Bart Preneel
Person information
- affiliation: Catholic University of Leuven, Belgium
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
showing all ?? records
2010 – today
- 2018
- [j89]Tor Helleseth, Bart Preneel:
Editorial: Special issue on recent trends in cryptography. Cryptography and Communications 10(1): 1-3 (2018) - [j88]Wouter Biesmans, Josep Balasch, Alfredo Rial, Bart Preneel, Ingrid Verbauwhede:
Private Mobile Pay-TV From Priced Oblivious Transfer. IEEE Trans. Information Forensics and Security 13(2): 280-291 (2018) - [c324]Eduard Marin, Dave Singelée, Bohan Yang, Vladimir Volskiy, Guy A. E. Vandenbosch, Bart Nuttin, Bart Preneel:
Securing Wireless Neurostimulators. CODASPY 2018: 287-298 - [c323]Atul Luykx, Bart Preneel:
Optimal Forgeries Against Polynomial-Based MACs and GCM. EUROCRYPT (1) 2018: 445-467 - [c322]Christina-Angeliki Toli, Bart Preneel:
Privacy-preserving Biometric Authentication Model for e-Finance Applications. ICISSP 2018: 353-360 - [i83]Atul Luykx, Bart Preneel:
Optimal Forgeries Against Polynomial-Based MACs and GCM. IACR Cryptology ePrint Archive 2018: 166 (2018) - [i82]Iraklis Symeonidis, Gergely Biczók, Fatemeh Shirazi, Cristina Pérez-Solà, Jessica Schroers, Bart Preneel:
Collateral Damage of Facebook Applications: a Comprehensive Study. IACR Cryptology ePrint Archive 2018: 285 (2018) - 2017
- [j87]Job Noorman, Jo Van Bulck, Jan Tobias Mühlberg, Frank Piessens, Pieter Maene, Bart Preneel, Ingrid Verbauwhede, Johannes Götzfried, Tilo Müller, Felix C. Freiling:
Sancus 2.0: A Low-Cost Security Architecture for IoT Devices. ACM Trans. Priv. Secur. 20(3): 7:1-7:33 (2017) - [j86]
- [j85]Yu Long Chen, Atul Luykx, Bart Mennink, Bart Preneel:
Efficient Length Doubling From Tweakable Block Ciphers. IACR Trans. Symmetric Cryptol. 2017(3): 253-270 (2017) - [c321]Ruan de Clercq, Ronald De Keulenaer, Pieter Maene, Bart Preneel, Bjorn De Sutter, Ingrid Verbauwhede:
SCM: Secure Code Memory Architecture. AsiaCCS 2017: 771-776 - [c320]Ren Zhang, Bart Preneel:
On the Necessity of a Prescribed Block Validity Consensus: Analyzing Bitcoin Unlimited Mining Protocol. CoNEXT 2017: 108-119 - [c319]Ren Zhang, Bart Preneel:
Publish or Perish: A Backward-Compatible Defense Against Selfish Mining in Bitcoin. CT-RSA 2017: 277-292 - [c318]Iraklis Symeonidis, Abdelrahaman Aly, Mustafa A. Mustafa, Bart Mennink, Siemen Dhooghe, Bart Preneel:
SePCAR: A Secure and Privacy-Enhancing Protocol for Car Access Provision. ESORICS (2) 2017: 475-493 - [c317]Mohammad Etemad, Filipe Beato, Alptekin Küpçü, Bart Preneel:
Are You Really My Friend? Efficient and Secure Friend-Matching in Mobile Social Networks. EuroS&P Workshops 2017: 122-131 - [c316]
- [c315]
- [c314]Hyunmin Kim, Seokhie Hong, Bart Preneel, Ingrid Verbauwhede:
STBC: Side Channel Attack Tolerant Balanced Circuit with Reduced Propagation Delay. ISVLSI 2017: 74-79 - [c313]Alan Szepieniec, Bart Preneel:
Short Solutions to Nonlinear Systems of Equations. NuTMiC 2017: 71-90 - [c312]
- [c311]Pieter Robyns, Eduard Marin, Wim Lamotte, Peter Quax, Dave Singelée, Bart Preneel:
Physical-layer fingerprinting of LoRa devices using supervised and zero-shot learning. WISEC 2017: 58-63 - [e26]Jens Grossklags, Bart Preneel:
Financial Cryptography and Data Security - 20th International Conference, FC 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers. Lecture Notes in Computer Science 9603, Springer 2017, ISBN 978-3-662-54969-8 [contents] - [i81]Iraklis Symeonidis, Abdelrahaman Aly, Mustafa A. Mustafa, Bart Preneel:
PePTCAP: A Privacy-enhancing Protocol for(Temporary) Car Access Provision. IACR Cryptology ePrint Archive 2017: 39 (2017) - [i80]Alan Szepieniec, Ward Beullens, Bart Preneel:
MQ Signatures for PKI. IACR Cryptology ePrint Archive 2017: 327 (2017) - [i79]Ren Zhang, Bart Preneel:
On the Necessity of a Prescribed Block Validity Consensus: Analyzing Bitcoin Unlimited Mining Protocol. IACR Cryptology ePrint Archive 2017: 686 (2017) - [i78]Ward Beullens, Bart Preneel:
Field lifting for smaller UOV public keys. IACR Cryptology ePrint Archive 2017: 776 (2017) - [i77]Yu Long Chen, Atul Luykx, Bart Mennink, Bart Preneel:
Efficient Length Doubling From Tweakable Block Ciphers. IACR Cryptology ePrint Archive 2017: 841 (2017) - [i76]Alan Szepieniec, Bart Preneel:
Short Solutions to Nonlinear Systems of Equations. IACR Cryptology ePrint Archive 2017: 1175 (2017) - 2016
- [j84]Filipe Beato, Stijn Meul, Bart Preneel:
Practical identity-based private sharing for online social networks. Computer Communications 73: 243-250 (2016) - [j83]Bart Mennink, Bart Preneel:
Efficient parallelizable hashing using small non-compressing primitives. Int. J. Inf. Sec. 15(3): 285-300 (2016) - [j82]Geoffrey Ottoy, Tom Hamelinckx, Bart Preneel, Lieven De Strycker, Jean-Pierre Goemaere:
On the choice of the appropriate AES data encryption method for ZigBee nodes. Security and Communication Networks 9(2): 87-93 (2016) - [c310]Eduard Marin, Dave Singelée, Flavio D. Garcia, Tom Chothia, Rik Willems, Bart Preneel:
On the (in)security of the latest generation implantable cardiac defibrillators and how to secure them. ACSAC 2016: 226-236 - [c309]Eduard Marin, Mustafa A. Mustafa, Dave Singelée, Bart Preneel:
A Privacy-Preserving Remote Healthcare System Offering End-to-End Security. ADHOC-NOW 2016: 237-250 - [c308]Aysajan Abidin, Enrique Argones-Rúa, Bart Preneel:
An Efficient Entity Authentication Protocol with Enhanced Security and Privacy Properties. CANS 2016: 335-349 - [c307]Christina-Angeliki Toli, Abdelrahaman Aly, Bart Preneel:
A Privacy-Preserving Model for Biometric Fusion. CANS 2016: 743-748 - [c306]Eduard Marin, Dave Singelée, Bohan Yang, Ingrid Verbauwhede, Bart Preneel:
On the Feasibility of Cryptography for a Wireless Insulin Pump System. CODASPY 2016: 113-120 - [c305]Ruan de Clercq, Ronald De Keulenaer, Bart Coppens, Bohan Yang, Pieter Maene, Koen De Bosschere, Bart Preneel, Bjorn De Sutter, Ingrid Verbauwhede:
SOFIA: Software and control flow integrity architecture. DATE 2016: 1172-1177 - [c304]Atul Luykx, Bart Preneel, Alan Szepieniec, Kan Yasuda:
On the Influence of Message Length in PMAC's Security Bounds. EUROCRYPT (1) 2016: 596-621 - [c303]Atul Luykx, Bart Preneel, Elmar Tischhauser, Kan Yasuda:
A MAC Mode for Lightweight Block Ciphers. FSE 2016: 43-59 - [c302]
- [c301]Iraklis Symeonidis, Pagona Tsormpatzoudi, Bart Preneel:
Collateral Damage of Online Social Network Applications. ICISSP 2016: 536-541 - [c300]Hyunmin Kim, Seokhie Hong, Bart Preneel, Ingrid Verbauwhede:
Binary decision diagram to design balanced secure logic styles. IOLTS 2016: 239-244 - [c299]Iraklis Symeonidis, Mustafa A. Mustafa, Bart Preneel:
Keyless car sharing system: A security and privacy analysis. ISC2 2016: 1-7 - [c298]Alan Szepieniec, Jintai Ding, Bart Preneel:
Extension Field Cancellation: A New Central Trapdoor for Multivariate Quadratic Systems. PQCrypto 2016: 182-196 - [c297]Aysajan Abidin, Eduard Marin, Dave Singelée, Bart Preneel:
Towards Quantum Distance Bounding Protocols. RFIDSec 2016: 151-162 - [c296]Iraklis Symeonidis, Fatemeh Shirazi, Gergely Biczók, Cristina Pérez-Solà, Bart Preneel:
Collateral Damage of Facebook Apps: Friends, Providers, and Privacy Interdependence. SEC 2016: 194-208 - [c295]Kaveh Razavi, Ben Gras, Erik Bosman, Bart Preneel, Cristiano Giuffrida, Herbert Bos:
Flip Feng Shui: Hammering a Needle in the Software Stack. USENIX Security Symposium 2016: 1-18 - [c294]Jan Tobias Mühlberg, Sara Cleemput, Mustafa A. Mustafa, Jo Van Bulck, Bart Preneel, Frank Piessens:
An Implementation of a High Assurance Smart Meter Using Protected Module Architectures. WISTP 2016: 53-69 - [i75]Frederik Armknecht, Tetsu Iwata, Kaisa Nyberg, Bart Preneel:
Symmetric Cryptography (Dagstuhl Seminar 16021). Dagstuhl Reports 6(1): 34-54 (2016) - [i74]George Danezis, Stefan Katzenbeisser, Christiane Peters, Bart Preneel:
Privacy and Security in Smart Energy Grids (Dagstuhl Seminar 16032). Dagstuhl Reports 6(1): 99-107 (2016) - [i73]Iraklis Symeonidis, Bart Preneel:
Collateral Damage in Online Social Networks: computing the significance of information collection. IACR Cryptology ePrint Archive 2016: 38 (2016) - [i72]Atul Luykx, Bart Preneel, Alan Szepieniec, Kan Yasuda:
On the Influence of Message Length in PMAC's Security Bounds. IACR Cryptology ePrint Archive 2016: 185 (2016) - [i71]Atul Luykx, Bart Preneel, Elmar Tischhauser, Kan Yasuda:
A MAC Mode for Lightweight Block Ciphers. IACR Cryptology ePrint Archive 2016: 190 (2016) - [i70]Eduard Marin, Enrique Argones-Rúa, Dave Singelée, Bart Preneel:
A survey on physiological-signal-based security for medical devices. IACR Cryptology ePrint Archive 2016: 867 (2016) - 2015
- [j81]Bart Preneel, Phillip Rogaway, Mark Dermot Ryan, Peter Y. A. Ryan:
Privacy and Security in an Age of Surveillance (Dagstuhl Perspectives Workshop 14401). Dagstuhl Manifestos 5(1): 25-37 (2015) - [j80]Elena Andreeva, Bart Mennink, Bart Preneel:
Open problems in hash function security. Des. Codes Cryptography 77(2-3): 611-631 (2015) - [j79]Atul Luykx, Bart Mennink, Bart Preneel, Laura Winnen:
Two-permutation-based hashing with binary mixing. J. Mathematical Cryptology 9(3): 139-150 (2015) - [j78]Marijn Scheir, Josep Balasch, Alfredo Rial, Bart Preneel, Ingrid Verbauwhede:
Anonymous Split E-Cash - Toward Mobile Anonymous Payments. ACM Trans. Embedded Comput. Syst. 14(4): 85:1-85:25 (2015) - [c293]
- [c292]Bart Mennink, Bart Preneel:
On the Impact of Known-Key Attacks on Hash Functions. ASIACRYPT (2) 2015: 59-84 - [c291]
- [c290]
- [c289]
- [c288]Willem Schroé, Bart Mennink, Elena Andreeva, Bart Preneel:
Forgery and Subkey Recovery on CAESAR Candidate iFeed. SAC 2015: 197-204 - [c287]Christina-Angeliki Toli, Bart Preneel:
Provoking security: Spoofing attacks against crypto-biometric systems. WorldCIS 2015: 67-72 - [e25]Berna Ors, Bart Preneel:
Cryptography and Information Security in the Balkans - First International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014, Revised Selected Papers. Lecture Notes in Computer Science 9024, Springer 2015, ISBN 978-3-319-21355-2 [contents] - [i69]Iraklis Symeonidis, Filipe Beato, Pagona Tsormpatzoudi, Bart Preneel:
Collateral damage of Facebook Apps: an enhanced privacy scoring model. IACR Cryptology ePrint Archive 2015: 456 (2015) - [i68]Sergey Agievich, Anastasiya Gorodilova, Nikolay Kolomeec, Svetla Nikova, Bart Preneel, Vincent Rijmen, George Shushuev, Natalia N. Tokareva, Valeriya Vitkup:
Problems, solutions and experience of the first international student's Olympiad in cryptography. IACR Cryptology ePrint Archive 2015: 534 (2015) - [i67]Alan Szepieniec, Bart Preneel:
New Techniques for Electronic Voting. IACR Cryptology ePrint Archive 2015: 809 (2015) - [i66]Bart Mennink, Bart Preneel:
On the Impact of Known-Key Attacks on Hash Functions. IACR Cryptology ePrint Archive 2015: 909 (2015) - [i65]Alan Szepieniec, Jintai Ding, Bart Preneel:
Extension Field Cancellation: a New Central Trapdoor for Multivariate Quadratic Systems. IACR Cryptology ePrint Archive 2015: 1184 (2015) - 2014
- [j77]Bart Preneel:
Attacking a problem from the middle: technical perspective. Commun. ACM 57(10): 97 (2014) - [j76]Kota Ideguchi, Elmar Tischhauser, Bart Preneel:
Internal differential collision attacks on the reduced-round Grøstl-0 hash function. Des. Codes Cryptography 70(3): 251-271 (2014) - [j75]Nikos Mavrogiannopoulos, Andreas Pashalidis, Bart Preneel:
Toward a secure Kerberos key exchange with smart cards. Int. J. Inf. Sec. 13(3): 217-228 (2014) - [j74]Jens Hermans, Roel Peeters, Bart Preneel:
Proper RFID Privacy: Model and Protocols. IEEE Trans. Mob. Comput. 13(12): 2888-2902 (2014) - [c286]
- [c285]Filipe Beato, Mauro Conti, Bart Preneel, Dario Vettore:
VirtualFriendship: Hiding interactions on Online Social Networks. CNS 2014: 328-336 - [c284]Michael Herrmann, Ren Zhang, Kai-Chun Ning, Claudia Díaz, Bart Preneel:
Censorship-resistant and privacy-preserving distributed web search. P2P 2014: 1-10 - [c283]Christina-Angeliki Toli, Bart Preneel:
A Survey on Multimodal Biometrics and the Protection of Their Templates. Privacy and Identity Management 2014: 169-184 - [c282]Nicky Mouha, Bart Mennink, Anthony Van Herrewege, Dai Watanabe, Bart Preneel, Ingrid Verbauwhede:
Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers. Selected Areas in Cryptography 2014: 306-323 - [c281]Michael Herrmann, Alfredo Rial, Claudia Díaz, Bart Preneel:
Practical privacy-preserving location-sharing based services with aggregate statistics. WISEC 2014: 87-98 - [e24]Bart Preneel, Demosthenes Ikonomou:
Privacy Technologies and Policy - First Annual Privacy Forum, APF 2012, Limassol, Cyprus, October 10-11, 2012, Revised Selected Papers. Lecture Notes in Computer Science 8319, Springer 2014, ISBN 978-3-642-54068-4 [contents] - [e23]Bart Preneel, Demosthenes Ikonomou:
Privacy Technologies and Policy - Second Annual Privacy Forum, APF 2014, Athens, Greece, May 20-21, 2014. Proceedings. Lecture Notes in Computer Science 8450, Springer 2014, ISBN 978-3-319-06748-3 [contents] - [e22]Viliam Geffert, Bart Preneel, Branislav Rovan, Julius Stuller, A Min Tjoa:
SOFSEM 2014: Theory and Practice of Computer Science - 40th International Conference on Current Trends in Theory and Practice of Computer Science, Nový Smokovec, Slovakia, January 26-29, 2014, Proceedings. Lecture Notes in Computer Science 8327, Springer 2014, ISBN 978-3-319-04297-8 [contents] - [i64]Frederik Armknecht, Helena Handschuh, Tetsu Iwata, Bart Preneel:
Symmetric Cryptography (Dagstuhl Seminar 14021). Dagstuhl Reports 4(1): 1-16 (2014) - [i63]Bart Preneel, Phillip Rogaway, Mark Dermot Ryan, Peter Y. A. Ryan:
Privacy and Security in an Age of Surveillance (Dagstuhl Perspectives Workshop 14401). Dagstuhl Reports 4(9): 106-123 (2014) - [i62]Bart Mennink, Bart Preneel:
Triple and Quadruple Encryption: Bridging the Gaps. IACR Cryptology ePrint Archive 2014: 16 (2014) - [i61]Nicky Mouha, Bart Mennink, Anthony Van Herrewege, Dai Watanabe, Bart Preneel, Ingrid Verbauwhede:
Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers. IACR Cryptology ePrint Archive 2014: 386 (2014) - 2013
- [j73]Javier Lopez, Svetla Nikova, Andreas Pashalidis, Günther Pernul, Bart Preneel:
Preface. Computers & Mathematics with Applications 65(5): 747 (2013) - [j72]Andras Boho, Glenn Van Wallendael, Ann Dooms, Jan De Cock, Geert Braeckman, Peter Schelkens, Bart Preneel, Rik Van de Walle:
End-To-End Security for Video Distribution: The Combination of Encryption, Watermarking, and Video Adaptation. IEEE Signal Process. Mag. 30(2): 97-107 (2013) - [c280]Geoffrey Ottoy, Bart Preneel, Jean-Pierre Goemaere, Lieven De Strycker:
Flexible Design of a Modular Simultaneous Exponentiation Core for Embedded Platforms. ARC 2013: 115-121 - [c279]Gunes Acar, Marc Juárez, Nick Nikiforakis, Claudia Díaz, Seda F. Gürses, Frank Piessens, Bart Preneel:
FPDetective: dusting the web for fingerprinters. ACM Conference on Computer and Communications Security 2013: 1129-1140 - [c278]Geoffrey Ottoy, Jorn Lapon, Vincent Naessens, Bart Preneel, Lieven De Strycker:
Dedicated Hardware for Attribute-Based Credential Verification. Communications and Multimedia Security 2013: 50-65 - [c277]Filipe Beato, Iulia Ion, Srdjan Capkun, Bart Preneel, Marc Langheinrich:
For some eyes only: protecting online information sharing. CODASPY 2013: 1-12 - [c276]Glenn Van Wallendael, Jan De Cock, Sebastiaan Van Leuven, Andras Boho, Peter Lambert, Bart Preneel, Rik Van de Walle:
Format-compliant encryption techniques for high efficiency video coding. ICIP 2013: 4583-4587 - [c275]Raoul Strackx, Job Noorman, Ingrid Verbauwhede, Bart Preneel, Frank Piessens:
Protected Software Module Architectures. ISSE 2013: 241-251 - [c274]Filipe Beato, Mauro Conti, Bart Preneel:
Friend in the Middle (FiM): Tackling de-anonymization in social networks. PerCom Workshops 2013: 279-284 - [c273]Hongjun Wu, Bart Preneel:
AEGIS: A Fast Authenticated Encryption Algorithm. Selected Areas in Cryptography 2013: 185-201 - [c272]Tancrède Lepoint, Matthieu Rivain, Yoni De Mulder, Peter Roelse, Bart Preneel:
Two Attacks on a White-Box AES Implementation. Selected Areas in Cryptography 2013: 265-285 - [c271]Bart Preneel:
The Future of Information Security Research: Cryptology and Beyond. Secure Data Management 2013: 23-27 - [c270]
- [c269]Job Noorman, Pieter Agten, Wilfried Daniels, Raoul Strackx, Anthony Van Herrewege, Christophe Huygens, Bart Preneel, Ingrid Verbauwhede, Frank Piessens:
Sancus: Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base. USENIX Security Symposium 2013: 479-494 - [c268]Michael Herrmann, Carmela Troncoso, Claudia Díaz, Bart Preneel:
Optimal sporadic location privacy preserving systems in presence of bandwidth constraints. WPES 2013: 167-178 - [i60]Nicky Mouha, Bart Preneel:
A Proof that the ARX Cipher Salsa20 is Secure against Differential Cryptanalysis. IACR Cryptology ePrint Archive 2013: 328 (2013) - [i59]Yoni De Mulder, Peter Roelse, Bart Preneel:
Revisiting the BGE Attack on a White-Box AES Implementation. IACR Cryptology ePrint Archive 2013: 450 (2013) - [i58]Hongjun Wu, Bart Preneel:
AEGIS: A Fast Authenticated Encryption Algorithm. IACR Cryptology ePrint Archive 2013: 695 (2013) - 2012
- [j71]Shoichi Hirose, Kota Ideguchi, Hidenori Kuwakado, Toru Owada, Bart Preneel, Hirotaka Yoshida:
An AES Based 256-bit Hash Function for Lightweight Applications: Lesamnta-LW. IEICE Transactions 95-A(1): 89-99 (2012) - [j70]Elena Andreeva, Andrey Bogdanov, Bart Mennink, Bart Preneel, Christian Rechberger:
On security arguments of the second round SHA-3 candidates. Int. J. Inf. Sec. 11(2): 103-120 (2012) - [j69]Elena Andreeva, Bart Mennink, Bart Preneel:
The parazoa family: generalizing the sponge hash functions. Int. J. Inf. Sec. 11(3): 149-165 (2012) - [j68]Nicky Mouha, Gautham Sekar, Bart Preneel:
Challenging the increased resistance of regular hash functions against birthday attacks. J. Mathematical Cryptology 6(3-4): 229-248 (2012) - [j67]Wim Aerts, Eli Biham, Dieter De Moitie, Elke De Mulder, Orr Dunkelman, Sebastiaan Indesteege, Nathan Keller, Bart Preneel, Guy A. E. Vandenbosch, Ingrid Verbauwhede:
A Practical Attack on KeeLoq. J. Cryptology 25(1): 136-157 (2012) - [j66]Bart Preneel, Jongsung Kim, Damien Sauveron:
Advanced theory and practice for cryptography and future security. Mathematical and Computer Modelling 55(1-2): 1-2 (2012) - [j65]Roel Peeters, Dave Singelée, Bart Preneel:
Toward More Secure and Reliable Access Control. IEEE Pervasive Computing 11(3): 76-83 (2012) - [j64]Jongsung Kim, Seokhie Hong, Bart Preneel, Eli Biham, Orr Dunkelman, Nathan Keller:
Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis. IEEE Trans. Information Theory 58(7): 4948-4966 (2012) - [j63]Andreas Pashalidis, Bart Preneel:
Evaluating Tag-Based Preference Obfuscation Systems. IEEE Trans. Knowl. Data Eng. 24(9): 1613-1623 (2012) - [c267]Jiazhe Chen, Meiqin Wang, Bart Preneel:
Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT. AFRICACRYPT 2012: 117-137 - [c266]Elena Andreeva, Bart Mennink, Bart Preneel, Marjan Skrobot:
Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein. AFRICACRYPT 2012: 287-305 - [c265]Leif Uhsadel, Markus Ullrich, Ingrid Verbauwhede, Bart Preneel:
Interface Design for Mapping a Variety of RSA Exponentiation Algorithms on a HW/SW Co-design Platform. ASAP 2012: 109-116 - [c264]Sebastiaan Indesteege, Bart Preneel:
DES Collisions Revisited. Cryptography and Security 2012: 13-24 - [c263]Nikos Mavrogiannopoulos, Andreas Pashalidis, Bart Preneel:
Security implications in Kerberos by the introduction of smart cards. AsiaCCS 2012: 59-60 - [c262]Nikos Mavrogiannopoulos, Frederik Vercauteren, Vesselin Velichkov, Bart Preneel:
A cross-protocol attack on the TLS protocol. ACM Conference on Computer and Communications Security 2012: 62-72 - [c261]Vincent van der Leest, Bart Preneel, Erik van der Sluis:
Soft Decision Error Correction for Compact Memory-Based PUFs Using a Single Enrollment. CHES 2012: 268-282 - [c260]Bart Mennink, Bart Preneel:
Hash Functions Based on Three Permutations: A Generic Security Analysis. CRYPTO 2012: 330-347 - [c259]
- [c258]Meiqin Wang, Yue Sun, Elmar Tischhauser, Bart Preneel:
A Model for Structure Attacks, with Applications to PRESENT and Serpent. FSE 2012: 49-68 - [c257]Vesselin Velichkov, Nicky Mouha, Christophe De Cannière, Bart Preneel:
UNAF: A Special Set of Additive Differences with Application to the Differential Analysis of ARX. FSE 2012: 287-305 - [c256]Koen Simoens, Bian Yang, Xuebing Zhou, Filipe Beato, Christoph Busch, Elaine M. Newton, Bart Preneel:
Criteria towards metrics for benchmarking template protection algorithms. ICB 2012: 498-505 - [c255]Li Weng, Geert Braeckman, Ann Dooms, Bart Preneel, Peter Schelkens:
Robust Image Content Authentication with Tamper Location. ICME 2012: 380-385 - [c254]Li Weng, Rony Darazi, Bart Preneel, Benoît Macq, Ann Dooms:
Robust Image Content Authentication Using Perceptual Hashing and Watermarking. PCM 2012: 315-326 - [c253]Nikos Mavrogiannopoulos, Miloslav Trmac, Bart Preneel:
A linux kernel cryptographic framework: decoupling cryptographic keys from applications. SAC 2012: 1435-1442 - [c252]Yoni De Mulder, Peter Roelse, Bart Preneel:
Cryptanalysis of the Xiao - Lai White-Box AES Implementation. Selected Areas in Cryptography 2012: 34-49