Bart Preneel
Bart Preneel
Professor, KU Leuven
Bestätigte E-Mail-Adresse bei esat.kuleuven.be
Titel
Zitiert von
Zitiert von
Jahr
Towards measuring anonymity
C Diaz, S Seys, J Claessens, B Preneel
International Workshop on Privacy Enhancing Technologies, 54-68, 2002
9422002
RIPEMD-160: A strengthened version of RIPEMD
H Dobbertin, A Bosselaers, B Preneel
International Workshop on Fast Software Encryption, 71-82, 1996
6871996
Mutual information analysis
B Gierlichs, L Batina, P Tuyls, B Preneel
International Workshop on Cryptographic Hardware and Embedded Systems, 426-442, 2008
6352008
Analysis and design of cryptographic hash functions
B Preneel
Katholieke Universiteit te Leuven, 1993
5891993
Hash functions based on block ciphers: A synthetic approach
B Preneel, R Govaerts, J Vandewalle
Annual international cryptology conference, 368-378, 1993
4941993
Trivium
C De Cannière, B Preneel
New Stream Cipher Designs, 244-266, 2008
4822008
Trivium specifications
C De Canniere, B Preneel
http://www. ecrypt. eu. org/stream/p3ciphers/trivium/trivium_p3. pdf, 2005
482*2005
A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements
M Deng, K Wuyts, R Scandariato, B Preneel, W Joosen
Requirements Engineering 16 (1), 3-32, 2011
3772011
Propagation characteristics of Boolean functions
B Preneel, W Van Leekwijck, L Van Linden, R Govaerts, J Vandewalle
Advances in Cryptology—EUROCRYPT’90, 161-173, 1990
3721990
MDx-MAC and building fast MACs from hash functions
B Preneel, PC Van Oorschot
Annual International Cryptology Conference, 1-14, 1995
3651995
FPDetective: dusting the web for fingerprinters
G Acar, M Juarez, N Nikiforakis, C Diaz, S Gürses, F Piessens, B Preneel
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
3382013
The Cipher SHARK
V Rijmen, J Daemen, B Preneel, A Bosselaers, E De Win
Fast Software Encryption, 99-111, 1996
3201996
ARM: Anonymous routing protocol for mobile ad hoc networks
S Seys, B Preneel
International Journal of Wireless and Mobile Computing 3 (3), 145-155, 2009
3022009
Power-analysis attack on an ASIC AES implementation
SB Ors, F Gurkaynak, E Oswald, B Preneel
International Conference on Information Technology: Coding and Computing …, 2004
2972004
Differential and linear cryptanalysis using mixed-integer linear programming
N Mouha, Q Wang, D Gu, B Preneel
International Conference on Information Security and Cryptology, 57-76, 2011
2722011
On the security of today’s online electronic banking systems
J Claessens, V Dem, D De Cock, B Preneel, J Vandewalle
Computers & Security 21 (3), 253-265, 2002
2252002
Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface
M Abe, K Aoki, G Ateniese, R Avanzi, Z Beerliová, O Billet, A Biryukov, ...
Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2006
221*2006
Sancus: Low-cost trustworthy extensible networked devices with a zero-software trusted computing base
J Noorman, P Agten, W Daniels, R Strackx, A Van Herrewege, C Huygens, ...
22nd {USENIX} Security Symposium ({USENIX} Security 13), 479-498, 2013
2192013
Cryptographic hash functions
B Preneel
European Transactions on Telecommunications 5 (4), 431-448, 1994
2121994
Location verification using secure distance bounding protocols
D Singelee, B Preneel
IEEE International Conference on Mobile Adhoc and Sensor Systems Conference …, 2005
2072005
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20