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asap/OrsBPV03, author = {Siddika Berna {\"{O}}rs and Lejla Batina and Bart Preneel and Joos Vandewalle}, title = {Hardware Implementation of an Elliptic Curve Processor over GF(p)}, booktitle = {14th {IEEE} International Conference on Application-Specific Systems, Architectures, and Processors {(ASAP} 2003), 24-26 June 2003, The Hague, The Netherlands}, pages = {433--443}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/ASAP.2003.1212866}, doi = {10.1109/ASAP.2003.1212866}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asap/OrsBPV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/RompayBPV03, author = {Bart Van Rompay and Alex Biryukov and Bart Preneel and Joos Vandewalle}, editor = {Chi{-}Sung Laih}, title = {Cryptanalysis of 3-Pass {HAVAL}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2894}, pages = {228--245}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40061-5\_14}, doi = {10.1007/978-3-540-40061-5\_14}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/RompayBPV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/OrsOP03, author = {Siddika Berna {\"{O}}rs and Elisabeth Oswald and Bart Preneel}, editor = {Colin D. Walter and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Power-Analysis Attacks on an {FPGA} - First Experimental Results}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2779}, pages = {35--50}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45238-6\_4}, doi = {10.1007/978-3-540-45238-6\_4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/OrsOP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BiryukovCBP03, author = {Alex Biryukov and Christophe De Canni{\`{e}}re and An Braeken and Bart Preneel}, editor = {Eli Biham}, title = {A Toolbox for Cryptanalysis: Linear and Affine Equivalence Algorithms}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2656}, pages = {33--50}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-39200-9\_3}, doi = {10.1007/3-540-39200-9\_3}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BiryukovCBP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BabbageCLPV03, author = {Steve Babbage and Christophe De Canni{\`{e}}re and Joseph Lano and Bart Preneel and Joos Vandewalle}, editor = {Thomas Johansson}, title = {Cryptanalysis of SOBER-t32}, booktitle = {Fast Software Encryption, 10th International Workshop, {FSE} 2003, Lund, Sweden, February 24-26, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2887}, pages = {111--128}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39887-5\_10}, doi = {10.1007/978-3-540-39887-5\_10}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/BabbageCLPV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/HongKPR03, author = {Dowon Hong and Ju{-}Sung Kang and Bart Preneel and Heuisu Ryu}, editor = {Thomas Johansson}, title = {A Concrete Security Analysis for 3GPP-MAC}, booktitle = {Fast Software Encryption, 10th International Workshop, {FSE} 2003, Lund, Sweden, February 24-26, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2887}, pages = {154--169}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39887-5\_12}, doi = {10.1007/978-3-540-39887-5\_12}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/HongKPR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/BorissovBNP03, author = {Yuri L. Borissov and An Braeken and Svetla Nikova and Bart Preneel}, editor = {Kenneth G. Paterson}, title = {On the Covering Radius of Second Order Binary Reed-Muller Code in the Set of Resilient Boolean Functions}, booktitle = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester, UK, December 16-18, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2898}, pages = {82--92}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40974-8\_8}, doi = {10.1007/978-3-540-40974-8\_8}, timestamp = {Wed, 18 Mar 2020 16:01:02 +0100}, biburl = {https://dblp.org/rec/conf/ima/BorissovBNP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/PaulP03, author = {Souradyuti Paul and Bart Preneel}, editor = {Thomas Johansson and Subhamoy Maitra}, title = {Analysis of Non-fortuitous Predictive States of the {RC4} Keystream Generator}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2003, 4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2904}, pages = {52--67}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24582-7\_4}, doi = {10.1007/978-3-540-24582-7\_4}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/PaulP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/NikovNP03, author = {Ventzislav Nikov and Svetla Nikova and Bart Preneel}, editor = {Thomas Johansson and Subhamoy Maitra}, title = {On Multiplicative Linear Secret Sharing Schemes}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2003, 4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2904}, pages = {135--147}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24582-7\_10}, doi = {10.1007/978-3-540-24582-7\_10}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/NikovNP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipps/OrsBPV03, author = {Siddika Berna {\"{O}}rs and Lejla Batina and Bart Preneel and Joos Vandewalle}, title = {Hardware Implementation of a Montgomery Modular Multiplier in a Systolic Array}, booktitle = {17th International Parallel and Distributed Processing Symposium {(IPDPS} 2003), 22-26 April 2003, Nice, France, CD-ROM/Abstracts Proceedings}, pages = {184}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/IPDPS.2003.1213341}, doi = {10.1109/IPDPS.2003.1213341}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipps/OrsBPV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/NakaharaPV03, author = {Jorge Nakahara Jr. and Bart Preneel and Joos Vandewalle}, editor = {Colin Boyd and Wenbo Mao}, title = {A Note on Weak Keys of PES, IDEA, and Some Extended Variants}, booktitle = {Information Security, 6th International Conference, {ISC} 2003, Bristol, UK, October 1-3, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2851}, pages = {267--279}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10958513\_21}, doi = {10.1007/10958513\_21}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/NakaharaPV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BiryukovLP03, author = {Alex Biryukov and Joseph Lano and Bart Preneel}, editor = {Mitsuru Matsui and Robert J. Zuccherato}, title = {Cryptanalysis of the Alleged SecurID Hash Function}, booktitle = {Selected Areas in Cryptography, 10th Annual International Workshop, {SAC} 2003, Ottawa, Canada, August 14-15, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3006}, pages = {130--144}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24654-1\_10}, doi = {10.1007/978-3-540-24654-1\_10}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/BiryukovLP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/NakaharaRPV03, author = {Jorge Nakahara Jr. and Vincent Rijmen and Bart Preneel and Joos Vandewalle}, editor = {Kijoon Chae and Moti Yung}, title = {The {MESH} Block Ciphers}, booktitle = {Information Security Applications, 4th International Workshop, {WISA} 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2908}, pages = {458--473}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24591-9\_34}, doi = {10.1007/978-3-540-24591-9\_34}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/NakaharaRPV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NikovNP03, author = {Ventzislav Nikov and Svetla Nikova and Bart Preneel}, title = {Multi-Party Computation from any Linear Secret Sharing Scheme Secure against Adaptive Adversary: The Zero-Error Case}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {6}, year = {2003}, url = {http://eprint.iacr.org/2003/006}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NikovNP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BiryukovLP03, author = {Alex Biryukov and Joseph Lano and Bart Preneel}, title = {Cryptanalysis of the Alleged SecurID Hash Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {162}, year = {2003}, url = {http://eprint.iacr.org/2003/162}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BiryukovLP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ClaessensDCPV02, author = {Joris Claessens and Valentin Dem and Danny De Cock and Bart Preneel and Joos Vandewalle}, title = {On the Security of Today's Online Electronic Banking Systems}, journal = {Comput. Secur.}, volume = {21}, number = {3}, pages = {253--265}, year = {2002}, url = {https://doi.org/10.1016/S0167-4048(02)00312-7}, doi = {10.1016/S0167-4048(02)00312-7}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ClaessensDCPV02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/firstmonday/ClaessensPV02, author = {Joris Claessens and Bart Preneel and Joos Vandewalle}, title = {A Tangled World Wide Web of Security Issues}, journal = {First Monday}, volume = {7}, number = {3}, year = {2002}, url = {https://doi.org/10.5210/fm.v7i3.935}, doi = {10.5210/FM.V7I3.935}, timestamp = {Mon, 04 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/firstmonday/ClaessensPV02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/informaticaSI/ClaessensPV02, author = {Joris Claessens and Bart Preneel and Joos Vandewalle}, title = {Combining World Wide Web and wireless security}, journal = {Informatica (Slovenia)}, volume = {26}, number = {2}, year = {2002}, timestamp = {Mon, 15 Feb 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/informaticaSI/ClaessensPV02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/KnudsenP02, author = {Lars R. Knudsen and Bart Preneel}, title = {Construction of secure and fast hash functions using nonbinary error-correcting codes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {48}, number = {9}, pages = {2524--2539}, year = {2002}, url = {https://doi.org/10.1109/TIT.2002.801402}, doi = {10.1109/TIT.2002.801402}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/KnudsenP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fasec/Preneel02, author = {Bart Preneel}, editor = {Ali E. Abdallah and Peter Y. A. Ryan and Steve A. Schneider}, title = {Cryptographic Challenges: The Past and the Future}, booktitle = {Formal Aspects of Security, First International Conference, FASec 2002, London, UK, December 16-18, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2629}, pages = {167--182}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-40981-6\_14}, doi = {10.1007/978-3-540-40981-6\_14}, timestamp = {Wed, 15 Sep 2021 13:43:48 +0200}, biburl = {https://dblp.org/rec/conf/fasec/Preneel02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/WatanabeFYTP02, author = {Dai Watanabe and Soichi Furuya and Hirotaka Yoshida and Kazuo Takaragi and Bart Preneel}, editor = {Joan Daemen and Vincent Rijmen}, title = {A New Keystream Generator {MUGI}}, booktitle = {Fast Software Encryption, 9th International Workshop, {FSE} 2002, Leuven, Belgium, February 4-6, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2365}, pages = {179--194}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45661-9\_14}, doi = {10.1007/3-540-45661-9\_14}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/WatanabeFYTP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/BiryukovNPV02, author = {Alex Biryukov and Jorge Nakahara Jr. and Bart Preneel and Joos Vandewalle}, editor = {Robert H. Deng and Sihan Qing and Feng Bao and Jianying Zhou}, title = {New Weak-Key Classes of {IDEA}}, booktitle = {Information and Communications Security, 4th International Conference, {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2513}, pages = {315--326}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36159-6\_27}, doi = {10.1007/3-540-36159-6\_27}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/BiryukovNPV02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/NikovNPV02, author = {Ventzislav Nikov and Svetla Nikova and Bart Preneel and Joos Vandewalle}, editor = {Alfred Menezes and Palash Sarkar}, title = {On Unconditionally Secure Distributed Oblivious Transfer}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2002, Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002}, series = {Lecture Notes in Computer Science}, volume = {2551}, pages = {395--408}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36231-2\_31}, doi = {10.1007/3-540-36231-2\_31}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/NikovNPV02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/NikovNPV02a, author = {Ventzislav Nikov and Svetla Nikova and Bart Preneel and Joos Vandewalle}, editor = {Alfred Menezes and Palash Sarkar}, title = {On Distributed Key Distribution Centers and Unconditionally Secure Proactive Verifiable Secret Sharing Schemes Based on General Access Structure}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2002, Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002}, series = {Lecture Notes in Computer Science}, volume = {2551}, pages = {422--436}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36231-2\_33}, doi = {10.1007/3-540-36231-2\_33}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/NikovNPV02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/DiazSCP02, author = {Claudia D{\'{\i}}az and Stefaan Seys and Joris Claessens and Bart Preneel}, editor = {Roger Dingledine and Paul F. Syverson}, title = {Towards Measuring Anonymity}, booktitle = {Privacy Enhancing Technologies, Second International Workshop, {PET} 2002, San Francisco, CA, USA, April 14-15, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2482}, pages = {54--68}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36467-6\_5}, doi = {10.1007/3-540-36467-6\_5}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/pet/DiazSCP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/QuisquaterPV02, author = {Micha{\"{e}}l Quisquater and Bart Preneel and Joos Vandewalle}, editor = {David Naccache and Pascal Paillier}, title = {On the Security of the Threshold Scheme Based on the Chinese Remainder Theorem}, booktitle = {Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February 12-14, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2274}, pages = {199--210}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45664-3\_14}, doi = {10.1007/3-540-45664-3\_14}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/QuisquaterPV02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Preneel02, author = {Bart Preneel}, editor = {David Naccache and Pascal Paillier}, title = {New European Schemes for Signature, Integrity and Encryption {(NESSIE):} {A} Status Report}, booktitle = {Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February 12-14, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2274}, pages = {297--309}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45664-3\_21}, doi = {10.1007/3-540-45664-3\_21}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Preneel02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/BorissovNPV02, author = {Yuri L. Borissov and Svetla Nikova and Bart Preneel and Joos Vandewalle}, editor = {Stelvio Cimato and Clemente Galdi and Giuseppe Persiano}, title = {On a Resynchronization Weakness in a Class of Combiners with Memory}, booktitle = {Security in Communication Networks, Third International Conference, {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2576}, pages = {164--173}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36413-7\_12}, doi = {10.1007/3-540-36413-7\_12}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/scn/BorissovNPV02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/xmlsec/WoutersPFR02, author = {Karel Wouters and Bart Preneel and Ana Isabel Gonz{\'{a}}lez{-}Tablas Ferreres and Arturo Ribagorda}, editor = {Michiharu Kudo}, title = {Towards an {XML} format for time-stamps}, booktitle = {Proceedings of the 2002 {ACM} Workshop on {XML} Security, Fairfax, VA, USA, November 22, 2002}, pages = {61--70}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/764792.764802}, doi = {10.1145/764792.764802}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/xmlsec/WoutersPFR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ctrsa/2002, editor = {Bart Preneel}, title = {Topics in Cryptology - {CT-RSA} 2002, The Cryptographer's Track at the {RSA} Conference, 2002, San Jose, CA, USA, February 18-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2271}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45760-7}, doi = {10.1007/3-540-45760-7}, isbn = {3-540-43224-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/2002.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NakaharaPV02, author = {Jorge Nakahara Jr. and Bart Preneel and Joos Vandewalle}, title = {Square Attacks on Reduced-Round Variants of the Skipjack Block Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {3}, year = {2002}, url = {http://eprint.iacr.org/2002/003}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NakaharaPV02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NikovNPV02, author = {Ventzislav Nikov and Svetla Nikova and Bart Preneel and Joos Vandewalle}, title = {Applying General Access Structure to Metering Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {102}, year = {2002}, url = {http://eprint.iacr.org/2002/102}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NikovNPV02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NikovNPV02a, author = {Ventzislav Nikov and Svetla Nikova and Bart Preneel and Joos Vandewalle}, title = {Applying General Access Structure to Proactive Secret Sharing Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {141}, year = {2002}, url = {http://eprint.iacr.org/2002/141}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NikovNPV02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NakaharaPV02a, author = {Jorge Nakahara Jr. and Bart Preneel and Joos Vandewalle}, title = {A note on Weak Keys of PES, {IDEA} and some Extended Variants}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {152}, year = {2002}, url = {http://eprint.iacr.org/2002/152}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NakaharaPV02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/BorstPR01, author = {Johan Borst and Bart Preneel and Vincent Rijmen}, title = {Cryptography on smart cards}, journal = {Comput. Networks}, volume = {36}, number = {4}, pages = {423--435}, year = {2001}, url = {https://doi.org/10.1016/S1389-1286(01)00164-5}, doi = {10.1016/S1389-1286(01)00164-5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/BorstPR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/HerleaCCPV01, author = {T. Herlea and Joris Claessens and Danny De Cock and Bart Preneel and Joos Vandewalle}, editor = {Ralf Steinmetz and Jana Dittmann and Martin Steinebach}, title = {Secure Meeting Scheduling with agenTA}, booktitle = {Communications and Multimedia Security Issues of the New Century, Proceedings of the {IFIP} {TC6/TC11} International Conference on Communications and Multimedia Security Issues, May 21-22, 2001, Darmstadt, Germany}, series = {{IFIP} Conference Proceedings}, volume = {192}, publisher = {Kluwer}, year = {2001}, timestamp = {Thu, 18 Dec 2003 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cms/HerleaCCPV01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecAgents/ClaessensPV01, author = {Joris Claessens and Bart Preneel and Joos Vandewalle}, editor = {Jiming Liu and Yiming Ye}, title = {Secure Communication for Secure Agent-Based Electronic Commerce Applications}, booktitle = {E-Commerce Agents, Marketplace Solutions, Security Issues, and Supply and Demand}, series = {Lecture Notes in Computer Science}, volume = {2033}, pages = {180--190}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45370-9\_11}, doi = {10.1007/3-540-45370-9\_11}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/ecAgents/ClaessensPV01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/VercauterenPV01, author = {Frederik Vercauteren and Bart Preneel and Joos Vandewalle}, editor = {Birgit Pfitzmann}, title = {A Memory Efficient Version of Satoh's Algorithm}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria, May 6-10, 2001, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {2045}, pages = {1--13}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44987-6\_1}, doi = {10.1007/3-540-44987-6\_1}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/VercauterenPV01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/RijmenRPV01, author = {Vincent Rijmen and Bart Van Rompay and Bart Preneel and Joos Vandewalle}, editor = {Mitsuru Matsui}, title = {Producing Collisions for {PANAMA}}, booktitle = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2355}, pages = {37--51}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45473-X\_4}, doi = {10.1007/3-540-45473-X\_4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/RijmenRPV01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BarretoRNPVK01, author = {Paulo S. L. M. Barreto and Vincent Rijmen and Jorge Nakahara Jr. and Bart Preneel and Joos Vandewalle and Hae Yong Kim}, editor = {Mitsuru Matsui}, title = {Improved {SQUARE} Attacks against Reduced-Round {HIEROCRYPT}}, booktitle = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2355}, pages = {165--173}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45473-X\_14}, doi = {10.1007/3-540-45473-X\_14}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BarretoRNPVK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Preneel01, author = {Bart Preneel}, editor = {Mitsuru Matsui}, title = {{NESSIE:} {A} European Approach to Evaluate Cryptographic Algorithms}, booktitle = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2355}, pages = {267--276}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45473-X\_22}, doi = {10.1007/3-540-45473-X\_22}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Preneel01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/netsec/ClaessensPV01, author = {Joris Claessens and Bart Preneel and Joos Vandewalle}, editor = {Bart De Decker and Frank Piessens and Jan Smits and Els Van Herreweghen}, title = {Combining World Wide Web and Wireless Security}, booktitle = {Advances in Network and Distributed Systems Security, {IFIP} {TC11} {WG11.4} First Annual Working Conference on Network Security, November 26-27, 2001, Leuven, Belgium}, series = {{IFIP} Conference Proceedings}, volume = {206}, pages = {153--171}, publisher = {Kluwer}, year = {2001}, url = {https://doi.org/10.1007/0-306-46958-8\_11}, doi = {10.1007/0-306-46958-8\_11}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/netsec/ClaessensPV01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BoerRPV01, author = {Bert den Boer and Bart Van Rompay and Bart Preneel and Joos Vandewalle}, editor = {Serge Vaudenay and Amr M. Youssef}, title = {New (Two-Track-)MAC Based on the Two Trails of {RIPEMD}}, booktitle = {Selected Areas in Cryptography, 8th Annual International Workshop, {SAC} 2001 Toronto, Ontario, Canada, August 16-17, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2259}, pages = {314--324}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45537-X\_25}, doi = {10.1007/3-540-45537-X\_25}, timestamp = {Tue, 01 Jun 2021 15:22:31 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/BoerRPV01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/HerleaCPNPD01, author = {T. Herlea and Joris Claessens and Bart Preneel and Gregory Neven and Frank Piessens and Bart De Decker}, editor = {Michel Dupuy and Pierre Paradinas}, title = {On Securely Scheduling a Meeting}, booktitle = {Trusted Information: The New Decade Challenge, {IFIP} {TC11} Sixteenth Annual Working Conference on Information Security (IFIP/Sec'01), June 11-13, 2001, Paris, France}, series = {{IFIP} Conference Proceedings}, volume = {193}, pages = {183--198}, publisher = {Kluwer}, year = {2001}, timestamp = {Fri, 26 Jul 2002 13:05:24 +0200}, biburl = {https://dblp.org/rec/conf/sec/HerleaCPNPD01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NakaharaBPVK01, author = {Jorge Nakahara Jr. and Paulo S. L. M. Barreto and Bart Preneel and Joos Vandewalle and Hae Y. Kim}, title = {{SQUARE} Attacks on Reduced-Round {PES} and {IDEA} Block Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {68}, year = {2001}, url = {http://eprint.iacr.org/2001/068}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/NakaharaBPVK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/HornP00, author = {G{\"{u}}nther Horn and Bart Preneel}, title = {Authentication and Payment in Future Mobile Systems}, journal = {J. Comput. Secur.}, volume = {8}, number = {2/3}, pages = {183--207}, year = {2000}, url = {https://doi.org/10.3233/jcs-2000-82-306}, doi = {10.3233/JCS-2000-82-306}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/HornP00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/IliadisSGPK00, author = {John Iliadis and Diomidis Spinellis and Dimitris Gritzalis and Bart Preneel and Sokratis K. Katsikas}, editor = {Dimitris Gritzalis and Sushil Jajodia and Pierangela Samarati}, title = {Evaluating certificate status information mechanisms}, booktitle = {{CCS} 2000, Proceedings of the 7th {ACM} Conference on Computer and Communications Security, Athens, Greece, November 1-4, 2000}, pages = {1--8}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/352600.352603}, doi = {10.1145/352600.352603}, timestamp = {Tue, 10 Nov 2020 20:00:15 +0100}, biburl = {https://dblp.org/rec/conf/ccs/IliadisSGPK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/NakaharaPV00, author = {Jorge Nakahara Jr. and Bart Preneel and Joos Vandewalle}, editor = {Bruce Schneier}, title = {Linear Cryptanalysis of Reduced-Round Versions of the {SAFER} Block Cipher Family}, booktitle = {Fast Software Encryption, 7th International Workshop, {FSE} 2000, New York, NY, USA, April 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1978}, pages = {244--261}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44706-7\_17}, doi = {10.1007/3-540-44706-7\_17}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/NakaharaPV00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2000, editor = {Bart Preneel}, title = {Advances in Cryptology - {EUROCRYPT} 2000, International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1807}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-45539-6}, doi = {10.1007/3-540-45539-6}, isbn = {3-540-67517-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2000.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Preneel99, author = {Bart Preneel}, title = {State-of-the-art ciphers for commercial applications}, journal = {Comput. Secur.}, volume = {18}, number = {1}, pages = {67--74}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)80009-1}, doi = {10.1016/S0167-4048(99)80009-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Preneel99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/PreneelO99, author = {Bart Preneel and Paul C. van Oorschot}, title = {On the Security of Iterated Message Authentication Codes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {45}, number = {1}, pages = {188--199}, year = {1999}, url = {https://doi.org/10.1109/18.746787}, doi = {10.1109/18.746787}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/PreneelO99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vlsisp/CsapodiVP99, author = {M{\'{a}}rton Csapodi and Joos Vandewalle and Bart Preneel}, title = {{CNN} Algorithms for Video Authentication and Copyright Protection}, journal = {J. {VLSI} Signal Process.}, volume = {23}, number = {2-3}, pages = {449--463}, year = {1999}, url = {https://doi.org/10.1023/A:1008113606327}, doi = {10.1023/A:1008113606327}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/vlsisp/CsapodiVP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DHalluinBPR99, author = {Carl D'Halluin and Gert Bijnens and Bart Preneel and Vincent Rijmen}, editor = {Kwok{-}Yan Lam and Eiji Okamoto and Chaoping Xing}, title = {Equivalent Keys of {HPC}}, booktitle = {Advances in Cryptology - {ASIACRYPT} '99, International Conference on the Theory and Applications of Cryptology and Information Security, Singapore, November 14-18, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1716}, pages = {29--42}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/978-3-540-48000-6\_4}, doi = {10.1007/978-3-540-48000-6\_4}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/DHalluinBPR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/NevelsteenP99, author = {Wim Nevelsteen and Bart Preneel}, editor = {Jacques Stern}, title = {Software Performance of Universal Hash Functions}, booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {24--41}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X\_3}, doi = {10.1007/3-540-48910-X\_3}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/NevelsteenP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BorstPV99, author = {Johan Borst and Bart Preneel and Joos Vandewalle}, editor = {Lars R. Knudsen}, title = {Linear Cryptanalysis of {RC5} and {RC6}}, booktitle = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome, Italy, March 24-26, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1636}, pages = {16--30}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48519-8\_2}, doi = {10.1007/3-540-48519-8\_2}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/BorstPV99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DHalluinBRP99, author = {Carl D'Halluin and Gert Bijnens and Vincent Rijmen and Bart Preneel}, editor = {Lars R. Knudsen}, title = {Attack on Six Rounds of Crypton}, booktitle = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome, Italy, March 24-26, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1636}, pages = {46--59}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48519-8\_4}, doi = {10.1007/3-540-48519-8\_4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/DHalluinBRP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/HandschuhP99, author = {Helena Handschuh and Bart Preneel}, editor = {Lars R. Knudsen}, title = {On the Security of Double and 2-Key Triple Modes of Operation}, booktitle = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome, Italy, March 24-26, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1636}, pages = {215--230}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48519-8\_16}, doi = {10.1007/3-540-48519-8\_16}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/HandschuhP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cms/1999, editor = {Bart Preneel}, title = {Secure Information Networks: Communications and Multimedia Security, {IFIP} {TC6/TC11} Joint Working Conference on Communications and Multimedia Security {(CMS} '99), September 20-21, 1999, Leuven, Belgium}, series = {{IFIP} Conference Proceedings}, volume = {152}, publisher = {Kluwer}, year = {1999}, isbn = {0-7923-8600-0}, timestamp = {Mon, 14 Oct 2002 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cms/1999.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/KnudsenLP98, author = {Lars R. Knudsen and Xuejia Lai and Bart Preneel}, title = {Attacks on Fast Double Block Length Hash Functions}, journal = {J. Cryptol.}, volume = {11}, number = {1}, pages = {59--72}, year = {1998}, url = {https://doi.org/10.1007/s001459900035}, doi = {10.1007/S001459900035}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/KnudsenLP98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ac/Preneel98, author = {Bart Preneel}, editor = {Ivan Damg{\aa}rd}, title = {The State of Cryptographic Hash Functions}, booktitle = {Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998}, series = {Lecture Notes in Computer Science}, volume = {1561}, pages = {158--182}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-48969-X\_8}, doi = {10.1007/3-540-48969-X\_8}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/ac/Preneel98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ants/WinMPW98, author = {Erik De Win and Serge Mister and Bart Preneel and Michael J. Wiener}, editor = {Joe Buhler}, title = {On the Performance of Signature Schemes Based on Elliptic Curves}, booktitle = {Algorithmic Number Theory, Third International Symposium, ANTS-III, Portland, Oregon, USA, June 21-25, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1423}, pages = {252--266}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054867}, doi = {10.1007/BFB0054867}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ants/WinMPW98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KnudsenMPRV98, author = {Lars R. Knudsen and Willi Meier and Bart Preneel and Vincent Rijmen and Sven Verdoolaege}, editor = {Kazuo Ohta and Dingyi Pei}, title = {Analysis Methods for (Alleged) {RC4}}, booktitle = {Advances in Cryptology - {ASIACRYPT} '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1514}, pages = {327--341}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49649-1\_26}, doi = {10.1007/3-540-49649-1\_26}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/KnudsenMPRV98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/HornP98, author = {G{\"{u}}nther Horn and Bart Preneel}, editor = {Jean{-}Jacques Quisquater and Yves Deswarte and Catherine Meadows and Dieter Gollmann}, title = {Authentication and Payment in Future Mobile Systems}, booktitle = {Computer Security - {ESORICS} 98, 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1485}, pages = {277--293}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0055870}, doi = {10.1007/BFB0055870}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/esorics/HornP98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isn/MartinPMHHPH98, author = {Keith M. Martin and Bart Preneel and Chris J. Mitchell and Hans{-}Joachim Hitz and G{\"{u}}nther Horn and Alla Poliakova and Peter Howard}, editor = {Sebastiano Trigila and Alvin P. Mullery and M{\'{a}}rio Campolargo and Hans Vanderstraeten and Marcel Mampaey}, title = {Secure Billing for Mobile Information Services in {UMTS}}, booktitle = {Intelligence in Services and Networks: Technology for Ubiquitous Telecom Services, 5th International Conference on Intelligence and Services in Networks, IS{\&}N'98, Antwerp, Belgium, May 25-28, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1430}, pages = {535--548}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0056997}, doi = {10.1007/BFB0056997}, timestamp = {Mon, 29 Mar 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isn/MartinPMHHPH98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sofsem/Preneel98, author = {Bart Preneel}, editor = {Branislav Rovan}, title = {An Introduction to Cryptology}, booktitle = {{SOFSEM} '98: Theory and Practice of Informatics, 25th Conference on Current Trends in Theory and Practice of Informatics, Jasn{\'{a}}, Slovakia, November 21-27, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1521}, pages = {204--221}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49477-4\_14}, doi = {10.1007/3-540-49477-4\_14}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/sofsem/Preneel98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wetice/ClaessensVPV98, author = {Joris Claessens and Mark Vandenwauver and Bart Preneel and Joos Vandewalle}, title = {Setting up a Secure Web Server and Clients on an Intranet}, booktitle = {7th Workshop on Enabling Technologies {(WETICE} '98), Infrastructure for Collaborative Enterprises, June 17-19, 1998, Palo Alto, CAUSA, Proceedings}, pages = {295--300}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/ENABL.1998.725708}, doi = {10.1109/ENABL.1998.725708}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wetice/ClaessensVPV98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ac/1997crypto, editor = {Bart Preneel and Vincent Rijmen}, title = {State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997. Revised Lectures}, series = {Lecture Notes in Computer Science}, volume = {1528}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49248-8}, doi = {10.1007/3-540-49248-8}, isbn = {3-540-65474-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ac/1997crypto.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/RijmenPW97, author = {Vincent Rijmen and Bart Preneel and Erik De Win}, title = {On Weaknesses of Non-surjective Round Functions}, journal = {Des. Codes Cryptogr.}, volume = {12}, number = {3}, pages = {253--266}, year = {1997}, url = {https://doi.org/10.1023/A:1008224928678}, doi = {10.1023/A:1008224928678}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/RijmenPW97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/PreneelRO97, author = {Bart Preneel and Vincent Rijmen and Paul C. van Oorschot}, title = {Security analysis of the message authenticator algorithm {(MAA)}}, journal = {Eur. Trans. Telecommun.}, volume = {8}, number = {5}, pages = {455--470}, year = {1997}, url = {https://doi.org/10.1002/ett.4460080504}, doi = {10.1002/ETT.4460080504}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ett/PreneelRO97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Preneel97, author = {Bart Preneel}, title = {MACs and hash functions: State of the art}, journal = {Inf. Secur. Tech. Rep.}, volume = {2}, number = {2}, pages = {33--43}, year = {1997}, url = {https://doi.org/10.1016/S1363-4127(97)81327-1}, doi = {10.1016/S1363-4127(97)81327-1}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Preneel97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ac/Preneel97, author = {Bart Preneel}, editor = {Bart Preneel and Vincent Rijmen}, title = {Cryptographic Primitives for Information Authentication - State of the Art}, booktitle = {State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997. Revised Lectures}, series = {Lecture Notes in Computer Science}, volume = {1528}, pages = {49--104}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-49248-8\_3}, doi = {10.1007/3-540-49248-8\_3}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/ac/Preneel97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ac/PreneelRB97, author = {Bart Preneel and Vincent Rijmen and Antoon Bosselaers}, editor = {Bart Preneel and Vincent Rijmen}, title = {Recent Developments in the Design of Conventional Cryptographic Algorithms}, booktitle = {State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997. Revised Lectures}, series = {Lecture Notes in Computer Science}, volume = {1528}, pages = {105--130}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-49248-8\_4}, doi = {10.1007/3-540-49248-8\_4}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ac/PreneelRB97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ac/WinP97, author = {Erik De Win and Bart Preneel}, editor = {Bart Preneel and Vincent Rijmen}, title = {Elliptic Curve Public-Key Cryptosystems - An Introduction}, booktitle = {State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997. Revised Lectures}, series = {Lecture Notes in Computer Science}, volume = {1528}, pages = {131--141}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-49248-8\_5}, doi = {10.1007/3-540-49248-8\_5}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ac/WinP97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KnudsenP97, author = {Lars R. Knudsen and Bart Preneel}, editor = {Burton S. Kaliski Jr.}, title = {Fast and Secure Hashing Based on Codes}, booktitle = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1294}, pages = {485--498}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052257}, doi = {10.1007/BFB0052257}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KnudsenP97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/RijmenP97, author = {Vincent Rijmen and Bart Preneel}, editor = {Eli Biham}, title = {A Family of Trapdoor Ciphers}, booktitle = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa, Israel, January 20-22, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1267}, pages = {139--148}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052342}, doi = {10.1007/BFB0052342}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/RijmenP97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/Preneel97, author = {Bart Preneel}, editor = {Michael Darnell}, title = {Hash Functions and {MAC} Algorithms Based on Block Ciphers}, booktitle = {Cryptography and Coding, 6th {IMA} International Conference, Cirencester, UK, December 17-19, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1355}, pages = {270--282}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0024473}, doi = {10.1007/BFB0024473}, timestamp = {Wed, 18 Mar 2020 16:00:59 +0100}, biburl = {https://dblp.org/rec/conf/ima/Preneel97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/Preneel97, author = {Bart Preneel}, editor = {Eiji Okamoto and George I. Davida and Masahiro Mambo}, title = {Cryptanalysis of Message Authentication Codes}, booktitle = {Information Security, First International Workshop, {ISW} '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1396}, pages = {55--65}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0030408}, doi = {10.1007/BFB0030408}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/Preneel97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhsn/PreneelW96, author = {Bart Preneel and Jean C. Walrand}, title = {Convergence of a quasistatic frequency allocation algorithm}, journal = {J. High Speed Networks}, volume = {5}, number = {1}, pages = {3--22}, year = {1996}, url = {https://doi.org/10.3233/JHS-1996-5102}, doi = {10.3233/JHS-1996-5102}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jhsn/PreneelW96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KnudsenP96, author = {Lars R. Knudsen and Bart Preneel}, editor = {Kwangjo Kim and Tsutomu Matsumoto}, title = {Hash Functions Based on Block Ciphers and Quaternary Codes}, booktitle = {Advances in Cryptology - {ASIACRYPT} '96, International Conference on the Theory and Applications of Cryptology and Information Security, Kyongju, Korea, November 3-7, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1163}, pages = {77--90}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/BFb0034837}, doi = {10.1007/BFB0034837}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/KnudsenP96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/PreneelO96, author = {Bart Preneel and Paul C. van Oorschot}, editor = {Ueli M. Maurer}, title = {On the Security of Two {MAC} Algorithms}, booktitle = {Advances in Cryptology - {EUROCRYPT} '96, International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, Spain, May 12-16, 1996, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1070}, pages = {19--32}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-68339-9\_3}, doi = {10.1007/3-540-68339-9\_3}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/PreneelO96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DobbertinBP96, author = {Hans Dobbertin and Antoon Bosselaers and Bart Preneel}, editor = {Dieter Gollmann}, title = {{RIPEMD-160:} {A} Strengthened Version of {RIPEMD}}, booktitle = {Fast Software Encryption, Third International Workshop, Cambridge, UK, February 21-23, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1039}, pages = {71--82}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-60865-6\_44}, doi = {10.1007/3-540-60865-6\_44}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/DobbertinBP96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/RijmenDPBW96, author = {Vincent Rijmen and Joan Daemen and Bart Preneel and Antoon Bosselaers and Erik De Win}, editor = {Dieter Gollmann}, title = {The Cipher {SHARK}}, booktitle = {Fast Software Encryption, Third International Workshop, Cambridge, UK, February 21-23, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1039}, pages = {99--111}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-60865-6\_47}, doi = {10.1007/3-540-60865-6\_47}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/RijmenDPBW96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/AndersonVPN96, author = {Ross J. Anderson and Serge Vaudenay and Bart Preneel and Kaisa Nyberg}, editor = {Ross J. Anderson}, title = {The Newton Channel}, booktitle = {Information Hiding, First International Workshop, Cambridge, UK, May 30 - June 1, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1174}, pages = {151--156}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-61996-8\_38}, doi = {10.1007/3-540-61996-8\_38}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ih/AndersonVPN96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/PrenelO95, author = {Bart Preneel and Paul C. van Oorschot}, editor = {Don Coppersmith}, title = {MDx-MAC and Building Fast MACs from Hash Functions}, booktitle = {Advances in Cryptology - {CRYPTO} '95, 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {963}, pages = {1--14}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-44750-4\_1}, doi = {10.1007/3-540-44750-4\_1}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/PrenelO95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/BosselaersP95, editor = {Antoon Bosselaers and Bart Preneel}, title = {Integrity Primitives for Secure Information Systems, Final Report of {RACE} Integrity Primitives Evaluation {RIPE-RACE} 1040}, series = {Lecture Notes in Computer Science}, volume = {1007}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-60640-8}, doi = {10.1007/3-540-60640-8}, isbn = {3-540-60640-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/BosselaersP95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fse/1994, editor = {Bart Preneel}, title = {Fast Software Encryption: Second International Workshop. Leuven, Belgium, 14-16 December 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1008}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-60590-8}, doi = {10.1007/3-540-60590-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/1994.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/Preneel94, author = {Bart Preneel}, title = {Cryptographic hash functions}, journal = {Eur. Trans. Telecommun.}, volume = {5}, number = {4}, pages = {431--448}, year = {1994}, url = {https://doi.org/10.1002/ett.4460050406}, doi = {10.1002/ETT.4460050406}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ett/Preneel94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Preneel94, author = {Bart Preneel}, editor = {Bart Preneel}, title = {FSE'94 - Introduction}, booktitle = {Fast Software Encryption: Second International Workshop. Leuven, Belgium, 14-16 December 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1008}, pages = {1--5}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-60590-8\_1}, doi = {10.1007/3-540-60590-8\_1}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/Preneel94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/RijmenP94, author = {Vincent Rijmen and Bart Preneel}, editor = {Bart Preneel}, title = {Improved Characteristics for Differential Cryptanalysis of Hash Functions Based on Block Ciphers}, booktitle = {Fast Software Encryption: Second International Workshop. Leuven, Belgium, 14-16 December 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1008}, pages = {242--248}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-60590-8\_18}, doi = {10.1007/3-540-60590-8\_18}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/RijmenP94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/RijmenP94a, author = {Vincent Rijmen and Bart Preneel}, editor = {Bart Preneel}, title = {Cryptanalysis of McGuffin}, booktitle = {Fast Software Encryption: Second International Workshop. Leuven, Belgium, 14-16 December 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1008}, pages = {353--358}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-60590-8\_27}, doi = {10.1007/3-540-60590-8\_27}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/RijmenP94a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PreneelGV93, author = {Bart Preneel and Ren{\'{e}} Govaerts and Joos Vandewalle}, editor = {Dorothy E. Denning and Raymond Pyle and Ravi Ganesan and Ravi S. Sandhu and Victoria Ashby}, title = {Differential Cryptanalysis of Hash Functions Based on Block Ciphers}, booktitle = {{CCS} '93, Proceedings of the 1st {ACM} Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 3-5, 1993}, pages = {183--188}, publisher = {{ACM}}, year = {1993}, url = {https://doi.org/10.1145/168588.168611}, doi = {10.1145/168588.168611}, timestamp = {Tue, 10 Nov 2020 20:00:40 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PreneelGV93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/PreneelNRB93, author = {Bart Preneel and Marnix Nuttin and Vincent Rijmen and Johan Buelens}, editor = {Douglas R. Stinson}, title = {Cryptanalysis of the {CFB} Mode of the {DES} with a Reduced Number of Rounds}, booktitle = {Advances in Cryptology - {CRYPTO} '93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {773}, pages = {212--223}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48329-2\_19}, doi = {10.1007/3-540-48329-2\_19}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/PreneelNRB93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/PreneelGV93, author = {Bart Preneel and Ren{\'{e}} Govaerts and Joos Vandewalle}, editor = {Douglas R. Stinson}, title = {Hash Functions Based on Block Ciphers: {A} Synthetic Approach}, booktitle = {Advances in Cryptology - {CRYPTO} '93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {773}, pages = {368--378}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48329-2\_31}, doi = {10.1007/3-540-48329-2\_31}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/PreneelGV93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Preneel93, author = {Bart Preneel}, editor = {Ross J. Anderson}, title = {Design Principles for Dedicated Hash Functions}, booktitle = {Fast Software Encryption, Cambridge Security Workshop, Cambridge, UK, December 9-11, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {809}, pages = {71--82}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-58108-1\_10}, doi = {10.1007/3-540-58108-1\_10}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/Preneel93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ac/1991esat, editor = {Bart Preneel and Ren{\'{e}} Govaerts and Joos Vandewalle}, title = {Computer Security and Industrial Cryptography - State of the Art and Evolution, {ESAT} Course, Leuven, Belgium, May 21-23, 1991}, series = {Lecture Notes in Computer Science}, volume = {741}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-57341-0}, doi = {10.1007/3-540-57341-0}, isbn = {3-540-57341-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ac/1991esat.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/PreneelGV92, author = {Bart Preneel and Ren{\'{e}} Govaerts and Joos Vandewalle}, editor = {Jennifer Seberry and Yuliang Zheng}, title = {On the Power of Memory in the Design of Collision Resistant Hash Functions}, booktitle = {Advances in Cryptology - {AUSCRYPT} '92, Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {718}, pages = {105--121}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-57220-1\_55}, doi = {10.1007/3-540-57220-1\_55}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/PreneelGV92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/PreneelGV92a, author = {Bart Preneel and Ren{\'{e}} Govaerts and Joos Vandewalle}, editor = {Jennifer Seberry and Yuliang Zheng}, title = {An Attack on Two Hash Functions by Zheng-Matsumoto-Imai}, booktitle = {Advances in Cryptology - {AUSCRYPT} '92, Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {718}, pages = {535--538}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-57220-1\_91}, doi = {10.1007/3-540-57220-1\_91}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/PreneelGV92a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ac/VandewalleGP91, author = {Joos Vandewalle and Ren{\'{e}} Govaerts and Bart Preneel}, editor = {Bart Preneel and Ren{\'{e}} Govaerts and Joos Vandewalle}, title = {Technical Approaches to Thwart Computer Fraud}, booktitle = {Computer Security and Industrial Cryptography - State of the Art and Evolution, {ESAT} Course, Leuven, Belgium, May 21-23, 1991}, series = {Lecture Notes in Computer Science}, volume = {741}, pages = {20--30}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-57341-0\_53}, doi = {10.1007/3-540-57341-0\_53}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/ac/VandewalleGP91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ac/PreneelGV91, author = {Bart Preneel and Ren{\'{e}} Govaerts and Joos Vandewalle}, editor = {Bart Preneel and Ren{\'{e}} Govaerts and Joos Vandewalle}, title = {Information Authentication: Hash Functions and Digital Signatures}, booktitle = {Computer Security and Industrial Cryptography - State of the Art and Evolution, {ESAT} Course, Leuven, Belgium, May 21-23, 1991}, series = {Lecture Notes in Computer Science}, volume = {741}, pages = {87--131}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-57341-0\_57}, doi = {10.1007/3-540-57341-0\_57}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ac/PreneelGV91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ac/Preneel91, author = {Bart Preneel}, editor = {Bart Preneel and Ren{\'{e}} Govaerts and Joos Vandewalle}, title = {Standardization of Cryptographic Techniques}, booktitle = {Computer Security and Industrial Cryptography - State of the Art and Evolution, {ESAT} Course, Leuven, Belgium, May 21-23, 1991}, series = {Lecture Notes in Computer Science}, volume = {741}, pages = {162--173}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-57341-0\_60}, doi = {10.1007/3-540-57341-0\_60}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ac/Preneel91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/PreneelGV91, author = {Bart Preneel and Ren{\'{e}} Govaerts and Joos Vandewalle}, editor = {Donald W. Davies}, title = {Boolean Functions Satisfying Higher Order Propagation Criteria}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {141--152}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_12}, doi = {10.1007/3-540-46416-6\_12}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/PreneelGV91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/PreneelCFJLR91, author = {Bart Preneel and David Chaum and Walter Fumy and Cees J. A. Jansen and Peter Landrock and Gert Roelofsen}, editor = {Donald W. Davies}, title = {Race Integrity Primitives Evaluation {(RIPE):} {A} Status Report}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {547--551}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_52}, doi = {10.1007/3-540-46416-6\_52}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/PreneelCFJLR91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PreneelBGV90, author = {Bart Preneel and Antoon Bosselaers and Ren{\'{e}} Govaerts and Joos Vandewalle}, title = {Cryptanalysis of a fast cryptographic checksum algorithm}, journal = {Comput. Secur.}, volume = {9}, number = {3}, pages = {257--262}, year = {1990}, url = {https://doi.org/10.1016/0167-4048(90)90172-P}, doi = {10.1016/0167-4048(90)90172-P}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/PreneelBGV90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/PreneelLLGV90, author = {Bart Preneel and Werner Van Leekwijck and Luc Van Linden and Ren{\'{e}} Govaerts and Joos Vandewalle}, editor = {Ivan Damg{\aa}rd}, title = {Propagation Characteristics of Boolean Functions}, booktitle = {Advances in Cryptology - {EUROCRYPT} '90, Workshop on the Theory and Application of of Cryptographic Techniques, Aarhus, Denmark, May 21-24, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {473}, pages = {161--173}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/3-540-46877-3\_14}, doi = {10.1007/3-540-46877-3\_14}, timestamp = {Fri, 17 Jul 2020 16:12:46 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/PreneelLLGV90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/PreneelBGV89, author = {Bart Preneel and Antoon Bosselaers and Ren{\'{e}} Govaerts and Joos Vandewalle}, editor = {Gilles Brassard}, title = {A Chosen Text Attack on The Modified Cryptographic Checksum Algorithm of Cohen and Huang}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {154--163}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_15}, doi = {10.1007/0-387-34805-0\_15}, timestamp = {Tue, 01 Jun 2021 15:21:29 +0200}, biburl = {https://dblp.org/rec/conf/crypto/PreneelBGV89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.