BibTeX records: Bart Preneel

download as .bib file

@article{DBLP:journals/iacr/SarencheZNP24,
  author       = {Roozbeh Sarenche and
                  Ren Zhang and
                  Svetla Nikova and
                  Bart Preneel},
  title        = {Time-Averaged Analysis of Selfish Mining in Bitcoin},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {363},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/363},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/SarencheZNP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/YoshizawaSMDTHP23,
  author       = {Takahito Yoshizawa and
                  Dave Singel{\'{e}}e and
                  Jan Tobias M{\"{u}}hlberg and
                  St{\'{e}}phane Delbruel and
                  Amir Taherkordi and
                  Danny Hughes and
                  Bart Preneel},
  title        = {A Survey of Security and Privacy Issues in {V2X} Communication Systems},
  journal      = {{ACM} Comput. Surv.},
  volume       = {55},
  number       = {9},
  pages        = {185:1--185:36},
  year         = {2023},
  url          = {https://doi.org/10.1145/3558052},
  doi          = {10.1145/3558052},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/YoshizawaSMDTHP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WangNLLPW23,
  author       = {Jinliang Wang and
                  Chao Niu and
                  Qun Liu and
                  Muzhou Li and
                  Bart Preneel and
                  Meiqin Wang},
  editor       = {Leonie Simpson and
                  Mir Ali Rezazadeh Baee},
  title        = {Cryptanalysis of {SPEEDY}},
  booktitle    = {Information Security and Privacy - 28th Australasian Conference, {ACISP}
                  2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13915},
  pages        = {124--156},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-35486-1\_7},
  doi          = {10.1007/978-3-031-35486-1\_7},
  timestamp    = {Thu, 22 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WangNLLPW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MadhusudanSTCP23,
  author       = {Akash Madhusudan and
                  Mahdi Sedaghat and
                  Samarth Tiwari and
                  Kelong Cong and
                  Bart Preneel},
  editor       = {Leonie Simpson and
                  Mir Ali Rezazadeh Baee},
  title        = {Reusable, Instant and Private Payment Guarantees for Cryptocurrencies},
  booktitle    = {Information Security and Privacy - 28th Australasian Conference, {ACISP}
                  2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13915},
  pages        = {580--605},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-35486-1\_25},
  doi          = {10.1007/978-3-031-35486-1\_25},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/MadhusudanSTCP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/LiuPZW23,
  author       = {Qun Liu and
                  Bart Preneel and
                  Zheng Zhao and
                  Meiqin Wang},
  editor       = {Jian Guo and
                  Ron Steinfeld},
  title        = {Improved Quantum Circuits for {AES:} Reducing the Depth and the Number
                  of Qubits},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Guangzhou, China, December 4-8, 2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14440},
  pages        = {67--98},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8727-6\_3},
  doi          = {10.1007/978-981-99-8727-6\_3},
  timestamp    = {Sun, 07 Jan 2024 14:24:24 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/LiuPZW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/CritesKPSS23,
  author       = {Elizabeth C. Crites and
                  Markulf Kohlweiss and
                  Bart Preneel and
                  Mahdi Sedaghat and
                  Daniel Slamanig},
  editor       = {Jian Guo and
                  Ron Steinfeld},
  title        = {Threshold Structure-Preserving Signatures},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Guangzhou, China, December 4-8, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14439},
  pages        = {348--382},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8724-5\_11},
  doi          = {10.1007/978-981-99-8724-5\_11},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/CritesKPSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BhatiPA0P23,
  author       = {Amit Singh Bhati and
                  Erik Pohle and
                  Aysajan Abidin and
                  Elena Andreeva and
                  Bart Preneel},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {Let's Go Eevee! {A} Friendly and Suitable Family of {AEAD} Modes for
                  IoT-to-Cloud Secure Computation},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {2546--2560},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3623091},
  doi          = {10.1145/3576915.3623091},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BhatiPA0P23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cf/HellemansRPM23,
  author       = {Wouter Hellemans and
                  Md Masoom Rabbani and
                  Bart Preneel and
                  Nele Mentens},
  editor       = {Andrea Bartolini and
                  Kristian F. D. Rietveld and
                  Catherine D. Schuman and
                  Jose Moreira},
  title        = {Yes we CAN!: Towards bringing security to legacy-restricted Controller
                  Area Networks. {A} review},
  booktitle    = {Proceedings of the 20th {ACM} International Conference on Computing
                  Frontiers, {CF} 2023, Bologna, Italy, May 9-11, 2023},
  pages        = {352--357},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3587135.3592818},
  doi          = {10.1145/3587135.3592818},
  timestamp    = {Sat, 30 Sep 2023 09:36:30 +0200},
  biburl       = {https://dblp.org/rec/conf/cf/HellemansRPM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/DuttaguptaMSP23,
  author       = {Sayon Duttagupta and
                  Eduard Marin and
                  Dave Singel{\'{e}}e and
                  Bart Preneel},
  editor       = {Mohamed Shehab and
                  Maribel Fern{\'{a}}ndez and
                  Ninghui Li},
  title        = {{HAT:} Secure and Practical Key Establishment for Implantable Medical
                  Devices},
  booktitle    = {Proceedings of the Thirteenth {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2023, Charlotte, NC, USA, April 24-26,
                  2023},
  pages        = {213--224},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3577923.3583646},
  doi          = {10.1145/3577923.3583646},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/DuttaguptaMSP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscn/YoshizawaP23,
  author       = {Takahito Yoshizawa and
                  Bart Preneel},
  title        = {Open Questions in {VRU} Standards from Security and Privacy Perspectives},
  booktitle    = {{IEEE} Conference on Standards for Communications and Networking,
                  {CSCN} 2023, Munich, Germany, November 6-8, 2023},
  pages        = {284--289},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CSCN60443.2023.10453165},
  doi          = {10.1109/CSCN60443.2023.10453165},
  timestamp    = {Wed, 13 Mar 2024 13:47:04 +0100},
  biburl       = {https://dblp.org/rec/conf/cscn/YoshizawaP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AbidinPP23,
  author       = {Aysajan Abidin and
                  Erik Pohle and
                  Bart Preneel},
  editor       = {Gene Tsudik and
                  Mauro Conti and
                  Kaitai Liang and
                  Georgios Smaragdakis},
  title        = {Arithmetic Circuit Implementations of S-boxes for {SKINNY} and {PHOTON}
                  in {MPC}},
  booktitle    = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
                  in Computer Security, The Hague, The Netherlands, September 25-29,
                  2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14344},
  pages        = {86--105},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-50594-2\_5},
  doi          = {10.1007/978-3-031-50594-2\_5},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/AbidinPP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/AghabagherlooGP23,
  author       = {Alireza Aghabagherloo and
                  Rafa G{\'{a}}lvez and
                  Davy Preuveneers and
                  Bart Preneel},
  title        = {On the Brittleness of Robust Features: An Exploratory Analysis of
                  Model Robustness and Illusionary Robust Features},
  booktitle    = {2023 {IEEE} Security and Privacy Workshops (SPW), San Francisco, CA,
                  USA, May 25, 2023},
  pages        = {38--44},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SPW59333.2023.00009},
  doi          = {10.1109/SPW59333.2023.00009},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/AghabagherlooGP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vnc/YoshizawaP23,
  author       = {Takahito Yoshizawa and
                  Bart Preneel},
  editor       = {Sinem Coleri and
                  Onur Altintas and
                  Frank Kargl and
                  Takamasa Higuchi and
                  Michele Segata and
                  Florian Klingler},
  title        = {A New Approach To Pseudonym Certificate Management in {V2X} Communication},
  booktitle    = {{IEEE} Vehicular Networking Conference, {VNC} 2023, Istanbul, Turkey,
                  April 26-28, 2023},
  pages        = {25--32},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/VNC57357.2023.10136349},
  doi          = {10.1109/VNC57357.2023.10136349},
  timestamp    = {Fri, 09 Jun 2023 15:18:18 +0200},
  biburl       = {https://dblp.org/rec/conf/vnc/YoshizawaP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/YoshizawaP23,
  author       = {Takahito Yoshizawa and
                  Bart Preneel},
  title        = {Post-Quantum Impacts on {V2X} Certificates - Already at The End of
                  The Road},
  booktitle    = {97th {IEEE} Vehicular Technology Conference, {VTC} Spring 2023, Florence,
                  Italy, June 20-23, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/VTC2023-Spring57618.2023.10199793},
  doi          = {10.1109/VTC2023-SPRING57618.2023.10199793},
  timestamp    = {Fri, 25 Aug 2023 08:20:01 +0200},
  biburl       = {https://dblp.org/rec/conf/vtc/YoshizawaP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MadhusudanSTCP23,
  author       = {Akash Madhusudan and
                  Mahdi Sedaghat and
                  Samarth Tiwari and
                  Kelong Cong and
                  Bart Preneel},
  title        = {Reusable, Instant and Private Payment Guarantees for Cryptocurrencies},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {583},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/583},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MadhusudanSTCP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangNLLPW23,
  author       = {Jinliang Wang and
                  Chao Niu and
                  Qun Liu and
                  Muzhou Li and
                  Bart Preneel and
                  Meiqin Wang},
  title        = {Cryptanalysis of {SPEEDY}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {612},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/612},
  timestamp    = {Wed, 21 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangNLLPW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BhatiDARP23,
  author       = {Amit Singh Bhati and
                  Antonin Dufka and
                  Elena Andreeva and
                  Arnab Roy and
                  Bart Preneel},
  title        = {Skye: {A} Fast {KDF} based on Expanding {PRF} and its Application
                  to Signal},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {781},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/781},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BhatiDARP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WuFPWW23,
  author       = {Lixuan Wu and
                  Yanhong Fan and
                  Bart Preneel and
                  Weijia Wang and
                  Meiqin Wang},
  title        = {An automated generation tool of hardware masked S-box: AGEMA\({}^{\mbox{+}}\)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {831},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/831},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WuFPWW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BhatiPAAP23,
  author       = {Amit Singh Bhati and
                  Erik Pohle and
                  Aysajan Abidin and
                  Elena Andreeva and
                  Bart Preneel},
  title        = {Let's Go Eevee! {A} Friendly and Suitable Family of {AEAD} Modes for
                  IoT-to-Cloud Secure Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1361},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1361},
  timestamp    = {Sat, 07 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BhatiPAAP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuPZW23,
  author       = {Qun Liu and
                  Bart Preneel and
                  Zheng Zhao and
                  Meiqin Wang},
  title        = {Improved Quantum Circuits for {AES:} Reducing the Depth and the Number
                  of Qubits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1417},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1417},
  timestamp    = {Sat, 07 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuPZW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbidinPP23,
  author       = {Aysajan Abidin and
                  Erik Pohle and
                  Bart Preneel},
  title        = {Arithmetic Circuit Implementations of S-boxes for {SKINNY} and {PHOTON}
                  in {MPC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1426},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1426},
  timestamp    = {Sat, 07 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbidinPP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AghabagherlooDM22,
  author       = {Alireza Aghabagherloo and
                  Mahshid Delavar and
                  Javad Mohajeri and
                  Mahmoud Salmasizadeh and
                  Bart Preneel},
  title        = {An Efficient and Physically Secure Privacy-Preserving Authentication
                  Scheme for Vehicular Ad-hoc NETworks (VANETs)},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {93831--93844},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3203580},
  doi          = {10.1109/ACCESS.2022.3203580},
  timestamp    = {Mon, 26 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/AghabagherlooDM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/TroncosoBBCCGHJ22,
  author       = {Carmela Troncoso and
                  Dan Bogdanov and
                  Edouard Bugnion and
                  Sylvain Chatel and
                  Cas Cremers and
                  Seda F. G{\"{u}}rses and
                  Jean{-}Pierre Hubaux and
                  Dennis Jackson and
                  James R. Larus and
                  Wouter Lueks and
                  Rui Oliveira and
                  Mathias Payer and
                  Bart Preneel and
                  Apostolos Pyrgelis and
                  Marcel Salath{\'{e}} and
                  Theresa Stadler and
                  Michael Veale},
  title        = {Deploying decentralized, privacy-preserving proximity tracing},
  journal      = {Commun. {ACM}},
  volume       = {65},
  number       = {9},
  pages        = {48--57},
  year         = {2022},
  url          = {https://doi.org/10.1145/3524107},
  doi          = {10.1145/3524107},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cacm/TroncosoBBCCGHJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imwut/AyalonLPR22,
  author       = {Oshrat Ayalon and
                  Sophie Li and
                  Bart Preneel and
                  Elissa M. Redmiles},
  title        = {Not Only for Contact Tracing: Use of Belgium's Contact Tracing App
                  among Young Adults},
  journal      = {Proc. {ACM} Interact. Mob. Wearable Ubiquitous Technol.},
  volume       = {6},
  number       = {4},
  pages        = {202:1--202:26},
  year         = {2022},
  url          = {https://doi.org/10.1145/3570348},
  doi          = {10.1145/3570348},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imwut/AyalonLPR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/SymeonidisRMMPP22,
  author       = {Iraklis Symeonidis and
                  Dragos Rotaru and
                  Mustafa A. Mustafa and
                  Bart Mennink and
                  Bart Preneel and
                  Panos Papadimitratos},
  title        = {{HERMES:} Scalable, Secure, and Privacy-Enhancing Vehicular Sharing-Access
                  System},
  journal      = {{IEEE} Internet Things J.},
  volume       = {9},
  number       = {1},
  pages        = {129--151},
  year         = {2022},
  url          = {https://doi.org/10.1109/JIOT.2021.3094930},
  doi          = {10.1109/JIOT.2021.3094930},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/SymeonidisRMMPP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/VandersmissenRP22,
  author       = {Joachim Vandersmissen and
                  Adri{\'{a}}n Ranea and
                  Bart Preneel},
  editor       = {Giuseppe Ateniese and
                  Daniele Venturi},
  title        = {A White-Box Speck Implementation Using Self-equivalence Encodings},
  booktitle    = {Applied Cryptography and Network Security - 20th International Conference,
                  {ACNS} 2022, Rome, Italy, June 20-23, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13269},
  pages        = {771--791},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-09234-3\_38},
  doi          = {10.1007/978-3-031-09234-3\_38},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/VandersmissenRP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/HeHPW22,
  author       = {Jiahui He and
                  Kai Hu and
                  Bart Preneel and
                  Meiqin Wang},
  editor       = {Shweta Agrawal and
                  Dongdai Lin},
  title        = {Stretching Cube Attacks: Improved Methods to Recover Massive Superpolies},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13794},
  pages        = {537--566},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22972-5\_19},
  doi          = {10.1007/978-3-031-22972-5\_19},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/HeHPW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/DuttaguptaSP22,
  author       = {Sayon Duttagupta and
                  Dave Singel{\'{e}}e and
                  Bart Preneel},
  title        = {{T-HIBE:} {A} Novel Key Establishment Solution for Decentralized,
                  Multi-Tenant IoT Systems},
  booktitle    = {19th {IEEE} Annual Consumer Communications {\&} Networking Conference,
                  {CCNC} 2022, Las Vegas, NV, USA, January 8-11, 2022},
  pages        = {766--774},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CCNC49033.2022.9700537},
  doi          = {10.1109/CCNC49033.2022.9700537},
  timestamp    = {Mon, 28 Aug 2023 21:17:27 +0200},
  biburl       = {https://dblp.org/rec/conf/ccnc/DuttaguptaSP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/WoutersGP22,
  author       = {Lennert Wouters and
                  Benedikt Gierlichs and
                  Bart Preneel},
  editor       = {Josep Balasch and
                  Colin O'Flynn},
  title        = {On the Susceptibility of Texas Instruments SimpleLink Platform Microcontrollers
                  to Non-invasive Physical Attacks},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 13th International
                  Workshop, {COSADE} 2022, Leuven, Belgium, April 11-12, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13211},
  pages        = {143--163},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-99766-3\_7},
  doi          = {10.1007/978-3-030-99766-3\_7},
  timestamp    = {Fri, 01 Apr 2022 15:49:26 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/WoutersGP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/BeckersWGPV22,
  author       = {Arthur Beckers and
                  Lennert Wouters and
                  Benedikt Gierlichs and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  editor       = {Josep Balasch and
                  Colin O'Flynn},
  title        = {Provable Secure Software Masking in the Real-World},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 13th International
                  Workshop, {COSADE} 2022, Leuven, Belgium, April 11-12, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13211},
  pages        = {215--235},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-99766-3\_10},
  doi          = {10.1007/978-3-030-99766-3\_10},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/BeckersWGPV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/RaneaVP22,
  author       = {Adri{\'{a}}n Ranea and
                  Joachim Vandersmissen and
                  Bart Preneel},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Implicit White-Box Implementations: White-Boxing {ARX} Ciphers},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13507},
  pages        = {33--63},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15802-5\_2},
  doi          = {10.1007/978-3-031-15802-5\_2},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/RaneaVP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscn/YoshizawaP22,
  author       = {Takahito Yoshizawa and
                  Bart Preneel},
  title        = {Misbehaviour Reporting in {ETSI} {ITS} Standard Considered Broken},
  booktitle    = {{IEEE} Conference on Standards for Communications and Networking,
                  {CSCN} 2022, Thessaloniki, Greece, November 28-30, 2022},
  pages        = {144--150},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CSCN57023.2022.10050926},
  doi          = {10.1109/CSCN57023.2022.10050926},
  timestamp    = {Fri, 03 Mar 2023 14:29:58 +0100},
  biburl       = {https://dblp.org/rec/conf/cscn/YoshizawaP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/SunPWW22,
  author       = {Ling Sun and
                  Bart Preneel and
                  Wei Wang and
                  Meiqin Wang},
  editor       = {Orr Dunkelman and
                  Stefan Dziembowski},
  title        = {A Greater {GIFT:} Strengthening {GIFT} Against Statistical Cryptanalysis},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13277},
  pages        = {115--144},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-07082-2\_5},
  doi          = {10.1007/978-3-031-07082-2\_5},
  timestamp    = {Tue, 27 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/SunPWW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/0003ZWWXP22,
  author       = {Ren Zhang and
                  Dingwei Zhang and
                  Quake Wang and
                  Shichen Wu and
                  Jan Xie and
                  Bart Preneel},
  title        = {NC-Max: Breaking the Security-Performance Tradeoff in Nakamoto Consensus},
  booktitle    = {29th Annual Network and Distributed System Security Symposium, {NDSS}
                  2022, San Diego, California, USA, April 24-28, 2022},
  publisher    = {The Internet Society},
  year         = {2022},
  url          = {https://www.ndss-symposium.org/ndss-paper/auto-draft-255/},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/0003ZWWXP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wimob/YoshizawaP22,
  author       = {Takahito Yoshizawa and
                  Bart Preneel},
  title        = {On Handling of Certificate Digest in {V2X} Communication},
  booktitle    = {18th International Conference on Wireless and Mobile Computing, Networking
                  and Communications, WiMob 2022, Thessaloniki, Greece, October 10-12,
                  2022},
  pages        = {160--165},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/WiMob55322.2022.9941683},
  doi          = {10.1109/WIMOB55322.2022.9941683},
  timestamp    = {Fri, 18 Nov 2022 20:51:17 +0100},
  biburl       = {https://dblp.org/rec/conf/wimob/YoshizawaP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-14674,
  author       = {Takahito Yoshizawa and
                  Dave Singel{\'{e}}e and
                  Jan Tobias M{\"{u}}hlberg and
                  St{\'{e}}phane Delbruel and
                  Amir Taherkordi and
                  Danny Hughes and
                  Bart Preneel},
  title        = {A Survey of Security and Privacy Issues in {V2X} Communication Systems},
  journal      = {CoRR},
  volume       = {abs/2208.14674},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.14674},
  doi          = {10.48550/ARXIV.2208.14674},
  eprinttype    = {arXiv},
  eprint       = {2208.14674},
  timestamp    = {Thu, 01 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-14674.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SunPWW22,
  author       = {Ling Sun and
                  Bart Preneel and
                  Wei Wang and
                  Meiqin Wang},
  title        = {A Greater {GIFT:} Strengthening {GIFT} against Statistical Cryptanalysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {243},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/243},
  timestamp    = {Tue, 27 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/SunPWW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeckersWGPV22,
  author       = {Arthur Beckers and
                  Lennert Wouters and
                  Benedikt Gierlichs and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  title        = {Provable Secure Software Masking in the Real-World},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {327},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/327},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeckersWGPV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WoutersGP22,
  author       = {Lennert Wouters and
                  Benedikt Gierlichs and
                  Bart Preneel},
  title        = {On the susceptibility of Texas Instruments SimpleLink platform microcontrollers
                  to non-invasive physical attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {328},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/328},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WoutersGP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RaneaVP22,
  author       = {Adri{\'{a}}n Ranea and
                  Joachim Vandersmissen and
                  Bart Preneel},
  title        = {Implicit White-Box Implementations: White-Boxing {ARX} Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {428},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/428},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RaneaVP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/VandersmissenRP22,
  author       = {Joachim Vandersmissen and
                  Adri{\'{a}}n Ranea and
                  Bart Preneel},
  title        = {A White-Box Speck Implementation using Self-Equivalence Encodings
                  (Full Version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {444},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/444},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/VandersmissenRP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SedaghatSKP22,
  author       = {Mahdi Sedaghat and
                  Daniel Slamanig and
                  Markulf Kohlweiss and
                  Bart Preneel},
  title        = {Structure-Preserving Threshold Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {839},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/839},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SedaghatSKP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MadhusudanSJP22,
  author       = {Akash Madhusudan and
                  Mahdi Sedaghat and
                  Philipp Jovanovic and
                  Bart Preneel},
  title        = {Nirvana: Instant and Anonymous Payment-Guarantees},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {872},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/872},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MadhusudanSJP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChaumCCLNPSYYZZ22,
  author       = {David Chaum and
                  Richard Carback and
                  Jeremy Clark and
                  Chao Liu and
                  Mahdi Nejadgholi and
                  Bart Preneel and
                  Alan T. Sherman and
                  Mario Yaksetig and
                  Zeyuan Yin and
                  Filip Zag{\'{o}}rski and
                  Bingsheng Zhang},
  title        = {VoteXX: {A} Solution to Improper Influence in Voter-Verifiable Elections},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1212},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1212},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChaumCCLNPSYYZZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/He0PW22,
  author       = {Jiahui He and
                  Kai Hu and
                  Bart Preneel and
                  Meiqin Wang},
  title        = {Stretching Cube Attacks: Improved Methods to Recover Massive Superpolies},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1218},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1218},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/He0PW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PohleAP22,
  author       = {Erik Pohle and
                  Aysajan Abidin and
                  Bart Preneel},
  title        = {Fast Evaluation of S-boxes with Garbled Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1278},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1278},
  timestamp    = {Sat, 22 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PohleAP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fdgth/LueksBBKL0PSTW21,
  author       = {Wouter Lueks and
                  Justus Benzler and
                  Dan Bogdanov and
                  G{\"{o}}ran Kirchner and
                  Raquel Lucas and
                  Rui Oliveira and
                  Bart Preneel and
                  Marcel Salath{\'{e}} and
                  Carmela Troncoso and
                  Viktor von Wyl},
  title        = {Toward a Common Performance and Effectiveness Terminology for Digital
                  Proximity Tracing Applications},
  journal      = {Frontiers Digit. Health},
  volume       = {3},
  pages        = {677929},
  year         = {2021},
  url          = {https://doi.org/10.3389/fdgth.2021.677929},
  doi          = {10.3389/FDGTH.2021.677929},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fdgth/LueksBBKL0PSTW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/WoutersGP21,
  author       = {Lennert Wouters and
                  Benedikt Gierlichs and
                  Bart Preneel},
  title        = {My other car is your car: compromising the Tesla Model {X} keyless
                  entry system},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {4},
  pages        = {149--172},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i4.149-172},
  doi          = {10.46586/TCHES.V2021.I4.149-172},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/WoutersGP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/ChenLMP21,
  author       = {Yu Long Chen and
                  Atul Luykx and
                  Bart Mennink and
                  Bart Preneel},
  title        = {Systematic Security Analysis of Stream Encryption With Key Erasure},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {67},
  number       = {11},
  pages        = {7518--7534},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIT.2021.3109302},
  doi          = {10.1109/TIT.2021.3109302},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/ChenLMP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/0001BPV21,
  author       = {Elena Andreeva and
                  Amit Singh Bhati and
                  Bart Preneel and
                  Damian Viz{\'{a}}r},
  title        = {1, 2, 3, Fork: Counter Mode Variants based on a Generalized Forkcipher},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2021},
  number       = {3},
  pages        = {1--35},
  year         = {2021},
  url          = {https://doi.org/10.46586/tosc.v2021.i3.1-35},
  doi          = {10.46586/TOSC.V2021.I3.1-35},
  timestamp    = {Thu, 30 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/0001BPV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ChenMP21,
  author       = {Yu Long Chen and
                  Bart Mennink and
                  Bart Preneel},
  editor       = {Mehdi Tibouchi and
                  Huaxiong Wang},
  title        = {Categorization of Faulty Nonce Misuse Resistant Message Authentication},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 6-10, 2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13092},
  pages        = {520--550},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92078-4\_18},
  doi          = {10.1007/978-3-030-92078-4\_18},
  timestamp    = {Fri, 03 Dec 2021 17:36:40 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ChenMP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/SedaghatP21,
  author       = {Mahdi Sedaghat and
                  Bart Preneel},
  editor       = {Mauro Conti and
                  Marc Stevens and
                  Stephan Krenn},
  title        = {Cross-Domain Attribute-Based Access Control Encryption},
  booktitle    = {Cryptology and Network Security - 20th International Conference, {CANS}
                  2021, Vienna, Austria, December 13-15, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13099},
  pages        = {3--23},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92548-2\_1},
  doi          = {10.1007/978-3-030-92548-2\_1},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/SedaghatP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/YoshizawaSP21,
  author       = {Takahito Yoshizawa and
                  Dave Singel{\'{e}}e and
                  Bart Preneel},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Jose Luis Mu{\~{n}}oz{-}Tapia and
                  Guillermo Navarro{-}Arribas and
                  Miguel Soriano},
  title        = {A New Privacy Enhancing Beacon Scheme in {V2X} Communication},
  booktitle    = {Data Privacy Management, Cryptocurrencies and Blockchain Technology
                  - {ESORICS} 2021 International Workshops, {DPM} 2021 and {CBT} 2021,
                  Darmstadt, Germany, October 8, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13140},
  pages        = {139--151},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-93944-1\_9},
  doi          = {10.1007/978-3-030-93944-1\_9},
  timestamp    = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/YoshizawaSP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isgt/0002MEP21,
  author       = {Clemens Brunner and
                  Akash Madhusudan and
                  Dominik Engel and
                  Bart Preneel},
  title        = {Off-chain state channels in the energy domain},
  booktitle    = {{IEEE} Power {\&} Energy Society Innovative Smart Grid Technologies
                  Conference, {ISGT} 2021, Washington, DC, USA, February 16-18, 2021},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ISGT49243.2021.9372246},
  doi          = {10.1109/ISGT49243.2021.9372246},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isgt/0002MEP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/FigueiredoMRNP21,
  author       = {Sammy de Figueiredo and
                  Akash Madhusudan and
                  Vincent Reniers and
                  Svetla Nikova and
                  Bart Preneel},
  editor       = {Chih{-}Cheng Hung and
                  Jiman Hong and
                  Alessio Bechini and
                  Eunjee Song},
  title        = {Exploring the storj network: a security analysis},
  booktitle    = {{SAC} '21: The 36th {ACM/SIGAPP} Symposium on Applied Computing, Virtual
                  Event, Republic of Korea, March 22-26, 2021},
  pages        = {257--264},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3412841.3441908},
  doi          = {10.1145/3412841.3441908},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/FigueiredoMRNP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/indocrypt/2021,
  editor       = {Avishek Adhikari and
                  Ralf K{\"{u}}sters and
                  Bart Preneel},
  title        = {Progress in Cryptology - {INDOCRYPT} 2021 - 22nd International Conference
                  on Cryptology in India, Jaipur, India, December 12-15, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13143},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92518-5},
  doi          = {10.1007/978-3-030-92518-5},
  isbn         = {978-3-030-92517-8},
  timestamp    = {Mon, 13 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/indocrypt/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SedaghatP21,
  author       = {Mahdi Sedaghat and
                  Bart Preneel},
  title        = {Cross-Domain Attribute-Based Access Control Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {74},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/074},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/SedaghatP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AndreevaBPV21,
  author       = {Elena Andreeva and
                  Amit Singh Bhati and
                  Bart Preneel and
                  Damian Viz{\'{a}}r},
  title        = {1, 2, 3, Fork: Counter Mode Variants based on a Generalized Forkcipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1154},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1154},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AndreevaBPV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenMP21,
  author       = {Yu Long Chen and
                  Bart Mennink and
                  Bart Preneel},
  title        = {Categorization of Faulty Nonce Misuse Resistant Message Authentication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1696},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1696},
  timestamp    = {Thu, 13 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenMP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/GorodilovaACHIK20,
  author       = {Anastasiya Gorodilova and
                  Sergey Agievich and
                  Claude Carlet and
                  Xiang{-}dong Hou and
                  Valeriya Idrisova and
                  Nikolay Kolomeec and
                  Alexandr Kutsenko and
                  Luca Mariot and
                  Alexey Oblaukhov and
                  Stjepan Picek and
                  Bart Preneel and
                  Razvan Rosie and
                  Natalia N. Tokareva},
  title        = {The Fifth International Students' Olympiad in cryptography - {NSUCRYPTO:}
                  Problems and their solutions},
  journal      = {Cryptologia},
  volume       = {44},
  number       = {3},
  pages        = {223--256},
  year         = {2020},
  url          = {https://doi.org/10.1080/01611194.2019.1670282},
  doi          = {10.1080/01611194.2019.1670282},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/GorodilovaACHIK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/debu/TroncosoPHSLLSP20,
  author       = {Carmela Troncoso and
                  Mathias Payer and
                  Jean{-}Pierre Hubaux and
                  Marcel Salath{\'{e}} and
                  James R. Larus and
                  Wouter Lueks and
                  Theresa Stadler and
                  Apostolos Pyrgelis and
                  Daniele Antonioli and
                  Ludovic Barman and
                  Sylvain Chatel and
                  Kenneth G. Paterson and
                  Srdjan Capkun and
                  David A. Basin and
                  Jan Beutel and
                  Dennis Jackson and
                  Marc Roeschlin and
                  Patrick Leu and
                  Bart Preneel and
                  Nigel P. Smart and
                  Aysajan Abidin and
                  Seda Gurses and
                  Michael Veale and
                  Cas Cremers and
                  Michael Backes and
                  Nils Ole Tippenhauer and
                  Reuben Binns and
                  Ciro Cattuto and
                  Alain Barrat and
                  Dario Fiore and
                  Manuel Barbosa and
                  Rui Oliveira and
                  Jos{\'{e}} Pereira},
  title        = {Decentralized Privacy-Preserving Proximity Tracing},
  journal      = {{IEEE} Data Eng. Bull.},
  volume       = {43},
  number       = {2},
  pages        = {36--66},
  year         = {2020},
  url          = {http://sites.computer.org/debull/A20june/p36.pdf},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/debu/TroncosoPHSLLSP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/WoutersHGOGP20,
  author       = {Lennert Wouters and
                  Jan Van den Herrewegen and
                  Flavio D. Garcia and
                  David F. Oswald and
                  Benedikt Gierlichs and
                  Bart Preneel},
  title        = {Dismantling DST80-based Immobiliser Systems},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {2},
  pages        = {99--127},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i2.99-127},
  doi          = {10.13154/TCHES.V2020.I2.99-127},
  timestamp    = {Thu, 07 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/WoutersHGOGP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/WoutersAGP20,
  author       = {Lennert Wouters and
                  Victor Arribas and
                  Benedikt Gierlichs and
                  Bart Preneel},
  title        = {Revisiting a Methodology for Efficient {CNN} Architectures in Profiling
                  Attacks},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {3},
  pages        = {147--168},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i3.147-168},
  doi          = {10.13154/TCHES.V2020.I3.147-168},
  timestamp    = {Thu, 02 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/WoutersAGP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aiccsa/Preneel20,
  author       = {Bart Preneel},
  title        = {Big Data against Corona: Mass Surveillance or Privacy by Design? Keynote},
  booktitle    = {17th {IEEE/ACS} International Conference on Computer Systems and Applications,
                  {AICCSA} 2020, Antalya, Turkey, November 2-5, 2020},
  pages        = {1},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/AICCSA50499.2020.9316509},
  doi          = {10.1109/AICCSA50499.2020.9316509},
  timestamp    = {Mon, 01 Feb 2021 12:21:59 +0100},
  biburl       = {https://dblp.org/rec/conf/aiccsa/Preneel20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobiwac/YoshizawaP20,
  author       = {Takahito Yoshizawa and
                  Bart Preneel},
  editor       = {Frank Y. Li and
                  Albert Y. Zomaya and
                  Rodolfo W. L. Coutinho},
  title        = {Verification Schemes of Multi-SIM Devices in Mobile Communication
                  Systems},
  booktitle    = {Proceedings of the 18th {ACM} International Symposium on Mobility
                  Management and Wireless Access, MobiWac 2020, Alicante, Spain, November
                  16-20, 2020},
  pages        = {91--97},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3416012.3424620},
  doi          = {10.1145/3416012.3424620},
  timestamp    = {Wed, 16 Dec 2020 16:07:17 +0100},
  biburl       = {https://dblp.org/rec/conf/mobiwac/YoshizawaP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/ReniersG00MLNLL20,
  author       = {Vincent Reniers and
                  Yuan Gao and
                  Ren Zhang and
                  Paolo Viviani and
                  Akash Madhusudan and
                  Bert Lagaisse and
                  Svetla Nikova and
                  Dimitri Van Landuyt and
                  Riccardo Lombardi and
                  Bart Preneel and
                  Wouter Joosen},
  editor       = {Chih{-}Cheng Hung and
                  Tom{\'{a}}s Cern{\'{y}} and
                  Dongwan Shin and
                  Alessio Bechini},
  title        = {Authenticated and auditable data sharing via smart contract},
  booktitle    = {{SAC} '20: The 35th {ACM/SIGAPP} Symposium on Applied Computing, online
                  event, [Brno, Czech Republic], March 30 - April 3, 2020},
  pages        = {324--331},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3341105.3373957},
  doi          = {10.1145/3341105.3373957},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/ReniersG00MLNLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/RaneaP20,
  author       = {Adri{\'{a}}n Ranea and
                  Bart Preneel},
  editor       = {Orr Dunkelman and
                  Michael J. Jacobson Jr. and
                  Colin O'Flynn},
  title        = {On Self-equivalence Encodings in White-Box Implementations},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2020 - 27th International Conference,
                  Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12804},
  pages        = {639--669},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-81652-0\_25},
  doi          = {10.1007/978-3-030-81652-0\_25},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/RaneaP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-12273,
  author       = {Carmela Troncoso and
                  Mathias Payer and
                  Jean{-}Pierre Hubaux and
                  Marcel Salath{\'{e}} and
                  James R. Larus and
                  Edouard Bugnion and
                  Wouter Lueks and
                  Theresa Stadler and
                  Apostolos Pyrgelis and
                  Daniele Antonioli and
                  Ludovic Barman and
                  Sylvain Chatel and
                  Kenneth G. Paterson and
                  Srdjan Capkun and
                  David A. Basin and
                  Jan Beutel and
                  Dennis Jackson and
                  Marc Roeschlin and
                  Patrick Leu and
                  Bart Preneel and
                  Nigel P. Smart and
                  Aysajan Abidin and
                  Seda F. G{\"{u}}rses and
                  Michael Veale and
                  Cas Cremers and
                  Michael Backes and
                  Nils Ole Tippenhauer and
                  Reuben Binns and
                  Ciro Cattuto and
                  Alain Barrat and
                  Dario Fiore and
                  Manuel Barbosa and
                  Rui Oliveira and
                  Jos{\'{e}} Pereira},
  title        = {Decentralized Privacy-Preserving Proximity Tracing},
  journal      = {CoRR},
  volume       = {abs/2005.12273},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.12273},
  eprinttype    = {arXiv},
  eprint       = {2005.12273},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-12273.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-12927,
  author       = {Justus Benzler and
                  Dan Bogdanov and
                  G{\"{o}}ran Kirchner and
                  Wouter Lueks and
                  Raquel Lucas and
                  Rui Oliveira and
                  Bart Preneel and
                  Marcel Salath{\'{e}} and
                  Carmela Troncoso and
                  Viktor von Wyl},
  title        = {Towards a common performance and effectiveness terminology for digital
                  proximity tracing applications},
  journal      = {CoRR},
  volume       = {abs/2012.12927},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.12927},
  eprinttype    = {arXiv},
  eprint       = {2012.12927},
  timestamp    = {Tue, 05 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-12927.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangZWXP20,
  author       = {Ren Zhang and
                  Dingwei Zhang and
                  Quake Wang and
                  Jan Xie and
                  Bart Preneel},
  title        = {NC-Max: Breaking the Throughput Limit of Nakamoto Consensus},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1101},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1101},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangZWXP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RaneaP20,
  author       = {Adri{\'{a}}n Ranea and
                  Bart Preneel},
  title        = {On Self-Equivalence Encodings in White-Box Implementations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1325},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1325},
  timestamp    = {Fri, 30 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/RaneaP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/GorodilovaACGIK19,
  author       = {Anastasiya Gorodilova and
                  Sergey Agievich and
                  Claude Carlet and
                  Evgeny Gorkunov and
                  Valeriya Idrisova and
                  Nikolay Kolomeec and
                  Alexandr Kutsenko and
                  Svetla Nikova and
                  Alexey Oblaukhov and
                  Stjepan Picek and
                  Bart Preneel and
                  Vincent Rijmen and
                  Natalia N. Tokareva},
  title        = {Problems and solutions from the fourth International Students' Olympiad
                  in Cryptography {(NSUCRYPTO)}},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {2},
  pages        = {138--174},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2018.1517834},
  doi          = {10.1080/01611194.2018.1517834},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/GorodilovaACGIK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/WoutersMAGP19,
  author       = {Lennert Wouters and
                  Eduard Marin and
                  Tomer Ashur and
                  Benedikt Gierlichs and
                  Bart Preneel},
  title        = {Fast, Furious and Insecure: Passive Keyless Entry and Start Systems
                  in Modern Supercars},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {3},
  pages        = {66--85},
  year         = {2019},
  url          = {https://doi.org/10.13154/tches.v2019.i3.66-85},
  doi          = {10.13154/TCHES.V2019.I3.66-85},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/WoutersMAGP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscn/YoshizawaP19,
  author       = {Takahito Yoshizawa and
                  Bart Preneel},
  title        = {Survey of Security Aspect of {V2X} Standards and Related Issues},
  booktitle    = {2019 {IEEE} Conference on Standards for Communications and Networking,
                  {CSCN} 2019, Granada, Spain, October 28-30, 2019},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CSCN.2019.8931311},
  doi          = {10.1109/CSCN.2019.8931311},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cscn/YoshizawaP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MadhusudanSMZP19,
  author       = {Akash Madhusudan and
                  Iraklis Symeonidis and
                  Mustafa A. Mustafa and
                  Ren Zhang and
                  Bart Preneel},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {SC2Share: Smart Contract for Secure Car Sharing},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {163--171},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007703601630171},
  doi          = {10.5220/0007703601630171},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/MadhusudanSMZP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/MarinASP19,
  author       = {Eduard Marin and
                  Enrique Argones{-}R{\'{u}}a and
                  Dave Singel{\'{e}}e and
                  Bart Preneel},
  editor       = {Florian Kerschbaum and
                  Atefeh Mashatan and
                  Jianwei Niu and
                  Adam J. Lee},
  title        = {On the Difficulty of Using Patient's Physiological Signals in Cryptographic
                  Protocols},
  booktitle    = {Proceedings of the 24th {ACM} Symposium on Access Control Models and
                  Technologies, {SACMAT} 2019, Toronto, ON, Canada, June 03-06, 2019},
  pages        = {113--122},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3322431.3325099},
  doi          = {10.1145/3322431.3325099},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/MarinASP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/LiP19,
  author       = {Chaoyun Li and
                  Bart Preneel},
  editor       = {Kenneth G. Paterson and
                  Douglas Stebila},
  title        = {Improved Interpolation Attacks on Cryptographic Primitives of Low
                  Algebraic Degree},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2019 - 26th International Conference,
                  Waterloo, ON, Canada, August 12-16, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11959},
  pages        = {171--193},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-38471-5\_8},
  doi          = {10.1007/978-3-030-38471-5\_8},
  timestamp    = {Mon, 28 Aug 2023 21:17:39 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/LiP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/SzepieniecP19,
  author       = {Alan Szepieniec and
                  Bart Preneel},
  editor       = {Kenneth G. Paterson and
                  Douglas Stebila},
  title        = {Block-Anti-Circulant Unbalanced Oil and Vinegar},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2019 - 26th International Conference,
                  Waterloo, ON, Canada, August 12-16, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11959},
  pages        = {574--588},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-38471-5\_23},
  doi          = {10.1007/978-3-030-38471-5\_23},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/SzepieniecP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/0003P19,
  author       = {Ren Zhang and
                  Bart Preneel},
  title        = {Lay Down the Common Metrics: Evaluating Proof-of-Work Consensus Protocols'
                  Security},
  booktitle    = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco,
                  CA, USA, May 19-23, 2019},
  pages        = {175--192},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SP.2019.00086},
  doi          = {10.1109/SP.2019.00086},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/0003P19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-04480,
  author       = {Anastasiya Gorodilova and
                  Sergey Agievich and
                  Claude Carlet and
                  Xiang{-}dong Hou and
                  Valeriya Idrisova and
                  Nikolay Kolomeec and
                  Alexandr Kutsenko and
                  Luca Mariot and
                  Alexey Oblaukhov and
                  Stjepan Picek and
                  Bart Preneel and
                  Razvan Rosie and
                  Natalia N. Tokareva},
  title        = {The Fifth International Students' Olympiad in Cryptography - {NSUCRYPTO:}
                  problems and their solutions},
  journal      = {CoRR},
  volume       = {abs/1906.04480},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.04480},
  eprinttype    = {arXiv},
  eprint       = {1906.04480},
  timestamp    = {Fri, 14 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-04480.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SzepieniecP19,
  author       = {Alan Szepieniec and
                  Bart Preneel},
  title        = {Block-Anti-Circulant Unbalanced Oil and Vinegar},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {46},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/046},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SzepieniecP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiP19,
  author       = {Chaoyun Li and
                  Bart Preneel},
  title        = {Improved Interpolation Attacks on Cryptographic Primitives of Low
                  Algebraic Degree},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {812},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/812},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/HellesethP18,
  author       = {Tor Helleseth and
                  Bart Preneel},
  title        = {Editorial: Special issue on recent trends in cryptography},
  journal      = {Cryptogr. Commun.},
  volume       = {10},
  number       = {1},
  pages        = {1--3},
  year         = {2018},
  url          = {https://doi.org/10.1007/s12095-017-0269-y},
  doi          = {10.1007/S12095-017-0269-Y},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/HellesethP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SymeonidisBSPSP18,
  author       = {Iraklis Symeonidis and
                  Gergely Bicz{\'{o}}k and
                  Fatemeh Shirazi and
                  Cristina P{\'{e}}rez{-}Sol{\`{a}} and
                  Jessica Schroers and
                  Bart Preneel},
  title        = {Collateral damage of Facebook third-party applications: a comprehensive
                  study},
  journal      = {Comput. Secur.},
  volume       = {77},
  pages        = {179--208},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2018.03.015},
  doi          = {10.1016/J.COSE.2018.03.015},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SymeonidisBSPSP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BiesmansBRPV18,
  author       = {Wouter Biesmans and
                  Josep Balasch and
                  Alfredo Rial and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  title        = {Private Mobile Pay-TV From Priced Oblivious Transfer},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {2},
  pages        = {280--291},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2746058},
  doi          = {10.1109/TIFS.2017.2746058},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BiesmansBRPV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/MarinS0VVNP18,
  author       = {Eduard Marin and
                  Dave Singel{\'{e}}e and
                  Bohan Yang and
                  Vladimir Volskiy and
                  Guy A. E. Vandenbosch and
                  Bart Nuttin and
                  Bart Preneel},
  editor       = {Ziming Zhao and
                  Gail{-}Joon Ahn and
                  Ram Krishnan and
                  Gabriel Ghinita},
  title        = {Securing Wireless Neurostimulators},
  booktitle    = {Proceedings of the Eighth {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2018, Tempe, AZ, USA, March 19-21,
                  2018},
  pages        = {287--298},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3176258.3176310},
  doi          = {10.1145/3176258.3176310},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/MarinS0VVNP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/LuykxP18,
  author       = {Atul Luykx and
                  Bart Preneel},
  editor       = {Jesper Buus Nielsen and
                  Vincent Rijmen},
  title        = {Optimal Forgeries Against Polynomial-Based MACs and {GCM}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10820},
  pages        = {445--467},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-78381-9\_17},
  doi          = {10.1007/978-3-319-78381-9\_17},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/LuykxP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/giots/CleemputMMP18,
  author       = {Sara Cleemput and
                  Mustafa A. Mustafa and
                  Eduard Marin and
                  Bart Preneel},
  title        = {De-pseudonymization of Smart Metering Data: Analysis and Countermeasures},
  booktitle    = {2018 Global Internet of Things Summit, GIoTS 2018, Bilbao, Spain,
                  June 4-7, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/GIOTS.2018.8534430},
  doi          = {10.1109/GIOTS.2018.8534430},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/giots/CleemputMMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ToliP18,
  author       = {Christina{-}Angeliki Toli and
                  Bart Preneel},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Privacy-preserving Biometric Authentication Model for e-Finance Applications},
  booktitle    = {Proceedings of the 4th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2018, Funchal, Madeira - Portugal,
                  January 22-24, 2018},
  pages        = {353--360},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006611303530360},
  doi          = {10.5220/0006611303530360},
  timestamp    = {Wed, 11 Apr 2018 15:27:25 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/ToliP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BeullensPS18,
  author       = {Ward Beullens and
                  Bart Preneel and
                  Alan Szepieniec},
  editor       = {Carlos Cid and
                  Michael J. Jacobson Jr.},
  title        = {Public Key Compression for Constrained Linear Signature Schemes},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2018 - 25th International Conference,
                  Calgary, AB, Canada, August 15-17, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11349},
  pages        = {300--321},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-10970-7\_14},
  doi          = {10.1007/978-3-030-10970-7\_14},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/BeullensPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2018,
  editor       = {Bart Preneel and
                  Frederik Vercauteren},
  title        = {Applied Cryptography and Network Security - 16th International Conference,
                  {ACNS} 2018, Leuven, Belgium, July 2-4, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10892},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93387-0},
  doi          = {10.1007/978-3-319-93387-0},
  isbn         = {978-3-319-93386-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1806-02059,
  author       = {Anastasiya Gorodilova and
                  Sergey Agievich and
                  Claude Carlet and
                  Evgeny Gorkunov and
                  Valeriya Idrisova and
                  Nikolay Kolomeec and
                  Alexandr Kutsenko and
                  Svetla Nikova and
                  Alexey Oblaukhov and
                  Stjepan Picek and
                  Bart Preneel and
                  Vincent Rijmen and
                  Natalia N. Tokareva},
  title        = {Problems and solutions of the Fourth International Students' Olympiad
                  in Cryptography {NSUCRYPTO}},
  journal      = {CoRR},
  volume       = {abs/1806.02059},
  year         = {2018},
  url          = {http://arxiv.org/abs/1806.02059},
  eprinttype    = {arXiv},
  eprint       = {1806.02059},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1806-02059.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuykxP18,
  author       = {Atul Luykx and
                  Bart Preneel},
  title        = {Optimal Forgeries Against Polynomial-Based MACs and {GCM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {166},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/166},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuykxP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SymeonidisBSPSP18,
  author       = {Iraklis Symeonidis and
                  Gergely Bicz{\'{o}}k and
                  Fatemeh Shirazi and
                  Cristina P{\'{e}}rez{-}Sol{\`{a}} and
                  Jessica Schroers and
                  Bart Preneel},
  title        = {Collateral Damage of Facebook Applications: a Comprehensive Study},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {285},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/285},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SymeonidisBSPSP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeullensPS18,
  author       = {Ward Beullens and
                  Bart Preneel and
                  Alan Szepieniec},
  title        = {Public Key Compression for Constrained Linear Signature Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {670},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/670},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeullensPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SzepieniecRP18,
  author       = {Alan Szepieniec and
                  Reza Reyhanitabar and
                  Bart Preneel},
  title        = {Key Encapsulation from Noisy Key Agreement in the Quantum Random Oracle
                  Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {884},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/884},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SzepieniecRP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/NoormanBMPMPVGM17,
  author       = {Job Noorman and
                  Jo Van Bulck and
                  Jan Tobias M{\"{u}}hlberg and
                  Frank Piessens and
                  Pieter Maene and
                  Bart Preneel and
                  Ingrid Verbauwhede and
                  Johannes G{\"{o}}tzfried and
                  Tilo M{\"{u}}ller and
                  Felix C. Freiling},
  title        = {Sancus 2.0: {A} Low-Cost Security Architecture for IoT Devices},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {20},
  number       = {3},
  pages        = {7:1--7:33},
  year         = {2017},
  url          = {https://doi.org/10.1145/3079763},
  doi          = {10.1145/3079763},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/NoormanBMPMPVGM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/Naya-PlasenciaP17,
  author       = {Mar{\'{\i}}a Naya{-}Plasencia and
                  Bart Preneel},
  title        = {Preface},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {1},
  pages        = {1--3},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i1.1-3},
  doi          = {10.13154/TOSC.V2017.I1.1-3},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/Naya-PlasenciaP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ChenLMP17,
  author       = {Yu Long Chen and
                  Atul Luykx and
                  Bart Mennink and
                  Bart Preneel},
  title        = {Efficient Length Doubling From Tweakable Block Ciphers},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {3},
  pages        = {253--270},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i3.253-270},
  doi          = {10.13154/TOSC.V2017.I3.253-270},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/ChenLMP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/AshurDLMMNRRS0P17,
  author       = {Tomer Ashur and
                  Jeroen Delvaux and
                  Sanghan Lee and
                  Pieter Maene and
                  Eduard Marin and
                  Svetla Nikova and
                  Oscar Reparaz and
                  Vladimir Rozic and
                  Dave Singel{\'{e}}e and
                  Bohan Yang and
                  Bart Preneel},
  editor       = {Srdjan Capkun and
                  Sherman S. M. Chow},
  title        = {A Privacy-Preserving Device Tracking System Using a Low-Power Wide-Area
                  Network},
  booktitle    = {Cryptology and Network Security - 16th International Conference, {CANS}
                  2017, Hong Kong, China, November 30 - December 2, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11261},
  pages        = {347--369},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-030-02641-7\_16},
  doi          = {10.1007/978-3-030-02641-7\_16},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/AshurDLMMNRRS0P17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ClercqKMPSV17,
  author       = {Ruan de Clercq and
                  Ronald De Keulenaer and
                  Pieter Maene and
                  Bart Preneel and
                  Bjorn De Sutter and
                  Ingrid Verbauwhede},
  editor       = {Ramesh Karri and
                  Ozgur Sinanoglu and
                  Ahmad{-}Reza Sadeghi and
                  Xun Yi},
  title        = {{SCM:} Secure Code Memory Architecture},
  booktitle    = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
                  2017},
  pages        = {771--776},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3052973.3053044},
  doi          = {10.1145/3052973.3053044},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ClercqKMPSV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/conext/ZhangP17,
  author       = {Ren Zhang and
                  Bart Preneel},
  title        = {On the Necessity of a Prescribed Block Validity Consensus: Analyzing
                  Bitcoin Unlimited Mining Protocol},
  booktitle    = {Proceedings of the 13th International Conference on emerging Networking
                  EXperiments and Technologies, CoNEXT 2017, Incheon, Republic of Korea,
                  December 12 - 15, 2017},
  pages        = {108--119},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3143361.3143389},
  doi          = {10.1145/3143361.3143389},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/conext/ZhangP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/ZhangP17,
  author       = {Ren Zhang and
                  Bart Preneel},
  editor       = {Helena Handschuh},
  title        = {Publish or Perish: {A} Backward-Compatible Defense Against Selfish
                  Mining in Bitcoin},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2017 - The Cryptographers' Track at
                  the {RSA} Conference 2017, San Francisco, CA, USA, February 14-17,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10159},
  pages        = {277--292},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-52153-4\_16},
  doi          = {10.1007/978-3-319-52153-4\_16},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/ZhangP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/SymeonidisAMMDP17,
  author       = {Iraklis Symeonidis and
                  Abdelrahaman Aly and
                  Mustafa A. Mustafa and
                  Bart Mennink and
                  Siemen Dhooghe and
                  Bart Preneel},
  editor       = {Simon N. Foley and
                  Dieter Gollmann and
                  Einar Snekkenes},
  title        = {SePCAR: {A} Secure and Privacy-Enhancing Protocol for Car Access Provision},
  booktitle    = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research
                  in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10493},
  pages        = {475--493},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66399-9\_26},
  doi          = {10.1007/978-3-319-66399-9\_26},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/SymeonidisAMMDP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/EtemadBKP17,
  author       = {Mohammad Etemad and
                  Filipe Beato and
                  Alptekin K{\"{u}}p{\c{c}}{\"{u}} and
                  Bart Preneel},
  title        = {Are You Really My Friend? Efficient and Secure Friend-Matching in
                  Mobile Social Networks},
  booktitle    = {2017 {IEEE} European Symposium on Security and Privacy Workshops,
                  EuroS{\&}P Workshops 2017, Paris, France, April 26-28, 2017},
  pages        = {122--131},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/EuroSPW.2017.61},
  doi          = {10.1109/EUROSPW.2017.61},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/EtemadBKP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Preneel17,
  author       = {Bart Preneel},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {The Future of Information Security},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {9},
  publisher    = {SciTePress},
  year         = {2017},
  timestamp    = {Thu, 18 May 2017 14:22:34 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Preneel17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/BeullensP17,
  author       = {Ward Beullens and
                  Bart Preneel},
  editor       = {Arpita Patra and
                  Nigel P. Smart},
  title        = {Field Lifting for Smaller {UOV} Public Keys},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2017 - 18th International Conference
                  on Cryptology in India, Chennai, India, December 10-13, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10698},
  pages        = {227--246},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-71667-1\_12},
  doi          = {10.1007/978-3-319-71667-1\_12},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/BeullensP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isvlsi/KimHPV17,
  author       = {Hyunmin Kim and
                  Seokhie Hong and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  title        = {{STBC:} Side Channel Attack Tolerant Balanced Circuit with Reduced
                  Propagation Delay},
  booktitle    = {2017 {IEEE} Computer Society Annual Symposium on VLSI, {ISVLSI} 2017,
                  Bochum, Germany, July 3-5, 2017},
  pages        = {74--79},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/ISVLSI.2017.22},
  doi          = {10.1109/ISVLSI.2017.22},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isvlsi/KimHPV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nutmic/SzepieniecP17,
  author       = {Alan Szepieniec and
                  Bart Preneel},
  editor       = {Jerzy Kaczorowski and
                  Josef Pieprzyk and
                  Jacek Pomykala},
  title        = {Short Solutions to Nonlinear Systems of Equations},
  booktitle    = {Number-Theoretic Methods in Cryptology - First International Conference,
                  NuTMiC 2017, Warsaw, Poland, September 11-13, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10737},
  pages        = {71--90},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-76620-1\_5},
  doi          = {10.1007/978-3-319-76620-1\_5},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nutmic/SzepieniecP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/SzepieniecBP17,
  author       = {Alan Szepieniec and
                  Ward Beullens and
                  Bart Preneel},
  editor       = {Tanja Lange and
                  Tsuyoshi Takagi},
  title        = {{MQ} Signatures for {PKI}},
  booktitle    = {Post-Quantum Cryptography - 8th International Workshop, PQCrypto 2017,
                  Utrecht, The Netherlands, June 26-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10346},
  pages        = {224--240},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59879-6\_13},
  doi          = {10.1007/978-3-319-59879-6\_13},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/SzepieniecBP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/RobynsMLQSP17,
  author       = {Pieter Robyns and
                  Eduard Marin and
                  Wim Lamotte and
                  Peter Quax and
                  Dave Singel{\'{e}}e and
                  Bart Preneel},
  editor       = {Guevara Noubir and
                  Mauro Conti and
                  Sneha Kumar Kasera},
  title        = {Physical-layer fingerprinting of LoRa devices using supervised and
                  zero-shot learning},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20,
                  2017},
  pages        = {58--63},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098243.3098267},
  doi          = {10.1145/3098243.3098267},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/RobynsMLQSP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2016,
  editor       = {Jens Grossklags and
                  Bart Preneel},
  title        = {Financial Cryptography and Data Security - 20th International Conference,
                  {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9603},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54970-4},
  doi          = {10.1007/978-3-662-54970-4},
  isbn         = {978-3-662-54969-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SymeonidisAMP17,
  author       = {Iraklis Symeonidis and
                  Abdelrahaman Aly and
                  Mustafa A. Mustafa and
                  Bart Preneel},
  title        = {PePTCAP: {A} Privacy-enhancing Protocol for(Temporary) Car Access
                  Provision},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {39},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/039},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SymeonidisAMP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SzepieniecBP17,
  author       = {Alan Szepieniec and
                  Ward Beullens and
                  Bart Preneel},
  title        = {{MQ} Signatures for {PKI}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {327},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/327},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SzepieniecBP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangP17,
  author       = {Ren Zhang and
                  Bart Preneel},
  title        = {On the Necessity of a Prescribed Block Validity Consensus: Analyzing
                  Bitcoin Unlimited Mining Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {686},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/686},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeullensP17,
  author       = {Ward Beullens and
                  Bart Preneel},
  title        = {Field lifting for smaller {UOV} public keys},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {776},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/776},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeullensP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenLMP17,
  author       = {Yu Long Chen and
                  Atul Luykx and
                  Bart Mennink and
                  Bart Preneel},
  title        = {Efficient Length Doubling From Tweakable Block Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {841},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/841},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenLMP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SzepieniecP17,
  author       = {Alan Szepieniec and
                  Bart Preneel},
  title        = {Short Solutions to Nonlinear Systems of Equations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1175},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1175},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SzepieniecP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/BeatoMP16,
  author       = {Filipe Beato and
                  Stijn Meul and
                  Bart Preneel},
  title        = {Practical identity-based private sharing for online social networks},
  journal      = {Comput. Commun.},
  volume       = {73},
  pages        = {243--250},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.comcom.2015.07.009},
  doi          = {10.1016/J.COMCOM.2015.07.009},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/BeatoMP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/MenninkP16,
  author       = {Bart Mennink and
                  Bart Preneel},
  title        = {Efficient parallelizable hashing using small non-compressing primitives},
  journal      = {Int. J. Inf. Sec.},
  volume       = {15},
  number       = {3},
  pages        = {285--300},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10207-015-0288-7},
  doi          = {10.1007/S10207-015-0288-7},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/MenninkP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/OttoyHPSG16,
  author       = {Geoffrey Ottoy and
                  Tom Hamelinckx and
                  Bart Preneel and
                  Lieven De Strycker and
                  Jean{-}Pierre Goemaere},
  title        = {On the choice of the appropriate {AES} data encryption method for
                  ZigBee nodes},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {2},
  pages        = {87--93},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.267},
  doi          = {10.1002/SEC.267},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/OttoyHPSG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MarinSGCWP16,
  author       = {Eduard Marin and
                  Dave Singel{\'{e}}e and
                  Flavio D. Garcia and
                  Tom Chothia and
                  Rik Willems and
                  Bart Preneel},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {On the (in)security of the latest generation implantable cardiac defibrillators
                  and how to secure them},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {226--236},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991094},
  timestamp    = {Tue, 06 Nov 2018 16:59:24 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MarinSGCWP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/adhoc-now/MarinMSP16,
  author       = {Eduard Marin and
                  Mustafa A. Mustafa and
                  Dave Singel{\'{e}}e and
                  Bart Preneel},
  editor       = {Nathalie Mitton and
                  Valeria Loscr{\`{\i}} and
                  Alexandre Mouradian},
  title        = {A Privacy-Preserving Remote Healthcare System Offering End-to-End
                  Security},
  booktitle    = {Ad-hoc, Mobile, and Wireless Networks - 15th International Conference,
                  {ADHOC-NOW} 2016, Lille, France, July 4-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9724},
  pages        = {237--250},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40509-4\_17},
  doi          = {10.1007/978-3-319-40509-4\_17},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/adhoc-now/MarinMSP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/AbidinAP16,
  author       = {Aysajan Abidin and
                  Enrique Argones{-}R{\'{u}}a and
                  Bart Preneel},
  editor       = {Sara Foresti and
                  Giuseppe Persiano},
  title        = {An Efficient Entity Authentication Protocol with Enhanced Security
                  and Privacy Properties},
  booktitle    = {Cryptology and Network Security - 15th International Conference, {CANS}
                  2016, Milan, Italy, November 14-16, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10052},
  pages        = {335--349},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-48965-0\_20},
  doi          = {10.1007/978-3-319-48965-0\_20},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/AbidinAP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/ToliAP16,
  author       = {Christina{-}Angeliki Toli and
                  Abdelrahaman Aly and
                  Bart Preneel},
  editor       = {Sara Foresti and
                  Giuseppe Persiano},
  title        = {A Privacy-Preserving Model for Biometric Fusion},
  booktitle    = {Cryptology and Network Security - 15th International Conference, {CANS}
                  2016, Milan, Italy, November 14-16, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10052},
  pages        = {743--748},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-48965-0\_54},
  doi          = {10.1007/978-3-319-48965-0\_54},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/ToliAP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/MarinS0VP16,
  author       = {Eduard Marin and
                  Dave Singel{\'{e}}e and
                  Bohan Yang and
                  Ingrid Verbauwhede and
                  Bart Preneel},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Alexander Pretschner},
  title        = {On the Feasibility of Cryptography for a Wireless Insulin Pump System},
  booktitle    = {Proceedings of the Sixth {ACM} on Conference on Data and Application
                  Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
                  9-11, 2016},
  pages        = {113--120},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2857705.2857746},
  doi          = {10.1145/2857705.2857746},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/MarinS0VP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/ClercqKC0MBPSV16,
  author       = {Ruan de Clercq and
                  Ronald De Keulenaer and
                  Bart Coppens and
                  Bohan Yang and
                  Pieter Maene and
                  Koen De Bosschere and
                  Bart Preneel and
                  Bjorn De Sutter and
                  Ingrid Verbauwhede},
  editor       = {Luca Fanucci and
                  J{\"{u}}rgen Teich},
  title        = {{SOFIA:} Software and control flow integrity architecture},
  booktitle    = {2016 Design, Automation {\&} Test in Europe Conference {\&}
                  Exhibition, {DATE} 2016, Dresden, Germany, March 14-18, 2016},
  pages        = {1172--1177},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://ieeexplore.ieee.org/document/7459489/},
  timestamp    = {Mon, 07 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/date/ClercqKC0MBPSV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/LuykxPSY16,
  author       = {Atul Luykx and
                  Bart Preneel and
                  Alan Szepieniec and
                  Kan Yasuda},
  editor       = {Marc Fischlin and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {On the Influence of Message Length in PMAC's Security Bounds},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9665},
  pages        = {596--621},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49890-3\_23},
  doi          = {10.1007/978-3-662-49890-3\_23},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/LuykxPSY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/LuykxPTY16,
  author       = {Atul Luykx and
                  Bart Preneel and
                  Elmar Tischhauser and
                  Kan Yasuda},
  editor       = {Thomas Peyrin},
  title        = {A {MAC} Mode for Lightweight Block Ciphers},
  booktitle    = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
                  Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9783},
  pages        = {43--59},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-52993-5\_3},
  doi          = {10.1007/978-3-662-52993-5\_3},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/LuykxPTY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hase/CleemputMP16,
  author       = {Sara Cleemput and
                  Mustafa A. Mustafa and
                  Bart Preneel},
  editor       = {Radu F. Babiceanu and
                  H{\'{e}}l{\`{e}}ne Waeselynck and
                  Raymond A. Paul and
                  Bojan Cukic and
                  Jie Xu},
  title        = {High Assurance Smart Metering},
  booktitle    = {17th {IEEE} International Symposium on High Assurance Systems Engineering,
                  {HASE} 2016, Orlando, FL, USA, January 7-9, 2016},
  pages        = {294--297},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/HASE.2016.41},
  doi          = {10.1109/HASE.2016.41},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hase/CleemputMP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/SymeonidisTP16,
  author       = {Iraklis Symeonidis and
                  Pagona Tsormpatzoudi and
                  Bart Preneel},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Collateral Damage of Online Social Network Applications},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {536--541},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005806705360541},
  doi          = {10.5220/0005806705360541},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/SymeonidisTP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iit/Preneel16,
  author       = {Bart Preneel},
  title        = {Keynote speakers: The future of information security},
  booktitle    = {2016 12th International Conference on Innovations in Information Technology
                  (IIT), Al-Ain, United Arab Emirates, November 28-30, 2016},
  pages        = {xiv--xx},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/INNOVATIONS.2016.7879991},
  doi          = {10.1109/INNOVATIONS.2016.7879991},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iit/Preneel16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iolts/KimHPV16,
  author       = {Hyunmin Kim and
                  Seokhie Hong and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  title        = {Binary decision diagram to design balanced secure logic styles},
  booktitle    = {22nd {IEEE} International Symposium on On-Line Testing and Robust
                  System Design, {IOLTS} 2016, Sant Feliu de Guixols, Spain, July 4-6,
                  2016},
  pages        = {239--244},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/IOLTS.2016.7604710},
  doi          = {10.1109/IOLTS.2016.7604710},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iolts/KimHPV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isc2/SymeonidisMP16,
  author       = {Iraklis Symeonidis and
                  Mustafa A. Mustafa and
                  Bart Preneel},
  title        = {Keyless car sharing system: {A} security and privacy analysis},
  booktitle    = {{IEEE} International Smart Cities Conference, {ISC2} 2016, Trento,
                  Italy, September 12-15, 2016},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISC2.2016.7580758},
  doi          = {10.1109/ISC2.2016.7580758},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/isc2/SymeonidisMP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/SzepieniecDP16,
  author       = {Alan Szepieniec and
                  Jintai Ding and
                  Bart Preneel},
  editor       = {Tsuyoshi Takagi},
  title        = {Extension Field Cancellation: {A} New Central Trapdoor for Multivariate
                  Quadratic Systems},
  booktitle    = {Post-Quantum Cryptography - 7th International Workshop, PQCrypto 2016,
                  Fukuoka, Japan, February 24-26, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9606},
  pages        = {182--196},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-29360-8\_12},
  doi          = {10.1007/978-3-319-29360-8\_12},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/SzepieniecDP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/AbidinMSP16,
  author       = {Aysajan Abidin and
                  Eduard Marin and
                  Dave Singel{\'{e}}e and
                  Bart Preneel},
  editor       = {Gerhard P. Hancke and
                  Konstantinos Markantonakis},
  title        = {Towards Quantum Distance Bounding Protocols},
  booktitle    = {Radio Frequency Identification and IoT Security - 12th International
                  Workshop, RFIDSec 2016, Hong Kong, China, November 30 - December 2,
                  2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10155},
  pages        = {151--162},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62024-4\_11},
  doi          = {10.1007/978-3-319-62024-4\_11},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rfidsec/AbidinMSP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/SymeonidisSBPP16,
  author       = {Iraklis Symeonidis and
                  Fatemeh Shirazi and
                  Gergely Bicz{\'{o}}k and
                  Cristina P{\'{e}}rez{-}Sol{\`{a}} and
                  Bart Preneel},
  editor       = {Jaap{-}Henk Hoepman and
                  Stefan Katzenbeisser},
  title        = {Collateral Damage of Facebook Apps: Friends, Providers, and Privacy
                  Interdependence},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 31st {IFIP} {TC} 11
                  International Conference, {SEC} 2016, Ghent, Belgium, May 30 - June
                  1, 2016, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {471},
  pages        = {194--208},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-33630-5\_14},
  doi          = {10.1007/978-3-319-33630-5\_14},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/SymeonidisSBPP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/RazaviGBPGB16,
  author       = {Kaveh Razavi and
                  Ben Gras and
                  Erik Bosman and
                  Bart Preneel and
                  Cristiano Giuffrida and
                  Herbert Bos},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Flip Feng Shui: Hammering a Needle in the Software Stack},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {1--18},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/razavi},
  timestamp    = {Mon, 01 Feb 2021 08:43:18 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/RazaviGBPGB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/MuhlbergCMBPP16,
  author       = {Jan Tobias M{\"{u}}hlberg and
                  Sara Cleemput and
                  Mustafa A. Mustafa and
                  Jo Van Bulck and
                  Bart Preneel and
                  Frank Piessens},
  editor       = {Sara Foresti and
                  Javier L{\'{o}}pez},
  title        = {An Implementation of a High Assurance Smart Meter Using Protected
                  Module Architectures},
  booktitle    = {Information Security Theory and Practice - 10th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2016, Heraklion, Crete, Greece, September 26-27,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9895},
  pages        = {53--69},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45931-8\_4},
  doi          = {10.1007/978-3-319-45931-8\_4},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/MuhlbergCMBPP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/ArmknechtINP16,
  author       = {Frederik Armknecht and
                  Tetsu Iwata and
                  Kaisa Nyberg and
                  Bart Preneel},
  title        = {Symmetric Cryptography (Dagstuhl Seminar 16021)},
  journal      = {Dagstuhl Reports},
  volume       = {6},
  number       = {1},
  pages        = {34--54},
  year         = {2016},
  url          = {https://doi.org/10.4230/DagRep.6.1.34},
  doi          = {10.4230/DAGREP.6.1.34},
  timestamp    = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/ArmknechtINP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/Danezis0PP16,
  author       = {George Danezis and
                  Stefan Katzenbeisser and
                  Christiane Peters and
                  Bart Preneel},
  title        = {Privacy and Security in Smart Energy Grids (Dagstuhl Seminar 16032)},
  journal      = {Dagstuhl Reports},
  volume       = {6},
  number       = {1},
  pages        = {99--107},
  year         = {2016},
  url          = {https://doi.org/10.4230/DagRep.6.1.99},
  doi          = {10.4230/DAGREP.6.1.99},
  timestamp    = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/Danezis0PP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SymeonidsP16,
  author       = {Iraklis Symeonidis and
                  Bart Preneel},
  title        = {Collateral Damage in Online Social Networks: computing the significance
                  of information collection},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {38},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/038},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SymeonidsP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuykxPSY16,
  author       = {Atul Luykx and
                  Bart Preneel and
                  Alan Szepieniec and
                  Kan Yasuda},
  title        = {On the Influence of Message Length in PMAC's Security Bounds},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {185},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/185},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuykxPSY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuykxPTY16,
  author       = {Atul Luykx and
                  Bart Preneel and
                  Elmar Tischhauser and
                  Kan Yasuda},
  title        = {A {MAC} Mode for Lightweight Block Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {190},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/190},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuykxPTY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MarinASP16,
  author       = {Eduard Marin and
                  Enrique Argones{-}R{\'{u}}a and
                  Dave Singel{\'{e}}e and
                  Bart Preneel},
  title        = {A survey on physiological-signal-based security for medical devices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {867},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/867},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MarinASP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-manifestos/PreneelRRR15,
  author       = {Bart Preneel and
                  Phillip Rogaway and
                  Mark Dermot Ryan and
                  Peter Y. A. Ryan},
  title        = {Privacy and Security in an Age of Surveillance (Dagstuhl Perspectives
                  Workshop 14401)},
  journal      = {Dagstuhl Manifestos},
  volume       = {5},
  number       = {1},
  pages        = {25--37},
  year         = {2015},
  url          = {https://doi.org/10.4230/DagMan.5.1.25},
  doi          = {10.4230/DAGMAN.5.1.25},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-manifestos/PreneelRRR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AndreevaMP15,
  author       = {Elena Andreeva and
                  Bart Mennink and
                  Bart Preneel},
  title        = {Open problems in hash function security},
  journal      = {Des. Codes Cryptogr.},
  volume       = {77},
  number       = {2-3},
  pages        = {611--631},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10623-015-0096-0},
  doi          = {10.1007/S10623-015-0096-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AndreevaMP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/LuykxMPW15,
  author       = {Atul Luykx and
                  Bart Mennink and
                  Bart Preneel and
                  Laura Winnen},
  title        = {Two-permutation-based hashing with binary mixing},
  journal      = {J. Math. Cryptol.},
  volume       = {9},
  number       = {3},
  pages        = {139--150},
  year         = {2015},
  url          = {http://www.degruyter.com/view/j/jmc.2015.9.issue-3/jmc-2015-0015/jmc-2015-0015.xml},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/LuykxMPW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tecs/ScheirBRPV15,
  author       = {Marijn Scheir and
                  Josep Balasch and
                  Alfredo Rial and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  title        = {Anonymous Split E-Cash - Toward Mobile Anonymous Payments},
  journal      = {{ACM} Trans. Embed. Comput. Syst.},
  volume       = {14},
  number       = {4},
  pages        = {85:1--85:25},
  year         = {2015},
  url          = {https://doi.org/10.1145/2783439},
  doi          = {10.1145/2783439},
  timestamp    = {Tue, 08 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tecs/ScheirBRPV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/MenninkP15,
  author       = {Bart Mennink and
                  Bart Preneel},
  editor       = {Tal Malkin and
                  Vladimir Kolesnikov and
                  Allison Bishop Lewko and
                  Michalis Polychronakis},
  title        = {On the {XOR} of Multiple Random Permutations},
  booktitle    = {Applied Cryptography and Network Security - 13th International Conference,
                  {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9092},
  pages        = {619--634},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28166-7\_30},
  doi          = {10.1007/978-3-319-28166-7\_30},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/MenninkP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/MenninkP15,
  author       = {Bart Mennink and
                  Bart Preneel},
  editor       = {Tetsu Iwata and
                  Jung Hee Cheon},
  title        = {On the Impact of Known-Key Attacks on Hash Functions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9453},
  pages        = {59--84},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48800-3\_3},
  doi          = {10.1007/978-3-662-48800-3\_3},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/MenninkP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/Preneel15,
  author       = {Bart Preneel},
  editor       = {Paolo Falcarin and
                  Brecht Wyseur},
  title        = {Software Security: Squaring the Circle?},
  booktitle    = {1st {IEEE/ACM} International Workshop on Software Protection, {SPRO}
                  2015, Florence, Italy, May 19, 2015},
  pages        = {1},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SPRO.2015.8},
  doi          = {10.1109/SPRO.2015.8},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/Preneel15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/Preneel15a,
  author       = {Bart Preneel},
  editor       = {Ilaria Matteucci and
                  Paolo Mori and
                  Marinella Petrocchi},
  title        = {Cryptography and Information Security in the Post-Snowden Era},
  booktitle    = {1st {IEEE/ACM} International Workshop on TEchnical and LEgal aspects
                  of data pRIvacy and SEcurity, {TELERISE} 2015, Florence, Italy, May
                  18, 2015},
  pages        = {1},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/TELERISE.2015.8},
  doi          = {10.1109/TELERISE.2015.8},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/Preneel15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/Preneel15,
  author       = {Bart Preneel},
  editor       = {Edgar R. Weippl and
                  Florian Kerschbaum and
                  Adam J. Lee},
  title        = {Post-Snowden Threat Models},
  booktitle    = {Proceedings of the 20th {ACM} Symposium on Access Control Models and
                  Technologies, Vienna, Austria, June 1-3, 2015},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2752952.2752978},
  doi          = {10.1145/2752952.2752978},
  timestamp    = {Mon, 26 Jun 2023 20:45:28 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/Preneel15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/SchroeM0P15,
  author       = {Willem Schro{\'{e}} and
                  Bart Mennink and
                  Elena Andreeva and
                  Bart Preneel},
  editor       = {Orr Dunkelman and
                  Liam Keliher},
  title        = {Forgery and Subkey Recovery on {CAESAR} Candidate iFeed},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2015 - 22nd International Conference,
                  Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9566},
  pages        = {197--204},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31301-6\_11},
  doi          = {10.1007/978-3-319-31301-6\_11},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/SchroeM0P15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/worldcis/ToliP15,
  author       = {Christina{-}Angeliki Toli and
                  Bart Preneel},
  title        = {Provoking security: Spoofing attacks against crypto-biometric systems},
  booktitle    = {2015 World Congress on Internet Security, WorldCIS 2015, Dublin, Ireland,
                  October 19-21, 2015},
  pages        = {67--72},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WorldCIS.2015.7359416},
  doi          = {10.1109/WORLDCIS.2015.7359416},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/worldcis/ToliP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/balkancryptsec/2014,
  editor       = {Berna {\"{O}}rs and
                  Bart Preneel},
  title        = {Cryptography and Information Security in the Balkans - First International
                  Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17,
                  2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9024},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-21356-9},
  doi          = {10.1007/978-3-319-21356-9},
  isbn         = {978-3-319-21355-2},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/balkancryptsec/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SymeonidsBTP15,
  author       = {Iraklis Symeonidis and
                  Filipe Beato and
                  Pagona Tsormpatzoudi and
                  Bart Preneel},
  title        = {Collateral damage of Facebook Apps: an enhanced privacy scoring model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {456},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/456},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SymeonidsBTP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgievichGKNPRST15,
  author       = {Sergey Agievich and
                  Anastasiya Gorodilova and
                  Nikolay Kolomeec and
                  Svetla Nikova and
                  Bart Preneel and
                  Vincent Rijmen and
                  George Shushuev and
                  Natalia N. Tokareva and
                  Valeriya Vitkup},
  title        = {Problems, solutions and experience of the first international student's
                  Olympiad in cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {534},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/534},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgievichGKNPRST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SzepieniecP15,
  author       = {Alan Szepieniec and
                  Bart Preneel},
  title        = {New Techniques for Electronic Voting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {809},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/809},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SzepieniecP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MenninkP15,
  author       = {Bart Mennink and
                  Bart Preneel},
  title        = {On the Impact of Known-Key Attacks on Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {909},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/909},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MenninkP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SzepieniecDP15,
  author       = {Alan Szepieniec and
                  Jintai Ding and
                  Bart Preneel},
  title        = {Extension Field Cancellation: a New Central Trapdoor for Multivariate
                  Quadratic Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1184},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1184},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SzepieniecDP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Preneel14,
  author       = {Bart Preneel},
  title        = {Attacking a problem from the middle: technical perspective},
  journal      = {Commun. {ACM}},
  volume       = {57},
  number       = {10},
  pages        = {97},
  year         = {2014},
  url          = {https://doi.org/10.1145/2661432},
  doi          = {10.1145/2661432},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cacm/Preneel14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/IdeguchiTP14,
  author       = {Kota Ideguchi and
                  Elmar Tischhauser and
                  Bart Preneel},
  title        = {Internal differential collision attacks on the reduced-round Gr{\o}stl-0
                  hash function},
  journal      = {Des. Codes Cryptogr.},
  volume       = {70},
  number       = {3},
  pages        = {251--271},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-012-9674-6},
  doi          = {10.1007/S10623-012-9674-6},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/IdeguchiTP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/MavrogiannopoulosPP14,
  author       = {Nikos Mavrogiannopoulos and
                  Andreas Pashalidis and
                  Bart Preneel},
  title        = {Toward a secure Kerberos key exchange with smart cards},
  journal      = {Int. J. Inf. Sec.},
  volume       = {13},
  number       = {3},
  pages        = {217--228},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10207-013-0213-x},
  doi          = {10.1007/S10207-013-0213-X},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/MavrogiannopoulosPP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/HermansPP14,
  author       = {Jens Hermans and
                  Roel Peeters and
                  Bart Preneel},
  title        = {Proper {RFID} Privacy: Model and Protocols},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {13},
  number       = {12},
  pages        = {2888--2902},
  year         = {2014},
  url          = {https://doi.org/10.1109/TMC.2014.2314127},
  doi          = {10.1109/TMC.2014.2314127},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmc/HermansPP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/MenninkP14,
  author       = {Bart Mennink and
                  Bart Preneel},
  editor       = {Dimitris Gritzalis and
                  Aggelos Kiayias and
                  Ioannis G. Askoxylakis},
  title        = {Breaking and Fixing Cryptophia's Short Combiner},
  booktitle    = {Cryptology and Network Security - 13th International Conference, {CANS}
                  2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8813},
  pages        = {50--63},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12280-9\_4},
  doi          = {10.1007/978-3-319-12280-9\_4},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/MenninkP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BeatoCPV14,
  author       = {Filipe Beato and
                  Mauro Conti and
                  Bart Preneel and
                  Dario Vettore},
  title        = {VirtualFriendship: Hiding interactions on Online Social Networks},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {328--336},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997501},
  doi          = {10.1109/CNS.2014.6997501},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/BeatoCPV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/p2p/HerrmannZNDP14,
  author       = {Michael Herrmann and
                  Ren Zhang and
                  Kai{-}Chun Ning and
                  Claudia D{\'{\i}}az and
                  Bart Preneel},
  title        = {Censorship-resistant and privacy-preserving distributed web search},
  booktitle    = {14th {IEEE} International Conference on Peer-to-Peer Computing, {P2P}
                  2014, London, United Kingdom, September 9-11, 2014, Proceedings},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/P2P.2014.6934312},
  doi          = {10.1109/P2P.2014.6934312},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/p2p/HerrmannZNDP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/primelife/ToliP14,
  author       = {Christina{-}Angeliki Toli and
                  Bart Preneel},
  editor       = {Jan Camenisch and
                  Simone Fischer{-}H{\"{u}}bner and
                  Marit Hansen},
  title        = {A Survey on Multimodal Biometrics and the Protection of Their Templates},
  booktitle    = {Privacy and Identity Management for the Future Internet in the Age
                  of Globalisation - 9th {IFIP} {WG} 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG
                  9.2.2 International Summer School, Patras, Greece, September 7-12,
                  2014, Revised Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {457},
  pages        = {169--184},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-18621-4\_12},
  doi          = {10.1007/978-3-319-18621-4\_12},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/primelife/ToliP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/MouhaMHWPV14,
  author       = {Nicky Mouha and
                  Bart Mennink and
                  Anthony Van Herrewege and
                  Dai Watanabe and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  editor       = {Antoine Joux and
                  Amr M. Youssef},
  title        = {Chaskey: An Efficient {MAC} Algorithm for 32-bit Microcontrollers},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2014 - 21st International Conference,
                  Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8781},
  pages        = {306--323},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13051-4\_19},
  doi          = {10.1007/978-3-319-13051-4\_19},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/MouhaMHWPV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/HerrmannRDP14,
  author       = {Michael Herrmann and
                  Alfredo Rial and
                  Claudia D{\'{\i}}az and
                  Bart Preneel},
  editor       = {Gergely {\'{A}}cs and
                  Andrew P. Martin and
                  Ivan Martinovic and
                  Claude Castelluccia and
                  Patrick Traynor},
  title        = {Practical privacy-preserving location-sharing based services with
                  aggregate statistics},
  booktitle    = {7th {ACM} Conference on Security {\&} Privacy in Wireless and
                  Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014},
  pages        = {87--98},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2627393.2627414},
  doi          = {10.1145/2627393.2627414},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/HerrmannRDP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/apf/2012,
  editor       = {Bart Preneel and
                  Demosthenes Ikonomou},
  title        = {Privacy Technologies and Policy - First Annual Privacy Forum, {APF}
                  2012, Limassol, Cyprus, October 10-11, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8319},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54069-1},
  doi          = {10.1007/978-3-642-54069-1},
  isbn         = {978-3-642-54068-4},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/apf/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/apf/2014,
  editor       = {Bart Preneel and
                  Demosthenes Ikonomou},
  title        = {Privacy Technologies and Policy - Second Annual Privacy Forum, {APF}
                  2014, Athens, Greece, May 20-21, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8450},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06749-0},
  doi          = {10.1007/978-3-319-06749-0},
  isbn         = {978-3-319-06748-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/apf/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sofsem/2014,
  editor       = {Viliam Geffert and
                  Bart Preneel and
                  Branislav Rovan and
                  Julius Stuller and
                  A Min Tjoa},
  title        = {{SOFSEM} 2014: Theory and Practice of Computer Science - 40th International
                  Conference on Current Trends in Theory and Practice of Computer Science,
                  Nov{\'{y}} Smokovec, Slovakia, January 26-29, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8327},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-04298-5},
  doi          = {10.1007/978-3-319-04298-5},
  isbn         = {978-3-319-04297-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sofsem/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/ArmknechtHIP14,
  author       = {Frederik Armknecht and
                  Helena Handschuh and
                  Tetsu Iwata and
                  Bart Preneel},
  title        = {Symmetric Cryptography (Dagstuhl Seminar 14021)},
  journal      = {Dagstuhl Reports},
  volume       = {4},
  number       = {1},
  pages        = {1--16},
  year         = {2014},
  url          = {https://doi.org/10.4230/DagRep.4.1.1},
  doi          = {10.4230/DAGREP.4.1.1},
  timestamp    = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/ArmknechtHIP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/PreneelRRR14,
  author       = {Bart Preneel and
                  Phillip Rogaway and
                  Mark Dermot Ryan and
                  Peter Y. A. Ryan},
  title        = {Privacy and Security in an Age of Surveillance (Dagstuhl Perspectives
                  Workshop 14401)},
  journal      = {Dagstuhl Reports},
  volume       = {4},
  number       = {9},
  pages        = {106--123},
  year         = {2014},
  url          = {https://doi.org/10.4230/DagRep.4.9.106},
  doi          = {10.4230/DAGREP.4.9.106},
  timestamp    = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/PreneelRRR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MenninkP14,
  author       = {Bart Mennink and
                  Bart Preneel},
  title        = {Triple and Quadruple Encryption: Bridging the Gaps},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {16},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/016},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MenninkP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MouhaMHWPV14,
  author       = {Nicky Mouha and
                  Bart Mennink and
                  Anthony Van Herrewege and
                  Dai Watanabe and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  title        = {Chaskey: An Efficient {MAC} Algorithm for 32-bit Microcontrollers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {386},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/386},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MouhaMHWPV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cma/LopezNPPP13,
  author       = {Javier L{\'{o}}pez and
                  Svetla Nikova and
                  Andreas Pashalidis and
                  G{\"{u}}nther Pernul and
                  Bart Preneel},
  title        = {Preface},
  journal      = {Comput. Math. Appl.},
  volume       = {65},
  number       = {5},
  pages        = {747},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.camwa.2013.02.001},
  doi          = {10.1016/J.CAMWA.2013.02.001},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cma/LopezNPPP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spm/BohoWDCBSPW13,
  author       = {Andras Boho and
                  Glenn Van Wallendael and
                  Ann Dooms and
                  Jan De Cock and
                  Geert Braeckman and
                  Peter Schelkens and
                  Bart Preneel and
                  Rik Van de Walle},
  title        = {End-To-End Security for Video Distribution: The Combination of Encryption,
                  Watermarking, and Video Adaptation},
  journal      = {{IEEE} Signal Process. Mag.},
  volume       = {30},
  number       = {2},
  pages        = {97--107},
  year         = {2013},
  url          = {https://doi.org/10.1109/MSP.2012.2230220},
  doi          = {10.1109/MSP.2012.2230220},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spm/BohoWDCBSPW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/arc/OttoyPGS13,
  author       = {Geoffrey Ottoy and
                  Bart Preneel and
                  Jean{-}Pierre Goemaere and
                  Lieven De Strycker},
  editor       = {Philip Brisk and
                  Jos{\'{e}} Gabriel F. Coutinho and
                  Pedro C. Diniz},
  title        = {Flexible Design of a Modular Simultaneous Exponentiation Core for
                  Embedded Platforms},
  booktitle    = {Reconfigurable Computing: Architectures, Tools and Applications -
                  9th International Symposium, {ARC} 2013, Los Angeles, CA, USA, March
                  25-27, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7806},
  pages        = {115--121},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36812-7\_11},
  doi          = {10.1007/978-3-642-36812-7\_11},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/arc/OttoyPGS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AcarJNDGPP13,
  author       = {Gunes Acar and
                  Marc Juarez and
                  Nick Nikiforakis and
                  Claudia D{\'{\i}}az and
                  Seda F. G{\"{u}}rses and
                  Frank Piessens and
                  Bart Preneel},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {FPDetective: dusting the web for fingerprinters},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {1129--1140},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516674},
  doi          = {10.1145/2508859.2516674},
  timestamp    = {Wed, 06 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AcarJNDGPP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/OttoyLNPS13,
  author       = {Geoffrey Ottoy and
                  Jorn Lapon and
                  Vincent Naessens and
                  Bart Preneel and
                  Lieven De Strycker},
  editor       = {Bart De Decker and
                  Jana Dittmann and
                  Christian Kraetzer and
                  Claus Vielhauer},
  title        = {Dedicated Hardware for Attribute-Based Credential Verification},
  booktitle    = {Communications and Multimedia Security - 14th {IFIP} {TC} 6/TC 11
                  International Conference, {CMS} 2013, Magdeburg, Germany, September
                  25-26, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8099},
  pages        = {50--65},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40779-6\_4},
  doi          = {10.1007/978-3-642-40779-6\_4},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/OttoyLNPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/BeatoICPL13,
  author       = {Filipe Beato and
                  Iulia Ion and
                  Srdjan Capkun and
                  Bart Preneel and
                  Marc Langheinrich},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Lujo Bauer and
                  Jaehong Park},
  title        = {For some eyes only: protecting online information sharing},
  booktitle    = {Third {ACM} Conference on Data and Application Security and Privacy,
                  CODASPY'13, San Antonio, TX, USA, February 18-20, 2013},
  pages        = {1--12},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2435349.2435351},
  doi          = {10.1145/2435349.2435351},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/BeatoICPL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icip/WallendaelCLBLPW13,
  author       = {Glenn Van Wallendael and
                  Jan De Cock and
                  Sebastiaan Van Leuven and
                  Andras Boho and
                  Peter Lambert and
                  Bart Preneel and
                  Rik Van de Walle},
  title        = {Format-compliant encryption techniques for high efficiency video coding},
  booktitle    = {{IEEE} International Conference on Image Processing, {ICIP} 2013,
                  Melbourne, Australia, September 15-18, 2013},
  pages        = {4583--4587},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICIP.2013.6738944},
  doi          = {10.1109/ICIP.2013.6738944},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icip/WallendaelCLBLPW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/StrackxNVPP13,
  author       = {Raoul Strackx and
                  Job Noorman and
                  Ingrid Verbauwhede and
                  Bart Preneel and
                  Frank Piessens},
  editor       = {Helmut Reimer and
                  Norbert Pohlmann and
                  Wolfgang Schneider},
  title        = {Protected Software Module Architectures},
  booktitle    = {{ISSE} 2013 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2013 Conference, Brussels,
                  Belgium, October 22-23, 2013},
  pages        = {241--251},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-658-03371-2\_21},
  doi          = {10.1007/978-3-658-03371-2\_21},
  timestamp    = {Wed, 24 Apr 2019 16:36:13 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/StrackxNVPP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/BeatoCP13,
  author       = {Filipe Beato and
                  Mauro Conti and
                  Bart Preneel},
  title        = {Friend in the Middle (FiM): Tackling de-anonymization in social networks},
  booktitle    = {2013 {IEEE} International Conference on Pervasive Computing and Communications
                  Workshops, {PERCOM} 2013 Workshops, San Diego, CA, USA, March 18-22,
                  2013},
  pages        = {279--284},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/PerComW.2013.6529495},
  doi          = {10.1109/PERCOMW.2013.6529495},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/BeatoCP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/WuP13,
  author       = {Hongjun Wu and
                  Bart Preneel},
  editor       = {Tanja Lange and
                  Kristin E. Lauter and
                  Petr Lisonek},
  title        = {{AEGIS:} {A} Fast Authenticated Encryption Algorithm},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference,
                  Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8282},
  pages        = {185--201},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43414-7\_10},
  doi          = {10.1007/978-3-662-43414-7\_10},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/WuP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/LepointRMRP13,
  author       = {Tancr{\`{e}}de Lepoint and
                  Matthieu Rivain and
                  Yoni De Mulder and
                  Peter Roelse and
                  Bart Preneel},
  editor       = {Tanja Lange and
                  Kristin E. Lauter and
                  Petr Lisonek},
  title        = {Two Attacks on a White-Box {AES} Implementation},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference,
                  Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8282},
  pages        = {265--285},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43414-7\_14},
  doi          = {10.1007/978-3-662-43414-7\_14},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/LepointRMRP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/Preneel13,
  author       = {Bart Preneel},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {The Future of Information Security Research: Cryptology and Beyond},
  booktitle    = {Secure Data Management - 10th {VLDB} Workshop, {SDM} 2013, Trento,
                  Italy, August 30, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8425},
  pages        = {23--27},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-06811-4\_5},
  doi          = {10.1007/978-3-319-06811-4\_5},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/Preneel13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/Preneel13,
  author       = {Bart Preneel},
  editor       = {Atilla El{\c{c}}i and
                  Manoj Singh Gaur and
                  Mehmet A. Orgun and
                  Oleg B. Makarevich},
  title        = {The {SHA-3} competition: lessons learned},
  booktitle    = {The 6th International Conference on Security of Information and Networks,
                  {SIN} '13, Aksaray, Turkey, November 26-28, 2013},
  pages        = {16--19},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523514.2523592},
  doi          = {10.1145/2523514.2523592},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/Preneel13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/NoormanADSHHPVP13,
  author       = {Job Noorman and
                  Pieter Agten and
                  Wilfried Daniels and
                  Raoul Strackx and
                  Anthony Van Herrewege and
                  Christophe Huygens and
                  Bart Preneel and
                  Ingrid Verbauwhede and
                  Frank Piessens},
  editor       = {Samuel T. King},
  title        = {Sancus: Low-cost Trustworthy Extensible Networked Devices with a Zero-software
                  Trusted Computing Base},
  booktitle    = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC,
                  USA, August 14-16, 2013},
  pages        = {479--494},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/noorman},
  timestamp    = {Mon, 01 Feb 2021 08:42:56 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/NoormanADSHHPVP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/HerrmannTDP13,
  author       = {Michael Herrmann and
                  Carmela Troncoso and
                  Claudia D{\'{\i}}az and
                  Bart Preneel},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Sara Foresti},
  title        = {Optimal sporadic location privacy preserving systems in presence of
                  bandwidth constraints},
  booktitle    = {Proceedings of the 12th annual {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2013, Berlin, Germany, November 4, 2013},
  pages        = {167--178},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2517840.2517853},
  doi          = {10.1145/2517840.2517853},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wpes/HerrmannTDP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MouhaP13,
  author       = {Nicky Mouha and
                  Bart Preneel},
  title        = {A Proof that the {ARX} Cipher Salsa20 is Secure against Differential
                  Cryptanalysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {328},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/328},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MouhaP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MulderRP13,
  author       = {Yoni De Mulder and
                  Peter Roelse and
                  Bart Preneel},
  title        = {Revisiting the {BGE} Attack on a White-Box {AES} Implementation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {450},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/450},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MulderRP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WuP13,
  author       = {Hongjun Wu and
                  Bart Preneel},
  title        = {{AEGIS:} {A} Fast Authenticated Encryption Algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {695},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/695},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/WuP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/HiroseIKOPY12,
  author       = {Shoichi Hirose and
                  Kota Ideguchi and
                  Hidenori Kuwakado and
                  Toru Owada and
                  Bart Preneel and
                  Hirotaka Yoshida},
  title        = {An {AES} Based 256-bit Hash Function for Lightweight Applications:
                  Lesamnta-LW},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {95-A},
  number       = {1},
  pages        = {89--99},
  year         = {2012},
  url          = {https://doi.org/10.1587/transfun.E95.A.89},
  doi          = {10.1587/TRANSFUN.E95.A.89},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/HiroseIKOPY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/AndreevaBMPR12,
  author       = {Elena Andreeva and
                  Andrey Bogdanov and
                  Bart Mennink and
                  Bart Preneel and
                  Christian Rechberger},
  title        = {On security arguments of the second round {SHA-3} candidates},
  journal      = {Int. J. Inf. Sec.},
  volume       = {11},
  number       = {2},
  pages        = {103--120},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10207-012-0156-7},
  doi          = {10.1007/S10207-012-0156-7},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/AndreevaBMPR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/AndreevaMP12,
  author       = {Elena Andreeva and
                  Bart Mennink and
                  Bart Preneel},
  title        = {The parazoa family: generalizing the sponge hash functions},
  journal      = {Int. J. Inf. Sec.},
  volume       = {11},
  number       = {3},
  pages        = {149--165},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10207-012-0157-6},
  doi          = {10.1007/S10207-012-0157-6},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/AndreevaMP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/MouhaSP12,
  author       = {Nicky Mouha and
                  Gautham Sekar and
                  Bart Preneel},
  title        = {Challenging the increased resistance of regular hash functions against
                  birthday attacks},
  journal      = {J. Math. Cryptol.},
  volume       = {6},
  number       = {3-4},
  pages        = {229--248},
  year         = {2012},
  url          = {https://doi.org/10.1515/jmc-2011-0010},
  doi          = {10.1515/JMC-2011-0010},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/MouhaSP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/AertsBMMDIKPVV12,
  author       = {Wim Aerts and
                  Eli Biham and
                  Dieter De Moitie and
                  Elke De Mulder and
                  Orr Dunkelman and
                  Sebastiaan Indesteege and
                  Nathan Keller and
                  Bart Preneel and
                  Guy A. E. Vandenbosch and
                  Ingrid Verbauwhede},
  title        = {A Practical Attack on KeeLoq},
  journal      = {J. Cryptol.},
  volume       = {25},
  number       = {1},
  pages        = {136--157},
  year         = {2012},
  url          = {https://doi.org/10.1007/s00145-010-9091-9},
  doi          = {10.1007/S00145-010-9091-9},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/AertsBMMDIKPVV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mcm/PreneelKS12,
  author       = {Bart Preneel and
                  Jongsung Kim and
                  Damien Sauveron},
  title        = {Advanced theory and practice for cryptography and future security},
  journal      = {Math. Comput. Model.},
  volume       = {55},
  number       = {1-2},
  pages        = {1--2},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.mcm.2011.09.020},
  doi          = {10.1016/J.MCM.2011.09.020},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mcm/PreneelKS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pervasive/PeetersSP12,
  author       = {Roel Peeters and
                  Dave Singel{\'{e}}e and
                  Bart Preneel},
  title        = {Toward More Secure and Reliable Access Control},
  journal      = {{IEEE} Pervasive Comput.},
  volume       = {11},
  number       = {3},
  pages        = {76--83},
  year         = {2012},
  url          = {https://doi.org/10.1109/MPRV.2011.42},
  doi          = {10.1109/MPRV.2011.42},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pervasive/PeetersSP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/KimHPBDK12,
  author       = {Jongsung Kim and
                  Seokhie Hong and
                  Bart Preneel and
                  Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller},
  title        = {Related-Key Boomerang and Rectangle Attacks: Theory and Experimental
                  Analysis},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {58},
  number       = {7},
  pages        = {4948--4966},
  year         = {2012},
  url          = {https://doi.org/10.1109/TIT.2012.2191655},
  doi          = {10.1109/TIT.2012.2191655},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/KimHPBDK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/PashalidisP12,
  author       = {Andreas Pashalidis and
                  Bart Preneel},
  title        = {Evaluating Tag-Based Preference Obfuscation Systems},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {24},
  number       = {9},
  pages        = {1613--1623},
  year         = {2012},
  url          = {https://doi.org/10.1109/TKDE.2011.118},
  doi          = {10.1109/TKDE.2011.118},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/PashalidisP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/ChenWP12,
  author       = {Jiazhe Chen and
                  Meiqin Wang and
                  Bart Preneel},
  editor       = {Aikaterini Mitrokotsa and
                  Serge Vaudenay},
  title        = {Impossible Differential Cryptanalysis of the Lightweight Block Ciphers
                  TEA, {XTEA} and {HIGHT}},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2012 - 5th International Conference
                  on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7374},
  pages        = {117--137},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31410-0\_8},
  doi          = {10.1007/978-3-642-31410-0\_8},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/ChenWP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/AndreevaMPS12,
  author       = {Elena Andreeva and
                  Bart Mennink and
                  Bart Preneel and
                  Marjan Skrobot},
  editor       = {Aikaterini Mitrokotsa and
                  Serge Vaudenay},
  title        = {Security Analysis and Comparison of the {SHA-3} Finalists BLAKE, Gr{\o}stl,
                  JH, Keccak, and Skein},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2012 - 5th International Conference
                  on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7374},
  pages        = {287--305},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31410-0\_18},
  doi          = {10.1007/978-3-642-31410-0\_18},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/AndreevaMPS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asap/UhsadelUVP12,
  author       = {Leif Uhsadel and
                  Markus Ullrich and
                  Ingrid Verbauwhede and
                  Bart Preneel},
  title        = {Interface Design for Mapping a Variety of {RSA} Exponentiation Algorithms
                  on a {HW/SW} Co-design Platform},
  booktitle    = {23rd {IEEE} International Conference on Application-Specific Systems,
                  Architectures and Processors, {ASAP} 2012, Delft, The Netherlands,
                  July 9-11, 2012},
  pages        = {109--116},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ASAP.2012.11},
  doi          = {10.1109/ASAP.2012.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asap/UhsadelUVP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/IndesteegeP12,
  author       = {Sebastiaan Indesteege and
                  Bart Preneel},
  editor       = {David Naccache},
  title        = {{DES} Collisions Revisited},
  booktitle    = {Cryptography and Security: From Theory to Applications - Essays Dedicated
                  to Jean-Jacques Quisquater on the Occasion of His 65th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {6805},
  pages        = {13--24},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28368-0\_4},
  doi          = {10.1007/978-3-642-28368-0\_4},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/IndesteegeP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MavrogiannopoulosPP12,
  author       = {Nikos Mavrogiannopoulos and
                  Andreas Pashalidis and
                  Bart Preneel},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {Security implications in Kerberos by the introduction of smart cards},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {59--60},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414490},
  doi          = {10.1145/2414456.2414490},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MavrogiannopoulosPP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MavrogiannopoulosVVP12,
  author       = {Nikos Mavrogiannopoulos and
                  Frederik Vercauteren and
                  Vesselin Velichkov and
                  Bart Preneel},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {A cross-protocol attack on the {TLS} protocol},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {62--72},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382206},
  doi          = {10.1145/2382196.2382206},
  timestamp    = {Tue, 12 Apr 2022 13:28:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/MavrogiannopoulosVVP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/LeestPS12,
  author       = {Vincent van der Leest and
                  Bart Preneel and
                  Erik van der Sluis},
  editor       = {Emmanuel Prouff and
                  Patrick Schaumont},
  title        = {Soft Decision Error Correction for Compact Memory-Based PUFs Using
                  a Single Enrollment},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
                  Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7428},
  pages        = {268--282},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33027-8\_16},
  doi          = {10.1007/978-3-642-33027-8\_16},
  timestamp    = {Mon, 15 Jun 2020 17:09:16 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/LeestPS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MenninkP12,
  author       = {Bart Mennink and
                  Bart Preneel},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Hash Functions Based on Three Permutations: {A} Generic Security Analysis},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {330--347},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_20},
  doi          = {10.1007/978-3-642-32009-5\_20},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/MenninkP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/Preneel12,
  author       = {Bart Preneel},
  editor       = {Guido Bertoni and
                  Benedikt Gierlichs},
  title        = {It's Not My Fault - On Fault Attacks on Symmetric Cryptography},
  booktitle    = {2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, Leuven,
                  Belgium, September 9, 2012},
  pages        = {57--60},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/FDTC.2012.20},
  doi          = {10.1109/FDTC.2012.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fdtc/Preneel12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/WangSTP12,
  author       = {Meiqin Wang and
                  Yue Sun and
                  Elmar Tischhauser and
                  Bart Preneel},
  editor       = {Anne Canteaut},
  title        = {A Model for Structure Attacks, with Applications to {PRESENT} and
                  Serpent},
  booktitle    = {Fast Software Encryption - 19th International Workshop, {FSE} 2012,
                  Washington, DC, USA, March 19-21, 2012. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7549},
  pages        = {49--68},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34047-5\_4},
  doi          = {10.1007/978-3-642-34047-5\_4},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/WangSTP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/VelichkovMCP12,
  author       = {Vesselin Velichkov and
                  Nicky Mouha and
                  Christophe De Canni{\`{e}}re and
                  Bart Preneel},
  editor       = {Anne Canteaut},
  title        = {{UNAF:} {A} Special Set of Additive Differences with Application to
                  the Differential Analysis of {ARX}},
  booktitle    = {Fast Software Encryption - 19th International Workshop, {FSE} 2012,
                  Washington, DC, USA, March 19-21, 2012. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7549},
  pages        = {287--305},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34047-5\_17},
  doi          = {10.1007/978-3-642-34047-5\_17},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/VelichkovMCP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icb/SimoensYZBBNP12,
  author       = {Koen Simoens and
                  Bian Yang and
                  Xuebing Zhou and
                  Filipe Beato and
                  Christoph Busch and
                  Elaine M. Newton and
                  Bart Preneel},
  editor       = {Anil K. Jain and
                  Arun Ross and
                  Salil Prabhakar and
                  Jaihie Kim},
  title        = {Criteria towards metrics for benchmarking template protection algorithms},
  booktitle    = {5th {IAPR} International Conference on Biometrics, {ICB} 2012, New
                  Delhi, India, March 29 - April 1, 2012},
  pages        = {498--505},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICB.2012.6199799},
  doi          = {10.1109/ICB.2012.6199799},
  timestamp    = {Wed, 06 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icb/SimoensYZBBNP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcs/WengBDPS12,
  author       = {Li Weng and
                  Geert Braeckman and
                  Ann Dooms and
                  Bart Preneel and
                  Peter Schelkens},
  title        = {Robust Image Content Authentication with Tamper Location},
  booktitle    = {Proceedings of the 2012 {IEEE} International Conference on Multimedia
                  and Expo, {ICME} 2012, Melbourne, Australia, July 9-13, 2012},
  pages        = {380--385},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICME.2012.163},
  doi          = {10.1109/ICME.2012.163},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icmcs/WengBDPS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pcm/WengDPMD12,
  author       = {Li Weng and
                  Rony Darazi and
                  Bart Preneel and
                  Beno{\^{\i}}t Macq and
                  Ann Dooms},
  editor       = {Weisi Lin and
                  Dong Xu and
                  Anthony T. S. Ho and
                  Jianxin Wu and
                  Ying He and
                  Jianfei Cai and
                  Mohan S. Kankanhalli and
                  Ming{-}Ting Sun},
  title        = {Robust Image Content Authentication Using Perceptual Hashing and Watermarking},
  booktitle    = {Advances in Multimedia Information Processing - {PCM} 2012 - 13th
                  Pacific-Rim Conference on Multimedia, Singapore, December 4-6, 2012.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7674},
  pages        = {315--326},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34778-8\_29},
  doi          = {10.1007/978-3-642-34778-8\_29},
  timestamp    = {Mon, 19 Sep 2022 15:19:36 +0200},
  biburl       = {https://dblp.org/rec/conf/pcm/WengDPMD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/MavrogiannopoulosTP12,
  author       = {Nikos Mavrogiannopoulos and
                  Miloslav Trmac and
                  Bart Preneel},
  editor       = {Sascha Ossowski and
                  Paola Lecca},
  title        = {A linux kernel cryptographic framework: decoupling cryptographic keys
                  from applications},
  booktitle    = {Proceedings of the {ACM} Symposium on Applied Computing, {SAC} 2012,
                  Riva, Trento, Italy, March 26-30, 2012},
  pages        = {1435--1442},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2245276.2232006},
  doi          = {10.1145/2245276.2232006},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/MavrogiannopoulosTP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/MulderRP12,
  author       = {Yoni De Mulder and
                  Peter Roelse and
                  Bart Preneel},
  editor       = {Lars R. Knudsen and
                  Huapeng Wu},
  title        = {Cryptanalysis of the Xiao - Lai White-Box {AES} Implementation},
  booktitle    = {Selected Areas in Cryptography, 19th International Conference, {SAC}
                  2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7707},
  pages        = {34--49},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35999-6\_3},
  doi          = {10.1007/978-3-642-35999-6\_3},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/MulderRP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/ArmknechtLPR12,
  author       = {Frederik Armknecht and
                  Stefan Lucks and
                  Bart Preneel and
                  Phillip Rogaway},
  title        = {Symmetric Cryptography (Dagstuhl Seminar 12031)},
  journal      = {Dagstuhl Reports},
  volume       = {2},
  number       = {1},
  pages        = {39--49},
  year         = {2012},
  url          = {https://doi.org/10.4230/DagRep.2.1.39},
  doi          = {10.4230/DAGREP.2.1.39},
  timestamp    = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/ArmknechtLPR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AndreevaBMPR12,
  author       = {Elena Andreeva and
                  Andrey Bogdanov and
                  Bart Mennink and
                  Bart Preneel and
                  Christian Rechberger},
  title        = {On Security Arguments of the Second Round {SHA-3} Candidates},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {147},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/147},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AndreevaBMPR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuykxAMP12,
  author       = {Atul Luykx and
                  Elena Andreeva and
                  Bart Mennink and
                  Bart Preneel},
  title        = {Impossibility Results for Indifferentiability with Resets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {644},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/644},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuykxAMP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MavrogiannopoulosKP11,
  author       = {Nikos Mavrogiannopoulos and
                  Nessim Kisserli and
                  Bart Preneel},
  title        = {A taxonomy of self-modifying code for obfuscation},
  journal      = {Comput. Secur.},
  volume       = {30},
  number       = {8},
  pages        = {679--691},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.cose.2011.08.007},
  doi          = {10.1016/J.COSE.2011.08.007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MavrogiannopoulosKP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijhcr/PeetersSP11,
  author       = {Roel Peeters and
                  Dave Singel{\'{e}}e and
                  Bart Preneel},
  title        = {Threshold-Based Location-Aware Access Control},
  journal      = {Int. J. Handheld Comput. Res.},
  volume       = {2},
  number       = {3},
  pages        = {22--37},
  year         = {2011},
  url          = {https://doi.org/10.4018/jhcr.2011070102},
  doi          = {10.4018/JHCR.2011070102},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijhcr/PeetersSP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/integration/SakiyamaKFPV11,
  author       = {Kazuo Sakiyama and
                  Miroslav Knezevic and
                  Junfeng Fan and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  title        = {Tripartite modular multiplication},
  journal      = {Integr.},
  volume       = {44},
  number       = {4},
  pages        = {259--269},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.vlsi.2011.03.008},
  doi          = {10.1016/J.VLSI.2011.03.008},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/integration/SakiyamaKFPV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/WolfP11,
  author       = {Christopher Wolf and
                  Bart Preneel},
  title        = {Equivalent keys in {\(\mathscr{M}\)}ultivariate uadratic public key
                  systems},
  journal      = {J. Math. Cryptol.},
  volume       = {4},
  number       = {4},
  pages        = {375--415},
  year         = {2011},
  url          = {https://doi.org/10.1515/jmc.2011.004},
  doi          = {10.1515/JMC.2011.004},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/WolfP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/IndesteegeP11,
  author       = {Sebastiaan Indesteege and
                  Bart Preneel},
  title        = {Practical Collisions for EnRUPT},
  journal      = {J. Cryptol.},
  volume       = {24},
  number       = {1},
  pages        = {1--23},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00145-010-9058-x},
  doi          = {10.1007/S00145-010-9058-X},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/IndesteegeP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/re/DengWSPJ11,
  author       = {Mina Deng and
                  Kim Wuyts and
                  Riccardo Scandariato and
                  Bart Preneel and
                  Wouter Joosen},
  title        = {A privacy threat analysis framework: supporting the elicitation and
                  fulfillment of privacy requirements},
  journal      = {Requir. Eng.},
  volume       = {16},
  number       = {1},
  pages        = {3--32},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00766-010-0115-7},
  doi          = {10.1007/S00766-010-0115-7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/re/DengWSPJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/software/GuWPAS11,
  author       = {Yuan Xiang Gu and
                  Brecht Wyseur and
                  Bart Preneel and
                  Jean{-}Daniel Aussel and
                  Reiner Sailer},
  title        = {Point/Counterpoint},
  journal      = {{IEEE} Softw.},
  volume       = {28},
  number       = {2},
  pages        = {56--59},
  year         = {2011},
  url          = {https://doi.org/10.1109/MS.2011.39},
  doi          = {10.1109/MS.2011.39},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/software/GuWPAS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/TroncosoDKBP11,
  author       = {Carmela Troncoso and
                  George Danezis and
                  Eleni Kosta and
                  Josep Balasch and
                  Bart Preneel},
  title        = {PriPAYD: Privacy-Friendly Pay-As-You-Drive Insurance},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {8},
  number       = {5},
  pages        = {742--755},
  year         = {2011},
  url          = {https://doi.org/10.1109/TDSC.2010.71},
  doi          = {10.1109/TDSC.2010.71},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/TroncosoDKBP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RialBP11,
  author       = {Alfredo Rial and
                  Josep Balasch and
                  Bart Preneel},
  title        = {A Privacy-Preserving Buyer-Seller Watermarking Protocol Based on Priced
                  Oblivious Transfer},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {6},
  number       = {1},
  pages        = {202--212},
  year         = {2011},
  url          = {https://doi.org/10.1109/TIFS.2010.2095844},
  doi          = {10.1109/TIFS.2010.2095844},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/RialBP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WangSMP11,
  author       = {Meiqin Wang and
                  Yue Sun and
                  Nicky Mouha and
                  Bart Preneel},
  editor       = {Udaya Parampalli and
                  Philip Hawkes},
  title        = {Algebraic Techniques in Differential Cryptanalysis Revisited},
  booktitle    = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
                  2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6812},
  pages        = {120--141},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22497-3\_9},
  doi          = {10.1007/978-3-642-22497-3\_9},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WangSMP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PreneelYW11,
  author       = {Bart Preneel and
                  Hirotaka Yoshida and
                  Dai Watanabe},
  editor       = {Udaya Parampalli and
                  Philip Hawkes},
  title        = {Finding Collisions for Reduced \emph{Luffa}-256 v2 (Poster)},
  booktitle    = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
                  2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6812},
  pages        = {423--427},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22497-3\_29},
  doi          = {10.1007/978-3-642-22497-3\_29},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PreneelYW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/Preneel11,
  author       = {Bart Preneel},
  editor       = {Abderrahmane Nitaj and
                  David Pointcheval},
  title        = {The {NIST} {SHA-3} Competition: {A} Perspective on the Final Year},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2011 - 4th International Conference
                  on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6737},
  pages        = {383--386},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21969-6\_26},
  doi          = {10.1007/978-3-642-21969-6\_26},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/Preneel11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/MouhaWGP11,
  author       = {Nicky Mouha and
                  Qingju Wang and
                  Dawu Gu and
                  Bart Preneel},
  editor       = {Chuankun Wu and
                  Moti Yung and
                  Dongdai Lin},
  title        = {Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming},
  booktitle    = {Information Security and Cryptology - 7th International Conference,
                  Inscrypt 2011, Beijing, China, November 30 - December 3, 2011. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7537},
  pages        = {57--76},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-34704-7\_5},
  doi          = {10.1007/978-3-642-34704-7\_5},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/MouhaWGP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/WengP11,
  author       = {Li Weng and
                  Bart Preneel},
  editor       = {Bart De Decker and
                  Jorn Lapon and
                  Vincent Naessens and
                  Andreas Uhl},
  title        = {A Secure Perceptual Hash Algorithm for Image Content Authentication},
  booktitle    = {Communications and Multimedia Security, 12th {IFIP} {TC} 6 / {TC}
                  11 International Conference, {CMS} 2011, Ghent, Belgium, October 19-21,2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7025},
  pages        = {108--121},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24712-5\_9},
  doi          = {10.1007/978-3-642-24712-5\_9},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/WengP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/OttoyMSPSGH11,
  author       = {Geoffrey Ottoy and
                  Jeroen Martens and
                  Nick Saeys and
                  Bart Preneel and
                  Lieven De Strycker and
                  Jean{-}Pierre Goemaere and
                  Tom Hamelinckx},
  editor       = {Bart De Decker and
                  Jorn Lapon and
                  Vincent Naessens and
                  Andreas Uhl},
  title        = {A Modular Test Platform for Evaluation of Security Protocols in {NFC}
                  Applications},
  booktitle    = {Communications and Multimedia Security, 12th {IFIP} {TC} 6 / {TC}
                  11 International Conference, {CMS} 2011, Ghent, Belgium, October 19-21,2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7025},
  pages        = {171--177},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24712-5\_15},
  doi          = {10.1007/978-3-642-24712-5\_15},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/OttoyMSPSGH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/NguyenWP11,
  author       = {Dung Q. Nguyen and
                  Li Weng and
                  Bart Preneel},
  editor       = {Bart De Decker and
                  Jorn Lapon and
                  Vincent Naessens and
                  Andreas Uhl},
  title        = {Radon Transform-Based Secure Image Hashing},
  booktitle    = {Communications and Multimedia Security, 12th {IFIP} {TC} 6 / {TC}
                  11 International Conference, {CMS} 2011, Ghent, Belgium, October 19-21,2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7025},
  pages        = {186--193},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24712-5\_17},
  doi          = {10.1007/978-3-642-24712-5\_17},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/NguyenWP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/SekarMVP11,
  author       = {Gautham Sekar and
                  Nicky Mouha and
                  Vesselin Velichkov and
                  Bart Preneel},
  editor       = {Aggelos Kiayias},
  title        = {Meet-in-the-Middle Attacks on Reduced-Round {XTEA}},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2011 - The Cryptographers' Track at
                  the {RSA} Conference 2011, San Francisco, CA, USA, February 14-18,
                  2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6558},
  pages        = {250--267},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19074-2\_17},
  doi          = {10.1007/978-3-642-19074-2\_17},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/SekarMVP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/HermansPVP11,
  author       = {Jens Hermans and
                  Andreas Pashalidis and
                  Frederik Vercauteren and
                  Bart Preneel},
  editor       = {Vijay Atluri and
                  Claudia D{\'{\i}}az},
  title        = {A New {RFID} Privacy Model},
  booktitle    = {Computer Security - {ESORICS} 2011 - 16th European Symposium on Research
                  in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6879},
  pages        = {568--587},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23822-2\_31},
  doi          = {10.1007/978-3-642-23822-2\_31},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/HermansPVP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/VelichkovMCP11,
  author       = {Vesselin Velichkov and
                  Nicky Mouha and
                  Christophe De Canni{\`{e}}re and
                  Bart Preneel},
  editor       = {Antoine Joux},
  title        = {The Additive Differential Probability of {ARX}},
  booktitle    = {Fast Software Encryption - 18th International Workshop, {FSE} 2011,
                  Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6733},
  pages        = {342--358},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21702-9\_20},
  doi          = {10.1007/978-3-642-21702-9\_20},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/VelichkovMCP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmm/WengP11,
  author       = {Li Weng and
                  Bart Preneel},
  editor       = {Kuo{-}Tien Lee and
                  Wen{-}Hsiang Tsai and
                  Hong{-}Yuan Mark Liao and
                  Tsuhan Chen and
                  Jun{-}Wei Hsieh and
                  Chien{-}Cheng Tseng},
  title        = {Image Distortion Estimation by Hash Comparison},
  booktitle    = {Advances in Multimedia Modeling - 17th International Multimedia Modeling
                  Conference, {MMM} 2011, Taipei, Taiwan, January 5-7, 2011, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6523},
  pages        = {62--72},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-17832-0\_7},
  doi          = {10.1007/978-3-642-17832-0\_7},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmm/WengP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sofsem/MulderWP11,
  author       = {Yoni De Mulder and
                  Karel Wouters and
                  Bart Preneel},
  editor       = {Ivana Cern{\'{a}} and
                  Tibor Gyim{\'{o}}thy and
                  Juraj Hromkovic and
                  Keith G. Jeffery and
                  Rastislav Kr{\'{a}}lovic and
                  Marko Vukolic and
                  Stefan Wolf},
  title        = {A Privacy-Preserving ID-Based Group Key Agreement Scheme Applied in
                  {VPAN}},
  booktitle    = {{SOFSEM} 2011: Theory and Practice of Computer Science - 37th Conference
                  on Current Trends in Theory and Practice of Computer Science, Nov{\'{y}}
                  Smokovec, Slovakia, January 22-28, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6543},
  pages        = {214--225},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-18381-2\_18},
  doi          = {10.1007/978-3-642-18381-2\_18},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sofsem/MulderWP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/SekarP11,
  author       = {Gautham Sekar and
                  Bart Preneel},
  editor       = {Souhwan Jung and
                  Moti Yung},
  title        = {Practical Attacks on a Cryptosystem Proposed in Patent {WO/2009/066313}},
  booktitle    = {Information Security Applications - 12th International Workshop, {WISA}
                  2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7115},
  pages        = {1--12},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27890-7\_1},
  doi          = {10.1007/978-3-642-27890-7\_1},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/SekarP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2011,
  editor       = {Bart Preneel and
                  Tsuyoshi Takagi},
  title        = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International
                  Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6917},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23951-9},
  doi          = {10.1007/978-3-642-23951-9},
  isbn         = {978-3-642-23950-2},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Preneel11,
  author       = {Bart Preneel},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {{AHS} Competition/SHA-3},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {27--29},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_546},
  doi          = {10.1007/978-1-4419-5906-5\_546},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Preneel11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Preneel11a,
  author       = {Bart Preneel},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {{CBC-MAC} and Variants},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {184--188},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_555},
  doi          = {10.1007/978-1-4419-5906-5\_555},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Preneel11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Preneel11b,
  author       = {Bart Preneel},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {{CMAC}},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {214--215},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_562},
  doi          = {10.1007/978-1-4419-5906-5\_562},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Preneel11b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Preneel11c,
  author       = {Bart Preneel},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Collision Attack},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {220--221},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_564},
  doi          = {10.1007/978-1-4419-5906-5\_564},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Preneel11c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Preneel11d,
  author       = {Bart Preneel},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Collision Resistance},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {221--222},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_565},
  doi          = {10.1007/978-1-4419-5906-5\_565},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Preneel11d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Preneel11e,
  author       = {Bart Preneel},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Correcting-Block Attack},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {259--260},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_566},
  doi          = {10.1007/978-1-4419-5906-5\_566},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Preneel11e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Preneel11f,
  author       = {Bart Preneel},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Davies-Meyer},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {312--313},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_569},
  doi          = {10.1007/978-1-4419-5906-5\_569},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Preneel11f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Preneel11g,
  author       = {Bart Preneel},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {{GMAC}},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {513--514},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_578},
  doi          = {10.1007/978-1-4419-5906-5\_578},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Preneel11g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Preneel11h,
  author       = {Bart Preneel},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Hash Functions},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {543--553},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_580},
  doi          = {10.1007/978-1-4419-5906-5\_580},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Preneel11h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Preneel11i,
  author       = {Bart Preneel},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {{HMAC}},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {559--560},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_581},
  doi          = {10.1007/978-1-4419-5906-5\_581},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Preneel11i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Preneel11j,
  author       = {Bart Preneel},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {{MAA}},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {741--742},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_591},
  doi          = {10.1007/978-1-4419-5906-5\_591},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Preneel11j.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Preneel11k,
  author       = {Bart Preneel},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {{MAC} Algorithms},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {742--748},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_592},
  doi          = {10.1007/978-1-4419-5906-5\_592},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Preneel11k.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Preneel11l,
  author       = {Bart Preneel},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {{MASH} Hash Functions (Modular Arithmetic Secure Hash)},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {761},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_594},
  doi          = {10.1007/978-1-4419-5906-5\_594},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Preneel11l.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Preneel11m,
  author       = {Bart Preneel},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {{MDC-2} and {MDC-4}},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {771--772},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_596},
  doi          = {10.1007/978-1-4419-5906-5\_596},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Preneel11m.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Preneel11n,
  author       = {Bart Preneel},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Modes of Operation of a Block Cipher},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {789--794},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_599},
  doi          = {10.1007/978-1-4419-5906-5\_599},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Preneel11n.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Preneel11o,
  author       = {Bart Preneel},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {{NESSIE} Project},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {831--836},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_602},
  doi          = {10.1007/978-1-4419-5906-5\_602},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Preneel11o.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Preneel11p,
  author       = {Bart Preneel},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {{PMAC}},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {941--942},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_603},
  doi          = {10.1007/978-1-4419-5906-5\_603},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Preneel11p.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Preneel11q,
  author       = {Bart Preneel},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Preimage Resistance},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {952--953},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_604},
  doi          = {10.1007/978-1-4419-5906-5\_604},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Preneel11q.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Preneel11r,
  author       = {Bart Preneel},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Second Preimage Resistance},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1093},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_613},
  doi          = {10.1007/978-1-4419-5906-5\_613},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Preneel11r.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Preneel11s,
  author       = {Bart Preneel},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Universal One-Way Hash Functions {(UOWHF)}},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1349--1350},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_624},
  doi          = {10.1007/978-1-4419-5906-5\_624},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Preneel11s.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/KatzenbeisserKPS11,
  author       = {Stefan Katzenbeisser and
                  Klaus Kursawe and
                  Bart Preneel and
                  Ahmad{-}Reza Sadeghi},
  title        = {Privacy and Security in Smart Energy Grids (Dagstuhl Seminar 11511)},
  journal      = {Dagstuhl Reports},
  volume       = {1},
  number       = {12},
  pages        = {62--68},
  year         = {2011},
  url          = {https://doi.org/10.4230/DagRep.1.12.62},
  doi          = {10.4230/DAGREP.1.12.62},
  timestamp    = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/KatzenbeisserKPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AndreevaMP11,
  author       = {Elena Andreeva and
                  Bart Mennink and
                  Bart Preneel},
  title        = {The Parazoa Family: Generalizing the Sponge Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {28},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/028},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AndreevaMP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MenninkP11,
  author       = {Bart Mennink and
                  Bart Preneel},
  title        = {Hash Functions Based on Three Permutations: {A} Generic Security Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {532},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/532},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MenninkP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenWP11,
  author       = {Jiazhe Chen and
                  Meiqin Wang and
                  Bart Preneel},
  title        = {Impossible Differential Cryptanalysis of the Lightweight Block Ciphers
                  TEA, {XTEA} and {HIGHT}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {616},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/616},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenWP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ahswn/SingeleeLBPSCPMB10,
  author       = {Dave Singel{\'{e}}e and
                  Beno{\^{\i}}t Latr{\'{e}} and
                  Bart Braem and
                  Micha{\"{e}}l Peeters and
                  Marijke De Soete and
                  Peter De Cleyn and
                  Bart Preneel and
                  Ingrid Moerman and
                  Chris Blondia},
  title        = {A Secure Low-Delay Protocol for Wireless Body Area Networks},
  journal      = {Ad Hoc Sens. Wirel. Networks},
  volume       = {9},
  number       = {1-2},
  pages        = {53--72},
  year         = {2010},
  url          = {http://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-9-number-1-2/ahswn-9-1-2-p-53-72/},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ahswn/SingeleeLBPSCPMB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BeuleEKKNPSS10,
  author       = {Jan De Beule and
                  Yves Edel and
                  Emilia K{\"{a}}sper and
                  Andreas Klein and
                  Svetla Nikova and
                  Bart Preneel and
                  Jeroen Schillewaert and
                  Leo Storme},
  title        = {Galois geometries and applications},
  journal      = {Des. Codes Cryptogr.},
  volume       = {56},
  number       = {2-3},
  pages        = {85--86},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10623-010-9410-z},
  doi          = {10.1007/S10623-010-9410-Z},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BeuleEKKNPSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/VelichkovRP10,
  author       = {Vesselin Velichkov and
                  Vincent Rijmen and
                  Bart Preneel},
  title        = {Algebraic cryptanalysis of a small-scale version of stream cipher
                  Lex},
  journal      = {{IET} Inf. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {49--61},
  year         = {2010},
  url          = {https://doi.org/10.1049/iet-ifs.2009.0118},
  doi          = {10.1049/IET-IFS.2009.0118},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/VelichkovRP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jips/AndreevaMP10,
  author       = {Elena Andreeva and
                  Bart Mennink and
                  Bart Preneel},
  title        = {Security Properties of Domain Extenders for Cryptographic Hash Functions},
  journal      = {J. Inf. Process. Syst.},
  volume       = {6},
  number       = {4},
  pages        = {453--480},
  year         = {2010},
  url          = {https://doi.org/10.3745/JIPS.2010.6.4.453},
  doi          = {10.3745/JIPS.2010.6.4.453},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jips/AndreevaMP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RialDBPP10,
  author       = {Alfredo Rial and
                  Mina Deng and
                  Tiziano Bianchi and
                  Alessandro Piva and
                  Bart Preneel},
  title        = {A Provably Secure Anonymous Buyer-Seller Watermarking Protocol},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {5},
  number       = {4},
  pages        = {920--931},
  year         = {2010},
  url          = {https://doi.org/10.1109/TIFS.2010.2072830},
  doi          = {10.1109/TIFS.2010.2072830},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/RialDBPP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/WanRZPG10,
  author       = {Zhiguo Wan and
                  Kui Ren and
                  Bo Zhu and
                  Bart Preneel and
                  Ming Gu},
  title        = {Anonymous User Communication for Privacy Protection in Wireless Metropolitan
                  Mesh Networks},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {59},
  number       = {2},
  pages        = {519--532},
  year         = {2010},
  url          = {https://doi.org/10.1109/TVT.2009.2028892},
  doi          = {10.1109/TVT.2009.2028892},
  timestamp    = {Wed, 14 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/WanRZPG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/HermansSBVP10,
  author       = {Jens Hermans and
                  Michael Schneider and
                  Johannes Buchmann and
                  Frederik Vercauteren and
                  Bart Preneel},
  editor       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {Parallel Shortest Lattice Vector Enumeration on Graphics Cards},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference
                  on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6055},
  pages        = {52--68},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12678-9\_4},
  doi          = {10.1007/978-3-642-12678-9\_4},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/africacrypt/HermansSBVP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/RialP10,
  author       = {Alfredo Rial and
                  Bart Preneel},
  editor       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {Optimistic Fair Priced Oblivious Transfer},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference
                  on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6055},
  pages        = {131--147},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12678-9\_9},
  doi          = {10.1007/978-3-642-12678-9\_9},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/RialP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/btas/SimoensCP10,
  author       = {Koen Simoens and
                  Chi{-}Ming Chang and
                  Bart Preneel},
  title        = {Reversing protected minutiae vicinities},
  booktitle    = {Fourth {IEEE} International Conference on Biometrics: Theory Applications
                  and Systems, {BTAS} 2010, Washington, DC, USA, 27-29 September, 2010},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/BTAS.2010.5634506},
  doi          = {10.1109/BTAS.2010.5634506},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/btas/SimoensCP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/Preneel10,
  author       = {Bart Preneel},
  editor       = {Josef Pieprzyk},
  title        = {The First 30 Years of Cryptographic Hash Functions and the {NIST}
                  {SHA-3} Competition},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2010, The Cryptographers' Track at
                  the {RSA} Conference 2010, San Francisco, CA, USA, March 1-5, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5985},
  pages        = {1--14},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11925-5\_1},
  doi          = {10.1007/978-3-642-11925-5\_1},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/Preneel10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/HermansVP10,
  author       = {Jens Hermans and
                  Frederik Vercauteren and
                  Bart Preneel},
  editor       = {Josef Pieprzyk},
  title        = {Speed Records for {NTRU}},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2010, The Cryptographers' Track at
                  the {RSA} Conference 2010, San Francisco, CA, USA, March 1-5, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5985},
  pages        = {73--88},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11925-5\_6},
  doi          = {10.1007/978-3-642-11925-5\_6},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/HermansVP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/GierlichsBPV10,
  author       = {Benedikt Gierlichs and
                  Lejla Batina and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  editor       = {Josef Pieprzyk},
  title        = {Revisiting Higher-Order {DPA} Attacks:},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2010, The Cryptographers' Track at
                  the {RSA} Conference 2010, San Francisco, CA, USA, March 1-5, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5985},
  pages        = {221--234},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11925-5\_16},
  doi          = {10.1007/978-3-642-11925-5\_16},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/GierlichsBPV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/BalaschVP10,
  author       = {Josep Balasch and
                  Ingrid Verbauwhede and
                  Bart Preneel},
  editor       = {Giovanni De Micheli and
                  Bashir M. Al{-}Hashimi and
                  Wolfgang M{\"{u}}ller and
                  Enrico Macii},
  title        = {An embedded platform for privacy-friendly road charging applications},
  booktitle    = {Design, Automation and Test in Europe, {DATE} 2010, Dresden, Germany,
                  March 8-12, 2010},
  pages        = {867--872},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/DATE.2010.5456931},
  doi          = {10.1109/DATE.2010.5456931},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/date/BalaschVP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/CappaertP10,
  author       = {Jan Cappaert and
                  Bart Preneel},
  editor       = {Ehab Al{-}Shaer and
                  Hongxia Jin and
                  Marc Joye},
  title        = {A general model for hiding control flow},
  booktitle    = {Proceedings of the 10th {ACM} Workshop on Digital Rights Management,
                  Chicago, Illinois, USA, October 4, 2010},
  pages        = {35--42},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866870.1866877},
  doi          = {10.1145/1866870.1866877},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/CappaertP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/FanGMSPV10,
  author       = {Junfeng Fan and
                  Xu Guo and
                  Elke De Mulder and
                  Patrick Schaumont and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  editor       = {Jim Plusquellic and
                  Ken Mai},
  title        = {State-of-the-art of Secure {ECC} Implementations: {A} Survey on Known
                  Side-channel Attacks and Countermeasures},
  booktitle    = {{HOST} 2010, Proceedings of the 2010 {IEEE} International Symposium
                  on Hardware-Oriented Security and Trust (HOST), 13-14 June 2010, Anaheim
                  Convention Center, California, {USA}},
  pages        = {76--87},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/HST.2010.5513110},
  doi          = {10.1109/HST.2010.5513110},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/FanGMSPV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/Preneel10,
  author       = {Bart Preneel},
  editor       = {Miguel Soriano and
                  Sihan Qing and
                  Javier L{\'{o}}pez},
  title        = {Cryptographic Hash Functions: Theory and Practice},
  booktitle    = {Information and Communications Security - 12th International Conference,
                  {ICICS} 2010, Barcelona, Spain, December 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6476},
  pages        = {1--3},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17650-0\_1},
  doi          = {10.1007/978-3-642-17650-0\_1},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/Preneel10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/HiroseIKOPY10,
  author       = {Shoichi Hirose and
                  Kota Ideguchi and
                  Hidenori Kuwakado and
                  Toru Owada and
                  Bart Preneel and
                  Hirotaka Yoshida},
  editor       = {Kyung Hyune Rhee and
                  DaeHun Nyang},
  title        = {A Lightweight 256-Bit Hash Function for Hardware and Low-End Devices:
                  Lesamnta-LW},
  booktitle    = {Information Security and Cryptology - {ICISC} 2010 - 13th International
                  Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6829},
  pages        = {151--168},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-24209-0\_10},
  doi          = {10.1007/978-3-642-24209-0\_10},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/HiroseIKOPY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/Preneel10,
  author       = {Bart Preneel},
  editor       = {Guang Gong and
                  Kishan Chand Gupta},
  title        = {Cryptographic Hash Functions: Theory and Practice},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2010 - 11th International Conference
                  on Cryptology in India, Hyderabad, India, December 12-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6498},
  pages        = {115--117},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17401-8\_9},
  doi          = {10.1007/978-3-642-17401-8\_9},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/Preneel10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/MulderWP10,
  author       = {Yoni De Mulder and
                  Brecht Wyseur and
                  Bart Preneel},
  editor       = {Guang Gong and
                  Kishan Chand Gupta},
  title        = {Cryptanalysis of a Perturbated White-Box {AES} Implementation},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2010 - 11th International Conference
                  on Cryptology in India, Hyderabad, India, December 12-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6498},
  pages        = {292--310},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17401-8\_21},
  doi          = {10.1007/978-3-642-17401-8\_21},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/MulderWP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/IdeguchiTP10,
  author       = {Kota Ideguchi and
                  Elmar Tischhauser and
                  Bart Preneel},
  editor       = {Mike Burmester and
                  Gene Tsudik and
                  Spyros S. Magliveras and
                  Ivana Ilic},
  title        = {Improved Collision Attacks on the Reduced-Round Gr{\o}stl Hash Function},
  booktitle    = {Information Security - 13th International Conference, {ISC} 2010,
                  Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6531},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-18178-8\_1},
  doi          = {10.1007/978-3-642-18178-8\_1},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/IdeguchiTP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/AndreevaMP10,
  author       = {Elena Andreeva and
                  Bart Mennink and
                  Bart Preneel},
  editor       = {Mike Burmester and
                  Gene Tsudik and
                  Spyros S. Magliveras and
                  Ivana Ilic},
  title        = {Security Reductions of the Second Round {SHA-3} Candidates},
  booktitle    = {Information Security - 13th International Conference, {ISC} 2010,
                  Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6531},
  pages        = {39--53},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-18178-8\_5},
  doi          = {10.1007/978-3-642-18178-8\_5},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/AndreevaMP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mm/WengP10,
  author       = {Li Weng and
                  Bart Preneel},
  editor       = {Alberto Del Bimbo and
                  Shih{-}Fu Chang and
                  Arnold W. M. Smeulders},
  title        = {A novel video hash algorithm},
  booktitle    = {Proceedings of the 18th International Conference on Multimedia 2010,
                  Firenze, Italy, October 25-29, 2010},
  pages        = {739--742},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1873951.1874066},
  doi          = {10.1145/1873951.1874066},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mm/WengP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmm/WengP10,
  author       = {Li Weng and
                  Bart Preneel},
  editor       = {Susanne Boll and
                  Qi Tian and
                  Lei Zhang and
                  Zili Zhang and
                  Yi{-}Ping Phoebe Chen},
  title        = {From Image Hashing to Video Hashing},
  booktitle    = {Advances in Multimedia Modeling, 16th International Multimedia Modeling
                  Conference, {MMM} 2010, Chongqing, China, January 6-8, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5916},
  pages        = {662--668},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11301-7\_66},
  doi          = {10.1007/978-3-642-11301-7\_66},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmm/WengP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/Preneel10,
  author       = {Bart Preneel},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Cryptography for Network Security: Failures, Successes and Challenges},
  booktitle    = {Computer Network Security, 5th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6258},
  pages        = {36--54},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14706-7\_4},
  doi          = {10.1007/978-3-642-14706-7\_4},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/Preneel10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisec/OttoyHPSG10,
  author       = {Geoffrey Ottoy and
                  Tom Hamelinckx and
                  Bart Preneel and
                  Lieven De Strycker and
                  Jean{-}Pierre Goemaere},
  editor       = {Andreas U. Schmidt and
                  Giovanni Russello and
                  Antonio Lioy and
                  Neeli R. Prasad and
                  Shiguo Lian},
  title        = {{AES} Data Encryption in a ZigBee Network: Software or Hardware?},
  booktitle    = {Security and Privacy in Mobile Information and Communication Systems
                  - Second International {ICST} Conference, MobiSec 2010, Catania, Sicily,
                  Italy, May 27-28, 2010, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {47},
  pages        = {163--173},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17502-2\_14},
  doi          = {10.1007/978-3-642-17502-2\_14},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobisec/OttoyHPSG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pairing/SimoensPP10,
  author       = {Koen Simoens and
                  Roel Peeters and
                  Bart Preneel},
  editor       = {Marc Joye and
                  Atsuko Miyaji and
                  Akira Otsuka},
  title        = {Increased Resilience in Threshold Cryptography: Sharing a Secret with
                  Devices That Cannot Store Shares},
  booktitle    = {Pairing-Based Cryptography - Pairing 2010 - 4th International Conference,
                  Yamanaka Hot Spring, Japan, December 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6487},
  pages        = {116--135},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17455-1\_8},
  doi          = {10.1007/978-3-642-17455-1\_8},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pairing/SimoensPP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/MouhaVCP10,
  author       = {Nicky Mouha and
                  Vesselin Velichkov and
                  Christophe De Canni{\`{e}}re and
                  Bart Preneel},
  editor       = {Alex Biryukov and
                  Guang Gong and
                  Douglas R. Stinson},
  title        = {The Differential Analysis of S-Functions},
  booktitle    = {Selected Areas in Cryptography - 17th International Workshop, {SAC}
                  2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6544},
  pages        = {36--56},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-19574-7\_3},
  doi          = {10.1007/978-3-642-19574-7\_3},
  timestamp    = {Sun, 25 Oct 2020 22:46:42 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/MouhaVCP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/AndreevaMP10,
  author       = {Elena Andreeva and
                  Bart Mennink and
                  Bart Preneel},
  editor       = {Juan A. Garay and
                  Roberto De Prisco},
  title        = {On the Indifferentiability of the Gr{\o}stl Hash Function},
  booktitle    = {Security and Cryptography for Networks, 7th International Conference,
                  {SCN} 2010, Amalfi, Italy, September 13-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6280},
  pages        = {88--105},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15317-4\_7},
  doi          = {10.1007/978-3-642-15317-4\_7},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/AndreevaMP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/StrackxPP10,
  author       = {Raoul Strackx and
                  Frank Piessens and
                  Bart Preneel},
  editor       = {Sushil Jajodia and
                  Jianying Zhou},
  title        = {Efficient Isolation of Trusted Subsystems in Embedded Systems},
  booktitle    = {Security and Privacy in Communication Networks - 6th Iternational
                  {ICST} Conference, SecureComm 2010, Singapore, September 7-9, 2010.
                  Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {50},
  pages        = {344--361},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16161-2\_20},
  doi          = {10.1007/978-3-642-16161-2\_20},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/StrackxPP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BalaschRTPVG10,
  author       = {Josep Balasch and
                  Alfredo Rial and
                  Carmela Troncoso and
                  Bart Preneel and
                  Ingrid Verbauwhede and
                  Christophe Geuens},
  title        = {PrETP: Privacy-Preserving Electronic Toll Pricing},
  booktitle    = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13,
                  2010, Proceedings},
  pages        = {63--78},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {http://www.usenix.org/events/sec10/tech/full\_papers/Balasch.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/BalaschRTPVG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/LeeBSPV10,
  author       = {Yong Ki Lee and
                  Lejla Batina and
                  Dave Singel{\'{e}}e and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  editor       = {Ahmad{-}Reza Sadeghi and
                  David Naccache},
  title        = {Anti-counterfeiting, Untraceability and Other Security Challenges
                  for {RFID} Systems: Public-Key-Based Protocols and Hardware},
  booktitle    = {Towards Hardware-Intrinsic Security - Foundations and Practice},
  series       = {Information Security and Cryptography},
  pages        = {237--257},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14452-3\_11},
  doi          = {10.1007/978-3-642-14452-3\_11},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/LeeBSPV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2010,
  editor       = {Dimitris Gritzalis and
                  Bart Preneel and
                  Marianthi Theoharidou},
  title        = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research
                  in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6345},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15497-3},
  doi          = {10.1007/978-3-642-15497-3},
  isbn         = {978-3-642-15496-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/europki/2009,
  editor       = {Fabio Martinelli and
                  Bart Preneel},
  title        = {Public Key Infrastructures, Services and Applications - 6th European
                  Workshop, EuroPKI 2009, Pisa, Italy, September 10-11, 2009, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6391},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16441-5},
  doi          = {10.1007/978-3-642-16441-5},
  isbn         = {978-3-642-16440-8},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/europki/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimHPBDK10,
  author       = {Jongsung Kim and
                  Seokhie Hong and
                  Bart Preneel and
                  Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller},
  title        = {Related-Key Boomerang and Rectangle Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {19},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/019},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimHPBDK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WolfP10,
  author       = {Christopher Wolf and
                  Bart Preneel},
  title        = {MQ\({}^{\mbox{*}}\)-IP: An Identity-based Identification Scheme without
                  Number-theoretic Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {87},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/087},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WolfP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SimoensPP10,
  author       = {Koen Simoens and
                  Roel Peeters and
                  Bart Preneel},
  title        = {Increased Resilience in Threshold Cryptography: Sharing a Secret with
                  Devices That Cannot Store Shares},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {207},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/207},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SimoensPP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AndreevaMP10,
  author       = {Elena Andreeva and
                  Bart Mennink and
                  Bart Preneel},
  title        = {On the Indifferentiability of the Gr{\"{o}}stl Hash Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {298},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/298},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AndreevaMP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IdeguchiTP10,
  author       = {Kota Ideguchi and
                  Elmar Tischhauser and
                  Bart Preneel},
  title        = {Improved Collision Attacks on the Reduced-Round Gr{\"{o}}stl
                  Hash Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {375},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/375},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IdeguchiTP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AndreevaMP10a,
  author       = {Elena Andreeva and
                  Bart Mennink and
                  Bart Preneel},
  title        = {Security Reductions of the Second Round {SHA-3} Candidates},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {381},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/381},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AndreevaMP10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/AlsenoyCSDP09,
  author       = {Brendan Van Alsenoy and
                  Danny De Cock and
                  Koen Simoens and
                  Jos Dumortier and
                  Bart Preneel},
  title        = {Delegation and digital mandates: Legal requirements and security objectives},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {25},
  number       = {5},
  pages        = {415--431},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.clsr.2009.07.007},
  doi          = {10.1016/J.CLSR.2009.07.007},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/AlsenoyCSDP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijwmc/SeysP09,
  author       = {Stefaan Seys and
                  Bart Preneel},
  title        = {{ARM:} anonymous routing protocol for mobile ad hoc networks},
  journal      = {Int. J. Wirel. Mob. Comput.},
  volume       = {3},
  number       = {3},
  pages        = {145--155},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJWMC.2009.028896},
  doi          = {10.1504/IJWMC.2009.028896},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijwmc/SeysP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/WanDBPG09,
  author       = {Zhiguo Wan and
                  Robert H. Deng and
                  Feng Bao and
                  Bart Preneel and
                  Ming Gu},
  title        = {\emph{n} PAKE\({}^{\mbox{+}}\): {A} Tree-Based Group Password-Authenticated
                  Key Exchange Protocol Using Different Passwords},
  journal      = {J. Comput. Sci. Technol.},
  volume       = {24},
  number       = {1},
  pages        = {138--151},
  year         = {2009},
  url          = {https://doi.org/10.1007/s11390-009-9207-6},
  doi          = {10.1007/S11390-009-9207-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcst/WanDBPG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/oir/DengCP09,
  author       = {Mina Deng and
                  Danny De Cock and
                  Bart Preneel},
  title        = {Towards a cross-context identity management framework in e-health},
  journal      = {Online Inf. Rev.},
  volume       = {33},
  number       = {3},
  pages        = {422--442},
  year         = {2009},
  url          = {https://doi.org/10.1108/14684520910969880},
  doi          = {10.1108/14684520910969880},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/oir/DengCP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RivestCPRSV09,
  author       = {Ronald L. Rivest and
                  David Chaum and
                  Bart Preneel and
                  Aviel D. Rubin and
                  Donald G. Saari and
                  Poorvi L. Vora},
  title        = {Guest editorial: special issue on electronic voting},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {4},
  pages        = {593--596},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2034721},
  doi          = {10.1109/TIFS.2009.2034721},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/RivestCPRSV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WanRZPG09,
  author       = {Zhiguo Wan and
                  Kui Ren and
                  Bo Zhu and
                  Bart Preneel and
                  Ming Gu},
  editor       = {Wanqing Li and
                  Willy Susilo and
                  Udaya Kiran Tupakula and
                  Reihaneh Safavi{-}Naini and
                  Vijay Varadharajan},
  title        = {Anonymous user communication for privacy protection in wireless metropolitan
                  mesh networks},
  booktitle    = {Proceedings of the 2009 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2009, Sydney, Australia, March
                  10-12, 2009},
  pages        = {368--371},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1533057.1533106},
  doi          = {10.1145/1533057.1533106},
  timestamp    = {Fri, 18 Mar 2022 11:47:58 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WanRZPG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/MouhaSAPTTP09,
  author       = {Nicky Mouha and
                  Gautham Sekar and
                  Jean{-}Philippe Aumasson and
                  Thomas Peyrin and
                  S{\o}ren S. Thomsen and
                  Meltem S{\"{o}}nmez Turan and
                  Bart Preneel},
  editor       = {Feng Bao and
                  Moti Yung and
                  Dongdai Lin and
                  Jiwu Jing},
  title        = {Cryptanalysis of the {ESSENCE} Family of Hash Functions},
  booktitle    = {Information Security and Cryptology - 5th International Conference,
                  Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6151},
  pages        = {15--34},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-16342-5\_2},
  doi          = {10.1007/978-3-642-16342-5\_2},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/MouhaSAPTTP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ddecs/MulderAPVV09,
  author       = {Elke De Mulder and
                  Wim Aerts and
                  Bart Preneel and
                  Ingrid Verbauwhede and
                  Guy A. E. Vandenbosch},
  title        = {Case Study : {A} class {E} power amplifier for {ISO-14443A}},
  booktitle    = {Proceedings of the 2009 {IEEE} Symposium on Design and Diagnostics
                  of Electronic Circuits and Systems, {DDECS} 2009, April 15-17, 2009,
                  Liberec, Czech Republic},
  pages        = {20--23},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/DDECS.2009.5012091},
  doi          = {10.1109/DDECS.2009.5012091},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ddecs/MulderAPVV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecctd/GierlichsMPV09,
  author       = {Benedikt Gierlichs and
                  Elke De Mulder and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  title        = {Empirical comparison of side channel analysis distinguishers on {DES}
                  in hardware},
  booktitle    = {19th European Conference on Circuit Theory and Design, {ECCTD} 2009,
                  Antalya, Turkey, August 23-27, 2009},
  pages        = {391--394},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ECCTD.2009.5275003},
  doi          = {10.1109/ECCTD.2009.5275003},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecctd/GierlichsMPV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/IndesteegeP09,
  author       = {Sebastiaan Indesteege and
                  Bart Preneel},
  editor       = {Orr Dunkelman},
  title        = {Practical Collisions for EnRUPT},
  booktitle    = {Fast Software Encryption, 16th International Workshop, {FSE} 2009,
                  Leuven, Belgium, February 22-25, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5665},
  pages        = {246--259},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03317-9\_15},
  doi          = {10.1007/978-3-642-03317-9\_15},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/IndesteegeP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcs/WengP09,
  author       = {Li Weng and
                  Bart Preneel},
  title        = {Shape-based features for image hashing},
  booktitle    = {Proceedings of the 2009 {IEEE} International Conference on Multimedia
                  and Expo, {ICME} 2009, June 28 - July 2, 2009, New York City, NY,
                  {USA}},
  pages        = {1074--1077},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICME.2009.5202684},
  doi          = {10.1109/ICME.2009.5202684},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icmcs/WengP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-4/PeetersKP09,
  author       = {Roel Peeters and
                  Markulf Kohlweiss and
                  Bart Preneel},
  editor       = {Jan Camenisch and
                  Dogan Kesdogan},
  title        = {Threshold Things That Think: Authorisation for Resharing},
  booktitle    = {iNetSec 2009 - Open Research Problems in Network Security - {IFIP}
                  {WG} 11.4 International Workshop, Zurich, Switzerland, April 23-24,
                  2009, Revised Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {309},
  pages        = {111--124},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-05437-2\_11},
  doi          = {10.1007/978-3-642-05437-2\_11},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-4/PeetersKP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/NakaharaSFCSP09,
  author       = {Jorge Nakahara Jr. and
                  Gautham Sekar and
                  Daniel Santana de Freitas and
                  Chang Chiann and
                  Ramon Hugo de Souza and
                  Bart Preneel},
  editor       = {Pierangela Samarati and
                  Moti Yung and
                  Fabio Martinelli and
                  Claudio A. Ardagna},
  title        = {A New Approach to \emph{chi}\({}^{\mbox{2}}\) Cryptanalysis of Block
                  Ciphers},
  booktitle    = {Information Security, 12th International Conference, {ISC} 2009, Pisa,
                  Italy, September 7-9, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5735},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04474-8\_1},
  doi          = {10.1007/978-3-642-04474-8\_1},
  timestamp    = {Mon, 21 Mar 2022 18:09:53 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/NakaharaSFCSP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/SaxenaWP09,
  author       = {Amitabh Saxena and
                  Brecht Wyseur and
                  Bart Preneel},
  editor       = {Pierangela Samarati and
                  Moti Yung and
                  Fabio Martinelli and
                  Claudio A. Ardagna},
  title        = {Towards Security Notions for White-Box Cryptography},
  booktitle    = {Information Security, 12th International Conference, {ISC} 2009, Pisa,
                  Italy, September 7-9, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5735},
  pages        = {49--58},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04474-8\_4},
  doi          = {10.1007/978-3-642-04474-8\_4},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/SaxenaWP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/Preneel09,
  author       = {Bart Preneel},
  editor       = {Tsuyoshi Takagi and
                  Masahiro Mambo},
  title        = {The Future of Cryptographic Algorithms},
  booktitle    = {Advances in Information and Computer Security, 4th International Workshop
                  on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5824},
  pages        = {1--2},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04846-3\_1},
  doi          = {10.1007/978-3-642-04846-3\_1},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/Preneel09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SekarP09,
  author       = {Gautham Sekar and
                  Bart Preneel},
  editor       = {Tsuyoshi Takagi and
                  Masahiro Mambo},
  title        = {Improved Distinguishing Attacks on {HC-256}},
  booktitle    = {Advances in Information and Computer Security, 4th International Workshop
                  on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5824},
  pages        = {38--52},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04846-3\_4},
  doi          = {10.1007/978-3-642-04846-3\_4},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/SekarP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/DengBPP09,
  author       = {Mina Deng and
                  Tiziano Bianchi and
                  Alessandro Piva and
                  Bart Preneel},
  editor       = {Edward W. Felten and
                  Jana Dittmann and
                  Jessica J. Fridrich and
                  Scott Craver},
  title        = {An efficient buyer-seller watermarking protocol based on composite
                  signal representation},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2009, Princeton, NJ,
                  USA, September 07 - 08, 2009},
  pages        = {9--18},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1597817.1597820},
  doi          = {10.1145/1597817.1597820},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/DengBPP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pairing/RialKP09,
  author       = {Alfredo Rial and
                  Markulf Kohlweiss and
                  Bart Preneel},
  editor       = {Hovav Shacham and
                  Brent Waters},
  title        = {Universally Composable Adaptive Priced Oblivious Transfer},
  booktitle    = {Pairing-Based Cryptography - Pairing 2009, Third International Conference,
                  Palo Alto, CA, USA, August 12-14, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5671},
  pages        = {231--247},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03298-1\_15},
  doi          = {10.1007/978-3-642-03298-1\_15},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pairing/RialKP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/IndesteegeMPS09,
  author       = {Sebastiaan Indesteege and
                  Florian Mendel and
                  Bart Preneel and
                  Martin Schl{\"{a}}ffer},
  editor       = {Michael J. Jacobson Jr. and
                  Vincent Rijmen and
                  Reihaneh Safavi{-}Naini},
  title        = {Practical Collisions for {SHAMATA-256}},
  booktitle    = {Selected Areas in Cryptography, 16th Annual International Workshop,
                  {SAC} 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5867},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-05445-7\_1},
  doi          = {10.1007/978-3-642-05445-7\_1},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/IndesteegeMPS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/AumassonDIP09,
  author       = {Jean{-}Philippe Aumasson and
                  Orr Dunkelman and
                  Sebastiaan Indesteege and
                  Bart Preneel},
  editor       = {Michael J. Jacobson Jr. and
                  Vincent Rijmen and
                  Reihaneh Safavi{-}Naini},
  title        = {Cryptanalysis of Dynamic {SHA(2)}},
  booktitle    = {Selected Areas in Cryptography, 16th Annual International Workshop,
                  {SAC} 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5867},
  pages        = {415--432},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-05445-7\_26},
  doi          = {10.1007/978-3-642-05445-7\_26},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/AumassonDIP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/DammeWKP09,
  author       = {Gauthier Van Damme and
                  Karel Wouters and
                  Hakan Karahan and
                  Bart Preneel},
  editor       = {Suman Banerjee},
  title        = {Offline {NFC} payments with electronic vouchers},
  booktitle    = {Proceedings of the 1st {ACM} {SIGCOMM} Workshop on Networking, Systems,
                  and Applications for Mobile Handhelds, MobiHeld 2009, Barcelona, Spain,
                  August 17, 2009},
  pages        = {25--30},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1592606.1592613},
  doi          = {10.1145/1592606.1592613},
  timestamp    = {Thu, 27 Apr 2023 08:33:19 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcomm/DammeWKP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/PeetersKPS09,
  author       = {Roel Peeters and
                  Markulf Kohlweiss and
                  Bart Preneel and
                  Nicky Sulmon},
  editor       = {Lorrie Faith Cranor},
  title        = {Threshold things that think: usable authorization for resharing},
  booktitle    = {Proceedings of the 5th Symposium on Usable Privacy and Security, {SOUPS}
                  2009, Mountain View, California, USA, July 15-17, 2009},
  series       = {{ACM} International Conference Proceeding Series},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1572532.1572557},
  doi          = {10.1145/1572532.1572557},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/soups/PeetersKPS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SimoensTP09,
  author       = {Koen Simoens and
                  Pim Tuyls and
                  Bart Preneel},
  title        = {Privacy Weaknesses in Biometric Sketches},
  booktitle    = {30th {IEEE} Symposium on Security and Privacy {(SP} 2009), 17-20 May
                  2009, Oakland, California, {USA}},
  pages        = {188--203},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SP.2009.24},
  doi          = {10.1109/SP.2009.24},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/SimoensTP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/SterckxGPV09,
  author       = {Micha{\"{e}}l Sterckx and
                  Benedikt Gierlichs and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  title        = {Efficient implementation of anonymous credentials on Java Card smart
                  cards},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {106--110},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386474},
  doi          = {10.1109/WIFS.2009.5386474},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/SterckxGPV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/MulderGPV09,
  author       = {Elke De Mulder and
                  Benedikt Gierlichs and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  title        = {Practical {DPA} attacks on {MDPL}},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {191--195},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386455},
  doi          = {10.1109/WIFS.2009.5386455},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/MulderGPV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/MouhaCIP09,
  author       = {Nicky Mouha and
                  Christophe De Canni{\`{e}}re and
                  Sebastiaan Indesteege and
                  Bart Preneel},
  editor       = {Heung Youl Youm and
                  Moti Yung},
  title        = {Finding Collisions for a 45-Step Simplified {HAS-V}},
  booktitle    = {Information Security Applications, 10th International Workshop, {WISA}
                  2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5932},
  pages        = {206--225},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10838-9\_16},
  doi          = {10.1007/978-3-642-10838-9\_16},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/MouhaCIP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/natosec/IndesteegeP09,
  author       = {Sebastiaan Indesteege and
                  Bart Preneel},
  editor       = {Bart Preneel and
                  Stefan M. Dodunekov and
                  Vincent Rijmen and
                  Svetla Nikova},
  title        = {Coding Theory and Hash Function Design - {A} Case Study: The Lane
                  Hash Function},
  booktitle    = {Enhancing Cryptographic Primitives with Techniques from Error Correcting
                  Codes},
  series       = {{NATO} Science for Peace and Security Series - {D:} Information and
                  Communication Security},
  volume       = {23},
  pages        = {63--68},
  publisher    = {{IOS} Press},
  year         = {2009},
  url          = {https://doi.org/10.3233/978-1-60750-002-5-63},
  doi          = {10.3233/978-1-60750-002-5-63},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/natosec/IndesteegeP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/africacrypt/2009,
  editor       = {Bart Preneel},
  title        = {Progress in Cryptology - {AFRICACRYPT} 2009, Second International
                  Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25,
                  2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5580},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02384-2},
  doi          = {10.1007/978-3-642-02384-2},
  isbn         = {978-3-642-02383-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dagstuhl/2009P9031,
  editor       = {Helena Handschuh and
                  Stefan Lucks and
                  Bart Preneel and
                  Phillip Rogaway},
  title        = {Symmetric Cryptography, 11.01. - 16.01.2009},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {09031},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year         = {2009},
  url          = {http://drops.dagstuhl.de/portals/09031/},
  timestamp    = {Thu, 10 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/2009P9031.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dagstuhl/2009P9282,
  editor       = {Jorge Guajardo and
                  Bart Preneel and
                  Ahmad{-}Reza Sadeghi and
                  Pim Tuyls},
  title        = {Foundations for Forgery-Resilient Cryptographic Hardware, 05.07. -
                  08.07.2009},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {09282},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year         = {2009},
  url          = {http://drops.dagstuhl.de/portals/09282/},
  timestamp    = {Thu, 10 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/2009P9282.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/natosec/23,
  editor       = {Bart Preneel and
                  Stefan M. Dodunekov and
                  Vincent Rijmen and
                  Svetla Nikova},
  title        = {Enhancing Cryptographic Primitives with Techniques from Error Correcting
                  Codes},
  series       = {{NATO} Science for Peace and Security Series - {D:} Information and
                  Communication Security},
  volume       = {23},
  publisher    = {{IOS} Press},
  year         = {2009},
  url          = {http://www.booksonline.iospress.nl/Content/View.aspx?piid=12139},
  isbn         = {978-1-60750-002-5},
  timestamp    = {Wed, 11 May 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/natosec/23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/GuajardoPST09,
  author       = {Jorge Guajardo and
                  Bart Preneel and
                  Ahmad{-}Reza Sadeghi and
                  Pim Tuyls},
  editor       = {Jorge Guajardo and
                  Bart Preneel and
                  Ahmad{-}Reza Sadeghi and
                  Pim Tuyls},
  title        = {09282 Executive Summary - Foundations for Forgery-Resilient Cryptographic
                  Hardware},
  booktitle    = {Foundations for Forgery-Resilient Cryptographic Hardware, 05.07. -
                  08.07.2009},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {09282},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year         = {2009},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2010/2408/},
  timestamp    = {Thu, 10 Jun 2021 13:02:11 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/GuajardoPST09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/GuajardoPTS09,
  author       = {Jorge Guajardo and
                  Bart Preneel and
                  Pim Tuyls and
                  Ahmad{-}Reza Sadeghi},
  editor       = {Jorge Guajardo and
                  Bart Preneel and
                  Ahmad{-}Reza Sadeghi and
                  Pim Tuyls},
  title        = {09282 Abstracts Collection - Foundations for Forgery-Resilient Cryptographic
                  Hardware},
  booktitle    = {Foundations for Forgery-Resilient Cryptographic Hardware, 05.07. -
                  08.07.2009},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {09282},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year         = {2009},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2010/2407/},
  timestamp    = {Thu, 23 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/GuajardoPTS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/HandschuhLPR09,
  author       = {Helena Handschuh and
                  Stefan Lucks and
                  Bart Preneel and
                  Phillip Rogaway},
  editor       = {Helena Handschuh and
                  Stefan Lucks and
                  Bart Preneel and
                  Phillip Rogaway},
  title        = {09031 Abstracts Collection - Symmetric Cryptography},
  booktitle    = {Symmetric Cryptography, 11.01. - 16.01.2009},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {09031},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year         = {2009},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2009/1960/},
  timestamp    = {Thu, 10 Jun 2021 13:02:06 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/HandschuhLPR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/HandschuhLPR09a,
  author       = {Helena Handschuh and
                  Stefan Lucks and
                  Bart Preneel and
                  Phillip Rogaway},
  editor       = {Helena Handschuh and
                  Stefan Lucks and
                  Bart Preneel and
                  Phillip Rogaway},
  title        = {09031 Executive Summary - Symmetric Cryptography},
  booktitle    = {Symmetric Cryptography, 11.01. - 16.01.2009},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {09031},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year         = {2009},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2009/1959/},
  timestamp    = {Thu, 23 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/HandschuhLPR09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/IndesteegeACDKN09,
  author       = {Sebastiaan Indesteege and
                  Elena Andreeva and
                  Christophe De Canni{\`{e}}re and
                  Orr Dunkelman and
                  Emilia K{\"{a}}sper and
                  Svetla Nikova and
                  Bart Preneel and
                  Elmar Tischhauser},
  editor       = {Helena Handschuh and
                  Stefan Lucks and
                  Bart Preneel and
                  Phillip Rogaway},
  title        = {The Lane hash function},
  booktitle    = {Symmetric Cryptography, 11.01. - 16.01.2009},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {09031},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year         = {2009},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2009/1952/},
  timestamp    = {Thu, 23 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/IndesteegeACDKN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/IndesteegeP09,
  author       = {Sebastiaan Indesteege and
                  Bart Preneel},
  editor       = {Helena Handschuh and
                  Stefan Lucks and
                  Bart Preneel and
                  Phillip Rogaway},
  title        = {Practical Collisions for EnRUPT},
  booktitle    = {Symmetric Cryptography, 11.01. - 16.01.2009},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {09031},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year         = {2009},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2009/1950/},
  timestamp    = {Thu, 23 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/IndesteegeP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/IndesteegeP09a,
  author       = {Sebastiaan Indesteege and
                  Bart Preneel},
  editor       = {Helena Handschuh and
                  Stefan Lucks and
                  Bart Preneel and
                  Phillip Rogaway},
  title        = {Practical Preimages for Maraca},
  booktitle    = {Symmetric Cryptography, 11.01. - 16.01.2009},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {09031},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year         = {2009},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2009/1951/},
  timestamp    = {Thu, 23 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/IndesteegeP09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AumassonDIP09,
  author       = {Jean{-}Philippe Aumasson and
                  Orr Dunkelman and
                  Sebastiaan Indesteege and
                  Bart Preneel},
  title        = {Cryptanalysis of Dynamic {SHA(2)}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {184},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/184},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AumassonDIP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GierlichsBPV09,
  author       = {Benedikt Gierlichs and
                  Lejla Batina and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  title        = {Revisiting Higher-Order {DPA} Attacks: Multivariate Mutual Information
                  Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {228},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/228},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GierlichsBPV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MulderGPV09,
  author       = {Elke De Mulder and
                  Benedikt Gierlichs and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  title        = {Practical {DPA} Attacks on {MDPL}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {231},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/231},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MulderGPV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DingGP09,
  author       = {Ning Ding and
                  Dawu Gu and
                  Bart Preneel},
  title        = {Precise Bounded-Concurrent Zero-Knowledge in Almost Constant Rounds},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {448},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/448},
  timestamp    = {Tue, 24 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DingGP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Hermans0BVP09,
  author       = {Jens Hermans and
                  Michael Schneider and
                  Johannes Buchmann and
                  Frederik Vercauteren and
                  Bart Preneel},
  title        = {Parallel Shortest Lattice Vector Enumeration on Graphics Cards},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {601},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/601},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/Hermans0BVP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/OrsBPV08,
  author       = {Siddika Berna {\"{O}}rs and
                  Lejla Batina and
                  Bart Preneel and
                  Joos Vandewalle},
  title        = {Hardware implementation of an elliptic curve processor over GF(p)
                  with Montgomery modular multiplier},
  journal      = {Int. J. Embed. Syst.},
  volume       = {3},
  number       = {4},
  pages        = {229--240},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJES.2008.022394},
  doi          = {10.1504/IJES.2008.022394},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijes/OrsBPV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/CockSP08,
  author       = {Danny De Cock and
                  Koen Simoens and
                  Bart Preneel},
  title        = {Insights on identity documents based on the Belgian case study},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {13},
  number       = {2},
  pages        = {54--60},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.istr.2008.06.004},
  doi          = {10.1016/J.ISTR.2008.06.004},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/CockSP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/ChenSWWDLMMMPPS08,
  author       = {Liqun Chen and
                  Willy Susilo and
                  Huaxiong Wang and
                  Duncan S. Wong and
                  Ed Dawson and
                  Xuejia Lai and
                  Masahiro Mambo and
                  Atsuko Miyaji and
                  Yi Mu and
                  David Pointcheval and
                  Bart Preneel and
                  Nigel P. Smart},
  title        = {Cryptography in Computer System Security},
  journal      = {J. Univers. Comput. Sci.},
  volume       = {14},
  number       = {3},
  pages        = {314--317},
  year         = {2008},
  url          = {http://www.jucs.org/jucs\_14\_3/cryptography\_in\_computer\_system},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jucs/ChenSWWDLMMMPPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scp/SchellekensWP08,
  author       = {Dries Schellekens and
                  Brecht Wyseur and
                  Bart Preneel},
  title        = {Remote attestation on legacy operating systems with trusted platform
                  modules},
  journal      = {Sci. Comput. Program.},
  volume       = {74},
  number       = {1-2},
  pages        = {13--22},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.scico.2008.09.005},
  doi          = {10.1016/J.SCICO.2008.09.005},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scp/SchellekensWP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/WoutersSLP08,
  author       = {Karel Wouters and
                  Koen Simoens and
                  Danny Lathouwers and
                  Bart Preneel},
  title        = {Secure and Privacy-Friendly Logging for eGovernment Services},
  booktitle    = {Proceedings of the The Third International Conference on Availability,
                  Reliability and Security, {ARES} 2008, March 4-7, 2008, Technical
                  University of Catalonia, Barcelona , Spain},
  pages        = {1091--1096},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ARES.2008.41},
  doi          = {10.1109/ARES.2008.41},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/WoutersSLP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/adhoc-now/SingeleeLBPSCPMB08,
  author       = {Dave Singel{\'{e}}e and
                  Beno{\^{\i}}t Latr{\'{e}} and
                  Bart Braem and
                  Micha{\"{e}}l Peeters and
                  Marijke De Soete and
                  Peter De Cleyn and
                  Bart Preneel and
                  Ingrid Moerman and
                  Chris Blondia},
  editor       = {David Coudert and
                  David Simplot{-}Ryl and
                  Ivan Stojmenovic},
  title        = {A Secure Cross-Layer Protocol for Multi-hop Wireless Body Area Networks},
  booktitle    = {Ad-hoc, Mobile and Wireless Networks, 7th International Conference,
                  {ADHOC-NOW} 2008, Sophia-Antipolis, France, September 10-12, 2008,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5198},
  pages        = {94--107},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85209-4\_8},
  doi          = {10.1007/978-3-540-85209-4\_8},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/adhoc-now/SingeleeLBPSCPMB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/CanniereKP08,
  author       = {Christophe De Canni{\`{e}}re and
                  {\"{O}}zg{\"{u}}l K{\"{u}}{\c{c}}{\"{u}}k and
                  Bart Preneel},
  editor       = {Serge Vaudenay},
  title        = {Analysis of Grain's Initialization Algorithm},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2008, First International Conference
                  on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5023},
  pages        = {276--289},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68164-9\_19},
  doi          = {10.1007/978-3-540-68164-9\_19},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/CanniereKP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/biosig/PeetersSCP08,
  author       = {Roel Peeters and
                  Koen Simoens and
                  Danny De Cock and
                  Bart Preneel},
  editor       = {Arslan Br{\"{o}}mme and
                  Christoph Busch and
                  Detlef H{\"{u}}hnlein},
  title        = {Cross-Context Delegation through Identity Federation},
  booktitle    = {{BIOSIG} 2008 - Proceedings of the Special Interest Group on Biometrics
                  and Electronic Signatures, 11.-12. September 2008 in Darmstadt, Germany},
  series       = {{LNI}},
  volume       = {{P-137}},
  pages        = {79--92},
  publisher    = {{GI}},
  year         = {2008},
  url          = {https://dl.gi.de/handle/20.500.12116/21200},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/biosig/PeetersSCP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GierlichsBTP08,
  author       = {Benedikt Gierlichs and
                  Lejla Batina and
                  Pim Tuyls and
                  Bart Preneel},
  editor       = {Elisabeth Oswald and
                  Pankaj Rohatgi},
  title        = {Mutual Information Analysis},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International
                  Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5154},
  pages        = {426--442},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85053-3\_27},
  doi          = {10.1007/978-3-540-85053-3\_27},
  timestamp    = {Thu, 14 Oct 2021 10:28:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GierlichsBTP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/Preneel08,
  author       = {Bart Preneel},
  editor       = {Moti Yung and
                  Peng Liu and
                  Dongdai Lin},
  title        = {The State of Hash Functions and the {NIST} {SHA-3} Competition},
  booktitle    = {Information Security and Cryptology, 4th International Conference,
                  Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5487},
  pages        = {1--11},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-01440-6\_1},
  doi          = {10.1007/978-3-642-01440-6\_1},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/Preneel08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HandschuhP08,
  author       = {Helena Handschuh and
                  Bart Preneel},
  editor       = {David A. Wagner},
  title        = {Key-Recovery Attacks on Universal Hash Function Based {MAC} Algorithms},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5157},
  pages        = {144--161},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85174-5\_9},
  doi          = {10.1007/978-3-540-85174-5\_9},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HandschuhP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/DiazTP08,
  author       = {Claudia D{\'{\i}}az and
                  Carmela Troncoso and
                  Bart Preneel},
  editor       = {Sushil Jajodia and
                  Javier L{\'{o}}pez},
  title        = {A Framework for the Analysis of Mix-Based Steganographic File Systems},
  booktitle    = {Computer Security - {ESORICS} 2008, 13th European Symposium on Research
                  in Computer Security, M{\'{a}}laga, Spain, October 6-8, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5283},
  pages        = {428--445},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88313-5\_28},
  doi          = {10.1007/978-3-540-88313-5\_28},
  timestamp    = {Thu, 29 Aug 2019 08:09:59 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/DiazTP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euc/ZhangGP08,
  author       = {Yuanyuan Zhang and
                  Dawu Gu and
                  Bart Preneel},
  editor       = {Cheng{-}Zhong Xu and
                  Minyi Guo},
  title        = {Reliable Key Establishment Scheme Exploiting Unidirectional Links
                  in Wireless Sensor Networks},
  booktitle    = {2008 {IEEE/IPIP} International Conference on Embedded and Ubiquitous
                  Computing {(EUC} 2008), Shanghai, China, December 17-20, 2008, Volume
                  {I}},
  pages        = {272--279},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/EUC.2008.10},
  doi          = {10.1109/EUC.2008.10},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/euc/ZhangGP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/IndesteegeKDBP08,
  author       = {Sebastiaan Indesteege and
                  Nathan Keller and
                  Orr Dunkelman and
                  Eli Biham and
                  Bart Preneel},
  editor       = {Nigel P. Smart},
  title        = {A Practical Attack on KeeLoq},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Istanbul, Turkey, April 13-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4965},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78967-3\_1},
  doi          = {10.1007/978-3-540-78967-3\_1},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/IndesteegeKDBP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciw/DengP08,
  author       = {Mina Deng and
                  Bart Preneel},
  editor       = {Abdelhamid Mellouk and
                  Jun Bi and
                  Guadalupe Ortiz and
                  Dickson K. W. Chiu and
                  Manuela Popescu},
  title        = {On Secure and Anonymous Buyer-Seller Watermarking Protocol},
  booktitle    = {Third International Conference on Internet and Web Applications and
                  Services, {ICIW} 2008, 8-13 June 2008, Athens, Greece},
  pages        = {524--529},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICIW.2008.28},
  doi          = {10.1109/ICIW.2008.28},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iciw/DengP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isecs/DengP08,
  author       = {Mina Deng and
                  Bart Preneel},
  editor       = {Fei Yu and
                  Qi Luo and
                  Yongjun Chen and
                  Zhigang Chen},
  title        = {Attacks on Two Buyer-Seller Watermarking Protocols and an Improvement
                  for Revocable Anonymity},
  booktitle    = {Proceedings of The International Symposium on Electronic Commerce
                  and Security, {ISECS} 2008, August 3-5, 2008, Guangzhou, China},
  pages        = {923--929},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISECS.2008.103},
  doi          = {10.1109/ISECS.2008.103},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isecs/DengP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/CappaertPAMB08,
  author       = {Jan Cappaert and
                  Bart Preneel and
                  Bertrand Anckaert and
                  Matias Madou and
                  Koen De Bosschere},
  editor       = {Liqun Chen and
                  Yi Mu and
                  Willy Susilo},
  title        = {Towards Tamper Resistant Code Encryption: Practice and Experience},
  booktitle    = {Information Security Practice and Experience, 4th International Conference,
                  {ISPEC} 2008, Sydney, Australia, April 21-23, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4991},
  pages        = {86--100},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79104-1\_7},
  doi          = {10.1007/978-3-540-79104-1\_7},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/CappaertPAMB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/IndesteegeP08,
  author       = {Sebastiaan Indesteege and
                  Bart Preneel},
  editor       = {Tzong{-}Chen Wu and
                  Chin{-}Laung Lei and
                  Vincent Rijmen and
                  Der{-}Tsai Lee},
  title        = {Collisions for RC4-Hash},
  booktitle    = {Information Security, 11th International Conference, {ISC} 2008, Taipei,
                  Taiwan, September 15-18, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5222},
  pages        = {355--366},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85886-7\_25},
  doi          = {10.1007/978-3-540-85886-7\_25},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/IndesteegeP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/otm/ParkPSZ08,
  author       = {Jong Hyuk Park and
                  Bart Preneel and
                  Ravi S. Sandhu and
                  Andr{\'{e}} Z{\'{u}}quete},
  editor       = {Robert Meersman and
                  Zahir Tari},
  title        = {{IS} 2008 {PC} Co-chairs' Message},
  booktitle    = {On the Move to Meaningful Internet Systems: {OTM} 2008, {OTM} 2008
                  Confederated International Conferences, CoopIS, DOA, GADA, IS, and
                  {ODBASE} 2008, Monterrey, Mexico, November 9-14, 2008, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5332},
  pages        = {937},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88873-4\_1},
  doi          = {10.1007/978-3-540-88873-4\_1},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/otm/ParkPSZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/TroncosoGPV08,
  author       = {Carmela Troncoso and
                  Benedikt Gierlichs and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  editor       = {Nikita Borisov and
                  Ian Goldberg},
  title        = {Perfect Matching Disclosure Attacks},
  booktitle    = {Privacy Enhancing Technologies, 8th International Symposium, {PETS}
                  2008, Leuven, Belgium, July 23-25, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5134},
  pages        = {2--23},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70630-4\_2},
  doi          = {10.1007/978-3-540-70630-4\_2},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/TroncosoGPV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/AndreevaP08,
  author       = {Elena Andreeva and
                  Bart Preneel},
  editor       = {Roberto Maria Avanzi and
                  Liam Keliher and
                  Francesco Sica},
  title        = {A Three-Property-Secure Hash Function},
  booktitle    = {Selected Areas in Cryptography, 15th International Workshop, {SAC}
                  2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5381},
  pages        = {228--244},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04159-4\_15},
  doi          = {10.1007/978-3-642-04159-4\_15},
  timestamp    = {Thu, 07 Sep 2023 13:44:11 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/AndreevaP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/IndesteegeMPR08,
  author       = {Sebastiaan Indesteege and
                  Florian Mendel and
                  Bart Preneel and
                  Christian Rechberger},
  editor       = {Roberto Maria Avanzi and
                  Liam Keliher and
                  Francesco Sica},
  title        = {Collisions and Other Non-random Properties for Step-Reduced {SHA-256}},
  booktitle    = {Selected Areas in Cryptography, 15th International Workshop, {SAC}
                  2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5381},
  pages        = {276--293},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04159-4\_18},
  doi          = {10.1007/978-3-642-04159-4\_18},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/IndesteegeMPR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Preneel08,
  author       = {Bart Preneel},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Cryptographic Algorithms - Successes, Failures and Challenges},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {21--27},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 13:20:36 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Preneel08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmap/DengWP08,
  author       = {Mina Deng and
                  Li Weng and
                  Bart Preneel},
  editor       = {Pedro A. Amado Assun{\c{c}}{\~{a}}o and
                  S{\'{e}}rgio M. M. de Faria},
  title        = {Anonymous Buyer-Seller Watermarking Protocol wth Additive Homomorphism},
  booktitle    = {{SIGMAP} 2008 - Proceedings of the International Conference on Signal
                  Processing and Multimedia Applications, Porto, Portugal, July 26-29,
                  2008, {SIGMAP} is part of {ICETE} - The International Joint Conference
                  on e-Business and Telecommunications},
  pages        = {300--307},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 13:52:49 +0200},
  biburl       = {https://dblp.org/rec/conf/sigmap/DengWP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/storagess/TroncosoCP08,
  author       = {Carmela Troncoso and
                  Danny De Cock and
                  Bart Preneel},
  editor       = {Yongdae Kim and
                  William Yurcik},
  title        = {Improving secure long-term archival of digitally signed documents},
  booktitle    = {Proceedings of the 2008 {ACM} Workshop On Storage Security And Survivability,
                  StorageSS 2008, Alexandria, VA, USA, October 31, 2008},
  pages        = {27--36},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456469.1456476},
  doi          = {10.1145/1456469.1456476},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/storagess/TroncosoCP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/SchellekensTP08,
  author       = {Dries Schellekens and
                  Pim Tuyls and
                  Bart Preneel},
  editor       = {Peter Lipp and
                  Ahmad{-}Reza Sadeghi and
                  Klaus{-}Michael Koch},
  title        = {Embedded Trusted Computing with Authenticated Non-volatile Memory},
  booktitle    = {Trusted Computing - Challenges and Applications, First International
                  Conference on Trusted Computing and Trust in Information Technologies,
                  Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4968},
  pages        = {60--74},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68979-9\_5},
  doi          = {10.1007/978-3-540-68979-9\_5},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/SchellekensTP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/WanRLP08,
  author       = {Zhiguo Wan and
                  Kui Ren and
                  Wenjing Lou and
                  Bart Preneel},
  title        = {Anonymous ID-Based Group Key Agreement for Wireless Networks},
  booktitle    = {{WCNC} 2008, {IEEE} Wireless Communications {\&} Networking Conference,
                  March 31 2008 - April 3 2008, Las Vegas, Nevada, USA, Conference Proceedings},
  pages        = {2615--2620},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/WCNC.2008.459},
  doi          = {10.1109/WCNC.2008.459},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/wcnc/WanRLP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wd/DengSCPJ08,
  author       = {Mina Deng and
                  Riccardo Scandariato and
                  Danny De Cock and
                  Bart Preneel and
                  Wouter Joosen},
  title        = {Identity in federated electronic healthcare},
  booktitle    = {1st {IFIP} Wireless Days, {WD} 2008, Dubai, UAE, November 24-27, 2008},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/WD.2008.4812919},
  doi          = {10.1109/WD.2008.4812919},
  timestamp    = {Mon, 09 Aug 2021 14:54:04 +0200},
  biburl       = {https://dblp.org/rec/conf/wd/DengSCPJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/winsys/KnezevicVPV08,
  author       = {Miroslav Knezevic and
                  Vesselin Velichkov and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  editor       = {Mohammad S. Obaidat and
                  Rafael F. S. Caldeirinha},
  title        = {On the Practical Performance of Rateless Codes},
  booktitle    = {{WINSYS} 2008 - Proceedings of the International Conference on Wireless
                  Information Networks and Systems, Porto, Portugal, July 26-29, 2008,
                  {WINSYS} is part of {ICETE} - The International Joint Conference on
                  e-Business and Telecommunications},
  pages        = {173--176},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Wed, 09 Sep 2009 08:25:31 +0200},
  biburl       = {https://dblp.org/rec/conf/winsys/KnezevicVPV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/WanRP08,
  author       = {Zhiguo Wan and
                  Kui Ren and
                  Bart Preneel},
  editor       = {Virgil D. Gligor and
                  Jean{-}Pierre Hubaux and
                  Radha Poovendran},
  title        = {A secure privacy-preserving roaming protocol based on hierarchical
                  identity-based encryption for mobile networks},
  booktitle    = {Proceedings of the First {ACM} Conference on Wireless Network Security,
                  {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008},
  pages        = {62--67},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1352533.1352544},
  doi          = {10.1145/1352533.1352544},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/WanRP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/MulderDBP08,
  author       = {Yoni De Mulder and
                  George Danezis and
                  Lejla Batina and
                  Bart Preneel},
  editor       = {Vijay Atluri and
                  Marianne Winslett},
  title        = {Identification via location-profiling in {GSM} networks},
  booktitle    = {Proceedings of the 2008 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2008, Alexandria, VA, USA, October 27, 2008},
  pages        = {23--32},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456403.1456409},
  doi          = {10.1145/1456403.1456409},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/MulderDBP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/GierlichsTDPV08,
  author       = {Benedikt Gierlichs and
                  Carmela Troncoso and
                  Claudia D{\'{\i}}az and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  editor       = {Vijay Atluri and
                  Marianne Winslett},
  title        = {Revisiting a combinatorial approach toward measuring anonymity},
  booktitle    = {Proceedings of the 2008 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2008, Alexandria, VA, USA, October 27, 2008},
  pages        = {111--116},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456403.1456422},
  doi          = {10.1145/1456403.1456422},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wpes/GierlichsTDPV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/CanniereP08,
  author       = {Christophe De Canni{\`{e}}re and
                  Bart Preneel},
  editor       = {Matthew J. B. Robshaw and
                  Olivier Billet},
  title        = {Trivium},
  booktitle    = {New Stream Cipher Designs - The eSTREAM Finalists},
  series       = {Lecture Notes in Computer Science},
  volume       = {4986},
  pages        = {244--266},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68351-3\_18},
  doi          = {10.1007/978-3-540-68351-3\_18},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/CanniereP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sofsem/2008,
  editor       = {Viliam Geffert and
                  Juhani Karhum{\"{a}}ki and
                  Alberto Bertoni and
                  Bart Preneel and
                  Pavol N{\'{a}}vrat and
                  M{\'{a}}ria Bielikov{\'{a}}},
  title        = {{SOFSEM} 2008: Theory and Practice of Computer Science, 34th Conference
                  on Current Trends in Theory and Practice of Computer Science, Nov{\'{y}}
                  Smokovec, Slovakia, January 19-25, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4910},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-77566-9},
  doi          = {10.1007/978-3-540-77566-9},
  isbn         = {978-3-540-77565-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sofsem/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sofsem/2008-2,
  editor       = {Viliam Geffert and
                  Juhani Karhum{\"{a}}ki and
                  Alberto Bertoni and
                  Bart Preneel and
                  Pavol N{\'{a}}vrat and
                  M{\'{a}}ria Bielikov{\'{a}}},
  title        = {{SOFSEM} 2008: Theory and Practice of Computer Science, 34th Conference
                  on Current Trends in Theory and Practice of Computer Science, Nov{\'{y}}
                  Smokovec, Slovakia, January 19-25, 2008, Volume {II} - Student Research
                  Forum},
  publisher    = {Safarik University, Kosice, Slovakia},
  year         = {2008},
  isbn         = {978-80-7097-697-5},
  timestamp    = {Tue, 25 Nov 2008 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sofsem/2008-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IndesteegeMPR08,
  author       = {Sebastiaan Indesteege and
                  Florian Mendel and
                  Bart Preneel and
                  Christian Rechberger},
  title        = {Collisions and other Non-Random Properties for Step-Reduced {SHA-256}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {131},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/131},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IndesteegeMPR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SaxenaWP08,
  author       = {Amitabh Saxena and
                  Brecht Wyseur and
                  Bart Preneel},
  title        = {White-Box Cryptography: Formal Notions and (Im)possibility Results},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {273},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/273},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SaxenaWP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/SakiyamaBPV07,
  author       = {Kazuo Sakiyama and
                  Lejla Batina and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  title        = {{HW/SW} co-design for public-key cryptosystems on the 8051 micro-controller},
  journal      = {Comput. Electr. Eng.},
  volume       = {33},
  number       = {5-6},
  pages        = {324--332},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.compeleceng.2007.05.005},
  doi          = {10.1016/J.COMPELECENG.2007.05.005},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/SakiyamaBPV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/MulderOPV07,
  author       = {Elke De Mulder and
                  Siddika Berna {\"{O}}rs and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  title        = {Differential power and electromagnetic attacks on a {FPGA} implementation
                  of elliptic curve cryptosystems},
  journal      = {Comput. Electr. Eng.},
  volume       = {33},
  number       = {5-6},
  pages        = {367--382},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.compeleceng.2007.05.009},
  doi          = {10.1016/J.COMPELECENG.2007.05.009},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/MulderOPV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/Preneel07,
  author       = {Bart Preneel},
  title        = {A survey of recent developments in cryptographic algorithms for smart
                  cards},
  journal      = {Comput. Networks},
  volume       = {51},
  number       = {9},
  pages        = {2223--2233},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.comnet.2007.01.008},
  doi          = {10.1016/J.COMNET.2007.01.008},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/Preneel07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BackesGP07,
  author       = {Michael Backes and
                  Stefanos Gritzalis and
                  Bart Preneel},
  title        = {Preface},
  journal      = {Int. J. Inf. Sec.},
  volume       = {6},
  number       = {6},
  pages        = {359--360},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10207-007-0034-x},
  doi          = {10.1007/S10207-007-0034-X},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/BackesGP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/SakiyamaBPV07,
  author       = {Kazuo Sakiyama and
                  Lejla Batina and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  title        = {High-performance Public-key Cryptoprocessor for Wireless Mobile Applications},
  journal      = {Mob. Networks Appl.},
  volume       = {12},
  number       = {4},
  pages        = {245--258},
  year         = {2007},
  url          = {https://doi.org/10.1007/s11036-007-0020-6},
  doi          = {10.1007/S11036-007-0020-6},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/monet/SakiyamaBPV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/SakiyamaBPV07,
  author       = {Kazuo Sakiyama and
                  Lejla Batina and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  title        = {Multicore Curve-Based Cryptoprocessor with Reconfigurable Modular
                  Arithmetic Logic Units over GF(2\({}^{\mbox{n}}\))},
  journal      = {{IEEE} Trans. Computers},
  volume       = {56},
  number       = {9},
  pages        = {1269--1282},
  year         = {2007},
  url          = {https://doi.org/10.1109/TC.2007.1071},
  doi          = {10.1109/TC.2007.1071},
  timestamp    = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/SakiyamaBPV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AndreevaNPS07,
  author       = {Elena Andreeva and
                  Gregory Neven and
                  Bart Preneel and
                  Thomas Shrimpton},
  editor       = {Kaoru Kurosawa},
  title        = {Seven-Property-Preserving Iterated Hashing: {ROX}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2007, 13th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kuching, Malaysia, December 2-6, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4833},
  pages        = {130--146},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76900-2\_8},
  doi          = {10.1007/978-3-540-76900-2\_8},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AndreevaNPS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AnckaertMSBBP07,
  author       = {Bertrand Anckaert and
                  Matias Madou and
                  Bjorn De Sutter and
                  Bruno De Bus and
                  Koen De Bosschere and
                  Bart Preneel},
  editor       = {G{\"{u}}nter Karjoth and
                  Ketil St{\o}len},
  title        = {Program obfuscation: a quantitative approach},
  booktitle    = {Proceedings of the 3th {ACM} Workshop on Quality of Protection, QoP
                  2007, Alexandria, VA, USA, October 29, 2007},
  pages        = {15--20},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1314257.1314263},
  doi          = {10.1145/1314257.1314263},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AnckaertMSBBP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/YoshidaWOKWKP07,
  author       = {Hirotaka Yoshida and
                  Dai Watanabe and
                  Katsuyuki Okeya and
                  Jun Kitahara and
                  Hongjun Wu and
                  {\"{O}}zg{\"{u}}l K{\"{u}}{\c{c}}{\"{u}}k and
                  Bart Preneel},
  editor       = {Pascal Paillier and
                  Ingrid Verbauwhede},
  title        = {{MAME:} {A} Compression Function with Reduced Hardware Requirements},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International
                  Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4727},
  pages        = {148--165},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74735-2\_11},
  doi          = {10.1007/978-3-540-74735-2\_11},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/YoshidaWOKWKP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/MendelLP07,
  author       = {Florian Mendel and
                  Joseph Lano and
                  Bart Preneel},
  editor       = {Masayuki Abe},
  title        = {Cryptanalysis of Reduced Variants of the {FORK-256} Hash Function},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2007, The Cryptographers' Track at
                  the {RSA} Conference 2007, San Francisco, CA, USA, February 5-9, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4377},
  pages        = {85--100},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/11967668\_6},
  doi          = {10.1007/11967668\_6},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/MendelLP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/SingeleeP07,
  author       = {Dave Singel{\'{e}}e and
                  Bart Preneel},
  editor       = {Frank Stajano and
                  Catherine Meadows and
                  Srdjan Capkun and
                  Tyler Moore},
  title        = {Distance Bounding in Noisy Environments},
  booktitle    = {Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop,
                  {ESAS} 2007, Cambridge, UK, July 2-3, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4572},
  pages        = {101--115},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73275-4\_8},
  doi          = {10.1007/978-3-540-73275-4\_8},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/SingeleeP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/WuP07,
  author       = {Hongjun Wu and
                  Bart Preneel},
  editor       = {Moni Naor},
  title        = {Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2007, 26th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Barcelona, Spain, May 20-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4515},
  pages        = {276--290},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72540-4\_16},
  doi          = {10.1007/978-3-540-72540-4\_16},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/WuP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/WuP07,
  author       = {Hongjun Wu and
                  Bart Preneel},
  editor       = {Alex Biryukov},
  title        = {Differential-Linear Attacks Against the Stream Cipher Phelix},
  booktitle    = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
                  Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4593},
  pages        = {87--100},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74619-5\_6},
  doi          = {10.1007/978-3-540-74619-5\_6},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/WuP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KimHP07,
  author       = {Jongsung Kim and
                  Seokhie Hong and
                  Bart Preneel},
  editor       = {Alex Biryukov},
  title        = {Related-Key Rectangle Attacks on Reduced {AES-192} and {AES-256}},
  booktitle    = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
                  Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4593},
  pages        = {225--241},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74619-5\_15},
  doi          = {10.1007/978-3-540-74619-5\_15},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/KimHP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/glvlsi/SakiyamaMPV07,
  author       = {Kazuo Sakiyama and
                  Elke De Mulder and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  editor       = {Hai Zhou and
                  Enrico Macii and
                  Zhiyuan Yan and
                  Yehia Massoud},
  title        = {Side-channel resistant system-level design flow for public-key cryptography},
  booktitle    = {Proceedings of the 17th {ACM} Great Lakes Symposium on {VLSI} 2007,
                  Stresa, Lago Maggiore, Italy, March 11-13, 2007},
  pages        = {144--147},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1228784.1228822},
  doi          = {10.1145/1228784.1228822},
  timestamp    = {Wed, 16 Aug 2023 21:16:32 +0200},
  biburl       = {https://dblp.org/rec/conf/glvlsi/SakiyamaMPV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/glvlsi/MentensSPV07,
  author       = {Nele Mentens and
                  Kazuo Sakiyama and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  editor       = {Hai Zhou and
                  Enrico Macii and
                  Zhiyuan Yan and
                  Yehia Massoud},
  title        = {Efficient pipelining for modular multiplication architectures in prime
                  fields},
  booktitle    = {Proceedings of the 17th {ACM} Great Lakes Symposium on {VLSI} 2007,
                  Stresa, Lago Maggiore, Italy, March 11-13, 2007},
  pages        = {534--539},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1228784.1228911},
  doi          = {10.1145/1228784.1228911},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/glvlsi/MentensSPV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/WanDBP07,
  author       = {Zhiguo Wan and
                  Robert H. Deng and
                  Feng Bao and
                  Bart Preneel},
  editor       = {Sihan Qing and
                  Hideki Imai and
                  Guilin Wang},
  title        = {\emph{n} PAKE\({}^{\mbox{ + }}\): {A} Hierarchical Group Password-Authenticated
                  Key Exchange Protocol Using Different Passwords},
  booktitle    = {Information and Communications Security, 9th International Conference,
                  {ICICS} 2007, Zhengzhou, China, December 12-15, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4861},
  pages        = {31--43},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77048-0\_3},
  doi          = {10.1007/978-3-540-77048-0\_3},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/WanDBP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcs/WengP07,
  author       = {Li Weng and
                  Bart Preneel},
  title        = {Attacking Some Perceptual Image Hash Algorithms},
  booktitle    = {Proceedings of the 2007 {IEEE} International Conference on Multimedia
                  and Expo, {ICME} 2007, July 2-5, 2007, Beijing, China},
  pages        = {879--882},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICME.2007.4284791},
  doi          = {10.1109/ICME.2007.4284791},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icmcs/WengP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/TroncosoDDP07,
  author       = {Carmela Troncoso and
                  Claudia D{\'{\i}}az and
                  Orr Dunkelman and
                  Bart Preneel},
  editor       = {Teddy Furon and
                  Fran{\c{c}}ois Cayre and
                  Gwena{\"{e}}l J. Do{\"{e}}rr and
                  Patrick Bas},
  title        = {Traffic Analysis Attacks on a Continuously-Observable Steganographic
                  File System},
  booktitle    = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo,
                  France, June 11-13, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4567},
  pages        = {220--236},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77370-2\_15},
  doi          = {10.1007/978-3-540-77370-2\_15},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/TroncosoDDP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/SekarPP07,
  author       = {Gautham Sekar and
                  Souradyuti Paul and
                  Bart Preneel},
  editor       = {K. Srinathan and
                  C. Pandu Rangan and
                  Moti Yung},
  title        = {Related-Key Attacks on the Py-Family of Ciphers and an Approach to
                  Repair the Weaknesses},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2007, 8th International Conference
                  on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4859},
  pages        = {58--72},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77026-8\_6},
  doi          = {10.1007/978-3-540-77026-8\_6},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/SekarPP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/DunkelmanSP07,
  author       = {Orr Dunkelman and
                  Gautham Sekar and
                  Bart Preneel},
  editor       = {K. Srinathan and
                  C. Pandu Rangan and
                  Moti Yung},
  title        = {Improved Meet-in-the-Middle Attacks on Reduced-Round {DES}},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2007, 8th International Conference
                  on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4859},
  pages        = {86--100},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77026-8\_8},
  doi          = {10.1007/978-3-540-77026-8\_8},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/DunkelmanSP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/BatinaMSPV07,
  author       = {Lejla Batina and
                  Nele Mentens and
                  Kazuo Sakiyama and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  title        = {Public-Key Cryptography on the Top of a Needle},
  booktitle    = {International Symposium on Circuits and Systems {(ISCAS} 2007), 27-20
                  May 2007, New Orleans, Louisiana, {USA}},
  pages        = {1831--1834},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/ISCAS.2007.378270},
  doi          = {10.1109/ISCAS.2007.378270},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscas/BatinaMSPV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/SekarPP07,
  author       = {Gautham Sekar and
                  Souradyuti Paul and
                  Bart Preneel},
  editor       = {Juan A. Garay and
                  Arjen K. Lenstra and
                  Masahiro Mambo and
                  Ren{\'{e}} Peralta},
  title        = {New Weaknesses in the Keystream Generation Algorithms of the Stream
                  Ciphers TPy and Py},
  booktitle    = {Information Security, 10th International Conference, {ISC} 2007, Valpara{\'{\i}}so,
                  Chile, October 9-12, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4779},
  pages        = {249--262},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75496-1\_17},
  doi          = {10.1007/978-3-540-75496-1\_17},
  timestamp    = {Fri, 03 Feb 2023 21:39:19 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/SekarPP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/DanezisDFKTP07,
  author       = {George Danezis and
                  Claudia D{\'{\i}}az and
                  Sebastian Faust and
                  Emilia K{\"{a}}sper and
                  Carmela Troncoso and
                  Bart Preneel},
  editor       = {Juan A. Garay and
                  Arjen K. Lenstra and
                  Masahiro Mambo and
                  Ren{\'{e}} Peralta},
  title        = {Efficient Negative Databases from Cryptographic Hash Functions},
  booktitle    = {Information Security, 10th International Conference, {ISC} 2007, Valpara{\'{\i}}so,
                  Chile, October 9-12, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4779},
  pages        = {423--436},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75496-1\_28},
  doi          = {10.1007/978-3-540-75496-1\_28},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/DanezisDFKTP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobiquitous/SingeleeP07,
  author       = {Dave Singel{\'{e}}e and
                  Bart Preneel},
  title        = {Key Establishment Using Secure Distance Bounding Protocols},
  booktitle    = {4th Annual International Conference on Mobile and Ubiquitous Systems
                  (MobiQuitous 2007), August 6-10, 2007, Philadelphia, PA, {USA}},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/MOBIQ.2007.4451066},
  doi          = {10.1109/MOBIQ.2007.4451066},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobiquitous/SingeleeP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/KohlweissFFGP07,
  author       = {Markulf Kohlweiss and
                  Sebastian Faust and
                  Lothar Fritsch and
                  Bartek Gedrojc and
                  Bart Preneel},
  editor       = {Nikita Borisov and
                  Philippe Golle},
  title        = {Efficient Oblivious Augmented Maps: Location-Based Services with a
                  Payment Broker},
  booktitle    = {Privacy Enhancing Technologies, 7th International Symposium, {PET}
                  2007 Ottawa, Canada, June 20-22, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4776},
  pages        = {77--94},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75551-7\_6},
  doi          = {10.1007/978-3-540-75551-7\_6},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/KohlweissFFGP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/WyseurMGP07,
  author       = {Brecht Wyseur and
                  Wil Michiels and
                  Paul Gorissen and
                  Bart Preneel},
  editor       = {Carlisle M. Adams and
                  Ali Miri and
                  Michael J. Wiener},
  title        = {Cryptanalysis of White-Box {DES} Implementations with Arbitrary External
                  Encodings},
  booktitle    = {Selected Areas in Cryptography, 14th International Workshop, {SAC}
                  2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4876},
  pages        = {264--277},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77360-3\_17},
  doi          = {10.1007/978-3-540-77360-3\_17},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/WyseurMGP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/samos/MentensSBPV07,
  author       = {Nele Mentens and
                  Kazuo Sakiyama and
                  Lejla Batina and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  editor       = {Holger Blume and
                  Georgi Gaydadjiev and
                  C. John Glossner and
                  Peter M. W. Knijnenburg},
  title        = {A Side-channel Attack Resistant Programmable {PKC} Coprocessor for
                  Embedded Applications},
  booktitle    = {Proceedings of the 2007 International Conference on Embedded Computer
                  Systems: Architectures, Modeling and Simulation {(IC-SAMOS} 2007),
                  Samos, Greece, July 16-19, 2007},
  pages        = {194--200},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICSAMOS.2007.4285751},
  doi          = {10.1109/ICSAMOS.2007.4285751},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/samos/MentensSBPV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmap/WengP07,
  author       = {Li Weng and
                  Bart Preneel},
  editor       = {S{\'{e}}rgio M. M. de Faria and
                  Pedro A. Amado Assun{\c{c}}{\~{a}}o},
  title        = {On Encryption and Authentication of the {DC} {DCT} Coefficient},
  booktitle    = {{SIGMAP} 2007 - Proceedings of the Second International Conference
                  on Signal Processing and Multimedia Applications, Barcelona, Spain,
                  July 28-31, 2007, {SIGMAP} is part of {ICETE} - The International
                  Joint Conference on e-Business and Telecommunications},
  pages        = {375--379},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 14:41:26 +0200},
  biburl       = {https://dblp.org/rec/conf/sigmap/WengP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/voteid/CockP07,
  author       = {Danny De Cock and
                  Bart Preneel},
  editor       = {Ammar Alkassar and
                  Melanie Volkamer},
  title        = {Electronic Voting in Belgium: Past and Future},
  booktitle    = {E-Voting and Identity, First International Conference, {VOTE-ID} 2007,
                  Bochum, Germany, October 4-5, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4896},
  pages        = {76--87},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77493-8\_7},
  doi          = {10.1007/978-3-540-77493-8\_7},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/voteid/CockP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/weworc/IndesteegeP07,
  author       = {Sebastiaan Indesteege and
                  Bart Preneel},
  editor       = {Stefan Lucks and
                  Ahmad{-}Reza Sadeghi and
                  Christopher Wolf},
  title        = {Preimages for Reduced-Round Tiger},
  booktitle    = {Research in Cryptology, Second Western European Workshop, WEWoRC 2007,
                  Bochum, Germany, July 4-6, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4945},
  pages        = {90--99},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-88353-1\_8},
  doi          = {10.1007/978-3-540-88353-1\_8},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/weworc/IndesteegeP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/weworc/SekarPP07,
  author       = {Gautham Sekar and
                  Souradyuti Paul and
                  Bart Preneel},
  editor       = {Stefan Lucks and
                  Ahmad{-}Reza Sadeghi and
                  Christopher Wolf},
  title        = {New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the
                  TPy6-A and the TPy6-B},
  booktitle    = {Research in Cryptology, Second Western European Workshop, WEWoRC 2007,
                  Bochum, Germany, July 4-6, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4945},
  pages        = {127--141},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-88353-1\_11},
  doi          = {10.1007/978-3-540-88353-1\_11},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/weworc/SekarPP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/TroncosoDKP07,
  author       = {Carmela Troncoso and
                  George Danezis and
                  Eleni Kosta and
                  Bart Preneel},
  editor       = {Peng Ning and
                  Ting Yu},
  title        = {Pripayd: privacy friendly pay-as-you-drive insurance},
  booktitle    = {Proceedings of the 2007 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2007, Alexandria, VA, USA, October 29, 2007},
  pages        = {99--107},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1314333.1314353},
  doi          = {10.1145/1314333.1314353},
  timestamp    = {Mon, 04 Apr 2022 16:00:14 +0200},
  biburl       = {https://dblp.org/rec/conf/wpes/TroncosoDKP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/SchellekensWP08,
  author       = {Dries Schellekens and
                  Brecht Wyseur and
                  Bart Preneel},
  editor       = {Fabio Massacci and
                  Frank Piessens},
  title        = {Remote Attestation on Legacy Operating Systems With Trusted Platform
                  Modules},
  booktitle    = {Proceedings of the First International Workshop on Run Time Enforcement
                  for Mobile and Distributed Systems, REM@ESORICS 2007, Dresden, Germany,
                  September 27, 2007},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {197},
  number       = {1},
  pages        = {59--72},
  publisher    = {Elsevier},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.entcs.2007.10.014},
  doi          = {10.1016/J.ENTCS.2007.10.014},
  timestamp    = {Mon, 13 Feb 2023 09:09:10 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/SchellekensWP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/07/DiazP07,
  author       = {Claudia D{\'{\i}}az and
                  Bart Preneel},
  editor       = {Milan Petkovic and
                  Willem Jonker},
  title        = {Accountable Anonymous Communication},
  booktitle    = {Security, Privacy, and Trust in Modern Data Management},
  series       = {Data-Centric Systems and Applications},
  pages        = {239--253},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-69861-6\_16},
  doi          = {10.1007/978-3-540-69861-6\_16},
  timestamp    = {Tue, 16 May 2017 14:01:42 +0200},
  biburl       = {https://dblp.org/rec/books/sp/07/DiazP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SekarPP07,
  author       = {Gautham Sekar and
                  Souradyuti Paul and
                  Bart Preneel},
  title        = {Weaknesses in the Pseudorandom Bit Generation Algorithms of the Stream
                  Ciphers TPypy and TPy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {75},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/075},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SekarPP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WyseurMGP07,
  author       = {Brecht Wyseur and
                  Wil Michiels and
                  Paul Gorissen and
                  Bart Preneel},
  title        = {Cryptanalysis of White-Box {DES} Implementations with Arbitrary External
                  Encodings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {104},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/104},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WyseurMGP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AndreevaNPS07,
  author       = {Elena Andreeva and
                  Gregory Neven and
                  Bart Preneel and
                  Thomas Shrimpton},
  title        = {Seven-Property-Preserving Iterated Hashing: {ROX}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {176},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/176},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AndreevaNPS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SekarPP07a,
  author       = {Gautham Sekar and
                  Souradyuti Paul and
                  Bart Preneel},
  title        = {New Weaknesses in the Keystream Generation Algorithms of the Stream
                  Ciphers TPy and Py},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {230},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/230},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SekarPP07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SekarPP07b,
  author       = {Gautham Sekar and
                  Souradyuti Paul and
                  Bart Preneel},
  title        = {New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the
                  TPy6-A and the TPy6-B},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {436},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/436},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SekarPP07b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/WolfBP06,
  author       = {Christopher Wolf and
                  An Braeken and
                  Bart Preneel},
  title        = {On the security of stepwise triangular systems},
  journal      = {Des. Codes Cryptogr.},
  volume       = {40},
  number       = {3},
  pages        = {285--302},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10623-006-0015-5},
  doi          = {10.1007/S10623-006-0015-5},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/WolfBP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pieee/CanniereBP06,
  author       = {Christophe De Canni{\`{e}}re and
                  Alex Biryukov and
                  Bart Preneel},
  title        = {An introduction to Block Cipher Cryptanalysis},
  journal      = {Proc. {IEEE}},
  volume       = {94},
  number       = {2},
  pages        = {346--356},
  year         = {2006},
  url          = {https://doi.org/10.1109/JPROC.2005.862300},
  doi          = {10.1109/JPROC.2005.862300},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pieee/CanniereBP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/BraekenBNP06,
  author       = {An Braeken and
                  Yuri L. Borissov and
                  Svetla Nikova and
                  Bart Preneel},
  title        = {Classification of cubic (n-4)-resilient Boolean functions},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {52},
  number       = {4},
  pages        = {1670--1676},
  year         = {2006},
  url          = {https://doi.org/10.1109/TIT.2006.871063},
  doi          = {10.1109/TIT.2006.871063},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tit/BraekenBNP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BraekenLP06,
  author       = {An Braeken and
                  Joseph Lano and
                  Bart Preneel},
  editor       = {Lynn Margaret Batten and
                  Reihaneh Safavi{-}Naini},
  title        = {Evaluating the Resistance of Stream Ciphers with Linear Feedback Against
                  Fast Algebraic Attacks},
  booktitle    = {Information Security and Privacy, 11th Australasian Conference, {ACISP}
                  2006, Melbourne, Australia, July 3-5, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4058},
  pages        = {40--51},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11780656\_4},
  doi          = {10.1007/11780656\_4},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BraekenLP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/adhoc-now/SingeleeP06,
  author       = {Dave Singel{\'{e}}e and
                  Bart Preneel},
  editor       = {Thomas Kunz and
                  S. S. Ravi},
  title        = {Improved Pairing Protocol for Bluetooth},
  booktitle    = {Ad-Hoc, Mobile, and Wireless Networks, 5th International Conference,
                  {ADHOC-NOW} 2006, Ottawa, Canada, August 17-19, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4104},
  pages        = {252--265},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11814764\_21},
  doi          = {10.1007/11814764\_21},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/adhoc-now/SingeleeP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/SeysP06,
  author       = {Stefaan Seys and
                  Bart Preneel},
  title        = {{ARM:} Anonymous Routing Protocol for Mobile Ad hoc Networks},
  booktitle    = {20th International Conference on Advanced Information Networking and
                  Applications {(AINA} 2006), 18-20 April 2006, Vienna, Austria},
  pages        = {133--137},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/AINA.2006.104},
  doi          = {10.1109/AINA.2006.104},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/SeysP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/arc/MentensBPV06,
  author       = {Nele Mentens and
                  Lejla Batina and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  editor       = {Koen Bertels and
                  Jo{\~{a}}o M. P. Cardoso and
                  Stamatis Vassiliadis},
  title        = {Time-Memory Trade-Off Attack on {FPGA} Platforms: {UNIX} Password
                  Cracking},
  booktitle    = {Reconfigurable Computing: Architectures and Applications, Second International
                  Workshop, {ARC} 2006, Delft, The Netherlands, March 1-3, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3985},
  pages        = {323--334},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11802839\_41},
  doi          = {10.1007/11802839\_41},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/arc/MentensBPV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/arc/SakiyamaMBPV06,
  author       = {Kazuo Sakiyama and
                  Nele Mentens and
                  Lejla Batina and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  editor       = {Koen Bertels and
                  Jo{\~{a}}o M. P. Cardoso and
                  Stamatis Vassiliadis},
  title        = {Reconfigurable Modular Arithmetic Logic Unit for High-Performance
                  Public-Key Cryptosystems},
  booktitle    = {Reconfigurable Computing: Architectures and Applications, Second International
                  Workshop, {ARC} 2006, Delft, The Netherlands, March 1-3, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3985},
  pages        = {347--357},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11802839\_43},
  doi          = {10.1007/11802839\_43},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/arc/SakiyamaMBPV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/PaulP06,
  author       = {Souradyuti Paul and
                  Bart Preneel},
  editor       = {Xuejia Lai and
                  Kefei Chen},
  title        = {On the (In)security of Stream Ciphers Based on Arrays and Modular
                  Addition},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2006, 12th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Shanghai, China, December 3-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4284},
  pages        = {69--83},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935230\_5},
  doi          = {10.1007/11935230\_5},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/PaulP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/NikovNP06,
  author       = {Ventzislav Nikov and
                  Svetla Nikova and
                  Bart Preneel},
  editor       = {Xuejia Lai and
                  Kefei Chen},
  title        = {A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2006, 12th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Shanghai, China, December 3-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4284},
  pages        = {348--363},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935230\_23},
  doi          = {10.1007/11935230\_23},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/NikovNP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/SakiyamaBPV06,
  author       = {Kazuo Sakiyama and
                  Lejla Batina and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  editor       = {Louis Goubin and
                  Mitsuru Matsui},
  title        = {Superscalar Coprocessor for High-Speed Curve-Based Cryptography},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
                  Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4249},
  pages        = {415--429},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11894063\_33},
  doi          = {10.1007/11894063\_33},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/SakiyamaBPV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/BatinaMSPV06,
  author       = {Lejla Batina and
                  Nele Mentens and
                  Kazuo Sakiyama and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  editor       = {Levente Butty{\'{a}}n and
                  Virgil D. Gligor and
                  Dirk Westhoff},
  title        = {Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks},
  booktitle    = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European
                  Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4357},
  pages        = {6--17},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11964254\_3},
  doi          = {10.1007/11964254\_3},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/BatinaMSPV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpl/MentensSBVP06,
  author       = {Nele Mentens and
                  Kazuo Sakiyama and
                  Lejla Batina and
                  Ingrid Verbauwhede and
                  Bart Preneel},
  title        = {Fpga-Oriented Secure Data Path Design: Implementation of a Public
                  Key Coprocessor},
  booktitle    = {Proceedings of the 2006 International Conference on Field Programmable
                  Logic and Applications (FPL), Madrid, Spain, August 28-30, 2006},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/FPL.2006.311205},
  doi          = {10.1109/FPL.2006.311205},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fpl/MentensSBVP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpl/SchellekensPV06,
  author       = {Dries Schellekens and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  title        = {{FPGA} Vendor Agnostic True Random Number Generator},
  booktitle    = {Proceedings of the 2006 International Conference on Field Programmable
                  Logic and Applications (FPL), Madrid, Spain, August 28-30, 2006},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/FPL.2006.311206},
  doi          = {10.1109/FPL.2006.311206},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fpl/SchellekensPV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/WuP06,
  author       = {Hongjun Wu and
                  Bart Preneel},
  editor       = {Matthew J. B. Robshaw},
  title        = {Cryptanalysis of the Stream Cipher {DECIM}},
  booktitle    = {Fast Software Encryption, 13th International Workshop, {FSE} 2006,
                  Graz, Austria, March 15-17, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4047},
  pages        = {30--40},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11799313\_3},
  doi          = {10.1007/11799313\_3},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/WuP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/PaulPS06,
  author       = {Souradyuti Paul and
                  Bart Preneel and
                  Gautham Sekar},
  editor       = {Matthew J. B. Robshaw},
  title        = {Distinguishing Attacks on the Stream Cipher Py},
  booktitle    = {Fast Software Encryption, 13th International Workshop, {FSE} 2006,
                  Graz, Austria, March 15-17, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4047},
  pages        = {405--421},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11799313\_26},
  doi          = {10.1007/11799313\_26},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/PaulPS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/WuP06a,
  author       = {Hongjun Wu and
                  Bart Preneel},
  editor       = {Matthew J. B. Robshaw},
  title        = {Resynchronization Attacks on {WG} and {LEX}},
  booktitle    = {Fast Software Encryption, 13th International Workshop, {FSE} 2006,
                  Graz, Austria, March 15-17, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4047},
  pages        = {422--432},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11799313\_27},
  doi          = {10.1007/11799313\_27},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/WuP06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/SakiyamaMPV06,
  author       = {Kazuo Sakiyama and
                  Elke De Mulder and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  title        = {A Parallel Processing Hardware Architecture for Elliptic Curve Cryptosystems},
  booktitle    = {2006 {IEEE} International Conference on Acoustics Speech and Signal
                  Processing, {ICASSP} 2006, Toulouse, France, May 14-19, 2006},
  pages        = {904--907},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICASSP.2006.1660801},
  doi          = {10.1109/ICASSP.2006.1660801},
  timestamp    = {Mon, 22 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icassp/SakiyamaMPV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/WengWP06,
  author       = {Li Weng and
                  Karel Wouters and
                  Bart Preneel},
  title        = {Extending the Selective {MPEG} Encryption Algorithm {PVEA}},
  booktitle    = {Second International Conference on Intelligent Information Hiding
                  and Multimedia Signal Processing {(IIH-MSP} 2006), Pasadena, California,
                  USA, December 18-20, 2006, Proceedings},
  pages        = {117--120},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/IIH-MSP.2006.264968},
  doi          = {10.1109/IIH-MSP.2006.264968},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iih-msp/WengWP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/MendelPRYW06,
  author       = {Florian Mendel and
                  Bart Preneel and
                  Vincent Rijmen and
                  Hirotaka Yoshida and
                  Dai Watanabe},
  editor       = {Rana Barua and
                  Tanja Lange},
  title        = {Update on Tiger},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2006, 7th International Conference
                  on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4329},
  pages        = {63--79},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11941378\_6},
  doi          = {10.1007/11941378\_6},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/indocrypt/MendelPRYW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/BatinaMPV06,
  author       = {Lejla Batina and
                  Nele Mentens and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  title        = {Flexible hardware architectures for curve-based cryptography},
  booktitle    = {International Symposium on Circuits and Systems {(ISCAS} 2006), 21-24
                  May 2006, Island of Kos, Greece},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/ISCAS.2006.1693714},
  doi          = {10.1109/ISCAS.2006.1693714},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscas/BatinaMPV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/SakiyamaPV06,
  author       = {Kazuo Sakiyama and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  title        = {A fast dual-field modular arithmetic logic unit and its hardware implementation},
  booktitle    = {International Symposium on Circuits and Systems {(ISCAS} 2006), 21-24
                  May 2006, Island of Kos, Greece},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/ISCAS.2006.1692703},
  doi          = {10.1109/ISCAS.2006.1692703},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscas/SakiyamaPV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/WuP06,
  author       = {Hongjun Wu and
                  Bart Preneel},
  editor       = {Eli Biham and
                  Amr M. Youssef},
  title        = {Cryptanalysis of the Stream Cipher {ABC} v2},
  booktitle    = {Selected Areas in Cryptography, 13th International Workshop, {SAC}
                  2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4356},
  pages        = {56--66},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-74462-7\_5},
  doi          = {10.1007/978-3-540-74462-7\_5},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/WuP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/HandschuhP06,
  author       = {Helena Handschuh and
                  Bart Preneel},
  editor       = {Eli Biham and
                  Amr M. Youssef},
  title        = {Blind Differential Cryptanalysis for Enhanced Power Attacks},
  booktitle    = {Selected Areas in Cryptography, 13th International Workshop, {SAC}
                  2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4356},
  pages        = {163--173},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-74462-7\_12},
  doi          = {10.1007/978-3-540-74462-7\_12},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/HandschuhP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/KimBPH06,
  author       = {Jongsung Kim and
                  Alex Biryukov and
                  Bart Preneel and
                  Seokhie Hong},
  editor       = {Roberto De Prisco and
                  Moti Yung},
  title        = {On the Security of {HMAC} and {NMAC} Based on HAVAL, MD4, MD5, {SHA-0}
                  and {SHA-1} (Extended Abstract)},
  booktitle    = {Security and Cryptography for Networks, 5th International Conference,
                  {SCN} 2006, Maiori, Italy, September 6-8, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4116},
  pages        = {242--256},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11832072\_17},
  doi          = {10.1007/11832072\_17},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/KimBPH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/serp/MadouABBCP06,
  author       = {Matias Madou and
                  Bertrand Anckaert and
                  Bruno De Bus and
                  Koen De Bosschere and
                  Jan Cappaert and
                  Bart Preneel},
  editor       = {Hamid R. Arabnia and
                  Hassan Reza},
  title        = {On the Effectiveness of Source Code Transformations for Binary Obfuscation},
  booktitle    = {Proceedings of the International Conference on Software Engineering
                  Research and Practice {\&} Conference on Programming Languages
                  and Compilers, {SERP} 2006, Las Vegas, Nevada, USA, June 26-29, 2006,
                  Volume 2},
  pages        = {527--533},
  publisher    = {{CSREA} Press},
  year         = {2006},
  timestamp    = {Wed, 29 Nov 2006 15:18:21 +0100},
  biburl       = {https://dblp.org/rec/conf/serp/MadouABBCP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/CockWP06,
  author       = {Danny De Cock and
                  Christopher Wolf and
                  Bart Preneel},
  editor       = {Jana Dittmann},
  title        = {The Belgian Electronic Identity Card (Overview)},
  booktitle    = {Sicherheit 2006: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 3. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 20.-22. Februar
                  2006 in Magdeburg},
  series       = {{LNI}},
  volume       = {{P-77}},
  pages        = {298--301},
  publisher    = {{GI}},
  year         = {2006},
  url          = {https://dl.gi.de/handle/20.500.12116/24786},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/CockWP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ws/SingeleeP06,
  author       = {Dave Singel{\'{e}}e and
                  Bart Preneel},
  editor       = {Radha Poovendran and
                  Ari Juels},
  title        = {Location privacy in wireless personal area networks},
  booktitle    = {Proceedings of the 2006 {ACM} Workshop on Wireless Security, Los Angeles,
                  California, USA, September 29, 2006},
  pages        = {11--18},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1161289.1161292},
  doi          = {10.1145/1161289.1161292},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ws/SingeleeP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icalp/2006-1,
  editor       = {Michele Bugliesi and
                  Bart Preneel and
                  Vladimiro Sassone and
                  Ingo Wegener},
  title        = {Automata, Languages and Programming, 33rd International Colloquium,
                  {ICALP} 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4051},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11786986},
  doi          = {10.1007/11786986},
  isbn         = {3-540-35904-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/2006-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icalp/2006-2,
  editor       = {Michele Bugliesi and
                  Bart Preneel and
                  Vladimiro Sassone and
                  Ingo Wegener},
  title        = {Automata, Languages and Programming, 33rd International Colloquium,
                  {ICALP} 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4052},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11787006},
  doi          = {10.1007/11787006},
  isbn         = {3-540-35907-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/2006-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isw/2006,
  editor       = {Sokratis K. Katsikas and
                  Javier L{\'{o}}pez and
                  Michael Backes and
                  Stefanos Gritzalis and
                  Bart Preneel},
  title        = {Information Security, 9th International Conference, {ISC} 2006, Samos
                  Island, Greece, August 30 - September 2, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4176},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11836810},
  doi          = {10.1007/11836810},
  isbn         = {3-540-38341-7},
  timestamp    = {Thu, 29 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/2005,
  editor       = {Bart Preneel and
                  Stafford E. Tavares},
  title        = {Selected Areas in Cryptography, 12th International Workshop, {SAC}
                  2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3897},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11693383},
  doi          = {10.1007/11693383},
  isbn         = {3-540-33108-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimBPH06,
  author       = {Jongsung Kim and
                  Alex Biryukov and
                  Bart Preneel and
                  Seokhie Hong},
  title        = {On the Security of {HMAC} and {NMAC} Based on HAVAL, MD4, MD5, {SHA-0}
                  and {SHA-1}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {187},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/187},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimBPH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BiryukovLP05,
  author       = {Alex Biryukov and
                  Joseph Lano and
                  Bart Preneel},
  title        = {Recent attacks on alleged SecurID and their practical implications},
  journal      = {Comput. Secur.},
  volume       = {24},
  number       = {5},
  pages        = {364--370},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.cose.2005.04.006},
  doi          = {10.1016/J.COSE.2005.04.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BiryukovLP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejasp/CanniereLP05,
  author       = {Christophe De Canni{\`{e}}re and
                  Joseph Lano and
                  Bart Preneel},
  title        = {Cryptanalysis of the Two-Dimensional Circulation Encryption Algorithm},
  journal      = {{EURASIP} J. Adv. Signal Process.},
  volume       = {2005},
  number       = {12},
  pages        = {1923--1927},
  year         = {2005},
  url          = {https://doi.org/10.1155/ASP.2005.1923},
  doi          = {10.1155/ASP.2005.1923},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejasp/CanniereLP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/SingeleeP05,
  author       = {Dave Singel{\'{e}}e and
                  Bart Preneel},
  title        = {The Wireless Application Protocol},
  journal      = {Int. J. Netw. Secur.},
  volume       = {1},
  number       = {3},
  pages        = {161--165},
  year         = {2005},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v1-n3/ijns-2005-v1-n3-p161-165.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/SingeleeP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/QuisquaterPV05,
  author       = {Micha{\"{e}}l Quisquater and
                  Bart Preneel and
                  Joos Vandewalle},
  title        = {Spectral characterization of cryptographic Boolean functions satisfying
                  the (extended) propagation criterion of degree \emph{l} and order
                  \emph{k}},
  journal      = {Inf. Process. Lett.},
  volume       = {93},
  number       = {1},
  pages        = {25--28},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.ipl.2004.08.011},
  doi          = {10.1016/J.IPL.2004.08.011},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/QuisquaterPV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/YuBorissovBNP05,
  author       = {Yuri L. Borissov and
                  An Braeken and
                  Svetla Nikova and
                  Bart Preneel},
  title        = {On the covering radii of binary Reed-Muller codes in the set of resilient
                  Boolean functions},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {51},
  number       = {3},
  pages        = {1182--1189},
  year         = {2005},
  url          = {https://doi.org/10.1109/TIT.2004.842779},
  doi          = {10.1109/TIT.2004.842779},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tit/YuBorissovBNP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PaulP05,
  author       = {Souradyuti Paul and
                  Bart Preneel},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Solving Systems of Differential Equations of Addition},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {75--88},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_7},
  doi          = {10.1007/11506157\_7},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PaulP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asap/BatinaMPV05,
  author       = {Lejla Batina and
                  Nele Mentens and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  title        = {Side-channel aware design: Algorithms and Architectures for Elliptic
                  Curve Cryptography over GF(2\({}^{\mbox{n}}\))},
  booktitle    = {16th {IEEE} International Conference on Application-Specific Systems,
                  Architectures, and Processors {(ASAP} 2005), 23-25 July 2005, Samos,
                  Greece},
  pages        = {350--355},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ASAP.2005.57},
  doi          = {10.1109/ASAP.2005.57},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asap/BatinaMPV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BatinaHHPV05,
  author       = {Lejla Batina and
                  David Hwang and
                  Alireza Hodjat and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Hardware/Software Co-design for Hyperelliptic Curve Cryptography {(HECC)}
                  on the 8051{\(\mathrm{\mu}\)}P},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {106--118},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_8},
  doi          = {10.1007/11545262\_8},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BatinaHHPV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/BraekenWP05,
  author       = {An Braeken and
                  Christopher Wolf and
                  Bart Preneel},
  editor       = {Alfred Menezes},
  title        = {A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2005, The Cryptographers' Track at
                  the {RSA} Conference 2005, San Francisco, CA, USA, February 14-18,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3376},
  pages        = {29--43},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30574-3\_4},
  doi          = {10.1007/978-3-540-30574-3\_4},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/BraekenWP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/MentensBPV05,
  author       = {Nele Mentens and
                  Lejla Batina and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  editor       = {Alfred Menezes},
  title        = {A Systematic Evaluation of Compact Hardware Implementations for the
                  Rijndael S-Box},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2005, The Cryptographers' Track at
                  the {RSA} Conference 2005, San Francisco, CA, USA, February 14-18,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3376},
  pages        = {323--333},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30574-3\_22},
  doi          = {10.1007/978-3-540-30574-3\_22},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/MentensBPV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/HongKLP05,
  author       = {Seokhie Hong and
                  Jongsung Kim and
                  Sangjin Lee and
                  Bart Preneel},
  editor       = {Henri Gilbert and
                  Helena Handschuh},
  title        = {Related-Key Rectangle Attacks on Reduced Versions of {SHACAL-1} and
                  {AES-192}},
  booktitle    = {Fast Software Encryption: 12th International Workshop, {FSE} 2005,
                  Paris, France, February 21-23, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3557},
  pages        = {368--383},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11502760\_25},
  doi          = {10.1007/11502760\_25},
  timestamp    = {Sat, 26 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/HongKLP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/BraekenBNP05,
  author       = {An Braeken and
                  Yuri L. Borissov and
                  Svetla Nikova and
                  Bart Preneel},
  editor       = {Lu{\'{\i}}s Caires and
                  Giuseppe F. Italiano and
                  Lu{\'{\i}}s Monteiro and
                  Catuscia Palamidessi and
                  Moti Yung},
  title        = {Classification of Boolean Functions of 6 Variables or Less with Respect
                  to Some Cryptographic Properties},
  booktitle    = {Automata, Languages and Programming, 32nd International Colloquium,
                  {ICALP} 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3580},
  pages        = {324--334},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11523468\_27},
  doi          = {10.1007/11523468\_27},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/BraekenBNP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcsw/SeysP05,
  author       = {Stefaan Seys and
                  Bart Preneel},
  title        = {The Wandering Nodes: Key Management for Low-Power Mobile Ad Hoc Networks},
  booktitle    = {25th International Conference on Distributed Computing Systems Workshops
                  {(ICDCS} 2005 Workshops), 6-10 June 2005, Columbus, OH, {USA}},
  pages        = {916--922},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICDCSW.2005.134},
  doi          = {10.1109/ICDCSW.2005.134},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcsw/SeysP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/KimBPL05,
  author       = {Jongsung Kim and
                  Alex Biryukov and
                  Bart Preneel and
                  Sangjin Lee},
  editor       = {Sihan Qing and
                  Wenbo Mao and
                  Javier L{\'{o}}pez and
                  Guilin Wang},
  title        = {On the Security of Encryption Modes of MD4, {MD5} and {HAVAL}},
  booktitle    = {Information and Communications Security, 7th International Conference,
                  {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3783},
  pages        = {147--158},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11602897\_13},
  doi          = {10.1007/11602897\_13},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/KimBPL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/BraekenWP05,
  author       = {An Braeken and
                  Christopher Wolf and
                  Bart Preneel},
  editor       = {Nigel P. Smart},
  title        = {Normality of Vectorial Functions},
  booktitle    = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester,
                  UK, December 19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3796},
  pages        = {186--200},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11586821\_13},
  doi          = {10.1007/11586821\_13},
  timestamp    = {Wed, 18 Mar 2020 16:00:57 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/BraekenWP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/BraekenP05,
  author       = {An Braeken and
                  Bart Preneel},
  editor       = {Nigel P. Smart},
  title        = {Probabilistic Algebraic Attacks},
  booktitle    = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester,
                  UK, December 19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3796},
  pages        = {290--303},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11586821\_20},
  doi          = {10.1007/11586821\_20},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/BraekenP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/BraekenP05,
  author       = {An Braeken and
                  Bart Preneel},
  editor       = {Subhamoy Maitra and
                  C. E. Veni Madhavan and
                  Ramarathnam Venkatesan},
  title        = {On the Algebraic Immunity of Symmetric Boolean Functions},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2005, 6th International Conference
                  on Cryptology in India, Bangalore, India, December 10-12, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3797},
  pages        = {35--48},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11596219\_4},
  doi          = {10.1007/11596219\_4},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/BraekenP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/PaulP05,
  author       = {Souradyuti Paul and
                  Bart Preneel},
  editor       = {Subhamoy Maitra and
                  C. E. Veni Madhavan and
                  Ramarathnam Venkatesan},
  title        = {Near Optimal Algorithms for Solving Differential Equations of Addition
                  with Batch Queries},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2005, 6th International Conference
                  on Cryptology in India, Bangalore, India, December 10-12, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3797},
  pages        = {90--103},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11596219\_8},
  doi          = {10.1007/11596219\_8},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/PaulP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mass/SingeleeP05,
  author       = {Dave Singel{\'{e}}e and
                  Bart Preneel},
  title        = {Location verification using secure distance bounding protocols},
  booktitle    = {{IEEE} 2nd International Conference on Mobile Adhoc and Sensor Systems,
                  {MASS} 2005, November 7-10, 2005, The City Center Hotel, Washington,
                  {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/MAHSS.2005.1542879},
  doi          = {10.1109/MAHSS.2005.1542879},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mass/SingeleeP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/WolfP05,
  author       = {Christopher Wolf and
                  Bart Preneel},
  editor       = {Ed Dawson and
                  Serge Vaudenay},
  title        = {Equivalent Keys in HFE, C\({}^{\mbox{*}}\), and Variations},
  booktitle    = {Progress in Cryptology - Mycrypt 2005, First International Conference
                  on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3715},
  pages        = {33--49},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11554868\_4},
  doi          = {10.1007/11554868\_4},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/WolfP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/WolfP05,
  author       = {Christopher Wolf and
                  Bart Preneel},
  editor       = {Serge Vaudenay},
  title        = {Large Superfluous Keys in Multivariate Quadratic Asymmetric Systems},
  booktitle    = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on
                  Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland,
                  January 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3386},
  pages        = {275--287},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30580-4\_19},
  doi          = {10.1007/978-3-540-30580-4\_19},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/WolfP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sicherheit/WolfP05,
  author       = {Christopher Wolf and
                  Bart Preneel},
  editor       = {Hannes Federrath},
  title        = {Applications of Multivariate Quadratic Public Key Systems},
  booktitle    = {Sicherheit 2005: Sicherheit - Schutz und Zuverl{\"{a}}ssigkeit,
                  Beitr{\"{a}}ge der 2. Jahrestagung des Fachbereichs Sicherheit
                  der Gesellschaft f{\"{u}}r Informatik e.v. (GI), 5.-8. April
                  2005 in Regensburg},
  series       = {{LNI}},
  volume       = {{P-62}},
  pages        = {413--424},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/28398},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sicherheit/WolfP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/SeysP05,
  author       = {Stefaan Seys and
                  Bart Preneel},
  editor       = {Dieter Hutter and
                  Markus Ullmann},
  title        = {Efficient Cooperative Signatures: {A} Novel Authentication Scheme
                  for Sensor Networks},
  booktitle    = {Security in Pervasive Computing, Second International Conference,
                  {SPC} 2005, Boppard, Germany, April 6-8, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3450},
  pages        = {86--100},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-32004-3\_11},
  doi          = {10.1007/978-3-540-32004-3\_11},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/SeysP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wimob/SeysP05,
  author       = {Stefaan Seys and
                  Bart Preneel},
  title        = {Power consumption evaluation of efficient digital signature schemes
                  for low power devices},
  booktitle    = {2005 {IEEE} International Conference on Wireless And Mobile Computing,
                  Networking And Communications, WiMob 2005, Montreal, Canada, August
                  22-14, 2005, Volume 1},
  pages        = {79--86},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/WIMOB.2005.1512820},
  doi          = {10.1109/WIMOB.2005.1512820},
  timestamp    = {Thu, 12 Aug 2021 09:49:22 +0200},
  biburl       = {https://dblp.org/rec/conf/wimob/SeysP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cms/2004,
  editor       = {David Chadwick and
                  Bart Preneel},
  title        = {Communications and Multimedia Security - 8th {IFIP} {TC-6} {TC-11}
                  Conference on Communications and Multimedia Security, Sept. 15-18,
                  2004, Windermere, The Lake District, United Kingdom},
  series       = {{IFIP}},
  volume       = {175},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/b105674},
  doi          = {10.1007/B105674},
  isbn         = {978-0-387-24485-3},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Preneel05,
  author       = {Bart Preneel},
  editor       = {Henk C. A. van Tilborg},
  title        = {{CBC-MAC} and Variants},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_46},
  doi          = {10.1007/0-387-23483-7\_46},
  timestamp    = {Thu, 27 Jun 2019 15:50:13 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Preneel05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Preneel05a,
  author       = {Bart Preneel},
  editor       = {Henk C. A. van Tilborg},
  title        = {Collision Attack},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_68},
  doi          = {10.1007/0-387-23483-7\_68},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Preneel05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Preneel05b,
  author       = {Bart Preneel},
  editor       = {Henk C. A. van Tilborg},
  title        = {Collision resistance},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_69},
  doi          = {10.1007/0-387-23483-7\_69},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Preneel05b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Preneel05c,
  author       = {Bart Preneel},
  editor       = {Henk C. A. van Tilborg},
  title        = {Correcting-block attack},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_79},
  doi          = {10.1007/0-387-23483-7\_79},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Preneel05c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Preneel05d,
  author       = {Bart Preneel},
  editor       = {Henk C. A. van Tilborg},
  title        = {Davies-Meyer Hash Function},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_96},
  doi          = {10.1007/0-387-23483-7\_96},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Preneel05d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Preneel05e,
  author       = {Bart Preneel},
  editor       = {Henk C. A. van Tilborg},
  title        = {Hash functions},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_186},
  doi          = {10.1007/0-387-23483-7\_186},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Preneel05e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Preneel05f,
  author       = {Bart Preneel},
  editor       = {Henk C. A. van Tilborg},
  title        = {{HMAC}},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_187},
  doi          = {10.1007/0-387-23483-7\_187},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Preneel05f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Preneel05g,
  author       = {Bart Preneel},
  editor       = {Henk C. A. van Tilborg},
  title        = {Maa},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_239},
  doi          = {10.1007/0-387-23483-7\_239},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Preneel05g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Preneel05h,
  author       = {Bart Preneel},
  editor       = {Henk C. A. van Tilborg},
  title        = {{MAC} Algorithms},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_240},
  doi          = {10.1007/0-387-23483-7\_240},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Preneel05h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Preneel05i,
  author       = {Bart Preneel},
  editor       = {Henk C. A. van Tilborg},
  title        = {Mash Hash Functions (Modular Arithmetic Secure Hash)},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_243},
  doi          = {10.1007/0-387-23483-7\_243},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Preneel05i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Preneel05j,
  author       = {Bart Preneel},
  editor       = {Henk C. A. van Tilborg},
  title        = {{MDC-2} and {MDC-4}},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_250},
  doi          = {10.1007/0-387-23483-7\_250},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Preneel05j.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Preneel05k,
  author       = {Bart Preneel},
  editor       = {Henk C. A. van Tilborg},
  title        = {Modes of Operation of a Block Cipher},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_258},
  doi          = {10.1007/0-387-23483-7\_258},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Preneel05k.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Preneel05l,
  author       = {Bart Preneel},
  editor       = {Henk C. A. van Tilborg},
  title        = {{NESSIE} Project},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_271},
  doi          = {10.1007/0-387-23483-7\_271},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Preneel05l.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Preneel05m,
  author       = {Bart Preneel},
  editor       = {Henk C. A. van Tilborg},
  title        = {{PMAC}},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_304},
  doi          = {10.1007/0-387-23483-7\_304},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Preneel05m.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Preneel05n,
  author       = {Bart Preneel},
  editor       = {Henk C. A. van Tilborg},
  title        = {Preimage Resistance},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_309},
  doi          = {10.1007/0-387-23483-7\_309},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Preneel05n.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Preneel05o,
  author       = {Bart Preneel},
  editor       = {Henk C. A. van Tilborg},
  title        = {Second preimage resistance},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_372},
  doi          = {10.1007/0-387-23483-7\_372},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Preneel05o.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Preneel05p,
  author       = {Bart Preneel},
  editor       = {Henk C. A. van Tilborg},
  title        = {Universal One-Way Hash Functions},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_447},
  doi          = {10.1007/0-387-23483-7\_447},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Preneel05p.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WolfP05,
  author       = {Christopher Wolf and
                  Bart Preneel},
  title        = {Taxonomy of Public Key Schemes based on the problem of Multivariate
                  Quadratic equations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {77},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/077},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WolfP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BraekenP05,
  author       = {An Braeken and
                  Bart Preneel},
  title        = {On the Algebraic Immunity of Symmetric Boolean Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {245},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/245},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BraekenP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimBPL05,
  author       = {Jongsung Kim and
                  Alex Biryukov and
                  Bart Preneel and
                  Sangjin Lee},
  title        = {On the Security of Encryption Modes of MD4, {MD5} and {HAVAL}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {327},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/327},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimBPL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BraekenBNP05,
  author       = {An Braeken and
                  Yuri L. Borissov and
                  Svetla Nikova and
                  Bart Preneel},
  title        = {Classification of Cubic (n-4)-resilient Boolean Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {332},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/332},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BraekenBNP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PaulP05,
  author       = {Souradyuti Paul and
                  Bart Preneel},
  title        = {On the (In)security of Stream Ciphers Based on Arrays and Modular
                  Addition (Full Version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {448},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/448},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PaulP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WolfP05a,
  author       = {Christopher Wolf and
                  Bart Preneel},
  title        = {Equivalent Keys in Multivariate Quadratic Public Key Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {464},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/464},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WolfP05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cai/MentensOPV04,
  author       = {Nele Mentens and
                  Siddika Berna {\"{O}}rs and
                  Bart Preneel and
                  Joos Vandewalle},
  title        = {An {FPGA} Implementation of a Montgomery Multiplier Over GF(2{\^{}}m)},
  journal      = {Comput. Artif. Intell.},
  volume       = {23},
  number       = {5},
  pages        = {487--499},
  year         = {2004},
  url          = {http://www.cai.sk/ojs/index.php/cai/article/view/441},
  timestamp    = {Mon, 14 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cai/MentensOPV04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/WatanabeFYTP04,
  author       = {Dai Watanabe and
                  Soichi Furuya and
                  Hirotaka Yoshida and
                  Kazuo Takaragi and
                  Bart Preneel},
  title        = {A New Keystream Generator {MUGI}},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {87-A},
  number       = {1},
  pages        = {37--45},
  year         = {2004},
  url          = {http://search.ieice.org/bin/summary.php?id=e87-a\_1\_37\&\#38;category=D\&\#38;year=2004\&\#38;lang=E\&\#38;abst=},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/WatanabeFYTP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/NakaharaPV04,
  author       = {Jorge Nakahara Jr. and
                  Bart Preneel and
                  Joos Vandewalle},
  editor       = {Huaxiong Wang and
                  Josef Pieprzyk and
                  Vijay Varadharajan},
  title        = {The Biryukov-Demirci Attack on Reduced-Round Versions of {IDEA} and
                  {MESH} Ciphers},
  booktitle    = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
                  2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3108},
  pages        = {98--109},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27800-9\_9},
  doi          = {10.1007/978-3-540-27800-9\_9},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/NakaharaPV04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ShiraiP04,
  author       = {Taizo Shirai and
                  Bart Preneel},
  editor       = {Pil Joong Lee},
  title        = {On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple
                  Rounds},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2004, 10th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Jeju Island, Korea, December 5-9, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3329},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30539-2\_1},
  doi          = {10.1007/978-3-540-30539-2\_1},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ShiraiP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/HongPL04,
  author       = {Deukjo Hong and
                  Bart Preneel and
                  Sangjin Lee},
  editor       = {Pil Joong Lee},
  title        = {Higher Order Universal One-Way Hash Functions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2004, 10th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Jeju Island, Korea, December 5-9, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3329},
  pages        = {201--213},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30539-2\_15},
  doi          = {10.1007/978-3-540-30539-2\_15},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/HongPL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/StandaertOP04,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Siddika Berna {\"{O}}rs and
                  Bart Preneel},
  editor       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  title        = {Power Analysis of an {FPGA:} Implementation of Rijndael: Is Pipelining
                  a {DPA} Countermeasure?},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International
                  Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3156},
  pages        = {30--44},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28632-5\_3},
  doi          = {10.1007/978-3-540-28632-5\_3},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/StandaertOP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/CockWSSP04,
  author       = {Danny De Cock and
                  Karel Wouters and
                  Dries Schellekens and
                  Dave Singel{\'{e}}e and
                  Bart Preneel},
  editor       = {David Chadwick and
                  Bart Preneel},
  title        = {Threat Modelling for Security Tokens in Web Applications},
  booktitle    = {Communications and Multimedia Security - 8th {IFIP} {TC-6} {TC-11}
                  Conference on Communications and Multimedia Security, Sept. 15-18,
                  2004, Windermere, The Lake District, United Kingdom},
  series       = {{IFIP}},
  volume       = {175},
  pages        = {183--193},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/0-387-24486-7\_14},
  doi          = {10.1007/0-387-24486-7\_14},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/CockWSSP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/CockWP04,
  author       = {Danny De Cock and
                  Karel Wouters and
                  Bart Preneel},
  editor       = {Sokratis K. Katsikas and
                  Stefanos Gritzalis and
                  Javier L{\'{o}}pez},
  title        = {Introduction to the Belgian {EID} Card: {BELPIC}},
  booktitle    = {Public Key Infrastructure, First European PKIWorkshop: Research and
                  Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3093},
  pages        = {1--13},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25980-0\_1},
  doi          = {10.1007/978-3-540-25980-0\_1},
  timestamp    = {Thu, 29 Aug 2019 08:09:59 +0200},
  biburl       = {https://dblp.org/rec/conf/europki/CockWP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpl/StandaertOQP04,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Siddika Berna {\"{O}}rs and
                  Jean{-}Jacques Quisquater and
                  Bart Preneel},
  editor       = {J{\"{u}}rgen Becker and
                  Marco Platzner and
                  Serge Vernalde},
  title        = {Power Analysis Attacks Against {FPGA} Implementations of the {DES}},
  booktitle    = {Field Programmable Logic and Application, 14th International Conference
                  , {FPL} 2004, Leuven, Belgium, August 30-September 1, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3203},
  pages        = {84--94},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30117-2\_11},
  doi          = {10.1007/978-3-540-30117-2\_11},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fpl/StandaertOQP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/PaulP04,
  author       = {Souradyuti Paul and
                  Bart Preneel},
  editor       = {Bimal K. Roy and
                  Willi Meier},
  title        = {A New Weakness in the {RC4} Keystream Generator and an Approach to
                  Improve the Security of the Cipher},
  booktitle    = {Fast Software Encryption, 11th International Workshop, {FSE} 2004,
                  Delhi, India, February 5-7, 2004, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3017},
  pages        = {245--259},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25937-4\_16},
  doi          = {10.1007/978-3-540-25937-4\_16},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/PaulP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/glvlsi/MentensOP04,
  author       = {Nele Mentens and
                  Siddika Berna {\"{O}}rs and
                  Bart Preneel},
  editor       = {David Garrett and
                  John C. Lach and
                  Charles A. Zukowski},
  title        = {An {FPGA} implementation of an elliptic curve processor GF(2\({}^{\mbox{m}}\))},
  booktitle    = {Proceedings of the 14th {ACM} Great Lakes Symposium on {VLSI} 2004,
                  Boston, MA, USA, April 26-28, 2004},
  pages        = {454--457},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/988952.989062},
  doi          = {10.1145/988952.989062},
  timestamp    = {Fri, 20 Aug 2021 16:30:37 +0200},
  biburl       = {https://dblp.org/rec/conf/glvlsi/MentensOP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/NikovNP04,
  author       = {Ventzislav Nikov and
                  Svetla Nikova and
                  Bart Preneel},
  editor       = {Javier L{\'{o}}pez and
                  Sihan Qing and
                  Eiji Okamoto},
  title        = {Robust Metering Schemes for General Access Structures},
  booktitle    = {Information and Communications Security, 6th International Conference,
                  {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3269},
  pages        = {53--65},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30191-2\_5},
  doi          = {10.1007/978-3-540-30191-2\_5},
  timestamp    = {Thu, 29 Aug 2019 08:10:01 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/NikovNP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11/DiazP04,
  author       = {Claudia D{\'{\i}}az and
                  Bart Preneel},
  editor       = {Yves Deswarte and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Lingyu Wang},
  title        = {Taxonomy of Mixes and Dummy Traffic},
  booktitle    = {Information Security Management, Education and Privacy, {IFIP} 18th
                  World Computer Congress, {TC11} 19th International Information Security
                  Workshops, 22-27 August 2004, Toulouse, France},
  series       = {{IFIP}},
  volume       = {148},
  pages        = {215--230},
  publisher    = {Kluwer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8145-6\_18},
  doi          = {10.1007/1-4020-8145-6\_18},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11/DiazP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifipTCS/BraekenWP04,
  author       = {An Braeken and
                  Christopher Wolf and
                  Bart Preneel},
  editor       = {Jean{-}Jacques L{\'{e}}vy and
                  Ernst W. Mayr and
                  John C. Mitchell},
  title        = {A Randomised Algorithm for Checking the Normality of Cryptographic
                  Boolean Functions},
  booktitle    = {Exploring New Frontiers of Theoretical Informatics, {IFIP} 18th World
                  Computer Congress, {TC1} 3rd International Conference on Theoretical
                  Computer Science (TCS2004), 22-27 August 2004, Toulouse, France},
  series       = {{IFIP}},
  volume       = {155},
  pages        = {51--66},
  publisher    = {Kluwer/Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8141-3\_7},
  doi          = {10.1007/1-4020-8141-3\_7},
  timestamp    = {Fri, 27 Sep 2019 10:35:17 +0200},
  biburl       = {https://dblp.org/rec/conf/ifipTCS/BraekenWP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/DiazP04,
  author       = {Claudia D{\'{\i}}az and
                  Bart Preneel},
  editor       = {Jessica J. Fridrich},
  title        = {Reasoning About the Anonymity Provided by Pool Mixes That Generate
                  Dummy Traffic},
  booktitle    = {Information Hiding, 6th International Workshop, {IH} 2004, Toronto,
                  Canada, May 23-25, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3200},
  pages        = {309--325},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30114-1\_22},
  doi          = {10.1007/978-3-540-30114-1\_22},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/DiazP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/BraekenNNP04,
  author       = {An Braeken and
                  Ventzislav Nikov and
                  Svetla Nikova and
                  Bart Preneel},
  editor       = {Anne Canteaut and
                  Kapalee Viswanathan},
  title        = {On Boolean Functions with Generalized Cryptographic Properties},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2004, 5th International Conference
                  on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3348},
  pages        = {120--135},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30556-9\_11},
  doi          = {10.1007/978-3-540-30556-9\_11},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/BraekenNNP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itcc/OrsGOP04,
  author       = {Siddika Berna {\"{O}}rs and
                  Frank K. G{\"{u}}rkaynak and
                  Elisabeth Oswald and
                  Bart Preneel},
  title        = {Power-Analysis Attack on an {ASIC} {AES} implementation},
  booktitle    = {International Conference on Information Technology: Coding and Computing
                  (ITCC'04), Volume 2, April 5-7, 2004, Las Vegas, Nevada, {USA}},
  pages        = {546--552},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/ITCC.2004.1286711},
  doi          = {10.1109/ITCC.2004.1286711},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itcc/OrsGOP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/ArmknechtLP04,
  author       = {Frederik Armknecht and
                  Joseph Lano and
                  Bart Preneel},
  editor       = {Helena Handschuh and
                  M. Anwar Hasan},
  title        = {Extending the Resynchronization Attack},
  booktitle    = {Selected Areas in Cryptography, 11th International Workshop, {SAC}
                  2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3357},
  pages        = {19--38},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30564-4\_2},
  doi          = {10.1007/978-3-540-30564-4\_2},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/ArmknechtLP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/Preneel04,
  author       = {Bart Preneel},
  editor       = {Carlo Blundo and
                  Stelvio Cimato},
  title        = {{ECRYPT:} The Cryptographic Research Challenges for the Next Decade},
  booktitle    = {Security in Communication Networks, 4th International Conference,
                  {SCN} 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3352},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30598-9\_1},
  doi          = {10.1007/978-3-540-30598-9\_1},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/Preneel04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/NikovNP04,
  author       = {Ventzislav Nikov and
                  Svetla Nikova and
                  Bart Preneel},
  editor       = {Carlo Blundo and
                  Stelvio Cimato},
  title        = {On the Size of Monotone Span Programs},
  booktitle    = {Security in Communication Networks, 4th International Conference,
                  {SCN} 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3352},
  pages        = {249--262},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30598-9\_18},
  doi          = {10.1007/978-3-540-30598-9\_18},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/NikovNP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/WolfBP04,
  author       = {Christopher Wolf and
                  An Braeken and
                  Bart Preneel},
  editor       = {Carlo Blundo and
                  Stelvio Cimato},
  title        = {Efficient Cryptanalysis of {RSE(2)PKC} and {RSSE(2)PKC}},
  booktitle    = {Security in Communication Networks, 4th International Conference,
                  {SCN} 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3352},
  pages        = {294--309},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30598-9\_21},
  doi          = {10.1007/978-3-540-30598-9\_21},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/WolfBP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/YoshidaBCLP04,
  author       = {Hirotaka Yoshida and
                  Alex Biryukov and
                  Christophe De Canni{\`{e}}re and
                  Joseph Lano and
                  Bart Preneel},
  editor       = {Carlo Blundo and
                  Stelvio Cimato},
  title        = {Non-randomness of the Full 4 and 5-Pass {HAVAL}},
  booktitle    = {Security in Communication Networks, 4th International Conference,
                  {SCN} 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3352},
  pages        = {324--336},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30598-9\_23},
  doi          = {10.1007/978-3-540-30598-9\_23},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/YoshidaBCLP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WolfP04,
  author       = {Christopher Wolf and
                  Bart Preneel},
  title        = {Asymmetric Cryptography: Hidden Field Equations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {72},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/072},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WolfP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BraekenWP04,
  author       = {An Braeken and
                  Christopher Wolf and
                  Bart Preneel},
  title        = {Classification of Highly Nonlinear Boolean Power Functions with a
                  Randomised Algorithm for Checking Normality},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {214},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/214},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BraekenWP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BraekenWP04a,
  author       = {An Braeken and
                  Christopher Wolf and
                  Bart Preneel},
  title        = {A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {222},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/222},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BraekenWP04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArmknechtLP04,
  author       = {Frederik Armknecht and
                  Joseph Lano and
                  Bart Preneel},
  title        = {Extending the Resynchronization Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {232},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/232},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArmknechtLP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WolfBP04,
  author       = {Christopher Wolf and
                  An Braeken and
                  Bart Preneel},
  title        = {Efficient Cryptanalysis of {RSE(2)PKC} and {RSSE(2)PKC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {237},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/237},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WolfBP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BraekenBNP04,
  author       = {An Braeken and
                  Yuri L. Borissov and
                  Svetla Nikova and
                  Bart Preneel},
  title        = {Classification of Boolean Functions of 6 Variables or Less with Respect
                  to Cryptographic Properties},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {248},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/248},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BraekenBNP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BraekenNNP04,
  author       = {An Braeken and
                  Ventzislav Nikov and
                  Svetla Nikova and
                  Bart Preneel},
  title        = {On Boolean Functions with Generalized Cryptographic Properties},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {259},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/259},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BraekenNNP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WolfP04a,
  author       = {Christopher Wolf and
                  Bart Preneel},
  title        = {Applications of Multivariate Quadratic Public Key Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {263},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/263},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WolfP04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PaulP04,
  author       = {Souradyuti Paul and
                  Bart Preneel},
  title        = {Solving Systems of Differential Equations of Addition},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {294},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/294},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PaulP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WolfP04b,
  author       = {Christopher Wolf and
                  Bart Preneel},
  title        = {Equivalent Keys in HFE, C\({}^{\mbox{*}}\), and variations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {360},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/360},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WolfP04b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WolfP04c,
  author       = {Christopher Wolf and
                  Bart Preneel},
  title        = {Superfluous Keys in Multivariate Quadratic Asymmetric Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {361},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/361},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WolfP04c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/IliadisGSCPG03,
  author       = {John Iliadis and
                  Stefanos Gritzalis and
                  Diomidis Spinellis and
                  Danny De Cock and
                  Bart Preneel and
                  Dimitris Gritzalis},
  title        = {Towards a framework for evaluating certificate status information
                  mechanisms},
  journal      = {Comput. Commun.},
  volume       = {26},
  number       = {16},
  pages        = {1839--1850},
  year         = {2003},
  url          = {https://doi.org/10.1016/S0140-3664(03)00079-3},
  doi          = {10.1016/S0140-3664(03)00079-3},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/IliadisGSCPG03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dud/DiazCP03,
  author       = {Claudia D{\'{\i}}az and
                  Joris Claessens and
                  Bart Preneel},
  title        = {{APES} - Anonymity and Privacy in Electronic Services},
  journal      = {Datenschutz und Datensicherheit},
  volume       = {27},
  number       = {3},
  year         = {2003},
  timestamp    = {Fri, 17 Dec 2004 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dud/DiazCP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/integration/BatinaOPV03,
  author       = {Lejla Batina and
                  Siddika Berna {\"{O}}rs and
                  Bart Preneel and
                  Joos Vandewalle},
  title        = {Hardware architectures for public key cryptography},
  journal      = {Integr.},
  volume       = {34},
  number       = {1-2},
  pages        = {1--64},
  year         = {2003},
  url          = {https://doi.org/10.1016/S0167-9260(02)00053-6},
  doi          = {10.1016/S0167-9260(02)00053-6},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/integration/BatinaOPV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/intr/ClaessensDGDPV03,
  author       = {Joris Claessens and
                  Claudia D{\'{\i}}az and
                  Caroline Goemans and
                  Jos Dumortier and
                  Bart Preneel and
                  Joos Vandewalle},
  title        = {Revocable anonymous access to the Internet?},
  journal      = {Internet Res.},
  volume       = {13},
  number       = {4},
  pages        = {242--258},
  year         = {2003},
  url          = {https://doi.org/10.1108/10662240310488933},
  doi          = {10.1108/10662240310488933},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/intr/ClaessensDGDPV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/QuisquaterPV03,
  author       = {Micha{\"{e}}l Quisquater and
                  Bart Preneel and
                  Joos Vandewalle},
  title        = {A new inequality in discrete Fourier theory},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {49},
  number       = {8},
  pages        = {2038--2040},
  year         = {2003},
  url          = {https://doi.org/10.1109/TIT.2003.814492},
  doi          = {10.1109/TIT.2003.814492},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/QuisquaterPV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toit/ClaessensPV03,
  author       = {Joris Claessens and
                  Bart Preneel and
                  Joos Vandewalle},
  title        = {(How) can mobile agents do secure electronic transactions on untrusted
                  hosts? {A} survey of the security issues and the current solutions},
  journal      = {{ACM} Trans. Internet Techn.},
  volume       = {3},
  number       = {1},
  pages        = {28--48},
  year         = {2003},
  url          = {https://doi.org/10.1145/643477.643479},
  doi          = {10.1145/643477.643479},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/toit/ClaessensPV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/NikovNP03,
  author       = {Ventzislav Nikov and
                  Svetla Nikova and
                  Bart Preneel},
  editor       = {Jianying Zhou and
                  Moti Yung and
                  Yongfei Han},
  title        = {Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally
                  Secure against Adaptive Adversary: The Zero-Error Case},
  booktitle    = {Applied Cryptography and Network Security, First International Conference,
                  {ACNS} 2003. Kunming, China, October 16-19, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2846},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45203-4\_1},
  doi          = {10.1007/978-3-540-45203-4\_1},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/NikovNP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asap/OrsBPV03,
  author       = {Siddika Berna {\"{O}}rs and
                  Lejla Batina and
                  Bart Preneel and
                  Joos Vandewalle},
  title        = {Hardware Implementation of an Elliptic Curve Processor over GF(p)},
  booktitle    = {14th {IEEE} International Conference on Application-Specific Systems,
                  Architectures, and Processors {(ASAP} 2003), 24-26 June 2003, The
                  Hague, The Netherlands},
  pages        = {433--443},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/ASAP.2003.1212866},
  doi          = {10.1109/ASAP.2003.1212866},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asap/OrsBPV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/RompayBPV03,
  author       = {Bart Van Rompay and
                  Alex Biryukov and
                  Bart Preneel and
                  Joos Vandewalle},
  editor       = {Chi{-}Sung Laih},
  title        = {Cryptanalysis of 3-Pass {HAVAL}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2003, 9th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, November 30 - December 4, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2894},
  pages        = {228--245},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40061-5\_14},
  doi          = {10.1007/978-3-540-40061-5\_14},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/RompayBPV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/OrsOP03,
  author       = {Siddika Berna {\"{O}}rs and
                  Elisabeth Oswald and
                  Bart Preneel},
  editor       = {Colin D. Walter and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Power-Analysis Attacks on an {FPGA} - First Experimental Results},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
                  Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2779},
  pages        = {35--50},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45238-6\_4},
  doi          = {10.1007/978-3-540-45238-6\_4},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/OrsOP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BiryukovCBP03,
  author       = {Alex Biryukov and
                  Christophe De Canni{\`{e}}re and
                  An Braeken and
                  Bart Preneel},
  editor       = {Eli Biham},
  title        = {A Toolbox for Cryptanalysis: Linear and Affine Equivalence Algorithms},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2003, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Warsaw,
                  Poland, May 4-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2656},
  pages        = {33--50},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-39200-9\_3},
  doi          = {10.1007/3-540-39200-9\_3},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BiryukovCBP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BabbageCLPV03,
  author       = {Steve Babbage and
                  Christophe De Canni{\`{e}}re and
                  Joseph Lano and
                  Bart Preneel and
                  Joos Vandewalle},
  editor       = {Thomas Johansson},
  title        = {Cryptanalysis of SOBER-t32},
  booktitle    = {Fast Software Encryption, 10th International Workshop, {FSE} 2003,
                  Lund, Sweden, February 24-26, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2887},
  pages        = {111--128},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39887-5\_10},
  doi          = {10.1007/978-3-540-39887-5\_10},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BabbageCLPV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/HongKPR03,
  author       = {Dowon Hong and
                  Ju{-}Sung Kang and
                  Bart Preneel and
                  Heuisu Ryu},
  editor       = {Thomas Johansson},
  title        = {A Concrete Security Analysis for 3GPP-MAC},
  booktitle    = {Fast Software Encryption, 10th International Workshop, {FSE} 2003,
                  Lund, Sweden, February 24-26, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2887},
  pages        = {154--169},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39887-5\_12},
  doi          = {10.1007/978-3-540-39887-5\_12},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/HongKPR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/BorissovBNP03,
  author       = {Yuri L. Borissov and
                  An Braeken and
                  Svetla Nikova and
                  Bart Preneel},
  editor       = {Kenneth G. Paterson},
  title        = {On the Covering Radius of Second Order Binary Reed-Muller Code in
                  the Set of Resilient Boolean Functions},
  booktitle    = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester,
                  UK, December 16-18, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2898},
  pages        = {82--92},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40974-8\_8},
  doi          = {10.1007/978-3-540-40974-8\_8},
  timestamp    = {Wed, 18 Mar 2020 16:01:02 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/BorissovBNP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/PaulP03,
  author       = {Souradyuti Paul and
                  Bart Preneel},
  editor       = {Thomas Johansson and
                  Subhamoy Maitra},
  title        = {Analysis of Non-fortuitous Predictive States of the {RC4} Keystream
                  Generator},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2003, 4th International Conference
                  on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2904},
  pages        = {52--67},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24582-7\_4},
  doi          = {10.1007/978-3-540-24582-7\_4},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/PaulP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/NikovNP03,
  author       = {Ventzislav Nikov and
                  Svetla Nikova and
                  Bart Preneel},
  editor       = {Thomas Johansson and
                  Subhamoy Maitra},
  title        = {On Multiplicative Linear Secret Sharing Schemes},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2003, 4th International Conference
                  on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2904},
  pages        = {135--147},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24582-7\_10},
  doi          = {10.1007/978-3-540-24582-7\_10},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/NikovNP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipps/OrsBPV03,
  author       = {Siddika Berna {\"{O}}rs and
                  Lejla Batina and
                  Bart Preneel and
                  Joos Vandewalle},
  title        = {Hardware Implementation of a Montgomery Modular Multiplier in a Systolic
                  Array},
  booktitle    = {17th International Parallel and Distributed Processing Symposium {(IPDPS}
                  2003), 22-26 April 2003, Nice, France, CD-ROM/Abstracts Proceedings},
  pages        = {184},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/IPDPS.2003.1213341},
  doi          = {10.1109/IPDPS.2003.1213341},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipps/OrsBPV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/NakaharaPV03,
  author       = {Jorge Nakahara Jr. and
                  Bart Preneel and
                  Joos Vandewalle},
  editor       = {Colin Boyd and
                  Wenbo Mao},
  title        = {A Note on Weak Keys of PES, IDEA, and Some Extended Variants},
  booktitle    = {Information Security, 6th International Conference, {ISC} 2003, Bristol,
                  UK, October 1-3, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2851},
  pages        = {267--279},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10958513\_21},
  doi          = {10.1007/10958513\_21},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/NakaharaPV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BiryukovLP03,
  author       = {Alex Biryukov and
                  Joseph Lano and
                  Bart Preneel},
  editor       = {Mitsuru Matsui and
                  Robert J. Zuccherato},
  title        = {Cryptanalysis of the Alleged SecurID Hash Function},
  booktitle    = {Selected Areas in Cryptography, 10th Annual International Workshop,
                  {SAC} 2003, Ottawa, Canada, August 14-15, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3006},
  pages        = {130--144},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24654-1\_10},
  doi          = {10.1007/978-3-540-24654-1\_10},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/BiryukovLP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/NakaharaRPV03,
  author       = {Jorge Nakahara Jr. and
                  Vincent Rijmen and
                  Bart Preneel and
                  Joos Vandewalle},
  editor       = {Kijoon Chae and
                  Moti Yung},
  title        = {The {MESH} Block Ciphers},
  booktitle    = {Information Security Applications, 4th International Workshop, {WISA}
                  2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2908},
  pages        = {458--473},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24591-9\_34},
  doi          = {10.1007/978-3-540-24591-9\_34},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/NakaharaRPV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NikovNP03,
  author       = {Ventzislav Nikov and
                  Svetla Nikova and
                  Bart Preneel},
  title        = {Multi-Party Computation from any Linear Secret Sharing Scheme Secure
                  against Adaptive Adversary: The Zero-Error Case},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {6},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/006},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NikovNP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BiryukovLP03,
  author       = {Alex Biryukov and
                  Joseph Lano and
                  Bart Preneel},
  title        = {Cryptanalysis of the Alleged SecurID Hash Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {162},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/162},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BiryukovLP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ClaessensDCPV02,
  author       = {Joris Claessens and
                  Valentin Dem and
                  Danny De Cock and
                  Bart Preneel and
                  Joos Vandewalle},
  title        = {On the Security of Today's Online Electronic Banking Systems},
  journal      = {Comput. Secur.},
  volume       = {21},
  number       = {3},
  pages        = {253--265},
  year         = {2002},
  url          = {https://doi.org/10.1016/S0167-4048(02)00312-7},
  doi          = {10.1016/S0167-4048(02)00312-7},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ClaessensDCPV02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/firstmonday/ClaessensPV02,
  author       = {Joris Claessens and
                  Bart Preneel and
                  Joos Vandewalle},
  title        = {A Tangled World Wide Web of Security Issues},
  journal      = {First Monday},
  volume       = {7},
  number       = {3},
  year         = {2002},
  url          = {https://doi.org/10.5210/fm.v7i3.935},
  doi          = {10.5210/FM.V7I3.935},
  timestamp    = {Mon, 04 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/firstmonday/ClaessensPV02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informaticaSI/ClaessensPV02,
  author       = {Joris Claessens and
                  Bart Preneel and
                  Joos Vandewalle},
  title        = {Combining World Wide Web and wireless security},
  journal      = {Informatica (Slovenia)},
  volume       = {26},
  number       = {2},
  year         = {2002},
  timestamp    = {Mon, 15 Feb 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/informaticaSI/ClaessensPV02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/KnudsenP02,
  author       = {Lars R. Knudsen and
                  Bart Preneel},
  title        = {Construction of secure and fast hash functions using nonbinary error-correcting
                  codes},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {48},
  number       = {9},
  pages        = {2524--2539},
  year         = {2002},
  url          = {https://doi.org/10.1109/TIT.2002.801402},
  doi          = {10.1109/TIT.2002.801402},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/KnudsenP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fasec/Preneel02,
  author       = {Bart Preneel},
  editor       = {Ali E. Abdallah and
                  Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {Cryptographic Challenges: The Past and the Future},
  booktitle    = {Formal Aspects of Security, First International Conference, FASec
                  2002, London, UK, December 16-18, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2629},
  pages        = {167--182},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-40981-6\_14},
  doi          = {10.1007/978-3-540-40981-6\_14},
  timestamp    = {Wed, 15 Sep 2021 13:43:48 +0200},
  biburl       = {https://dblp.org/rec/conf/fasec/Preneel02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/WatanabeFYTP02,
  author       = {Dai Watanabe and
                  Soichi Furuya and
                  Hirotaka Yoshida and
                  Kazuo Takaragi and
                  Bart Preneel},
  editor       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {A New Keystream Generator {MUGI}},
  booktitle    = {Fast Software Encryption, 9th International Workshop, {FSE} 2002,
                  Leuven, Belgium, February 4-6, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2365},
  pages        = {179--194},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45661-9\_14},
  doi          = {10.1007/3-540-45661-9\_14},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/WatanabeFYTP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/BiryukovNPV02,
  author       = {Alex Biryukov and
                  Jorge Nakahara Jr. and
                  Bart Preneel and
                  Joos Vandewalle},
  editor       = {Robert H. Deng and
                  Sihan Qing and
                  Feng Bao and
                  Jianying Zhou},
  title        = {New Weak-Key Classes of {IDEA}},
  booktitle    = {Information and Communications Security, 4th International Conference,
                  {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2513},
  pages        = {315--326},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36159-6\_27},
  doi          = {10.1007/3-540-36159-6\_27},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/BiryukovNPV02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/NikovNPV02,
  author       = {Ventzislav Nikov and
                  Svetla Nikova and
                  Bart Preneel and
                  Joos Vandewalle},
  editor       = {Alfred Menezes and
                  Palash Sarkar},
  title        = {On Unconditionally Secure Distributed Oblivious Transfer},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2002, Third International Conference
                  on Cryptology in India, Hyderabad, India, December 16-18, 2002},
  series       = {Lecture Notes in Computer Science},
  volume       = {2551},
  pages        = {395--408},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36231-2\_31},
  doi          = {10.1007/3-540-36231-2\_31},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/NikovNPV02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/NikovNPV02a,
  author       = {Ventzislav Nikov and
                  Svetla Nikova and
                  Bart Preneel and
                  Joos Vandewalle},
  editor       = {Alfred Menezes and
                  Palash Sarkar},
  title        = {On Distributed Key Distribution Centers and Unconditionally Secure
                  Proactive Verifiable Secret Sharing Schemes Based on General Access
                  Structure},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2002, Third International Conference
                  on Cryptology in India, Hyderabad, India, December 16-18, 2002},
  series       = {Lecture Notes in Computer Science},
  volume       = {2551},
  pages        = {422--436},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36231-2\_33},
  doi          = {10.1007/3-540-36231-2\_33},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/NikovNPV02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/DiazSCP02,
  author       = {Claudia D{\'{\i}}az and
                  Stefaan Seys and
                  Joris Claessens and
                  Bart Preneel},
  editor       = {Roger Dingledine and
                  Paul F. Syverson},
  title        = {Towards Measuring Anonymity},
  booktitle    = {Privacy Enhancing Technologies, Second International Workshop, {PET}
                  2002, San Francisco, CA, USA, April 14-15, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2482},
  pages        = {54--68},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36467-6\_5},
  doi          = {10.1007/3-540-36467-6\_5},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/DiazSCP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/QuisquaterPV02,
  author       = {Micha{\"{e}}l Quisquater and
                  Bart Preneel and
                  Joos Vandewalle},
  editor       = {David Naccache and
                  Pascal Paillier},
  title        = {On the Security of the Threshold Scheme Based on the Chinese Remainder
                  Theorem},
  booktitle    = {Public Key Cryptography, 5th International Workshop on Practice and
                  Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February
                  12-14, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2274},
  pages        = {199--210},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45664-3\_14},
  doi          = {10.1007/3-540-45664-3\_14},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/QuisquaterPV02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Preneel02,
  author       = {Bart Preneel},
  editor       = {David Naccache and
                  Pascal Paillier},
  title        = {New European Schemes for Signature, Integrity and Encryption {(NESSIE):}
                  {A} Status Report},
  booktitle    = {Public Key Cryptography, 5th International Workshop on Practice and
                  Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February
                  12-14, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2274},
  pages        = {297--309},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45664-3\_21},
  doi          = {10.1007/3-540-45664-3\_21},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Preneel02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/BorissovNPV02,
  author       = {Yuri L. Borissov and
                  Svetla Nikova and
                  Bart Preneel and
                  Joos Vandewalle},
  editor       = {Stelvio Cimato and
                  Clemente Galdi and
                  Giuseppe Persiano},
  title        = {On a Resynchronization Weakness in a Class of Combiners with Memory},
  booktitle    = {Security in Communication Networks, Third International Conference,
                  {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2576},
  pages        = {164--173},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36413-7\_12},
  doi          = {10.1007/3-540-36413-7\_12},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/BorissovNPV02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/xmlsec/WoutersPFR02,
  author       = {Karel Wouters and
                  Bart Preneel and
                  Ana Isabel Gonz{\'{a}}lez{-}Tablas Ferreres and
                  Arturo Ribagorda},
  editor       = {Michiharu Kudo},
  title        = {Towards an {XML} format for time-stamps},
  booktitle    = {Proceedings of the 2002 {ACM} Workshop on {XML} Security, Fairfax,
                  VA, USA, November 22, 2002},
  pages        = {61--70},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/764792.764802},
  doi          = {10.1145/764792.764802},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/xmlsec/WoutersPFR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ctrsa/2002,
  editor       = {Bart Preneel},
  title        = {Topics in Cryptology - {CT-RSA} 2002, The Cryptographer's Track at
                  the {RSA} Conference, 2002, San Jose, CA, USA, February 18-22, 2002,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2271},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45760-7},
  doi          = {10.1007/3-540-45760-7},
  isbn         = {3-540-43224-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/2002.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NakaharaPV02,
  author       = {Jorge Nakahara Jr. and
                  Bart Preneel and
                  Joos Vandewalle},
  title        = {Square Attacks on Reduced-Round Variants of the Skipjack Block Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {3},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/003},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NakaharaPV02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NikovNPV02,
  author       = {Ventzislav Nikov and
                  Svetla Nikova and
                  Bart Preneel and
                  Joos Vandewalle},
  title        = {Applying General Access Structure to Metering Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {102},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/102},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NikovNPV02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NikovNPV02a,
  author       = {Ventzislav Nikov and
                  Svetla Nikova and
                  Bart Preneel and
                  Joos Vandewalle},
  title        = {Applying General Access Structure to Proactive Secret Sharing Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {141},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/141},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NikovNPV02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NakaharaPV02a,
  author       = {Jorge Nakahara Jr. and
                  Bart Preneel and
                  Joos Vandewalle},
  title        = {A note on Weak Keys of PES, {IDEA} and some Extended Variants},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {152},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/152},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NakaharaPV02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/BorstPR01,
  author       = {Johan Borst and
                  Bart Preneel and
                  Vincent Rijmen},
  title        = {Cryptography on smart cards},
  journal      = {Comput. Networks},
  volume       = {36},
  number       = {4},
  pages        = {423--435},
  year         = {2001},
  url          = {https://doi.org/10.1016/S1389-1286(01)00164-5},
  doi          = {10.1016/S1389-1286(01)00164-5},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/BorstPR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/HerleaCCPV01,
  author       = {T. Herlea and
                  Joris Claessens and
                  Danny De Cock and
                  Bart Preneel and
                  Joos Vandewalle},
  editor       = {Ralf Steinmetz and
                  Jana Dittmann and
                  Martin Steinebach},
  title        = {Secure Meeting Scheduling with agenTA},
  booktitle    = {Communications and Multimedia Security Issues of the New Century,
                  Proceedings of the {IFIP} {TC6/TC11} International Conference on Communications
                  and Multimedia Security Issues, May 21-22, 2001, Darmstadt, Germany},
  series       = {{IFIP} Conference Proceedings},
  volume       = {192},
  publisher    = {Kluwer},
  year         = {2001},
  timestamp    = {Thu, 18 Dec 2003 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cms/HerleaCCPV01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecAgents/ClaessensPV01,
  author       = {Joris Claessens and
                  Bart Preneel and
                  Joos Vandewalle},
  editor       = {Jiming Liu and
                  Yiming Ye},
  title        = {Secure Communication for Secure Agent-Based Electronic Commerce Applications},
  booktitle    = {E-Commerce Agents, Marketplace Solutions, Security Issues, and Supply
                  and Demand},
  series       = {Lecture Notes in Computer Science},
  volume       = {2033},
  pages        = {180--190},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45370-9\_11},
  doi          = {10.1007/3-540-45370-9\_11},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ecAgents/ClaessensPV01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/VercauterenPV01,
  author       = {Frederik Vercauteren and
                  Bart Preneel and
                  Joos Vandewalle},
  editor       = {Birgit Pfitzmann},
  title        = {A Memory Efficient Version of Satoh's Algorithm},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference
                  on the Theory and Application of Cryptographic Techniques, Innsbruck,
                  Austria, May 6-10, 2001, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {2045},
  pages        = {1--13},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44987-6\_1},
  doi          = {10.1007/3-540-44987-6\_1},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/VercauterenPV01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/RijmenRPV01,
  author       = {Vincent Rijmen and
                  Bart Van Rompay and
                  Bart Preneel and
                  Joos Vandewalle},
  editor       = {Mitsuru Matsui},
  title        = {Producing Collisions for {PANAMA}},
  booktitle    = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama,
                  Japan, April 2-4, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2355},
  pages        = {37--51},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45473-X\_4},
  doi          = {10.1007/3-540-45473-X\_4},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/RijmenRPV01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BarretoRNPVK01,
  author       = {Paulo S. L. M. Barreto and
                  Vincent Rijmen and
                  Jorge Nakahara Jr. and
                  Bart Preneel and
                  Joos Vandewalle and
                  Hae Yong Kim},
  editor       = {Mitsuru Matsui},
  title        = {Improved {SQUARE} Attacks against Reduced-Round {HIEROCRYPT}},
  booktitle    = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama,
                  Japan, April 2-4, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2355},
  pages        = {165--173},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45473-X\_14},
  doi          = {10.1007/3-540-45473-X\_14},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BarretoRNPVK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Preneel01,
  author       = {Bart Preneel},
  editor       = {Mitsuru Matsui},
  title        = {{NESSIE:} {A} European Approach to Evaluate Cryptographic Algorithms},
  booktitle    = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama,
                  Japan, April 2-4, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2355},
  pages        = {267--276},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45473-X\_22},
  doi          = {10.1007/3-540-45473-X\_22},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Preneel01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/netsec/ClaessensPV01,
  author       = {Joris Claessens and
                  Bart Preneel and
                  Joos Vandewalle},
  editor       = {Bart De Decker and
                  Frank Piessens and
                  Jan Smits and
                  Els Van Herreweghen},
  title        = {Combining World Wide Web and Wireless Security},
  booktitle    = {Advances in Network and Distributed Systems Security, {IFIP} {TC11}
                  {WG11.4} First Annual Working Conference on Network Security, November
                  26-27, 2001, Leuven, Belgium},
  series       = {{IFIP} Conference Proceedings},
  volume       = {206},
  pages        = {153--171},
  publisher    = {Kluwer},
  year         = {2001},
  url          = {https://doi.org/10.1007/0-306-46958-8\_11},
  doi          = {10.1007/0-306-46958-8\_11},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/netsec/ClaessensPV01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BoerRPV01,
  author       = {Bert den Boer and
                  Bart Van Rompay and
                  Bart Preneel and
                  Joos Vandewalle},
  editor       = {Serge Vaudenay and
                  Amr M. Youssef},
  title        = {New (Two-Track-)MAC Based on the Two Trails of {RIPEMD}},
  booktitle    = {Selected Areas in Cryptography, 8th Annual International Workshop,
                  {SAC} 2001 Toronto, Ontario, Canada, August 16-17, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2259},
  pages        = {314--324},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45537-X\_25},
  doi          = {10.1007/3-540-45537-X\_25},
  timestamp    = {Tue, 01 Jun 2021 15:22:31 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/BoerRPV01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/HerleaCPNPD01,
  author       = {T. Herlea and
                  Joris Claessens and
                  Bart Preneel and
                  Gregory Neven and
                  Frank Piessens and
                  Bart De Decker},
  editor       = {Michel Dupuy and
                  Pierre Paradinas},
  title        = {On Securely Scheduling a Meeting},
  booktitle    = {Trusted Information: The New Decade Challenge, {IFIP} {TC11} Sixteenth
                  Annual Working Conference on Information Security (IFIP/Sec'01), June
                  11-13, 2001, Paris, France},
  series       = {{IFIP} Conference Proceedings},
  volume       = {193},
  pages        = {183--198},
  publisher    = {Kluwer},
  year         = {2001},
  timestamp    = {Fri, 26 Jul 2002 13:05:24 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/HerleaCPNPD01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NakaharaBPVK01,
  author       = {Jorge Nakahara Jr. and
                  Paulo S. L. M. Barreto and
                  Bart Preneel and
                  Joos Vandewalle and
                  Hae Y. Kim},
  title        = {{SQUARE} Attacks on Reduced-Round {PES} and {IDEA} Block Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {68},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/068},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/NakaharaBPVK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/HornP00,
  author       = {G{\"{u}}nther Horn and
                  Bart Preneel},
  title        = {Authentication and Payment in Future Mobile Systems},
  journal      = {J. Comput. Secur.},
  volume       = {8},
  number       = {2/3},
  pages        = {183--207},
  year         = {2000},
  url          = {https://doi.org/10.3233/jcs-2000-82-306},
  doi          = {10.3233/JCS-2000-82-306},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/HornP00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/IliadisSGPK00,
  author       = {John Iliadis and
                  Diomidis Spinellis and
                  Dimitris Gritzalis and
                  Bart Preneel and
                  Sokratis K. Katsikas},
  editor       = {Dimitris Gritzalis and
                  Sushil Jajodia and
                  Pierangela Samarati},
  title        = {Evaluating certificate status information mechanisms},
  booktitle    = {{CCS} 2000, Proceedings of the 7th {ACM} Conference on Computer and
                  Communications Security, Athens, Greece, November 1-4, 2000},
  pages        = {1--8},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/352600.352603},
  doi          = {10.1145/352600.352603},
  timestamp    = {Tue, 10 Nov 2020 20:00:15 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/IliadisSGPK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/NakaharaPV00,
  author       = {Jorge Nakahara Jr. and
                  Bart Preneel and
                  Joos Vandewalle},
  editor       = {Bruce Schneier},
  title        = {Linear Cryptanalysis of Reduced-Round Versions of the {SAFER} Block
                  Cipher Family},
  booktitle    = {Fast Software Encryption, 7th International Workshop, {FSE} 2000,
                  New York, NY, USA, April 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1978},
  pages        = {244--261},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44706-7\_17},
  doi          = {10.1007/3-540-44706-7\_17},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/NakaharaPV00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2000,
  editor       = {Bart Preneel},
  title        = {Advances in Cryptology - {EUROCRYPT} 2000, International Conference
                  on the Theory and Application of Cryptographic Techniques, Bruges,
                  Belgium, May 14-18, 2000, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1807},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-45539-6},
  doi          = {10.1007/3-540-45539-6},
  isbn         = {3-540-67517-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/2000.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Preneel99,
  author       = {Bart Preneel},
  title        = {State-of-the-art ciphers for commercial applications},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {1},
  pages        = {67--74},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)80009-1},
  doi          = {10.1016/S0167-4048(99)80009-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Preneel99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/PreneelO99,
  author       = {Bart Preneel and
                  Paul C. van Oorschot},
  title        = {On the Security of Iterated Message Authentication Codes},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {45},
  number       = {1},
  pages        = {188--199},
  year         = {1999},
  url          = {https://doi.org/10.1109/18.746787},
  doi          = {10.1109/18.746787},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/PreneelO99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vlsisp/CsapodiVP99,
  author       = {M{\'{a}}rton Csapodi and
                  Joos Vandewalle and
                  Bart Preneel},
  title        = {{CNN} Algorithms for Video Authentication and Copyright Protection},
  journal      = {J. {VLSI} Signal Process.},
  volume       = {23},
  number       = {2-3},
  pages        = {449--463},
  year         = {1999},
  url          = {https://doi.org/10.1023/A:1008113606327},
  doi          = {10.1023/A:1008113606327},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/vlsisp/CsapodiVP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DHalluinBPR99,
  author       = {Carl D'Halluin and
                  Gert Bijnens and
                  Bart Preneel and
                  Vincent Rijmen},
  editor       = {Kwok{-}Yan Lam and
                  Eiji Okamoto and
                  Chaoping Xing},
  title        = {Equivalent Keys of {HPC}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '99, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Singapore, November 14-18, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1716},
  pages        = {29--42},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/978-3-540-48000-6\_4},
  doi          = {10.1007/978-3-540-48000-6\_4},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DHalluinBPR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/NevelsteenP99,
  author       = {Wim Nevelsteen and
                  Bart Preneel},
  editor       = {Jacques Stern},
  title        = {Software Performance of Universal Hash Functions},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '99, International Conference
                  on the Theory and Application of Cryptographic Techniques, Prague,
                  Czech Republic, May 2-6, 1999, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1592},
  pages        = {24--41},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48910-X\_3},
  doi          = {10.1007/3-540-48910-X\_3},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/NevelsteenP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BorstPV99,
  author       = {Johan Borst and
                  Bart Preneel and
                  Joos Vandewalle},
  editor       = {Lars R. Knudsen},
  title        = {Linear Cryptanalysis of {RC5} and {RC6}},
  booktitle    = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome,
                  Italy, March 24-26, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1636},
  pages        = {16--30},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48519-8\_2},
  doi          = {10.1007/3-540-48519-8\_2},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BorstPV99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DHalluinBRP99,
  author       = {Carl D'Halluin and
                  Gert Bijnens and
                  Vincent Rijmen and
                  Bart Preneel},
  editor       = {Lars R. Knudsen},
  title        = {Attack on Six Rounds of Crypton},
  booktitle    = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome,
                  Italy, March 24-26, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1636},
  pages        = {46--59},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48519-8\_4},
  doi          = {10.1007/3-540-48519-8\_4},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/DHalluinBRP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/HandschuhP99,
  author       = {Helena Handschuh and
                  Bart Preneel},
  editor       = {Lars R. Knudsen},
  title        = {On the Security of Double and 2-Key Triple Modes of Operation},
  booktitle    = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome,
                  Italy, March 24-26, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1636},
  pages        = {215--230},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48519-8\_16},
  doi          = {10.1007/3-540-48519-8\_16},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/HandschuhP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cms/1999,
  editor       = {Bart Preneel},
  title        = {Secure Information Networks: Communications and Multimedia Security,
                  {IFIP} {TC6/TC11} Joint Working Conference on Communications and Multimedia
                  Security {(CMS} '99), September 20-21, 1999, Leuven, Belgium},
  series       = {{IFIP} Conference Proceedings},
  volume       = {152},
  publisher    = {Kluwer},
  year         = {1999},
  isbn         = {0-7923-8600-0},
  timestamp    = {Mon, 14 Oct 2002 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/1999.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/KnudsenLP98,
  author       = {Lars R. Knudsen and
                  Xuejia Lai and
                  Bart Preneel},
  title        = {Attacks on Fast Double Block Length Hash Functions},
  journal      = {J. Cryptol.},
  volume       = {11},
  number       = {1},
  pages        = {59--72},
  year         = {1998},
  url          = {https://doi.org/10.1007/s001459900035},
  doi          = {10.1007/S001459900035},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/KnudsenLP98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ac/Preneel98,
  author       = {Bart Preneel},
  editor       = {Ivan Damg{\aa}rd},
  title        = {The State of Cryptographic Hash Functions},
  booktitle    = {Lectures on Data Security, Modern Cryptology in Theory and Practice,
                  Summer School, Aarhus, Denmark, July 1998},
  series       = {Lecture Notes in Computer Science},
  volume       = {1561},
  pages        = {158--182},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-48969-X\_8},
  doi          = {10.1007/3-540-48969-X\_8},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ac/Preneel98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ants/WinMPW98,
  author       = {Erik De Win and
                  Serge Mister and
                  Bart Preneel and
                  Michael J. Wiener},
  editor       = {Joe Buhler},
  title        = {On the Performance of Signature Schemes Based on Elliptic Curves},
  booktitle    = {Algorithmic Number Theory, Third International Symposium, ANTS-III,
                  Portland, Oregon, USA, June 21-25, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1423},
  pages        = {252--266},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054867},
  doi          = {10.1007/BFB0054867},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ants/WinMPW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KnudsenMPRV98,
  author       = {Lars R. Knudsen and
                  Willi Meier and
                  Bart Preneel and
                  Vincent Rijmen and
                  Sven Verdoolaege},
  editor       = {Kazuo Ohta and
                  Dingyi Pei},
  title        = {Analysis Methods for (Alleged) {RC4}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '98, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Beijing, China, October 18-22, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1514},
  pages        = {327--341},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49649-1\_26},
  doi          = {10.1007/3-540-49649-1\_26},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KnudsenMPRV98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/HornP98,
  author       = {G{\"{u}}nther Horn and
                  Bart Preneel},
  editor       = {Jean{-}Jacques Quisquater and
                  Yves Deswarte and
                  Catherine Meadows and
                  Dieter Gollmann},
  title        = {Authentication and Payment in Future Mobile Systems},
  booktitle    = {Computer Security - {ESORICS} 98, 5th European Symposium on Research
                  in Computer Security, Louvain-la-Neuve, Belgium, September 16-18,
                  1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1485},
  pages        = {277--293},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0055870},
  doi          = {10.1007/BFB0055870},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/HornP98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isn/MartinPMHHPH98,
  author       = {Keith M. Martin and
                  Bart Preneel and
                  Chris J. Mitchell and
                  Hans{-}Joachim Hitz and
                  G{\"{u}}nther Horn and
                  Alla Poliakova and
                  Peter Howard},
  editor       = {Sebastiano Trigila and
                  Alvin P. Mullery and
                  M{\'{a}}rio Campolargo and
                  Hans Vanderstraeten and
                  Marcel Mampaey},
  title        = {Secure Billing for Mobile Information Services in {UMTS}},
  booktitle    = {Intelligence in Services and Networks: Technology for Ubiquitous Telecom
                  Services, 5th International Conference on Intelligence and Services
                  in Networks, IS{\&}N'98, Antwerp, Belgium, May 25-28, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1430},
  pages        = {535--548},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0056997},
  doi          = {10.1007/BFB0056997},
  timestamp    = {Mon, 29 Mar 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isn/MartinPMHHPH98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sofsem/Preneel98,
  author       = {Bart Preneel},
  editor       = {Branislav Rovan},
  title        = {An Introduction to Cryptology},
  booktitle    = {{SOFSEM} '98: Theory and Practice of Informatics, 25th Conference
                  on Current Trends in Theory and Practice of Informatics, Jasn{\'{a}},
                  Slovakia, November 21-27, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1521},
  pages        = {204--221},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49477-4\_14},
  doi          = {10.1007/3-540-49477-4\_14},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/sofsem/Preneel98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wetice/ClaessensVPV98,
  author       = {Joris Claessens and
                  Mark Vandenwauver and
                  Bart Preneel and
                  Joos Vandewalle},
  title        = {Setting up a Secure Web Server and Clients on an Intranet},
  booktitle    = {7th Workshop on Enabling Technologies {(WETICE} '98), Infrastructure
                  for Collaborative Enterprises, June 17-19, 1998, Palo Alto, CAUSA,
                  Proceedings},
  pages        = {295--300},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/ENABL.1998.725708},
  doi          = {10.1109/ENABL.1998.725708},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wetice/ClaessensVPV98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ac/1997crypto,
  editor       = {Bart Preneel and
                  Vincent Rijmen},
  title        = {State of the Art in Applied Cryptography, Course on Computer Security
                  and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997. Revised
                  Lectures},
  series       = {Lecture Notes in Computer Science},
  volume       = {1528},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49248-8},
  doi          = {10.1007/3-540-49248-8},
  isbn         = {3-540-65474-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ac/1997crypto.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/RijmenPW97,
  author       = {Vincent Rijmen and
                  Bart Preneel and
                  Erik De Win},
  title        = {On Weaknesses of Non-surjective Round Functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {12},
  number       = {3},
  pages        = {253--266},
  year         = {1997},
  url          = {https://doi.org/10.1023/A:1008224928678},
  doi          = {10.1023/A:1008224928678},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/RijmenPW97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/PreneelRO97,
  author       = {Bart Preneel and
                  Vincent Rijmen and
                  Paul C. van Oorschot},
  title        = {Security analysis of the message authenticator algorithm {(MAA)}},
  journal      = {Eur. Trans. Telecommun.},
  volume       = {8},
  number       = {5},
  pages        = {455--470},
  year         = {1997},
  url          = {https://doi.org/10.1002/ett.4460080504},
  doi          = {10.1002/ETT.4460080504},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ett/PreneelRO97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Preneel97,
  author       = {Bart Preneel},
  title        = {MACs and hash functions: State of the art},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {2},
  number       = {2},
  pages        = {33--43},
  year         = {1997},
  url          = {https://doi.org/10.1016/S1363-4127(97)81327-1},
  doi          = {10.1016/S1363-4127(97)81327-1},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Preneel97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ac/Preneel97,
  author       = {Bart Preneel},
  editor       = {Bart Preneel and
                  Vincent Rijmen},
  title        = {Cryptographic Primitives for Information Authentication - State of
                  the Art},
  booktitle    = {State of the Art in Applied Cryptography, Course on Computer Security
                  and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997. Revised
                  Lectures},
  series       = {Lecture Notes in Computer Science},
  volume       = {1528},
  pages        = {49--104},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/3-540-49248-8\_3},
  doi          = {10.1007/3-540-49248-8\_3},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ac/Preneel97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ac/PreneelRB97,
  author       = {Bart Preneel and
                  Vincent Rijmen and
                  Antoon Bosselaers},
  editor       = {Bart Preneel and
                  Vincent Rijmen},
  title        = {Recent Developments in the Design of Conventional Cryptographic Algorithms},
  booktitle    = {State of the Art in Applied Cryptography, Course on Computer Security
                  and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997. Revised
                  Lectures},
  series       = {Lecture Notes in Computer Science},
  volume       = {1528},
  pages        = {105--130},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/3-540-49248-8\_4},
  doi          = {10.1007/3-540-49248-8\_4},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ac/PreneelRB97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ac/WinP97,
  author       = {Erik De Win and
                  Bart Preneel},
  editor       = {Bart Preneel and
                  Vincent Rijmen},
  title        = {Elliptic Curve Public-Key Cryptosystems - An Introduction},
  booktitle    = {State of the Art in Applied Cryptography, Course on Computer Security
                  and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997. Revised
                  Lectures},
  series       = {Lecture Notes in Computer Science},
  volume       = {1528},
  pages        = {131--141},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/3-540-49248-8\_5},
  doi          = {10.1007/3-540-49248-8\_5},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ac/WinP97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KnudsenP97,
  author       = {Lars R. Knudsen and
                  Bart Preneel},
  editor       = {Burton S. Kaliski Jr.},
  title        = {Fast and Secure Hashing Based on Codes},
  booktitle    = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1294},
  pages        = {485--498},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052257},
  doi          = {10.1007/BFB0052257},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KnudsenP97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/RijmenP97,
  author       = {Vincent Rijmen and
                  Bart Preneel},
  editor       = {Eli Biham},
  title        = {A Family of Trapdoor Ciphers},
  booktitle    = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa,
                  Israel, January 20-22, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1267},
  pages        = {139--148},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052342},
  doi          = {10.1007/BFB0052342},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/RijmenP97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/Preneel97,
  author       = {Bart Preneel},
  editor       = {Michael Darnell},
  title        = {Hash Functions and {MAC} Algorithms Based on Block Ciphers},
  booktitle    = {Cryptography and Coding, 6th {IMA} International Conference, Cirencester,
                  UK, December 17-19, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1355},
  pages        = {270--282},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0024473},
  doi          = {10.1007/BFB0024473},
  timestamp    = {Wed, 18 Mar 2020 16:00:59 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/Preneel97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/Preneel97,
  author       = {Bart Preneel},
  editor       = {Eiji Okamoto and
                  George I. Davida and
                  Masahiro Mambo},
  title        = {Cryptanalysis of Message Authentication Codes},
  booktitle    = {Information Security, First International Workshop, {ISW} '97, Tatsunokuchi,
                  Japan, September 17-19, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1396},
  pages        = {55--65},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0030408},
  doi          = {10.1007/BFB0030408},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/Preneel97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jhsn/PreneelW96,
  author       = {Bart Preneel and
                  Jean C. Walrand},
  title        = {Convergence of a quasistatic frequency allocation algorithm},
  journal      = {J. High Speed Networks},
  volume       = {5},
  number       = {1},
  pages        = {3--22},
  year         = {1996},
  url          = {https://doi.org/10.3233/JHS-1996-5102},
  doi          = {10.3233/JHS-1996-5102},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jhsn/PreneelW96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KnudsenP96,
  author       = {Lars R. Knudsen and
                  Bart Preneel},
  editor       = {Kwangjo Kim and
                  Tsutomu Matsumoto},
  title        = {Hash Functions Based on Block Ciphers and Quaternary Codes},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '96, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Kyongju, Korea, November 3-7, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1163},
  pages        = {77--90},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/BFb0034837},
  doi          = {10.1007/BFB0034837},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KnudsenP96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/PreneelO96,
  author       = {Bart Preneel and
                  Paul C. van Oorschot},
  editor       = {Ueli M. Maurer},
  title        = {On the Security of Two {MAC} Algorithms},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '96, International Conference
                  on the Theory and Application of Cryptographic Techniques, Saragossa,
                  Spain, May 12-16, 1996, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1070},
  pages        = {19--32},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-68339-9\_3},
  doi          = {10.1007/3-540-68339-9\_3},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/PreneelO96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DobbertinBP96,
  author       = {Hans Dobbertin and
                  Antoon Bosselaers and
                  Bart Preneel},
  editor       = {Dieter Gollmann},
  title        = {{RIPEMD-160:} {A} Strengthened Version of {RIPEMD}},
  booktitle    = {Fast Software Encryption, Third International Workshop, Cambridge,
                  UK, February 21-23, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1039},
  pages        = {71--82},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-60865-6\_44},
  doi          = {10.1007/3-540-60865-6\_44},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/DobbertinBP96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/RijmenDPBW96,
  author       = {Vincent Rijmen and
                  Joan Daemen and
                  Bart Preneel and
                  Antoon Bosselaers and
                  Erik De Win},
  editor       = {Dieter Gollmann},
  title        = {The Cipher {SHARK}},
  booktitle    = {Fast Software Encryption, Third International Workshop, Cambridge,
                  UK, February 21-23, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1039},
  pages        = {99--111},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-60865-6\_47},
  doi          = {10.1007/3-540-60865-6\_47},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/RijmenDPBW96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/AndersonVPN96,
  author       = {Ross J. Anderson and
                  Serge Vaudenay and
                  Bart Preneel and
                  Kaisa Nyberg},
  editor       = {Ross J. Anderson},
  title        = {The Newton Channel},
  booktitle    = {Information Hiding, First International Workshop, Cambridge, UK, May
                  30 - June 1, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1174},
  pages        = {151--156},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-61996-8\_38},
  doi          = {10.1007/3-540-61996-8\_38},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/AndersonVPN96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/PrenelO95,
  author       = {Bart Preneel and
                  Paul C. van Oorschot},
  editor       = {Don Coppersmith},
  title        = {MDx-MAC and Building Fast MACs from Hash Functions},
  booktitle    = {Advances in Cryptology - {CRYPTO} '95, 15th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {963},
  pages        = {1--14},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-44750-4\_1},
  doi          = {10.1007/3-540-44750-4\_1},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/PrenelO95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/BosselaersP95,
  editor       = {Antoon Bosselaers and
                  Bart Preneel},
  title        = {Integrity Primitives for Secure Information Systems, Final Report
                  of {RACE} Integrity Primitives Evaluation {RIPE-RACE} 1040},
  series       = {Lecture Notes in Computer Science},
  volume       = {1007},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-60640-8},
  doi          = {10.1007/3-540-60640-8},
  isbn         = {3-540-60640-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/BosselaersP95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fse/1994,
  editor       = {Bart Preneel},
  title        = {Fast Software Encryption: Second International Workshop. Leuven, Belgium,
                  14-16 December 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1008},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-60590-8},
  doi          = {10.1007/3-540-60590-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/1994.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/Preneel94,
  author       = {Bart Preneel},
  title        = {Cryptographic hash functions},
  journal      = {Eur. Trans. Telecommun.},
  volume       = {5},
  number       = {4},
  pages        = {431--448},
  year         = {1994},
  url          = {https://doi.org/10.1002/ett.4460050406},
  doi          = {10.1002/ETT.4460050406},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ett/Preneel94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Preneel94,
  author       = {Bart Preneel},
  editor       = {Bart Preneel},
  title        = {FSE'94 - Introduction},
  booktitle    = {Fast Software Encryption: Second International Workshop. Leuven, Belgium,
                  14-16 December 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1008},
  pages        = {1--5},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-60590-8\_1},
  doi          = {10.1007/3-540-60590-8\_1},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Preneel94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/RijmenP94,
  author       = {Vincent Rijmen and
                  Bart Preneel},
  editor       = {Bart Preneel},
  title        = {Improved Characteristics for Differential Cryptanalysis of Hash Functions
                  Based on Block Ciphers},
  booktitle    = {Fast Software Encryption: Second International Workshop. Leuven, Belgium,
                  14-16 December 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1008},
  pages        = {242--248},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-60590-8\_18},
  doi          = {10.1007/3-540-60590-8\_18},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/RijmenP94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/RijmenP94a,
  author       = {Vincent Rijmen and
                  Bart Preneel},
  editor       = {Bart Preneel},
  title        = {Cryptanalysis of McGuffin},
  booktitle    = {Fast Software Encryption: Second International Workshop. Leuven, Belgium,
                  14-16 December 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1008},
  pages        = {353--358},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-60590-8\_27},
  doi          = {10.1007/3-540-60590-8\_27},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/RijmenP94a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PreneelGV93,
  author       = {Bart Preneel and
                  Ren{\'{e}} Govaerts and
                  Joos Vandewalle},
  editor       = {Dorothy E. Denning and
                  Raymond Pyle and
                  Ravi Ganesan and
                  Ravi S. Sandhu and
                  Victoria Ashby},
  title        = {Differential Cryptanalysis of Hash Functions Based on Block Ciphers},
  booktitle    = {{CCS} '93, Proceedings of the 1st {ACM} Conference on Computer and
                  Communications Security, Fairfax, Virginia, USA, November 3-5, 1993},
  pages        = {183--188},
  publisher    = {{ACM}},
  year         = {1993},
  url          = {https://doi.org/10.1145/168588.168611},
  doi          = {10.1145/168588.168611},
  timestamp    = {Tue, 10 Nov 2020 20:00:40 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/PreneelGV93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/PreneelNRB93,
  author       = {Bart Preneel and
                  Marnix Nuttin and
                  Vincent Rijmen and
                  Johan Buelens},
  editor       = {Douglas R. Stinson},
  title        = {Cryptanalysis of the {CFB} Mode of the {DES} with a Reduced Number
                  of Rounds},
  booktitle    = {Advances in Cryptology - {CRYPTO} '93, 13th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {773},
  pages        = {212--223},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-48329-2\_19},
  doi          = {10.1007/3-540-48329-2\_19},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/PreneelNRB93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/PreneelGV93,
  author       = {Bart Preneel and
                  Ren{\'{e}} Govaerts and
                  Joos Vandewalle},
  editor       = {Douglas R. Stinson},
  title        = {Hash Functions Based on Block Ciphers: {A} Synthetic Approach},
  booktitle    = {Advances in Cryptology - {CRYPTO} '93, 13th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {773},
  pages        = {368--378},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-48329-2\_31},
  doi          = {10.1007/3-540-48329-2\_31},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/PreneelGV93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Preneel93,
  author       = {Bart Preneel},
  editor       = {Ross J. Anderson},
  title        = {Design Principles for Dedicated Hash Functions},
  booktitle    = {Fast Software Encryption, Cambridge Security Workshop, Cambridge,
                  UK, December 9-11, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {809},
  pages        = {71--82},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-58108-1\_10},
  doi          = {10.1007/3-540-58108-1\_10},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Preneel93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ac/1991esat,
  editor       = {Bart Preneel and
                  Ren{\'{e}} Govaerts and
                  Joos Vandewalle},
  title        = {Computer Security and Industrial Cryptography - State of the Art and
                  Evolution, {ESAT} Course, Leuven, Belgium, May 21-23, 1991},
  series       = {Lecture Notes in Computer Science},
  volume       = {741},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-57341-0},
  doi          = {10.1007/3-540-57341-0},
  isbn         = {3-540-57341-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ac/1991esat.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/PreneelGV92,
  author       = {Bart Preneel and
                  Ren{\'{e}} Govaerts and
                  Joos Vandewalle},
  editor       = {Jennifer Seberry and
                  Yuliang Zheng},
  title        = {On the Power of Memory in the Design of Collision Resistant Hash Functions},
  booktitle    = {Advances in Cryptology - {AUSCRYPT} '92, Workshop on the Theory and
                  Application of Cryptographic Techniques, Gold Coast, Queensland, Australia,
                  December 13-16, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {718},
  pages        = {105--121},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-57220-1\_55},
  doi          = {10.1007/3-540-57220-1\_55},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/PreneelGV92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/PreneelGV92a,
  author       = {Bart Preneel and
                  Ren{\'{e}} Govaerts and
                  Joos Vandewalle},
  editor       = {Jennifer Seberry and
                  Yuliang Zheng},
  title        = {An Attack on Two Hash Functions by Zheng-Matsumoto-Imai},
  booktitle    = {Advances in Cryptology - {AUSCRYPT} '92, Workshop on the Theory and
                  Application of Cryptographic Techniques, Gold Coast, Queensland, Australia,
                  December 13-16, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {718},
  pages        = {535--538},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-57220-1\_91},
  doi          = {10.1007/3-540-57220-1\_91},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/PreneelGV92a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ac/VandewalleGP91,
  author       = {Joos Vandewalle and
                  Ren{\'{e}} Govaerts and
                  Bart Preneel},
  editor       = {Bart Preneel and
                  Ren{\'{e}} Govaerts and
                  Joos Vandewalle},
  title        = {Technical Approaches to Thwart Computer Fraud},
  booktitle    = {Computer Security and Industrial Cryptography - State of the Art and
                  Evolution, {ESAT} Course, Leuven, Belgium, May 21-23, 1991},
  series       = {Lecture Notes in Computer Science},
  volume       = {741},
  pages        = {20--30},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-57341-0\_53},
  doi          = {10.1007/3-540-57341-0\_53},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ac/VandewalleGP91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ac/PreneelGV91,
  author       = {Bart Preneel and
                  Ren{\'{e}} Govaerts and
                  Joos Vandewalle},
  editor       = {Bart Preneel and
                  Ren{\'{e}} Govaerts and
                  Joos Vandewalle},
  title        = {Information Authentication: Hash Functions and Digital Signatures},
  booktitle    = {Computer Security and Industrial Cryptography - State of the Art and
                  Evolution, {ESAT} Course, Leuven, Belgium, May 21-23, 1991},
  series       = {Lecture Notes in Computer Science},
  volume       = {741},
  pages        = {87--131},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-57341-0\_57},
  doi          = {10.1007/3-540-57341-0\_57},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ac/PreneelGV91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ac/Preneel91,
  author       = {Bart Preneel},
  editor       = {Bart Preneel and
                  Ren{\'{e}} Govaerts and
                  Joos Vandewalle},
  title        = {Standardization of Cryptographic Techniques},
  booktitle    = {Computer Security and Industrial Cryptography - State of the Art and
                  Evolution, {ESAT} Course, Leuven, Belgium, May 21-23, 1991},
  series       = {Lecture Notes in Computer Science},
  volume       = {741},
  pages        = {162--173},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-57341-0\_60},
  doi          = {10.1007/3-540-57341-0\_60},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ac/Preneel91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/PreneelGV91,
  author       = {Bart Preneel and
                  Ren{\'{e}} Govaerts and
                  Joos Vandewalle},
  editor       = {Donald W. Davies},
  title        = {Boolean Functions Satisfying Higher Order Propagation Criteria},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Brighton, UK, April 8-11,
                  1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {547},
  pages        = {141--152},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-46416-6\_12},
  doi          = {10.1007/3-540-46416-6\_12},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/PreneelGV91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/PreneelCFJLR91,
  author       = {Bart Preneel and
                  David Chaum and
                  Walter Fumy and
                  Cees J. A. Jansen and
                  Peter Landrock and
                  Gert Roelofsen},
  editor       = {Donald W. Davies},
  title        = {Race Integrity Primitives Evaluation {(RIPE):} {A} Status Report},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Brighton, UK, April 8-11,
                  1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {547},
  pages        = {547--551},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-46416-6\_52},
  doi          = {10.1007/3-540-46416-6\_52},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/PreneelCFJLR91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PreneelBGV90,
  author       = {Bart Preneel and
                  Antoon Bosselaers and
                  Ren{\'{e}} Govaerts and
                  Joos Vandewalle},
  title        = {Cryptanalysis of a fast cryptographic checksum algorithm},
  journal      = {Comput. Secur.},
  volume       = {9},
  number       = {3},
  pages        = {257--262},
  year         = {1990},
  url          = {https://doi.org/10.1016/0167-4048(90)90172-P},
  doi          = {10.1016/0167-4048(90)90172-P},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/PreneelBGV90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/PreneelLLGV90,
  author       = {Bart Preneel and
                  Werner Van Leekwijck and
                  Luc Van Linden and
                  Ren{\'{e}} Govaerts and
                  Joos Vandewalle},
  editor       = {Ivan Damg{\aa}rd},
  title        = {Propagation Characteristics of Boolean Functions},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '90, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Aarhus, Denmark, May 21-24,
                  1990, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {473},
  pages        = {161--173},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/3-540-46877-3\_14},
  doi          = {10.1007/3-540-46877-3\_14},
  timestamp    = {Fri, 17 Jul 2020 16:12:46 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/PreneelLLGV90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/PreneelBGV89,
  author       = {Bart Preneel and
                  Antoon Bosselaers and
                  Ren{\'{e}} Govaerts and
                  Joos Vandewalle},
  editor       = {Gilles Brassard},
  title        = {A Chosen Text Attack on The Modified Cryptographic Checksum Algorithm
                  of Cohen and Huang},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {154--163},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_15},
  doi          = {10.1007/0-387-34805-0\_15},
  timestamp    = {Tue, 01 Jun 2021 15:21:29 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/PreneelBGV89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics