Bart Preneel
Affiliations:- Catholic University of Leuven, Belgium
According to our database1,
Bart Preneel
authored at least 559 papers
between 1989 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
-
on isni.org
On csauthors.net:
Bibliography
2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Let's Go Eevee! A Friendly and Suitable Family of AEAD Modes for IoT-to-Cloud Secure Computation.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
ACM Comput. Surv., 2023
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023
Proceedings of the IEEE Vehicular Networking Conference, 2023
On the Brittleness of Robust Features: An Exploratory Analysis of Model Robustness and Illusionary Robust Features.
Proceedings of the 2023 IEEE Security and Privacy Workshops (SPW), 2023
Proceedings of the IEEE Conference on Standards for Communications and Networking, 2023
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023
Yes we CAN!: Towards bringing security to legacy-restricted Controller Area Networks. A review.
Proceedings of the 20th ACM International Conference on Computing Frontiers, 2023
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023
2022
IEEE Internet Things J., 2022
Not Only for Contact Tracing: Use of Belgium's Contact Tracing App among Young Adults.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022
On the susceptibility of Texas Instruments SimpleLink platform microcontrollers to non-invasive physical attacks.
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
An Efficient and Physically Secure Privacy-Preserving Authentication Scheme for Vehicular Ad-hoc NETworks (VANETs).
IEEE Access, 2022
Proceedings of the 18th International Conference on Wireless and Mobile Computing, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the IEEE Conference on Standards for Communications and Networking, 2022
T-HIBE: A Novel Key Establishment Solution for Decentralized, Multi-Tenant IoT Systems.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022
Proceedings of the Applied Cryptography and Network Security, 2022
2021
IEEE Trans. Inf. Theory, 2021
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Toward a Common Performance and Effectiveness Terminology for Digital Proximity Tracing Applications.
Frontiers Digit. Health, 2021
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021
Proceedings of the IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2021
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2021
2020
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
The Fifth International Students' Olympiad in cryptography - NSUCRYPTO: Problems and their solutions.
Cryptologia, 2020
Towards a common performance and effectiveness terminology for digital proximity tracing applications.
CoRR, 2020
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020
Proceedings of the 18th ACM International Symposium on Mobility Management and Wireless Access, 2020
Proceedings of the 17th IEEE/ACS International Conference on Computer Systems and Applications, 2020
2019
Fast, Furious and Insecure: Passive Keyless Entry and Start Systems in Modern Supercars.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019
IACR Cryptol. ePrint Arch., 2019
Problems and solutions from the fourth International Students' Olympiad in Cryptography (NSUCRYPTO).
Cryptologia, 2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
On the Difficulty of Using Patient's Physiological Signals in Cryptographic Protocols.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019
Proceedings of the 2019 IEEE Conference on Standards for Communications and Networking, 2019
2018
IEEE Trans. Inf. Forensics Secur., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Problems and solutions of the Fourth International Students' Olympiad in Cryptography NSUCRYPTO.
CoRR, 2018
Comput. Secur., 2018
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018
Proceedings of the 2018 Global Internet of Things Summit, 2018
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018
2017
ACM Trans. Priv. Secur., 2017
On the Necessity of a Prescribed Block Validity Consensus: Analyzing Bitcoin Unlimited Mining Protocol.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Physical-layer fingerprinting of LoRa devices using supervised and zero-shot learning.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017
Proceedings of the 2017 IEEE Computer Society Annual Symposium on VLSI, 2017
The Future of Information Security.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017
Are You Really My Friend? Efficient and Secure Friend-Matching in Mobile Social Networks.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops, 2017
Proceedings of the Computer Security - ESORICS 2017, 2017
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017
2016
Secur. Commun. Networks, 2016
Int. J. Inf. Sec., 2016
Collateral Damage in Online Social Networks: computing the significance of information collection.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Dagstuhl Reports, 2016
Comput. Commun., 2016
An Implementation of a High Assurance Smart Meter Using Protected Module Architectures.
Proceedings of the Information Security Theory and Practice, 2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the ICT Systems Security and Privacy Protection, 2016
Proceedings of the Radio Frequency Identification and IoT Security, 2016
Proceedings of the IEEE International Smart Cities Conference, 2016
Proceedings of the 22nd IEEE International Symposium on On-Line Testing and Robust System Design, 2016
Proceedings of the 2016 12th International Conference on Innovations in Information Technology (IIT), 2016
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016
Proceedings of the 17th IEEE International Symposium on High Assurance Systems Engineering, 2016
Proceedings of the 2016 Design, Automation & Test in Europe Conference & Exhibition, 2016
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016
An Efficient Entity Authentication Protocol with Enhanced Security and Privacy Properties.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 15th International Conference, 2016
On the (in)security of the latest generation implantable cardiac defibrillators and how to secure them.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
ACM Trans. Embed. Comput. Syst., 2015
Extension Field Cancellation: a New Central Trapdoor for Multivariate Quadratic Systems.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Problems, solutions and experience of the first international student's Olympiad in cryptography.
IACR Cryptol. ePrint Arch., 2015
Proceedings of the 2015 World Congress on Internet Security, 2015
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015
Proceedings of the 1st IEEE/ACM International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity, 2015
Proceedings of the 1st IEEE/ACM International Workshop on Software Protection, 2015
Proceedings of the Applied Cryptography and Network Security, 2015
2014
IACR Cryptol. ePrint Arch., 2014
Des. Codes Cryptogr., 2014
Privacy and Security in an Age of Surveillance (Dagstuhl Perspectives Workshop 14401).
Dagstuhl Reports, 2014
Practical privacy-preserving location-sharing based services with aggregate statistics.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014
Proceedings of the Privacy and Identity Management for the Future Internet in the Age of Globalisation, 2014
Proceedings of the 14th IEEE International Conference on Peer-to-Peer Computing, 2014
Proceedings of the IEEE Conference on Communications and Network Security, 2014
Proceedings of the Cryptology and Network Security - 13th International Conference, 2014
2013
End-To-End Security for Video Distribution: The Combination of Encryption, Watermarking, and Video Adaptation.
IEEE Signal Process. Mag., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Optimal sporadic location privacy preserving systems in presence of bandwidth constraints.
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013
Sancus: Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
Proceedings of the 6th International Conference on Security of Information and Networks, 2013
Proceedings of the Secure Data Management - 10th VLDB Workshop, 2013
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013
Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, 2013
Proceedings of the IEEE International Conference on Image Processing, 2013
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013
Proceedings of the Communications and Multimedia Security, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Flexible Design of a Modular Simultaneous Exponentiation Core for Embedded Platforms.
Proceedings of the Reconfigurable Computing: Architectures, Tools and Applications, 2013
2012
IEEE Trans. Knowl. Data Eng., 2012
IEEE Trans. Inf. Theory, 2012
Math. Comput. Model., 2012
Challenging the increased resistance of regular hash functions against birthday attacks.
J. Math. Cryptol., 2012
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012
A linux kernel cryptographic framework: decoupling cryptographic keys from applications.
Proceedings of the ACM Symposium on Applied Computing, 2012
Proceedings of the Advances in Multimedia Information Processing - PCM 2012, 2012
Proceedings of the 2012 IEEE International Conference on Multimedia and Expo, 2012
Proceedings of the 5th IAPR International Conference on Biometrics, 2012
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012
UNAF: A Special Set of Additive Differences with Application to the Differential Analysis of ARX.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012
Proceedings of the 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2012
Soft Decision Error Correction for Compact Memory-Based PUFs Using a Single Enrollment.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
Proceedings of the Cryptography and Security: From Theory to Applications, 2012
Interface Design for Mapping a Variety of RSA Exponentiation Algorithms on a HW/SW Co-design Platform.
Proceedings of the 23rd IEEE International Conference on Application-Specific Systems, 2012
Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
A Privacy-Preserving Buyer-Seller Watermarking Protocol Based on Priced Oblivious Transfer.
IEEE Trans. Inf. Forensics Secur., 2011
IEEE Trans. Dependable Secur. Comput., 2011
A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements.
Requir. Eng., 2011
IACR Cryptol. ePrint Arch., 2011
Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT.
IACR Cryptol. ePrint Arch., 2011
Dagstuhl Reports, 2011
Proceedings of the Information Security Applications - 12th International Workshop, 2011
Proceedings of the SOFSEM 2011: Theory and Practice of Computer Science, 2011
Proceedings of the Advances in Multimedia Modeling, 2011
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011
Proceedings of the Communications and Multimedia Security, 2011
Proceedings of the Communications and Multimedia Security, 2011
Proceedings of the Communications and Multimedia Security, 2011
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011
Proceedings of the Progress in Cryptology - AFRICACRYPT 2011, 2011
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011
2010
Anti-counterfeiting, Untraceability and Other Security Challenges for RFID Systems: Public-Key-Based Protocols and Hardware.
Proceedings of the Towards Hardware-Intrinsic Security - Foundations and Practice, 2010
Anonymous User Communication for Privacy Protection in Wireless Metropolitan Mesh Networks.
IEEE Trans. Veh. Technol., 2010
IEEE Trans. Inf. Forensics Secur., 2010
J. Inf. Process. Syst., 2010
IET Inf. Secur., 2010
MQ<sup>*</sup>-IP: An Identity-based Identification Scheme without Number-theoretic Assumptions.
IACR Cryptol. ePrint Arch., 2010
Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares.
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
Ad Hoc Sens. Wirel. Networks, 2010
Proceedings of the 19th USENIX Security Symposium, 2010
Proceedings of the Security and Privacy in Communication Networks, 2010
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2010
Proceedings of the Computer Network Security, 2010
Proceedings of the Advances in Multimedia Modeling, 2010
Proceedings of the 18th International Conference on Multimedia 2010, 2010
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010
State-of-the-art of Secure ECC Implementations: A Survey on Known Side-channel Attacks and Countermeasures.
Proceedings of the HOST 2010, 2010
Proceedings of the 10th ACM Workshop on Digital Rights Management, 2010
Proceedings of the Design, Automation and Test in Europe, 2010
Proceedings of the Topics in Cryptology, 2010
Proceedings of the Fourth IEEE International Conference on Biometrics: Theory Applications and Systems, 2010
Proceedings of the Progress in Cryptology, 2010
2009
Proceedings of the Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, 2009
IEEE Trans. Inf. Forensics Secur., 2009
Online Inf. Rev., 2009
<i>n</i> PAKE<sup>+</sup>: A Tree-Based Group Password-Authenticated Key Exchange Protocol Using Different Passwords.
J. Comput. Sci. Technol., 2009
Int. J. Wirel. Mob. Comput., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
Comput. Law Secur. Rev., 2009
Proceedings of the Information Security Applications, 10th International Workshop, 2009
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
Proceedings of the 1st ACM SIGCOMM Workshop on Networking, 2009
Proceedings of the Selected Areas in Cryptography, 16th Annual International Workshop, 2009
Proceedings of the Pairing-Based Cryptography, 2009
An efficient buyer-seller watermarking protocol based on composite signal representation.
Proceedings of the Multimedia and Security Workshop, 2009
Proceedings of the Advances in Information and Computer Security, 2009
Proceedings of the Advances in Information and Computer Security, 2009
Proceedings of the Information Security, 12th International Conference, 2009
Proceedings of the Information Security, 12th International Conference, 2009
Proceedings of the iNetSec 2009 - Open Research Problems in Network Security, 2009
Proceedings of the 2009 IEEE International Conference on Multimedia and Expo, 2009
Proceedings of the 19th European Conference on Circuit Theory and Design, 2009
Proceedings of the 2009 IEEE Symposium on Design and Diagnostics of Electronic Circuits and Systems, 2009
Proceedings of the Symmetric Cryptography, 11.01. - 16.01.2009, 2009
Proceedings of the Symmetric Cryptography, 11.01. - 16.01.2009, 2009
Proceedings of the Symmetric Cryptography, 11.01. - 16.01.2009, 2009
Proceedings of the Symmetric Cryptography, 11.01. - 16.01.2009, 2009
09282 Abstracts Collection - Foundations for Forgery-Resilient Cryptographic Hardware.
Proceedings of the Foundations for Forgery-Resilient Cryptographic Hardware, 05.07., 2009
Proceedings of the Foundations for Forgery-Resilient Cryptographic Hardware, 05.07., 2009
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009
2008
Inf. Secur. Tech. Rep., 2008
Hardware implementation of an elliptic curve processor over GF(p) with Montgomery modular multiplier.
Int. J. Embed. Syst., 2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008
A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks.
Proceedings of the First ACM Conference on Wireless Network Security, 2008
On the Practical Performance of Rateless Codes.
Proceedings of the WINSYS 2008, 2008
Proceedings of the 1st IFIP Wireless Days, 2008
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008
Proceedings of the Trusted Computing, 2008
Proceedings of the 2008 ACM Workshop On Storage Security And Survivability, 2008
Anonymous Buyer-Seller Watermarking Protocol wth Additive Homomorphism.
Proceedings of the SIGMAP 2008, 2008
Cryptographic Algorithms - Successes, Failures and Challenges.
Proceedings of the SECRYPT 2008, 2008
Proceedings of the Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2008
Proceedings of the Privacy Enhancing Technologies, 2008
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008, 2008
Proceedings of the Information Security, 11th International Conference, 2008
Proceedings of the Information Security Practice and Experience, 2008
Attacks on Two Buyer-Seller Watermarking Protocols and an Improvement for Revocable Anonymity.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008
Proceedings of the Third International Conference on Internet and Web Applications and Services, 2008
Reliable Key Establishment Scheme Exploiting Unidirectional Links in Wireless Sensor Networks.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008
Proceedings of the Computer Security, 2008
Proceedings of the Advances in Cryptology, 2008
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008
Proceedings of the BIOSIG 2008, 2008
Proceedings of the Progress in Cryptology, 2008
Proceedings of the Ad-hoc, Mobile and Wireless Networks, 7th International Conference, 2008
Proceedings of the The Third International Conference on Availability, 2008
2007
Multicore Curve-Based Cryptoprocessor with Reconfigurable Modular Arithmetic Logic Units over GF(2<sup>n</sup>).
IEEE Trans. Computers, 2007
Mob. Networks Appl., 2007
IACR Cryptol. ePrint Arch., 2007
New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B.
IACR Cryptol. ePrint Arch., 2007
New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py.
IACR Cryptol. ePrint Arch., 2007
Weaknesses in the Pseudorandom Bit Generation Algorithms of the Stream Ciphers TPypy and TPy.
IACR Cryptol. ePrint Arch., 2007
Proceedings of the First International Workshop on Run Time Enforcement for Mobile and Distributed Systems, 2007
Comput. Networks, 2007
Comput. Electr. Eng., 2007
Differential power and electromagnetic attacks on a FPGA implementation of elliptic curve cryptosystems.
Comput. Electr. Eng., 2007
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, 2007
Proceedings of the Research in Cryptology, Second Western European Workshop, 2007
Proceedings of the E-Voting and Identity, First International Conference, 2007
On Encryption and Authentication of the DC DCT Coefficient.
Proceedings of the SIGMAP 2007, 2007
A Side-channel Attack Resistant Programmable PKC Coprocessor for Embedded Applications.
Proceedings of the 2007 International Conference on Embedded Computer Systems: Architectures, 2007
Proceedings of the Privacy Enhancing Technologies, 7th International Symposium, 2007
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007
Proceedings of the Information Security, 10th International Conference, 2007
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2007), 2007
Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses.
Proceedings of the Progress in Cryptology, 2007
Proceedings of the Progress in Cryptology, 2007
Proceedings of the Information Hiding, 9th International Workshop, 2007
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007
<i>n</i> PAKE<sup> + </sup>: A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords.
Proceedings of the Information and Communications Security, 9th International Conference, 2007
Proceedings of the 17th ACM Great Lakes Symposium on VLSI 2007, 2007
Proceedings of the 17th ACM Great Lakes Symposium on VLSI 2007, 2007
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007
Proceedings of the Advances in Cryptology, 2007
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2007
Proceedings of the Topics in Cryptology, 2007
Proceedings of the Cryptographic Hardware and Embedded Systems, 2007
Proceedings of the 3th ACM Workshop on Quality of Protection, 2007
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007
2006
IEEE Trans. Inf. Theory, 2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the 2006 ACM Workshop on Wireless Security, 2006
Proceedings of the Sicherheit 2006: Sicherheit, 2006
On the Effectiveness of Source Code Transformations for Binary Obfuscation.
Proceedings of the International Conference on Software Engineering Research and Practice & Conference on Programming Languages and Compilers, 2006
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract).
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006
Proceedings of the Selected Areas in Cryptography, 13th International Workshop, 2006
Proceedings of the Selected Areas in Cryptography, 13th International Workshop, 2006
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2006), 2006
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2006), 2006
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006
Proceedings of the 2006 IEEE International Conference on Acoustics Speech and Signal Processing, 2006
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006
Proceedings of the 2006 International Conference on Field Programmable Logic and Applications (FPL), 2006
Proceedings of the 2006 International Conference on Field Programmable Logic and Applications (FPL), 2006
Proceedings of the Security and Privacy in Ad-Hoc and Sensor Networks, 2006
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006
Proceedings of the Advances in Cryptology, 2006
Proceedings of the Advances in Cryptology, 2006
Reconfigurable Modular Arithmetic Logic Unit for High-Performance Public-Key Cryptosystems.
Proceedings of the Reconfigurable Computing: Architectures and Applications, 2006
Proceedings of the Reconfigurable Computing: Architectures and Applications, 2006
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 5th International Conference, 2006
Evaluating the Resistance of Stream Ciphers with Linear Feedback Against Fast Algebraic Attacks.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006
2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
On the covering radii of binary Reed-Muller codes in the set of resilient Boolean functions.
IEEE Trans. Inf. Theory, 2005
Spectral characterization of cryptographic Boolean functions satisfying the (extended) propagation criterion of degree <i>l</i> and order <i>k</i>.
Inf. Process. Lett., 2005
IACR Cryptol. ePrint Arch., 2005
Taxonomy of Public Key Schemes based on the problem of Multivariate Quadratic equations.
IACR Cryptol. ePrint Arch., 2005
On the (In)security of Stream Ciphers Based on Arrays and Modular Addition (Full Version).
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
EURASIP J. Adv. Signal Process., 2005
Comput. Secur., 2005
Power consumption evaluation of efficient digital signature schemes for low power devices.
Proceedings of the 2005 IEEE International Conference on Wireless And Mobile Computing, 2005
Proceedings of the Security in Pervasive Computing, Second International Conference, 2005
Proceedings of the Public Key Cryptography, 2005
Proceedings of the IEEE 2nd International Conference on Mobile Adhoc and Sensor Systems, 2005
Near Optimal Algorithms for Solving Differential Equations of Addition with Batch Queries.
Proceedings of the Progress in Cryptology, 2005
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005
Classification of Boolean Functions of 6 Variables or Less with Respect to Some Cryptographic Properties.
Proceedings of the Automata, Languages and Programming, 32nd International Colloquium, 2005
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005
Proceedings of the Topics in Cryptology, 2005
Hardware/Software Co-design for Hyperelliptic Curve Cryptography (HECC) on the 8051µP.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29, 2005
Side-channel aware design: Algorithms and Architectures for Elliptic Curve Cryptography over GF(2<sup>n</sup>).
Proceedings of the 16th IEEE International Conference on Application-Specific Systems, 2005
2004
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
Classification of Highly Nonlinear Boolean Power Functions with a Randomised Algorithm for Checking Normality.
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
Classification of Boolean Functions of 6 Variables or Less with Respect to Cryptographic Properties.
IACR Cryptol. ePrint Arch., 2004
Comput. Artif. Intell., 2004
Proceedings of the Security in Communication Networks, 4th International Conference, 2004
Proceedings of the Security in Communication Networks, 4th International Conference, 2004
Proceedings of the Security in Communication Networks, 4th International Conference, 2004
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004
Proceedings of the Information Hiding, 6th International Workshop, 2004
A Randomised Algorithm for Checking the Normality of Cryptographic Boolean Functions.
Proceedings of the Exploring New Frontiers of Theoretical Informatics, 2004
Proceedings of the Information Security Management, Education and Privacy, 2004
Proceedings of the Information and Communications Security, 6th International Conference, 2004
Proceedings of the 14th ACM Great Lakes Symposium on VLSI 2004, 2004
A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher.
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004
Proceedings of the Field Programmable Logic and Application, 2004
Proceedings of the Public Key Infrastructure, 2004
Proceedings of the Communications and Multimedia Security, 2004
Power Analysis of an FPGA: Implementation of Rijndael: Is Pipelining a DPA Countermeasure?
Proceedings of the Cryptographic Hardware and Embedded Systems, 2004
Proceedings of the Advances in Cryptology, 2004
Proceedings of the Advances in Cryptology, 2004
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
2003
(How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions.
ACM Trans. Internet Techn., 2003
Multi-Party Computation from any Linear Secret Sharing Scheme Secure against Adaptive Adversary: The Zero-Error Case.
IACR Cryptol. ePrint Arch., 2003
APES - Anonymity and Privacy in Electronic Services.
Datenschutz und Datensicherheit, 2003
Comput. Commun., 2003
Proceedings of the Information Security Applications, 4th International Workshop, 2003
Proceedings of the 17th International Parallel and Distributed Processing Symposium (IPDPS 2003), 2003
Proceedings of the Progress in Cryptology, 2003
Proceedings of the Progress in Cryptology, 2003
On the Covering Radius of Second Order Binary Reed-Muller Code in the Set of Resilient Boolean Functions.
Proceedings of the Cryptography and Coding, 2003
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003
Proceedings of the Advances in Cryptology, 2003
Proceedings of the Cryptographic Hardware and Embedded Systems, 2003
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003
Proceedings of the 14th IEEE International Conference on Application-Specific Systems, 2003
Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case.
Proceedings of the Applied Cryptography and Network Security, 2003
2002
Construction of secure and fast hash functions using nonbinary error-correcting codes.
IEEE Trans. Inf. Theory, 2002
Combining World Wide Web and wireless security.
Informatica (Slovenia), 2002
IACR Cryptol. ePrint Arch., 2002
IACR Cryptol. ePrint Arch., 2002
IACR Cryptol. ePrint Arch., 2002
IACR Cryptol. ePrint Arch., 2002
Proceedings of the 2002 ACM Workshop on XML Security, Fairfax, VA, USA, November 22, 2002, 2002
Proceedings of the Security in Communication Networks, Third International Conference, 2002
Proceedings of the Public Key Cryptography, 2002
New European Schemes for Signature, Integrity and Encryption (NESSIE): A Status Report.
Proceedings of the Public Key Cryptography, 2002
Proceedings of the Privacy Enhancing Technologies, Second International Workshop, 2002
On Distributed Key Distribution Centers and Unconditionally Secure Proactive Verifiable Secret Sharing Schemes Based on General Access Structure.
Proceedings of the Progress in Cryptology, 2002
Proceedings of the Progress in Cryptology, 2002
Proceedings of the Information and Communications Security, 4th International Conference, 2002
Proceedings of the Formal Aspects of Security, First International Conference, 2002
2001
IACR Cryptol. ePrint Arch., 2001
On Securely Scheduling a Meeting.
Proceedings of the Trusted Information: The New Decade Challenge, 2001
Proceedings of the Selected Areas in Cryptography, 8th Annual International Workshop, 2001
Proceedings of the Fast Software Encryption, 8th International Workshop, 2001
Proceedings of the Fast Software Encryption, 8th International Workshop, 2001
Proceedings of the Fast Software Encryption, 8th International Workshop, 2001
Proceedings of the Advances in Cryptology, 2001
Proceedings of the E-Commerce Agents, 2001
Secure Meeting Scheduling with agenTA.
Proceedings of the Communications and Multimedia Security Issues of the New Century, 2001
2000
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000
Proceedings of the CCS 2000, 2000
1999
J. VLSI Signal Process., 1999
IEEE Trans. Inf. Theory, 1999
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999
Proceedings of the Advances in Cryptology, 1999
1998
Proceedings of the 7th Workshop on Enabling Technologies (WETICE '98), 1998
Proceedings of the SOFSEM '98: Theory and Practice of Informatics, 1998
Proceedings of the Intelligence in Services and Networks: Technology for Ubiquitous Telecom Services, 1998
Proceedings of the Algorithmic Number Theory, Third International Symposium, 1998
Proceedings of the Lectures on Data Security, 1998
1997
Eur. Trans. Telecommun., 1997
Proceedings of the Information Security, First International Workshop, 1997
Proceedings of the Cryptography and Coding, 1997
Proceedings of the Fast Software Encryption, 4th International Workshop, 1997
Proceedings of the Advances in Cryptology, 1997
Proceedings of the State of the Art in Applied Cryptography, 1997
Proceedings of the State of the Art in Applied Cryptography, 1997
Proceedings of the State of the Art in Applied Cryptography, 1997
1996
J. High Speed Networks, 1996
Proceedings of the Information Hiding, First International Workshop, Cambridge, UK, May 30, 1996
Proceedings of the Fast Software Encryption, 1996
Proceedings of the Advances in Cryptology, 1996
Proceedings of the Advances in Cryptology, 1996
1995
Proceedings of the Advances in Cryptology, 1995
1994
Proceedings of the Fast Software Encryption: Second International Workshop. Leuven, 1994
Improved Characteristics for Differential Cryptanalysis of Hash Functions Based on Block Ciphers.
Proceedings of the Fast Software Encryption: Second International Workshop. Leuven, 1994
Proceedings of the Fast Software Encryption: Second International Workshop. Leuven, 1994
1993
Proceedings of the Fast Software Encryption, 1993
Proceedings of the Advances in Cryptology, 1993
Proceedings of the Advances in Cryptology, 1993
Proceedings of the CCS '93, 1993
1992
Proceedings of the Advances in Cryptology, 1992
Proceedings of the Advances in Cryptology, 1992
1991
Proceedings of the Advances in Cryptology, 1991
Proceedings of the Advances in Cryptology, 1991
Proceedings of the Computer Security and Industrial Cryptography, 1991
Proceedings of the Computer Security and Industrial Cryptography, 1991
Proceedings of the Computer Security and Industrial Cryptography, 1991
1990
Proceedings of the Advances in Cryptology, 1990
1989
A Chosen Text Attack on The Modified Cryptographic Checksum Algorithm of Cohen and Huang.
Proceedings of the Advances in Cryptology, 1989