% csauthors.net - beta - BibTeX bibliography of Bart Preneel
@inproceedings{conf/crypto/PreneelBGV89,
title = {A Chosen Text Attack on The Modified Cryptographic Checksum Algorithm of Cohen and Huang.},
year = {1989},
booktitle = {CRYPTO},
author = {{Bart Preneel} and {Antoon Bosselaers} and {René Govaerts} and {Joos Vandewalle}},
publisher = {Springer},
booktitle = {Advances in Cryptology - CRYPTO '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}
}
@inproceedings{conf/eurocrypt/PreneelLLGV90,
title = {Propagation Characteristics of Boolean Functions.},
year = {1990},
booktitle = {EUROCRYPT},
author = {{Bart Preneel} and {Werner Van Leekwijck} and {Luc Van Linden} and {René Govaerts} and {Joos Vandewalle}},
publisher = {Springer},
booktitle = {Advances in Cryptology - EUROCRYPT '90, Workshop on the Theory and Application of of Cryptographic Techniques, Aarhus, Denmark, May 21-24, 1990, Proceedings}
}
@article{journals/compsec/PreneelBGV90,
title = {Cryptanalysis of a fast cryptographic checksum algorithm.},
year = {1990},
journal = {Comput. Secur.},
author = {{Bart Preneel} and {Antoon Bosselaers} and {René Govaerts} and {Joos Vandewalle}}
}
@inproceedings{conf/ac/Preneel91,
title = {Standardization of Cryptographic Techniques.},
year = {1991},
booktitle = {Computer Security and Industrial Cryptography},
author = {{Bart Preneel}},
publisher = {Springer},
booktitle = {Computer Security and Industrial Cryptography - State of the Art and Evolution, ESAT Course, Leuven, Belgium, May 21-23, 1991}
}
@inproceedings{conf/ac/PreneelGV91,
title = {Information Authentication: Hash Functions and Digital Signatures.},
year = {1991},
booktitle = {Computer Security and Industrial Cryptography},
author = {{Bart Preneel} and {René Govaerts} and {Joos Vandewalle}},
publisher = {Springer},
booktitle = {Computer Security and Industrial Cryptography - State of the Art and Evolution, ESAT Course, Leuven, Belgium, May 21-23, 1991}
}
@inproceedings{conf/ac/VandewalleGP91,
title = {Technical Approaches to Thwart Computer Fraud.},
year = {1991},
booktitle = {Computer Security and Industrial Cryptography},
author = {{Joos Vandewalle} and {René Govaerts} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Computer Security and Industrial Cryptography - State of the Art and Evolution, ESAT Course, Leuven, Belgium, May 21-23, 1991}
}
@inproceedings{conf/eurocrypt/PreneelCFJLR91,
title = {Race Integrity Primitives Evaluation (RIPE): A Status Report.},
year = {1991},
booktitle = {EUROCRYPT},
author = {{Bart Preneel} and {David Chaum} and {Walter Fumy} and {Cees J. A. Jansen} and {Peter Landrock} and {Gert Roelofsen}},
publisher = {Springer},
booktitle = {Advances in Cryptology - EUROCRYPT '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}
}
@inproceedings{conf/eurocrypt/PreneelGV91,
title = {Boolean Functions Satisfying Higher Order Propagation Criteria.},
year = {1991},
booktitle = {EUROCRYPT},
author = {{Bart Preneel} and {René Govaerts} and {Joos Vandewalle}},
publisher = {Springer},
booktitle = {Advances in Cryptology - EUROCRYPT '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}
}
@inproceedings{conf/asiacrypt/PreneelGV92,
title = {On the Power of Memory in the Design of Collision Resistant Hash Functions.},
year = {1992},
booktitle = {AUSCRYPT},
author = {{Bart Preneel} and {René Govaerts} and {Joos Vandewalle}},
publisher = {Springer},
booktitle = {Advances in Cryptology - AUSCRYPT '92, Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992, Proceedings}
}
@inproceedings{conf/asiacrypt/PreneelGV92a,
title = {An Attack on Two Hash Functions by Zheng-Matsumoto-Imai.},
year = {1992},
booktitle = {AUSCRYPT},
author = {{Bart Preneel} and {René Govaerts} and {Joos Vandewalle}},
publisher = {Springer},
booktitle = {Advances in Cryptology - AUSCRYPT '92, Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992, Proceedings}
}
@inproceedings{conf/ccs/PreneelGV93,
title = {Differential Cryptanalysis of Hash Functions Based on Block Ciphers.},
year = {1993},
booktitle = {CCS},
author = {{Bart Preneel} and {René Govaerts} and {Joos Vandewalle}},
publisher = {ACM},
booktitle = {CCS '93, Proceedings of the 1st ACM Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 3-5, 1993.}
}
@inproceedings{conf/crypto/PreneelGV93,
title = {Hash Functions Based on Block Ciphers: A Synthetic Approach.},
year = {1993},
booktitle = {CRYPTO},
author = {{Bart Preneel} and {René Govaerts} and {Joos Vandewalle}},
publisher = {Springer},
booktitle = {Advances in Cryptology - CRYPTO '93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings}
}
@inproceedings{conf/crypto/PreneelNRB93,
title = {Cryptanalysis of the CFB Mode of the DES with a Reduced Number of Rounds.},
year = {1993},
booktitle = {CRYPTO},
author = {{Bart Preneel} and {Marnix Nuttin} and {Vincent Rijmen} and {Johan Buelens}},
publisher = {Springer},
booktitle = {Advances in Cryptology - CRYPTO '93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings}
}
@inproceedings{conf/fse/Preneel93,
title = {Design Principles for Dedicated Hash Functions.},
year = {1993},
booktitle = {FSE},
author = {{Bart Preneel}},
publisher = {Springer},
booktitle = {Fast Software Encryption, Cambridge Security Workshop, Cambridge, UK, December 9-11, 1993, Proceedings}
}
@inproceedings{conf/fse/Preneel94,
title = {FSE'94 - Introduction.},
year = {1994},
booktitle = {FSE},
author = {{Bart Preneel}},
publisher = {Springer},
booktitle = {Fast Software Encryption: Second International Workshop. Leuven, Belgium, 14-16 December 1994, Proceedings}
}
@inproceedings{conf/fse/RijmenP94,
title = {Improved Characteristics for Differential Cryptanalysis of Hash Functions Based on Block Ciphers.},
year = {1994},
booktitle = {FSE},
author = {{Vincent Rijmen} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Fast Software Encryption: Second International Workshop. Leuven, Belgium, 14-16 December 1994, Proceedings}
}
@inproceedings{conf/fse/RijmenP94a,
title = {Cryptanalysis of McGuffin.},
year = {1994},
booktitle = {FSE},
author = {{Vincent Rijmen} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Fast Software Encryption: Second International Workshop. Leuven, Belgium, 14-16 December 1994, Proceedings}
}
@article{journals/ett/Preneel94,
title = {Cryptographic hash functions.},
year = {1994},
journal = {Eur. Trans. Telecommun.},
author = {{Bart Preneel}}
}
@inproceedings{conf/crypto/PrenelO95,
title = {MDx-MAC and Building Fast MACs from Hash Functions.},
year = {1995},
booktitle = {CRYPTO},
author = {{Bart Preneel} and {Paul C. van Oorschot}},
publisher = {Springer},
booktitle = {Advances in Cryptology - CRYPTO '95, 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings}
}
@inproceedings{conf/asiacrypt/KnudsenP96,
title = {Hash Functions Based on Block Ciphers and Quaternary Codes.},
year = {1996},
booktitle = {ASIACRYPT},
author = {{Lars R. Knudsen} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Advances in Cryptology - ASIACRYPT '96, International Conference on the Theory and Applications of Cryptology and Information Security, Kyongju, Korea, November 3-7, 1996, Proceedings}
}
@inproceedings{conf/eurocrypt/PreneelO96,
title = {On the Security of Two MAC Algorithms.},
year = {1996},
booktitle = {EUROCRYPT},
author = {{Bart Preneel} and {Paul C. van Oorschot}},
publisher = {Springer},
booktitle = {Advances in Cryptology - EUROCRYPT '96, International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, Spain, May 12-16, 1996, Proceeding}
}
@inproceedings{conf/fse/DobbertinBP96,
title = {RIPEMD-160: A Strengthened Version of RIPEMD.},
year = {1996},
booktitle = {FSE},
author = {{Hans Dobbertin} and {Antoon Bosselaers} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Fast Software Encryption, Third International Workshop, Cambridge, UK, February 21-23, 1996, Proceedings}
}
@inproceedings{conf/fse/RijmenDPBW96,
title = {The Cipher SHARK.},
year = {1996},
booktitle = {FSE},
author = {{Vincent Rijmen} and {Joan Daemen} and {Bart Preneel} and {Antoon Bosselaers} and {Erik De Win}},
publisher = {Springer},
booktitle = {Fast Software Encryption, Third International Workshop, Cambridge, UK, February 21-23, 1996, Proceedings}
}
@inproceedings{conf/ih/AndersonVPN96,
title = {The Newton Channel.},
year = {1996},
booktitle = {Information Hiding},
author = {{Ross J. Anderson} and {Serge Vaudenay} and {Bart Preneel} and {Kaisa Nyberg}},
publisher = {Springer},
booktitle = {Information Hiding, First International Workshop, Cambridge, UK, May 30 - June 1, 1996, Proceedings}
}
@article{journals/jhsn/PreneelW96,
title = {Convergence of a quasistatic frequency allocation algorithm.},
year = {1996},
journal = {J. High Speed Networks},
author = {{Bart Preneel} and {Jean C. Walrand}}
}
@inproceedings{conf/ac/Preneel97,
title = {Cryptographic Primitives for Information Authentication - State of the Art.},
year = {1997},
booktitle = {State of the Art in Applied Cryptography},
author = {{Bart Preneel}},
publisher = {Springer},
booktitle = {State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997. Revised Lectures}
}
@inproceedings{conf/ac/PreneelRB97,
title = {Recent Developments in the Design of Conventional Cryptographic Algorithms.},
year = {1997},
booktitle = {State of the Art in Applied Cryptography},
author = {{Bart Preneel} and {Vincent Rijmen} and {Antoon Bosselaers}},
publisher = {Springer},
booktitle = {State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997. Revised Lectures}
}
@inproceedings{conf/ac/WinP97,
title = {Elliptic Curve Public-Key Cryptosystems - An Introduction.},
year = {1997},
booktitle = {State of the Art in Applied Cryptography},
author = {{Erik De Win} and {Bart Preneel}},
publisher = {Springer},
booktitle = {State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997. Revised Lectures}
}
@inproceedings{conf/crypto/KnudsenP97,
title = {Fast and Secure Hashing Based on Codes.},
year = {1997},
booktitle = {CRYPTO},
author = {{Lars R. Knudsen} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Advances in Cryptology - CRYPTO '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings}
}
@inproceedings{conf/fse/RijmenP97,
title = {A Family of Trapdoor Ciphers.},
year = {1997},
booktitle = {FSE},
author = {{Vincent Rijmen} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Fast Software Encryption, 4th International Workshop, FSE '97, Haifa, Israel, January 20-22, 1997, Proceedings}
}
@inproceedings{conf/ima/Preneel97,
title = {Hash Functions and MAC Algorithms Based on Block Ciphers.},
year = {1997},
booktitle = {IMACC},
author = {{Bart Preneel}},
publisher = {Springer},
booktitle = {Cryptography and Coding, 6th IMA International Conference, Cirencester, UK, December 17-19, 1997, Proceedings}
}
@inproceedings{conf/isw/Preneel97,
title = {Cryptanalysis of Message Authentication Codes.},
year = {1997},
booktitle = {ISW},
author = {{Bart Preneel}},
publisher = {Springer},
booktitle = {Information Security, First International Workshop, ISW '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings}
}
@article{journals/dcc/RijmenPW97,
title = {On Weaknesses of Non-surjective Round Functions.},
year = {1997},
journal = {Des. Codes Cryptogr.},
author = {{Vincent Rijmen} and {Bart Preneel} and {Erik De Win}}
}
@article{journals/ett/PreneelRO97,
title = {Security analysis of the message authenticator algorithm (MAA).},
year = {1997},
journal = {Eur. Trans. Telecommun.},
author = {{Bart Preneel} and {Vincent Rijmen} and {Paul C. van Oorschot}}
}
@article{journals/istr/Preneel97,
title = {MACs and hash functions: State of the art.},
year = {1997},
journal = {Inf. Secur. Tech. Rep.},
author = {{Bart Preneel}}
}
@inproceedings{conf/ac/Preneel98,
title = {The State of Cryptographic Hash Functions.},
year = {1998},
booktitle = {Lectures on Data Security},
author = {{Bart Preneel}},
publisher = {Springer},
booktitle = {Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998}
}
@inproceedings{conf/ants/WinMPW98,
title = {On the Performance of Signature Schemes Based on Elliptic Curves.},
year = {1998},
booktitle = {ANTS},
author = {{Erik De Win} and {Serge Mister} and {Bart Preneel} and {Michael J. Wiener}},
publisher = {Springer},
booktitle = {Algorithmic Number Theory, Third International Symposium, ANTS-III, Portland, Oregon, USA, June 21-25, 1998, Proceedings}
}
@inproceedings{conf/asiacrypt/KnudsenMPRV98,
title = {Analysis Methods for (Alleged) RC4.},
year = {1998},
booktitle = {ASIACRYPT},
author = {{Lars R. Knudsen} and {Willi Meier} and {Bart Preneel} and {Vincent Rijmen} and {Sven Verdoolaege}},
publisher = {Springer},
booktitle = {Advances in Cryptology - ASIACRYPT '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings}
}
@inproceedings{conf/isn/MartinPMHHPH98,
title = {Secure Billing for Mobile Information Services in UMTS.},
year = {1998},
booktitle = {IS&N},
author = {{Keith M. Martin} and {Bart Preneel} and {Chris J. Mitchell} and {Hans-Joachim Hitz} and {Günther Horn} and {Alla Poliakova} and {Peter Howard}},
publisher = {Springer},
booktitle = {Intelligence in Services and Networks: Technology for Ubiquitous Telecom Services, 5th International Conference on Intelligence and Services in Networks, IS&N'98, Antwerp, Belgium, May 25-28, 1998, Proceedings}
}
@inproceedings{conf/sofsem/Preneel98,
title = {An Introduction to Cryptology.},
year = {1998},
booktitle = {SOFSEM},
author = {{Bart Preneel}},
publisher = {Springer},
booktitle = {SOFSEM '98: Theory and Practice of Informatics, 25th Conference on Current Trends in Theory and Practice of Informatics, Jasná, Slovakia, November 21-27, 1998, Proceedings}
}
@inproceedings{conf/wetice/ClaessensVPV98,
title = {Setting up a Secure Web Server and Clients on an Intranet.},
year = {1998},
booktitle = {WETICE},
author = {{Joris Claessens} and {Mark Vandenwauver} and {Bart Preneel} and {Joos Vandewalle}},
publisher = {IEEE Computer Society},
booktitle = {7th Workshop on Enabling Technologies (WETICE '98), Infrastructure for Collaborative Enterprises, June 17-19, 1998, Palo Alto, CAUSA, Proceedings}
}
@article{journals/joc/KnudsenLP98,
title = {Attacks on Fast Double Block Length Hash Functions.},
year = {1998},
journal = {J. Cryptol.},
author = {{Lars R. Knudsen} and {Xuejia Lai} and {Bart Preneel}}
}
@inproceedings{conf/asiacrypt/DHalluinBPR99,
title = {Equivalent Keys of HPC.},
year = {1999},
booktitle = {ASIACRYPT},
author = {{Carl D'Halluin} and {Gert Bijnens} and {Bart Preneel} and {Vincent Rijmen}},
publisher = {Springer},
booktitle = {Advances in Cryptology - ASIACRYPT '99, International Conference on the Theory and Applications of Cryptology and Information Security, Singapore, November 14-18, 1999, Proceedings}
}
@inproceedings{conf/eurocrypt/NevelsteenP99,
title = {Software Performance of Universal Hash Functions.},
year = {1999},
booktitle = {EUROCRYPT},
author = {{Wim Nevelsteen} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Advances in Cryptology - EUROCRYPT '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}
}
@inproceedings{conf/fse/BorstPV99,
title = {Linear Cryptanalysis of RC5 and RC6.},
year = {1999},
booktitle = {FSE},
author = {{Johan Borst} and {Bart Preneel} and {Joos Vandewalle}},
publisher = {Springer},
booktitle = {Fast Software Encryption, 6th International Workshop, FSE '99, Rome, Italy, March 24-26, 1999, Proceedings}
}
@inproceedings{conf/fse/DHalluinBRP99,
title = {Attack on Six Rounds of Crypton.},
year = {1999},
booktitle = {FSE},
author = {{Carl D'Halluin} and {Gert Bijnens} and {Vincent Rijmen} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Fast Software Encryption, 6th International Workshop, FSE '99, Rome, Italy, March 24-26, 1999, Proceedings}
}
@inproceedings{conf/fse/HandschuhP99,
title = {On the Security of Double and 2-Key Triple Modes of Operation.},
year = {1999},
booktitle = {FSE},
author = {{Helena Handschuh} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Fast Software Encryption, 6th International Workshop, FSE '99, Rome, Italy, March 24-26, 1999, Proceedings}
}
@article{journals/compsec/Preneel99,
title = {State-of-the-art ciphers for commercial applications.},
year = {1999},
journal = {Comput. Secur.},
author = {{Bart Preneel}}
}
@article{journals/tit/PreneelO99,
title = {On the Security of Iterated Message Authentication Codes.},
year = {1999},
journal = {IEEE Trans. Inf. Theory},
author = {{Bart Preneel} and {Paul C. van Oorschot}}
}
@article{journals/vlsisp/CsapodiVP99,
title = {CNN Algorithms for Video Authentication and Copyright Protection.},
year = {1999},
journal = {J. VLSI Signal Process.},
author = {{Márton Csapodi} and {Joos Vandewalle} and {Bart Preneel}}
}
@inproceedings{conf/ccs/IliadisSGPK00,
title = {Evaluating certificate status information mechanisms.},
year = {2000},
booktitle = {CCS},
author = {{John Iliadis} and {Diomidis Spinellis} and {Dimitris Gritzalis} and {Bart Preneel} and {Sokratis K. Katsikas}},
publisher = {ACM},
booktitle = {CCS 2000, Proceedings of the 7th ACM Conference on Computer and Communications Security, Athens, Greece, November 1-4, 2000.}
}
@inproceedings{conf/fse/NakaharaPV00,
title = {Linear Cryptanalysis of Reduced-Round Versions of the SAFER Block Cipher Family.},
year = {2000},
booktitle = {FSE},
author = {{Jorge Nakahara Jr.} and {Bart Preneel} and {Joos Vandewalle}},
publisher = {Springer},
booktitle = {Fast Software Encryption, 7th International Workshop, FSE 2000, New York, NY, USA, April 10-12, 2000, Proceedings}
}
@article{journals/jcs/HornP00,
title = {Authentication and Payment in Future Mobile Systems.},
year = {2000},
journal = {J. Comput. Secur.},
author = {{Günther Horn} and {Bart Preneel}}
}
@inproceedings{conf/cms/HerleaCCPV01,
title = {Secure Meeting Scheduling with agenTA.},
year = {2001},
booktitle = {Communications and Multimedia Security},
author = {{T. Herlea} and {Joris Claessens} and {Danny De Cock} and {Bart Preneel} and {Joos Vandewalle}},
publisher = {Kluwer},
booktitle = {Communications and Multimedia Security Issues of the New Century, Proceedings of the IFIP TC6/TC11 International Conference on Communications and Multimedia Security Issues, May 21-22, 2001, Darmstadt, Germany}
}
@inproceedings{conf/ecAgents/ClaessensPV01,
title = {Secure Communication for Secure Agent-Based Electronic Commerce Applications.},
year = {2001},
booktitle = {E-Commerce Agents},
author = {{Joris Claessens} and {Bart Preneel} and {Joos Vandewalle}},
publisher = {Springer},
booktitle = {E-Commerce Agents, Marketplace Solutions, Security Issues, and Supply and Demand}
}
@inproceedings{conf/eurocrypt/VercauterenPV01,
title = {A Memory Efficient Version of Satoh's Algorithm.},
year = {2001},
booktitle = {EUROCRYPT},
author = {{Frederik Vercauteren} and {Bart Preneel} and {Joos Vandewalle}},
publisher = {Springer},
booktitle = {Advances in Cryptology - EUROCRYPT 2001, International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria, May 6-10, 2001, Proceeding}
}
@inproceedings{conf/fse/BarretoRNPVK01,
title = {Improved SQUARE Attacks against Reduced-Round HIEROCRYPT.},
year = {2001},
booktitle = {FSE},
author = {{Paulo S. L. M. Barreto} and {Vincent Rijmen} and {Jorge Nakahara Jr.} and {Bart Preneel} and {Joos Vandewalle} and {Hae Yong Kim}},
publisher = {Springer},
booktitle = {Fast Software Encryption, 8th International Workshop, FSE 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers}
}
@inproceedings{conf/fse/Preneel01,
title = {NESSIE: A European Approach to Evaluate Cryptographic Algorithms.},
year = {2001},
booktitle = {FSE},
author = {{Bart Preneel}},
publisher = {Springer},
booktitle = {Fast Software Encryption, 8th International Workshop, FSE 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers}
}
@inproceedings{conf/fse/RijmenRPV01,
title = {Producing Collisions for PANAMA.},
year = {2001},
booktitle = {FSE},
author = {{Vincent Rijmen} and {Bart Van Rompay} and {Bart Preneel} and {Joos Vandewalle}},
publisher = {Springer},
booktitle = {Fast Software Encryption, 8th International Workshop, FSE 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers}
}
@inproceedings{conf/sacrypt/BoerRPV01,
title = {New (Two-Track-)MAC Based on the Two Trails of RIPEMD.},
year = {2001},
booktitle = {Selected Areas in Cryptography},
author = {{Bert den Boer} and {Bart Van Rompay} and {Bart Preneel} and {Joos Vandewalle}},
publisher = {Springer},
booktitle = {Selected Areas in Cryptography, 8th Annual International Workshop, SAC 2001 Toronto, Ontario, Canada, August 16-17, 2001, Revised Papers}
}
@inproceedings{conf/sec/HerleaCPNPD01,
title = {On Securely Scheduling a Meeting.},
year = {2001},
booktitle = {SEC},
author = {{T. Herlea} and {Joris Claessens} and {Bart Preneel} and {Gregory Neven} and {Frank Piessens} and {Bart De Decker}},
publisher = {Kluwer},
booktitle = {Trusted Information: The New Decade Challenge, IFIP TC11 Sixteenth Annual Working Conference on Information Security (IFIP/Sec'01), June 11-13, 2001, Paris, France}
}
@article{journals/cn/BorstPR01,
title = {Cryptography on smart cards.},
year = {2001},
journal = {Comput. Networks},
author = {{Johan Borst} and {Bart Preneel} and {Vincent Rijmen}}
}
@article{journals/iacr/NakaharaBPVK01,
title = {SQUARE Attacks on Reduced-Round PES and IDEA Block Ciphers.},
year = {2001},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Jorge Nakahara Jr.} and {Paulo S. L. M. Barreto} and {Bart Preneel} and {Joos Vandewalle} and {Hae Y. Kim}}
}
@inproceedings{conf/fasec/Preneel02,
title = {Cryptographic Challenges: The Past and the Future.},
year = {2002},
booktitle = {FASec},
author = {{Bart Preneel}},
publisher = {Springer},
booktitle = {Formal Aspects of Security, First International Conference, FASec 2002, London, UK, December 16-18, 2002, Revised Papers}
}
@inproceedings{conf/icics/BiryukovNPV02,
title = {New Weak-Key Classes of IDEA.},
year = {2002},
booktitle = {ICICS},
author = {{Alex Biryukov} and {Jorge Nakahara Jr.} and {Bart Preneel} and {Joos Vandewalle}},
publisher = {Springer},
booktitle = {Information and Communications Security, 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings}
}
@inproceedings{conf/indocrypt/NikovNPV02,
title = {On Unconditionally Secure Distributed Oblivious Transfer.},
year = {2002},
booktitle = {INDOCRYPT},
author = {{Ventzislav Nikov} and {Svetla Nikova} and {Bart Preneel} and {Joos Vandewalle}},
publisher = {Springer},
booktitle = {Progress in Cryptology - INDOCRYPT 2002, Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002}
}
@inproceedings{conf/indocrypt/NikovNPV02a,
title = {On Distributed Key Distribution Centers and Unconditionally Secure Proactive Verifiable Secret Sharing Schemes Based on General Access Structure.},
year = {2002},
booktitle = {INDOCRYPT},
author = {{Ventzislav Nikov} and {Svetla Nikova} and {Bart Preneel} and {Joos Vandewalle}},
publisher = {Springer},
booktitle = {Progress in Cryptology - INDOCRYPT 2002, Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002}
}
@inproceedings{conf/pet/DiazSCP02,
title = {Towards Measuring Anonymity.},
year = {2002},
booktitle = {Privacy Enhancing Technologies},
author = {{Claudia Díaz} and {Stefaan Seys} and {Joris Claessens} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Privacy Enhancing Technologies, Second International Workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002, Revised Papers}
}
@inproceedings{conf/pkc/Preneel02,
title = {New European Schemes for Signature, Integrity and Encryption (NESSIE): A Status Report.},
year = {2002},
booktitle = {Public Key Cryptography},
author = {{Bart Preneel}},
publisher = {Springer},
booktitle = {Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Paris, France, February 12-14, 2002, Proceedings}
}
@inproceedings{conf/pkc/QuisquaterPV02,
title = {On the Security of the Threshold Scheme Based on the Chinese Remainder Theorem.},
year = {2002},
booktitle = {Public Key Cryptography},
author = {{Michaël Quisquater} and {Bart Preneel} and {Joos Vandewalle}},
publisher = {Springer},
booktitle = {Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Paris, France, February 12-14, 2002, Proceedings}
}
@inproceedings{conf/scn/BorissovNPV02,
title = {On a Resynchronization Weakness in a Class of Combiners with Memory.},
year = {2002},
booktitle = {SCN},
author = {{Yuri L. Borissov} and {Svetla Nikova} and {Bart Preneel} and {Joos Vandewalle}},
publisher = {Springer},
booktitle = {Security in Communication Networks, Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers}
}
@inproceedings{conf/xmlsec/WoutersPFR02,
title = {Towards an XML format for time-stamps.},
year = {2002},
booktitle = {XML Security},
author = {{Karel Wouters} and {Bart Preneel} and {Ana Isabel González-Tablas Ferreres} and {Arturo Ribagorda}},
publisher = {ACM},
booktitle = {Proceedings of the 2002 ACM Workshop on XML Security, Fairfax, VA, USA, November 22, 2002}
}
@article{journals/compsec/ClaessensDCPV02,
title = {On the Security of Today's Online Electronic Banking Systems.},
year = {2002},
journal = {Comput. Secur.},
author = {{Joris Claessens} and {Valentin Dem} and {Danny De Cock} and {Bart Preneel} and {Joos Vandewalle}}
}
@article{journals/firstmonday/ClaessensPV02,
title = {A Tangled World Wide Web of Security Issues.},
year = {2002},
journal = {First Monday},
author = {{Joris Claessens} and {Bart Preneel} and {Joos Vandewalle}}
}
@article{journals/iacr/NakaharaPV02,
title = {Square Attacks on Reduced-Round Variants of the Skipjack Block Cipher.},
year = {2002},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Jorge Nakahara Jr.} and {Bart Preneel} and {Joos Vandewalle}}
}
@article{journals/iacr/NakaharaPV02a,
title = {A note on Weak Keys of PES, IDEA and some Extended Variants.},
year = {2002},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Jorge Nakahara Jr.} and {Bart Preneel} and {Joos Vandewalle}}
}
@article{journals/iacr/NikovNPV02,
title = {Applying General Access Structure to Metering Schemes.},
year = {2002},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Ventzislav Nikov} and {Svetla Nikova} and {Bart Preneel} and {Joos Vandewalle}}
}
@article{journals/iacr/NikovNPV02a,
title = {Applying General Access Structure to Proactive Secret Sharing Schemes.},
year = {2002},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Ventzislav Nikov} and {Svetla Nikova} and {Bart Preneel} and {Joos Vandewalle}}
}
@article{journals/informaticaSI/ClaessensPV02,
title = {Combining World Wide Web and wireless security.},
year = {2002},
journal = {Informatica (Slovenia)},
author = {{Joris Claessens} and {Bart Preneel} and {Joos Vandewalle}}
}
@article{journals/tit/KnudsenP02,
title = {Construction of secure and fast hash functions using nonbinary error-correcting codes.},
year = {2002},
journal = {IEEE Trans. Inf. Theory},
author = {{Lars R. Knudsen} and {Bart Preneel}}
}
@inproceedings{conf/acns/NikovNP03,
title = {Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case.},
year = {2003},
booktitle = {ACNS},
author = {{Ventzislav Nikov} and {Svetla Nikova} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Applied Cryptography and Network Security, First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings}
}
@inproceedings{conf/asap/OrsBPV03,
title = {Hardware Implementation of an Elliptic Curve Processor over GF(p).},
year = {2003},
booktitle = {ASAP},
author = {{Siddika Berna Örs} and {Lejla Batina} and {Bart Preneel} and {Joos Vandewalle}},
publisher = {IEEE Computer Society},
booktitle = {14th IEEE International Conference on Application-Specific Systems, Architectures, and Processors (ASAP 2003), 24-26 June 2003, The Hague, The Netherlands}
}
@inproceedings{conf/asiacrypt/RompayBPV03,
title = {Cryptanalysis of 3-Pass HAVAL.},
year = {2003},
booktitle = {ASIACRYPT},
author = {{Bart Van Rompay} and {Alex Biryukov} and {Bart Preneel} and {Joos Vandewalle}},
publisher = {Springer},
booktitle = {Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings}
}
@inproceedings{conf/ches/OrsOP03,
title = {Power-Analysis Attacks on an FPGA - First Experimental Results.},
year = {2003},
booktitle = {CHES},
author = {{Siddika Berna Örs} and {Elisabeth Oswald} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings}
}
@inproceedings{conf/eurocrypt/BiryukovCBP03,
title = {A Toolbox for Cryptanalysis: Linear and Affine Equivalence Algorithms.},
year = {2003},
booktitle = {EUROCRYPT},
author = {{Alex Biryukov} and {Christophe De Cannière} and {An Braeken} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Advances in Cryptology - EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings}
}
@inproceedings{conf/fse/BabbageCLPV03,
title = {Cryptanalysis of SOBER-t32.},
year = {2003},
booktitle = {FSE},
author = {{Steve Babbage} and {Christophe De Cannière} and {Joseph Lano} and {Bart Preneel} and {Joos Vandewalle}},
publisher = {Springer},
booktitle = {Fast Software Encryption, 10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 2003, Revised Papers}
}
@inproceedings{conf/fse/HongKPR03,
title = {A Concrete Security Analysis for 3GPP-MAC.},
year = {2003},
booktitle = {FSE},
author = {{Dowon Hong} and {Ju-Sung Kang} and {Bart Preneel} and {Heuisu Ryu}},
publisher = {Springer},
booktitle = {Fast Software Encryption, 10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 2003, Revised Papers}
}
@inproceedings{conf/ima/BorissovBNP03,
title = {On the Covering Radius of Second Order Binary Reed-Muller Code in the Set of Resilient Boolean Functions.},
year = {2003},
booktitle = {IMACC},
author = {{Yuri L. Borissov} and {An Braeken} and {Svetla Nikova} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Cryptography and Coding, 9th IMA International Conference, Cirencester, UK, December 16-18, 2003, Proceedings}
}
@inproceedings{conf/indocrypt/NikovNP03,
title = {On Multiplicative Linear Secret Sharing Schemes.},
year = {2003},
booktitle = {INDOCRYPT},
author = {{Ventzislav Nikov} and {Svetla Nikova} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Progress in Cryptology - INDOCRYPT 2003, 4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings}
}
@inproceedings{conf/indocrypt/PaulP03,
title = {Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator.},
year = {2003},
booktitle = {INDOCRYPT},
author = {{Souradyuti Paul} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Progress in Cryptology - INDOCRYPT 2003, 4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings}
}
@inproceedings{conf/ipps/OrsBPV03,
title = {Hardware Implementation of a Montgomery Modular Multiplier in a Systolic Array.},
year = {2003},
booktitle = {IPDPS},
author = {{Siddika Berna Örs} and {Lejla Batina} and {Bart Preneel} and {Joos Vandewalle}},
publisher = {IEEE Computer Society},
booktitle = {17th International Parallel and Distributed Processing Symposium (IPDPS 2003), 22-26 April 2003, Nice, France, CD-ROM/Abstracts Proceedings}
}
@inproceedings{conf/wisa/NakaharaRPV03,
title = {The MESH Block Ciphers.},
year = {2003},
booktitle = {WISA},
author = {{Jorge Nakahara Jr.} and {Vincent Rijmen} and {Bart Preneel} and {Joos Vandewalle}},
publisher = {Springer},
booktitle = {Information Security Applications, 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers}
}
@article{journals/comcom/IliadisGSCPG03,
title = {Towards a framework for evaluating certificate status information mechanisms.},
year = {2003},
journal = {Comput. Commun.},
author = {{John Iliadis} and {Stefanos Gritzalis} and {Diomidis Spinellis} and {Danny De Cock} and {Bart Preneel} and {Dimitris Gritzalis}}
}
@article{journals/dud/DiazCP03,
title = {APES - Anonymity and Privacy in Electronic Services.},
year = {2003},
journal = {Datenschutz und Datensicherheit},
author = {{Claudia Díaz} and {Joris Claessens} and {Bart Preneel}}
}
@article{journals/iacr/BiryukovLP03,
title = {Cryptanalysis of the Alleged SecurID Hash Function.},
year = {2003},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Alex Biryukov} and {Joseph Lano} and {Bart Preneel}}
}
@article{journals/iacr/NikovNP03,
title = {Multi-Party Computation from any Linear Secret Sharing Scheme Secure against Adaptive Adversary: The Zero-Error Case.},
year = {2003},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Ventzislav Nikov} and {Svetla Nikova} and {Bart Preneel}}
}
@article{journals/integration/BatinaOPV03,
title = {Hardware architectures for public key cryptography.},
year = {2003},
journal = {Integr.},
author = {{Lejla Batina} and {Siddika Berna Örs} and {Bart Preneel} and {Joos Vandewalle}}
}
@article{journals/intr/ClaessensDGDPV03,
title = {Revocable anonymous access to the Internet?},
year = {2003},
journal = {Internet Res.},
author = {{Joris Claessens} and {Claudia Díaz} and {Caroline Goemans} and {Jos Dumortier} and {Bart Preneel} and {Joos Vandewalle}}
}
@article{journals/tit/QuisquaterPV03,
title = {A new inequality in discrete Fourier theory.},
year = {2003},
journal = {IEEE Trans. Inf. Theory},
author = {{Michaël Quisquater} and {Bart Preneel} and {Joos Vandewalle}}
}
@article{journals/toit/ClaessensPV03,
title = {(How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions.},
year = {2003},
journal = {ACM Trans. Internet Techn.},
author = {{Joris Claessens} and {Bart Preneel} and {Joos Vandewalle}}
}
@inproceedings{conf/acisp/NakaharaPV04,
title = {The Biryukov-Demirci Attack on Reduced-Round Versions of IDEA and MESH Ciphers.},
year = {2004},
booktitle = {ACISP},
author = {{Jorge Nakahara Jr.} and {Bart Preneel} and {Joos Vandewalle}},
publisher = {Springer},
booktitle = {Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings}
}
@inproceedings{conf/asiacrypt/HongPL04,
title = {Higher Order Universal One-Way Hash Functions.},
year = {2004},
booktitle = {ASIACRYPT},
author = {{Deukjo Hong} and {Bart Preneel} and {Sangjin Lee 002}},
publisher = {Springer},
booktitle = {Advances in Cryptology - ASIACRYPT 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings}
}
@inproceedings{conf/asiacrypt/ShiraiP04,
title = {On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds.},
year = {2004},
booktitle = {ASIACRYPT},
author = {{Taizo Shirai} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Advances in Cryptology - ASIACRYPT 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings}
}
@inproceedings{conf/ches/StandaertOP04,
title = {Power Analysis of an FPGA: Implementation of Rijndael: Is Pipelining a DPA Countermeasure?},
year = {2004},
booktitle = {CHES},
author = {{François-Xavier Standaert} and {Siddika Berna Örs} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings}
}
@inproceedings{conf/cms/CockWSSP04,
title = {Threat Modelling for Security Tokens in Web Applications.},
year = {2004},
booktitle = {Communications and Multimedia Security},
author = {{Danny De Cock} and {Karel Wouters} and {Dries Schellekens} and {Dave Singelée} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Communications and Multimedia Security - 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15-18, 2004, Windermere, The Lake District, United Kingdom}
}
@inproceedings{conf/europki/CockWP04,
title = {Introduction to the Belgian EID Card: BELPIC.},
year = {2004},
booktitle = {EuroPKI},
author = {{Danny De Cock} and {Karel Wouters} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Public Key Infrastructure, First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings}
}
@inproceedings{conf/fpl/StandaertOQP04,
title = {Power Analysis Attacks Against FPGA Implementations of the DES.},
year = {2004},
booktitle = {FPL},
author = {{François-Xavier Standaert} and {Siddika Berna Örs} and {Jean-Jacques Quisquater} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Field Programmable Logic and Application, 14th International Conference , FPL 2004, Leuven, Belgium, August 30-September 1, 2004, Proceedings}
}
@inproceedings{conf/fse/PaulP04,
title = {A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher.},
year = {2004},
booktitle = {FSE},
author = {{Souradyuti Paul} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Fast Software Encryption, 11th International Workshop, FSE 2004, Delhi, India, February 5-7, 2004, Revised Papers}
}
@inproceedings{conf/glvlsi/MentensOP04,
title = {An FPGA implementation of an elliptic curve processor GF(2m).},
year = {2004},
booktitle = {ACM Great Lakes Symposium on VLSI},
author = {{Nele Mentens} and {Siddika Berna Örs} and {Bart Preneel}},
publisher = {ACM},
booktitle = {Proceedings of the 14th ACM Great Lakes Symposium on VLSI 2004, Boston, MA, USA, April 26-28, 2004}
}
@inproceedings{conf/icics/NikovNP04,
title = {Robust Metering Schemes for General Access Structures.},
year = {2004},
booktitle = {ICICS},
author = {{Ventzislav Nikov} and {Svetla Nikova} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004, Proceedings}
}
@inproceedings{conf/ifip11/DiazP04,
title = {Taxonomy of Mixes and Dummy Traffic.},
year = {2004},
booktitle = {International Information Security Workshops},
author = {{Claudia Díaz} and {Bart Preneel}},
publisher = {Kluwer},
booktitle = {Information Security Management, Education and Privacy, IFIP 18th World Computer Congress, TC11 19th International Information Security Workshops, 22-27 August 2004, Toulouse, France}
}
@inproceedings{conf/ifipTCS/BraekenWP04,
title = {A Randomised Algorithm for Checking the Normality of Cryptographic Boolean Functions.},
year = {2004},
booktitle = {IFIP TCS},
author = {{An Braeken} and {Christopher Wolf} and {Bart Preneel}},
publisher = {Kluwer/Springer},
booktitle = {Exploring New Frontiers of Theoretical Informatics, IFIP 18th World Computer Congress, TC1 3rd International Conference on Theoretical Computer Science (TCS2004), 22-27 August 2004, Toulouse, France}
}
@inproceedings{conf/ih/DiazP04,
title = {Reasoning About the Anonymity Provided by Pool Mixes That Generate Dummy Traffic.},
year = {2004},
booktitle = {Information Hiding},
author = {{Claudia Díaz} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Information Hiding, 6th International Workshop, IH 2004, Toronto, Canada, May 23-25, 2004, Revised Selected Papers}
}
@inproceedings{conf/itcc/OrsGOP04,
title = {Power-Analysis Attack on an ASIC AES implementation.},
year = {2004},
booktitle = {ITCC (2)},
author = {{Siddika Berna Örs} and {Frank K. Gürkaynak} and {Elisabeth Oswald} and {Bart Preneel}},
publisher = {IEEE Computer Society},
booktitle = {International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 2, April 5-7, 2004, Las Vegas, Nevada, USA}
}
@inproceedings{conf/scn/NikovNP04,
title = {On the Size of Monotone Span Programs.},
year = {2004},
booktitle = {SCN},
author = {{Ventzislav Nikov} and {Svetla Nikova} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Security in Communication Networks, 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers}
}
@inproceedings{conf/scn/Preneel04,
title = {ECRYPT: The Cryptographic Research Challenges for the Next Decade.},
year = {2004},
booktitle = {SCN},
author = {{Bart Preneel}},
publisher = {Springer},
booktitle = {Security in Communication Networks, 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers}
}
@inproceedings{conf/scn/YoshidaBCLP04,
title = {Non-randomness of the Full 4 and 5-Pass HAVAL.},
year = {2004},
booktitle = {SCN},
author = {{Hirotaka Yoshida} and {Alex Biryukov} and {Christophe De Cannière} and {Joseph Lano} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Security in Communication Networks, 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers}
}
@article{journals/cai/MentensOPV04,
title = {An FPGA Implementation of a Montgomery Multiplier Over GF(2^m).},
year = {2004},
journal = {Comput. Artif. Intell.},
author = {{Nele Mentens} and {Siddika Berna Örs} and {Bart Preneel} and {Joos Vandewalle}}
}
@article{journals/iacr/ArmknechtLP04,
title = {Extending the Resynchronization Attack.},
year = {2004},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Frederik Armknecht} and {Joseph Lano} and {Bart Preneel}}
}
@article{journals/iacr/BraekenBNP04,
title = {Classification of Boolean Functions of 6 Variables or Less with Respect to Cryptographic Properties.},
year = {2004},
journal = {IACR Cryptol. ePrint Arch.},
author = {{An Braeken} and {Yuri L. Borissov} and {Svetla Nikova} and {Bart Preneel}}
}
@article{journals/iacr/BraekenNNP04,
title = {On Boolean Functions with Generalized Cryptographic Properties.},
year = {2004},
journal = {IACR Cryptol. ePrint Arch.},
author = {{An Braeken} and {Ventzislav Nikov} and {Svetla Nikova} and {Bart Preneel}}
}
@article{journals/iacr/BraekenWP04,
title = {Classification of Highly Nonlinear Boolean Power Functions with a Randomised Algorithm for Checking Normality.},
year = {2004},
journal = {IACR Cryptol. ePrint Arch.},
author = {{An Braeken} and {Christopher Wolf} and {Bart Preneel}}
}
@article{journals/iacr/BraekenWP04a,
title = {A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes.},
year = {2004},
journal = {IACR Cryptol. ePrint Arch.},
author = {{An Braeken} and {Christopher Wolf} and {Bart Preneel}}
}
@article{journals/iacr/PaulP04,
title = {Solving Systems of Differential Equations of Addition.},
year = {2004},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Souradyuti Paul} and {Bart Preneel}}
}
@article{journals/iacr/WolfBP04,
title = {Efficient Cryptanalysis of RSE(2)PKC and RSSE(2)PKC.},
year = {2004},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Christopher Wolf} and {An Braeken} and {Bart Preneel}}
}
@article{journals/iacr/WolfP04,
title = {Asymmetric Cryptography: Hidden Field Equations.},
year = {2004},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Christopher Wolf} and {Bart Preneel}}
}
@article{journals/iacr/WolfP04a,
title = {Applications of Multivariate Quadratic Public Key Systems.},
year = {2004},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Christopher Wolf} and {Bart Preneel}}
}
@article{journals/iacr/WolfP04b,
title = {Equivalent Keys in HFE, C*, and variations.},
year = {2004},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Christopher Wolf} and {Bart Preneel}}
}
@article{journals/iacr/WolfP04c,
title = {Superfluous Keys in Multivariate Quadratic Asymmetric Systems.},
year = {2004},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Christopher Wolf} and {Bart Preneel}}
}
@article{journals/ieicet/WatanabeFYTP04,
title = {A New Keystream Generator MUGI.},
year = {2004},
journal = {IEICE Trans. Fundam. Electron. Commun. Comput. Sci.},
author = {{Dai Watanabe} and {Soichi Furuya} and {Hirotaka Yoshida} and {Kazuo Takaragi} and {Bart Preneel}}
}
@inproceedings{conf/asap/BatinaMPV05,
title = {Side-channel aware design: Algorithms and Architectures for Elliptic Curve Cryptography over GF(2n).},
year = {2005},
booktitle = {ASAP},
author = {{Lejla Batina} and {Nele Mentens} and {Bart Preneel} and {Ingrid Verbauwhede}},
publisher = {IEEE Computer Society},
booktitle = {16th IEEE International Conference on Application-Specific Systems, Architectures, and Processors (ASAP 2005), 23-25 July 2005, Samos, Greece}
}
@inproceedings{conf/ches/BatinaHHPV05,
title = {Hardware/Software Co-design for Hyperelliptic Curve Cryptography (HECC) on the 8051µP.},
year = {2005},
booktitle = {CHES},
author = {{Lejla Batina} and {David Hwang 001} and {Alireza Hodjat} and {Bart Preneel} and {Ingrid Verbauwhede}},
publisher = {Springer},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}
}
@inproceedings{conf/ctrsa/MentensBPV05,
title = {A Systematic Evaluation of Compact Hardware Implementations for the Rijndael S-Box.},
year = {2005},
booktitle = {CT-RSA},
author = {{Nele Mentens} and {Lejla Batina} and {Bart Preneel} and {Ingrid Verbauwhede}},
publisher = {Springer},
booktitle = {Topics in Cryptology - CT-RSA 2005, The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings}
}
@inproceedings{conf/fse/HongKLP05,
title = {Related-Key Rectangle Attacks on Reduced Versions of SHACAL-1 and AES-192.},
year = {2005},
booktitle = {FSE},
author = {{Seokhie Hong} and {Jongsung Kim} and {Sangjin Lee 002} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers}
}
@inproceedings{conf/icalp/BraekenBNP05,
title = {Classification of Boolean Functions of 6 Variables or Less with Respect to Some Cryptographic Properties.},
year = {2005},
booktitle = {ICALP},
author = {{An Braeken} and {Yuri L. Borissov} and {Svetla Nikova} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Automata, Languages and Programming, 32nd International Colloquium, ICALP 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings}
}
@inproceedings{conf/icdcsw/SeysP05,
title = {The Wandering Nodes: Key Management for Low-Power Mobile Ad Hoc Networks.},
year = {2005},
booktitle = {ICDCS Workshops},
author = {{Stefaan Seys} and {Bart Preneel}},
publisher = {IEEE Computer Society},
booktitle = {25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 6-10 June 2005, Columbus, OH, USA}
}
@inproceedings{conf/ima/BraekenP05,
title = {Probabilistic Algebraic Attacks.},
year = {2005},
booktitle = {IMACC},
author = {{An Braeken} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Cryptography and Coding, 10th IMA International Conference, Cirencester, UK, December 19-21, 2005, Proceedings}
}
@inproceedings{conf/ima/BraekenWP05,
title = {Normality of Vectorial Functions.},
year = {2005},
booktitle = {IMACC},
author = {{An Braeken} and {Christopher Wolf} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Cryptography and Coding, 10th IMA International Conference, Cirencester, UK, December 19-21, 2005, Proceedings}
}
@inproceedings{conf/indocrypt/PaulP05,
title = {Near Optimal Algorithms for Solving Differential Equations of Addition with Batch Queries.},
year = {2005},
booktitle = {INDOCRYPT},
author = {{Souradyuti Paul} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Progress in Cryptology - INDOCRYPT 2005, 6th International Conference on Cryptology in India, Bangalore, India, December 10-12, 2005, Proceedings}
}
@inproceedings{conf/mass/SingeleeP05,
title = {Location verification using secure distance bounding protocols.},
year = {2005},
booktitle = {MASS},
author = {{Dave Singelée} and {Bart Preneel}},
publisher = {IEEE Computer Society},
booktitle = {IEEE 2nd International Conference on Mobile Adhoc and Sensor Systems, MASS 2005, November 7-10, 2005, The City Center Hotel, Washington, USA}
}
@inproceedings{conf/pkc/WolfP05,
title = {Large Superfluous Keys in Multivariate Quadratic Asymmetric Systems.},
year = {2005},
booktitle = {Public Key Cryptography},
author = {{Christopher Wolf} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Public Key Cryptography - PKC 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings}
}
@inproceedings{conf/spc/SeysP05,
title = {Efficient Cooperative Signatures: A Novel Authentication Scheme for Sensor Networks.},
year = {2005},
booktitle = {SPC},
author = {{Stefaan Seys} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Security in Pervasive Computing, Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings}
}
@inproceedings{conf/wimob/SeysP05,
title = {Power consumption evaluation of efficient digital signature schemes for low power devices.},
year = {2005},
booktitle = {WiMob (1)},
author = {{Stefaan Seys} and {Bart Preneel}},
publisher = {IEEE},
booktitle = {2005 IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, WiMob 2005, Montreal, Canada, August 22-14, 2005, Volume 1}
}
@article{journals/compsec/BiryukovLP05,
title = {Recent attacks on alleged SecurID and their practical implications.},
year = {2005},
journal = {Comput. Secur.},
author = {{Alex Biryukov} and {Joseph Lano} and {Bart Preneel}}
}
@article{journals/ejasp/CanniereLP05,
title = {Cryptanalysis of the Two-Dimensional Circulation Encryption Algorithm.},
year = {2005},
journal = {EURASIP J. Adv. Signal Process.},
author = {{Christophe De Cannière} and {Joseph Lano} and {Bart Preneel}}
}
@article{journals/iacr/BraekenP05,
title = {On the Algebraic Immunity of Symmetric Boolean Functions.},
year = {2005},
journal = {IACR Cryptol. ePrint Arch.},
author = {{An Braeken} and {Bart Preneel}}
}
@article{journals/iacr/KimBPL05,
title = {On the Security of Encryption Modes of MD4, MD5 and HAVAL.},
year = {2005},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Jongsung Kim} and {Alex Biryukov} and {Bart Preneel} and {Sangjin Lee 002}}
}
@article{journals/iacr/PaulP05,
title = {On the (In)security of Stream Ciphers Based on Arrays and Modular Addition (Full Version).},
year = {2005},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Souradyuti Paul} and {Bart Preneel}}
}
@article{journals/iacr/WolfP05,
title = {Taxonomy of Public Key Schemes based on the problem of Multivariate Quadratic equations.},
year = {2005},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Christopher Wolf} and {Bart Preneel}}
}
@article{journals/iacr/WolfP05a,
title = {Equivalent Keys in Multivariate Quadratic Public Key Systems.},
year = {2005},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Christopher Wolf} and {Bart Preneel}}
}
@article{journals/ijnsec/SingeleeP05,
title = {The Wireless Application Protocol.},
year = {2005},
journal = {Int. J. Netw. Secur.},
author = {{Dave Singelée} and {Bart Preneel}}
}
@article{journals/ipl/QuisquaterPV05,
title = {Spectral characterization of cryptographic Boolean functions satisfying the (extended) propagation criterion of degree l and order k.},
year = {2005},
journal = {Inf. Process. Lett.},
author = {{Michaël Quisquater} and {Bart Preneel} and {Joos Vandewalle}}
}
@article{journals/tit/YuBorissovBNP05,
title = {On the covering radii of binary Reed-Muller codes in the set of resilient Boolean functions.},
year = {2005},
journal = {IEEE Trans. Inf. Theory},
author = {{Yuri L. Borissov} and {An Braeken} and {Svetla Nikova} and {Bart Preneel}}
}
@incollection{reference/crypt/Preneel05,
title = {CBC-MAC and Variants.},
year = {2005},
booktitle = {Encyclopedia of Cryptography and Security},
author = {{Bart Preneel}},
publisher = {Springer},
booktitle = {Encyclopedia of Cryptography and Security}
}
@incollection{reference/crypt/Preneel05a,
title = {Collision Attack.},
year = {2005},
booktitle = {Encyclopedia of Cryptography and Security},
author = {{Bart Preneel}},
publisher = {Springer},
booktitle = {Encyclopedia of Cryptography and Security}
}
@incollection{reference/crypt/Preneel05b,
title = {Collision resistance.},
year = {2005},
booktitle = {Encyclopedia of Cryptography and Security},
author = {{Bart Preneel}},
publisher = {Springer},
booktitle = {Encyclopedia of Cryptography and Security}
}
@incollection{reference/crypt/Preneel05c,
title = {Correcting-block attack.},
year = {2005},
booktitle = {Encyclopedia of Cryptography and Security},
author = {{Bart Preneel}},
publisher = {Springer},
booktitle = {Encyclopedia of Cryptography and Security}
}
@incollection{reference/crypt/Preneel05d,
title = {Davies-Meyer Hash Function.},
year = {2005},
booktitle = {Encyclopedia of Cryptography and Security},
author = {{Bart Preneel}},
publisher = {Springer},
booktitle = {Encyclopedia of Cryptography and Security}
}
@incollection{reference/crypt/Preneel05e,
title = {Hash functions.},
year = {2005},
booktitle = {Encyclopedia of Cryptography and Security},
author = {{Bart Preneel}},
publisher = {Springer},
booktitle = {Encyclopedia of Cryptography and Security}
}
@incollection{reference/crypt/Preneel05f,
title = {HMAC.},
year = {2005},
booktitle = {Encyclopedia of Cryptography and Security},
author = {{Bart Preneel}},
publisher = {Springer},
booktitle = {Encyclopedia of Cryptography and Security}
}
@incollection{reference/crypt/Preneel05g,
title = {Maa.},
year = {2005},
booktitle = {Encyclopedia of Cryptography and Security},
author = {{Bart Preneel}},
publisher = {Springer},
booktitle = {Encyclopedia of Cryptography and Security}
}
@incollection{reference/crypt/Preneel05h,
title = {MAC Algorithms.},
year = {2005},
booktitle = {Encyclopedia of Cryptography and Security},
author = {{Bart Preneel}},
publisher = {Springer},
booktitle = {Encyclopedia of Cryptography and Security}
}
@incollection{reference/crypt/Preneel05i,
title = {Mash Hash Functions (Modular Arithmetic Secure Hash).},
year = {2005},
booktitle = {Encyclopedia of Cryptography and Security},
author = {{Bart Preneel}},
publisher = {Springer},
booktitle = {Encyclopedia of Cryptography and Security}
}
@incollection{reference/crypt/Preneel05j,
title = {MDC-2 and MDC-4.},
year = {2005},
booktitle = {Encyclopedia of Cryptography and Security},
author = {{Bart Preneel}},
publisher = {Springer},
booktitle = {Encyclopedia of Cryptography and Security}
}
@incollection{reference/crypt/Preneel05k,
title = {Modes of Operation of a Block Cipher.},
year = {2005},
booktitle = {Encyclopedia of Cryptography and Security},
author = {{Bart Preneel}},
publisher = {Springer},
booktitle = {Encyclopedia of Cryptography and Security}
}
@incollection{reference/crypt/Preneel05l,
title = {NESSIE Project.},
year = {2005},
booktitle = {Encyclopedia of Cryptography and Security},
author = {{Bart Preneel}},
publisher = {Springer},
booktitle = {Encyclopedia of Cryptography and Security}
}
@incollection{reference/crypt/Preneel05m,
title = {PMAC.},
year = {2005},
booktitle = {Encyclopedia of Cryptography and Security},
author = {{Bart Preneel}},
publisher = {Springer},
booktitle = {Encyclopedia of Cryptography and Security}
}
@incollection{reference/crypt/Preneel05n,
title = {Preimage Resistance.},
year = {2005},
booktitle = {Encyclopedia of Cryptography and Security},
author = {{Bart Preneel}},
publisher = {Springer},
booktitle = {Encyclopedia of Cryptography and Security}
}
@incollection{reference/crypt/Preneel05o,
title = {Second preimage resistance.},
year = {2005},
booktitle = {Encyclopedia of Cryptography and Security},
author = {{Bart Preneel}},
publisher = {Springer},
booktitle = {Encyclopedia of Cryptography and Security}
}
@incollection{reference/crypt/Preneel05p,
title = {Universal One-Way Hash Functions.},
year = {2005},
booktitle = {Encyclopedia of Cryptography and Security},
author = {{Bart Preneel}},
publisher = {Springer},
booktitle = {Encyclopedia of Cryptography and Security}
}
@inproceedings{conf/acisp/BraekenLP06,
title = {Evaluating the Resistance of Stream Ciphers with Linear Feedback Against Fast Algebraic Attacks.},
year = {2006},
booktitle = {ACISP},
author = {{An Braeken} and {Joseph Lano} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Information Security and Privacy, 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings}
}
@inproceedings{conf/adhoc-now/SingeleeP06,
title = {Improved Pairing Protocol for Bluetooth.},
year = {2006},
booktitle = {ADHOC-NOW},
author = {{Dave Singelée} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Ad-Hoc, Mobile, and Wireless Networks, 5th International Conference, ADHOC-NOW 2006, Ottawa, Canada, August 17-19, 2006, Proceedings}
}
@inproceedings{conf/arc/MentensBPV06,
title = {Time-Memory Trade-Off Attack on FPGA Platforms: UNIX Password Cracking.},
year = {2006},
booktitle = {ARC},
author = {{Nele Mentens} and {Lejla Batina} and {Bart Preneel} and {Ingrid Verbauwhede}},
publisher = {Springer},
booktitle = {Reconfigurable Computing: Architectures and Applications, Second International Workshop, ARC 2006, Delft, The Netherlands, March 1-3, 2006, Revised Selected Papers}
}
@inproceedings{conf/arc/SakiyamaMBPV06,
title = {Reconfigurable Modular Arithmetic Logic Unit for High-Performance Public-Key Cryptosystems.},
year = {2006},
booktitle = {ARC},
author = {{Kazuo Sakiyama} and {Nele Mentens} and {Lejla Batina} and {Bart Preneel} and {Ingrid Verbauwhede}},
publisher = {Springer},
booktitle = {Reconfigurable Computing: Architectures and Applications, Second International Workshop, ARC 2006, Delft, The Netherlands, March 1-3, 2006, Revised Selected Papers}
}
@inproceedings{conf/asiacrypt/NikovNP06,
title = {A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols.},
year = {2006},
booktitle = {ASIACRYPT},
author = {{Ventzislav Nikov} and {Svetla Nikova} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings}
}
@inproceedings{conf/asiacrypt/PaulP06,
title = {On the (In)security of Stream Ciphers Based on Arrays and Modular Addition.},
year = {2006},
booktitle = {ASIACRYPT},
author = {{Souradyuti Paul} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings}
}
@inproceedings{conf/ches/SakiyamaBPV06,
title = {Superscalar Coprocessor for High-Speed Curve-Based Cryptography.},
year = {2006},
booktitle = {CHES},
author = {{Kazuo Sakiyama} and {Lejla Batina} and {Bart Preneel} and {Ingrid Verbauwhede}},
publisher = {Springer},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings}
}
@inproceedings{conf/esas/BatinaMSPV06,
title = {Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks.},
year = {2006},
booktitle = {ESAS},
author = {{Lejla Batina} and {Nele Mentens} and {Kazuo Sakiyama} and {Bart Preneel} and {Ingrid Verbauwhede}},
publisher = {Springer},
booktitle = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers}
}
@inproceedings{conf/fpl/MentensSBVP06,
title = {Fpga-Oriented Secure Data Path Design: Implementation of a Public Key Coprocessor.},
year = {2006},
booktitle = {FPL},
author = {{Nele Mentens} and {Kazuo Sakiyama} and {Lejla Batina} and {Ingrid Verbauwhede} and {Bart Preneel}},
publisher = {IEEE},
booktitle = {Proceedings of the 2006 International Conference on Field Programmable Logic and Applications (FPL), Madrid, Spain, August 28-30, 2006}
}
@inproceedings{conf/fpl/SchellekensPV06,
title = {FPGA Vendor Agnostic True Random Number Generator.},
year = {2006},
booktitle = {FPL},
author = {{Dries Schellekens} and {Bart Preneel} and {Ingrid Verbauwhede}},
publisher = {IEEE},
booktitle = {Proceedings of the 2006 International Conference on Field Programmable Logic and Applications (FPL), Madrid, Spain, August 28-30, 2006}
}
@inproceedings{conf/fse/PaulPS06,
title = {Distinguishing Attacks on the Stream Cipher Py.},
year = {2006},
booktitle = {FSE},
author = {{Souradyuti Paul} and {Bart Preneel} and {Gautham Sekar}},
publisher = {Springer},
booktitle = {Fast Software Encryption, 13th International Workshop, FSE 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers}
}
@inproceedings{conf/fse/WuP06,
title = {Cryptanalysis of the Stream Cipher DECIM.},
year = {2006},
booktitle = {FSE},
author = {{Hongjun Wu 001} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Fast Software Encryption, 13th International Workshop, FSE 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers}
}
@inproceedings{conf/fse/WuP06a,
title = {Resynchronization Attacks on WG and LEX.},
year = {2006},
booktitle = {FSE},
author = {{Hongjun Wu 001} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Fast Software Encryption, 13th International Workshop, FSE 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers}
}
@inproceedings{conf/icassp/SakiyamaMPV06,
title = {A Parallel Processing Hardware Architecture for Elliptic Curve Cryptosystems.},
year = {2006},
booktitle = {ICASSP (3)},
author = {{Kazuo Sakiyama} and {Elke De Mulder} and {Bart Preneel} and {Ingrid Verbauwhede}},
publisher = {IEEE},
booktitle = {2006 IEEE International Conference on Acoustics Speech and Signal Processing, ICASSP 2006, Toulouse, France, May 14-19, 2006}
}
@inproceedings{conf/iih-msp/WengWP06,
title = {Extending the Selective MPEG Encryption Algorithm PVEA.},
year = {2006},
booktitle = {IIH-MSP},
author = {{Li Weng} and {Karel Wouters} and {Bart Preneel}},
publisher = {IEEE Computer Society},
booktitle = {Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), Pasadena, California, USA, December 18-20, 2006, Proceedings}
}
@inproceedings{conf/indocrypt/MendelPRYW06,
title = {Update on Tiger.},
year = {2006},
booktitle = {INDOCRYPT},
author = {{Florian Mendel} and {Bart Preneel} and {Vincent Rijmen} and {Hirotaka Yoshida} and {Dai Watanabe}},
publisher = {Springer},
booktitle = {Progress in Cryptology - INDOCRYPT 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings}
}
@inproceedings{conf/iscas/BatinaMPV06,
title = {Flexible hardware architectures for curve-based cryptography.},
year = {2006},
booktitle = {ISCAS},
author = {{Lejla Batina} and {Nele Mentens} and {Bart Preneel} and {Ingrid Verbauwhede}},
publisher = {IEEE},
booktitle = {International Symposium on Circuits and Systems (ISCAS 2006), 21-24 May 2006, Island of Kos, Greece}
}
@inproceedings{conf/iscas/SakiyamaPV06,
title = {A fast dual-field modular arithmetic logic unit and its hardware implementation.},
year = {2006},
booktitle = {ISCAS},
author = {{Kazuo Sakiyama} and {Bart Preneel} and {Ingrid Verbauwhede}},
publisher = {IEEE},
booktitle = {International Symposium on Circuits and Systems (ISCAS 2006), 21-24 May 2006, Island of Kos, Greece}
}
@inproceedings{conf/sacrypt/HandschuhP06,
title = {Blind Differential Cryptanalysis for Enhanced Power Attacks.},
year = {2006},
booktitle = {Selected Areas in Cryptography},
author = {{Helena Handschuh} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Selected Areas in Cryptography, 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers}
}
@inproceedings{conf/sacrypt/WuP06,
title = {Cryptanalysis of the Stream Cipher ABC v2.},
year = {2006},
booktitle = {Selected Areas in Cryptography},
author = {{Hongjun Wu 001} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Selected Areas in Cryptography, 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers}
}
@inproceedings{conf/scn/KimBPH06,
title = {On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract).},
year = {2006},
booktitle = {SCN},
author = {{Jongsung Kim} and {Alex Biryukov} and {Bart Preneel} and {Seokhie Hong}},
publisher = {Springer},
booktitle = {Security and Cryptography for Networks, 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006, Proceedings}
}
@inproceedings{conf/serp/MadouABBCP06,
title = {On the Effectiveness of Source Code Transformations for Binary Obfuscation.},
year = {2006},
booktitle = {Software Engineering Research and Practice},
author = {{Matias Madou} and {Bertrand Anckaert} and {Bruno De Bus} and {Koen De Bosschere} and {Jan Cappaert} and {Bart Preneel}},
publisher = {CSREA Press},
booktitle = {Proceedings of the International Conference on Software Engineering Research and Practice & Conference on Programming Languages and Compilers, SERP 2006, Las Vegas, Nevada, USA, June 26-29, 2006, Volume 2}
}
@inproceedings{conf/sicherheit/CockWP06,
title = {The Belgian Electronic Identity Card (Overview).},
year = {2006},
booktitle = {Sicherheit},
author = {{Danny De Cock} and {Christopher Wolf} and {Bart Preneel}},
publisher = {GI},
booktitle = {Sicherheit 2006: Sicherheit - Schutz und Zuverlässigkeit, Beiträge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg}
}
@inproceedings{conf/ws/SingeleeP06,
title = {Location privacy in wireless personal area networks.},
year = {2006},
booktitle = {Workshop on Wireless Security},
author = {{Dave Singelée} and {Bart Preneel}},
publisher = {ACM},
booktitle = {Proceedings of the 2006 ACM Workshop on Wireless Security, Los Angeles, California, USA, September 29, 2006}
}
@article{journals/dcc/WolfBP06,
title = {On the security of stepwise triangular systems.},
year = {2006},
journal = {Des. Codes Cryptogr.},
author = {{Christopher Wolf} and {An Braeken} and {Bart Preneel}}
}
@article{journals/iacr/KimBPH06,
title = {On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1.},
year = {2006},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Jongsung Kim} and {Alex Biryukov} and {Bart Preneel} and {Seokhie Hong}}
}
@article{journals/pieee/CanniereBP06,
title = {An introduction to Block Cipher Cryptanalysis.},
year = {2006},
journal = {Proc. IEEE},
author = {{Christophe De Cannière} and {Alex Biryukov} and {Bart Preneel}}
}
@article{journals/tit/BraekenBNP06,
title = {Classification of cubic (n-4)-resilient Boolean functions.},
year = {2006},
journal = {IEEE Trans. Inf. Theory},
author = {{An Braeken} and {Yuri L. Borissov} and {Svetla Nikova} and {Bart Preneel}}
}
@incollection{books/sp/07/DiazP07,
title = {Accountable Anonymous Communication.},
year = {2007},
booktitle = {Security, Privacy, and Trust in Modern Data Management},
author = {{Claudia Díaz} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Security, Privacy, and Trust in Modern Data Management}
}
@inproceedings{conf/ccs/AnckaertMSBBP07,
title = {Program obfuscation: a quantitative approach.},
year = {2007},
booktitle = {QoP},
author = {{Bertrand Anckaert} and {Matias Madou} and {Bjorn De Sutter} and {Bruno De Bus} and {Koen De Bosschere} and {Bart Preneel}},
publisher = {ACM},
booktitle = {Proceedings of the 3th ACM Workshop on Quality of Protection, QoP 2007, Alexandria, VA, USA, October 29, 2007}
}
@inproceedings{conf/ches/YoshidaWOKWKP07,
title = {MAME: A Compression Function with Reduced Hardware Requirements.},
year = {2007},
booktitle = {CHES},
author = {{Hirotaka Yoshida} and {Dai Watanabe} and {Katsuyuki Okeya} and {Jun Kitahara} and {Hongjun Wu 001} and {Özgül Küçük} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings}
}
@inproceedings{conf/ctrsa/MendelLP07,
title = {Cryptanalysis of Reduced Variants of the FORK-256 Hash Function.},
year = {2007},
booktitle = {CT-RSA},
author = {{Florian Mendel} and {Joseph Lano} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Topics in Cryptology - CT-RSA 2007, The Cryptographers' Track at the RSA Conference 2007, San Francisco, CA, USA, February 5-9, 2007, Proceedings}
}
@inproceedings{conf/esas/SingeleeP07,
title = {Distance Bounding in Noisy Environments.},
year = {2007},
booktitle = {ESAS},
author = {{Dave Singelée} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007, Proceedings}
}
@inproceedings{conf/eurocrypt/WuP07,
title = {Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy.},
year = {2007},
booktitle = {EUROCRYPT},
author = {{Hongjun Wu 001} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings}
}
@inproceedings{conf/fse/KimHP07,
title = {Related-Key Rectangle Attacks on Reduced AES-192 and AES-256.},
year = {2007},
booktitle = {FSE},
author = {{Jongsung Kim} and {Seokhie Hong} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Fast Software Encryption, 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers}
}
@inproceedings{conf/fse/WuP07,
title = {Differential-Linear Attacks Against the Stream Cipher Phelix.},
year = {2007},
booktitle = {FSE},
author = {{Hongjun Wu 001} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Fast Software Encryption, 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers}
}
@inproceedings{conf/glvlsi/MentensSPV07,
title = {Efficient pipelining for modular multiplication architectures in prime fields.},
year = {2007},
booktitle = {ACM Great Lakes Symposium on VLSI},
author = {{Nele Mentens} and {Kazuo Sakiyama} and {Bart Preneel} and {Ingrid Verbauwhede}},
publisher = {ACM},
booktitle = {Proceedings of the 17th ACM Great Lakes Symposium on VLSI 2007, Stresa, Lago Maggiore, Italy, March 11-13, 2007}
}
@inproceedings{conf/glvlsi/SakiyamaMPV07,
title = {Side-channel resistant system-level design flow for public-key cryptography.},
year = {2007},
booktitle = {ACM Great Lakes Symposium on VLSI},
author = {{Kazuo Sakiyama} and {Elke De Mulder} and {Bart Preneel} and {Ingrid Verbauwhede}},
publisher = {ACM},
booktitle = {Proceedings of the 17th ACM Great Lakes Symposium on VLSI 2007, Stresa, Lago Maggiore, Italy, March 11-13, 2007}
}
@inproceedings{conf/icics/WanDBP07,
title = {n PAKE + : A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords.},
year = {2007},
booktitle = {ICICS},
author = {{Zhiguo Wan} and {Robert H. Deng} and {Feng Bao 001} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Information and Communications Security, 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007, Proceedings}
}
@inproceedings{conf/icmcs/WengP07,
title = {Attacking Some Perceptual Image Hash Algorithms.},
year = {2007},
booktitle = {ICME},
author = {{Li Weng} and {Bart Preneel}},
publisher = {IEEE Computer Society},
booktitle = {Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, ICME 2007, July 2-5, 2007, Beijing, China}
}
@inproceedings{conf/ih/TroncosoDDP07,
title = {Traffic Analysis Attacks on a Continuously-Observable Steganographic File System.},
year = {2007},
booktitle = {Information Hiding},
author = {{Carmela Troncoso} and {Claudia Díaz} and {Orr Dunkelman} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Information Hiding, 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers}
}
@inproceedings{conf/indocrypt/DunkelmanSP07,
title = {Improved Meet-in-the-Middle Attacks on Reduced-Round DES.},
year = {2007},
booktitle = {INDOCRYPT},
author = {{Orr Dunkelman} and {Gautham Sekar} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Progress in Cryptology - INDOCRYPT 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings}
}
@inproceedings{conf/indocrypt/SekarPP07,
title = {Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses.},
year = {2007},
booktitle = {INDOCRYPT},
author = {{Gautham Sekar} and {Souradyuti Paul} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Progress in Cryptology - INDOCRYPT 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings}
}
@inproceedings{conf/iscas/BatinaMSPV07,
title = {Public-Key Cryptography on the Top of a Needle.},
year = {2007},
booktitle = {ISCAS},
author = {{Lejla Batina} and {Nele Mentens} and {Kazuo Sakiyama} and {Bart Preneel} and {Ingrid Verbauwhede}},
publisher = {IEEE},
booktitle = {International Symposium on Circuits and Systems (ISCAS 2007), 27-20 May 2007, New Orleans, Louisiana, USA}
}
@inproceedings{conf/isw/DanezisDFKTP07,
title = {Efficient Negative Databases from Cryptographic Hash Functions.},
year = {2007},
booktitle = {ISC},
author = {{George Danezis} and {Claudia Díaz} and {Sebastian Faust} and {Emilia Käsper} and {Carmela Troncoso} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings}
}
@inproceedings{conf/mobiquitous/SingeleeP07,
title = {Key Establishment Using Secure Distance Bounding Protocols.},
year = {2007},
booktitle = {MobiQuitous},
author = {{Dave Singelée} and {Bart Preneel}},
publisher = {IEEE Computer Society},
booktitle = {4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), August 6-10, 2007, Philadelphia, PA, USA}
}
@inproceedings{conf/pet/KohlweissFFGP07,
title = {Efficient Oblivious Augmented Maps: Location-Based Services with a Payment Broker.},
year = {2007},
booktitle = {Privacy Enhancing Technologies},
author = {{Markulf Kohlweiss} and {Sebastian Faust} and {Lothar Fritsch} and {Bartek Gedrojc} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Privacy Enhancing Technologies, 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007, Revised Selected Papers}
}
@inproceedings{conf/samos/MentensSBPV07,
title = {A Side-channel Attack Resistant Programmable PKC Coprocessor for Embedded Applications.},
year = {2007},
booktitle = {ICSAMOS},
author = {{Nele Mentens} and {Kazuo Sakiyama} and {Lejla Batina} and {Bart Preneel} and {Ingrid Verbauwhede}},
publisher = {IEEE},
booktitle = {Proceedings of the 2007 International Conference on Embedded Computer Systems: Architectures, Modeling and Simulation (IC-SAMOS 2007), Samos, Greece, July 16-19, 2007}
}
@inproceedings{conf/sigmap/WengP07,
title = {On Encryption and Authentication of the DC DCT Coefficient.},
year = {2007},
booktitle = {SIGMAP},
author = {{Li Weng} and {Bart Preneel}},
publisher = {INSTICC Press},
booktitle = {SIGMAP 2007 - Proceedings of the Second International Conference on Signal Processing and Multimedia Applications, Barcelona, Spain, July 28-31, 2007, SIGMAP is part of ICETE - The International Joint Conference on e-Business and Telecommunications}
}
@inproceedings{conf/voteid/CockP07,
title = {Electronic Voting in Belgium: Past and Future.},
year = {2007},
booktitle = {VOTE-ID},
author = {{Danny De Cock} and {Bart Preneel}},
publisher = {Springer},
booktitle = {E-Voting and Identity, First International Conference, VOTE-ID 2007, Bochum, Germany, October 4-5, 2007, Revised Selected Papers}
}
@inproceedings{conf/weworc/IndesteegeP07,
title = {Preimages for Reduced-Round Tiger.},
year = {2007},
booktitle = {WEWoRC},
author = {{Sebastiaan Indesteege} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Research in Cryptology, Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers}
}
@inproceedings{conf/wpes/TroncosoDKP07,
title = {Pripayd: privacy friendly pay-as-you-drive insurance.},
year = {2007},
booktitle = {WPES},
author = {{Carmela Troncoso} and {George Danezis} and {Eleni Kosta} and {Bart Preneel}},
publisher = {ACM},
booktitle = {Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, WPES 2007, Alexandria, VA, USA, October 29, 2007}
}
@article{journals/cee/MulderOPV07,
title = {Differential power and electromagnetic attacks on a FPGA implementation of elliptic curve cryptosystems.},
year = {2007},
journal = {Comput. Electr. Eng.},
author = {{Elke De Mulder} and {Siddika Berna Örs} and {Bart Preneel} and {Ingrid Verbauwhede}}
}
@article{journals/cee/SakiyamaBPV07,
title = {HW/SW co-design for public-key cryptosystems on the 8051 micro-controller.},
year = {2007},
journal = {Comput. Electr. Eng.},
author = {{Kazuo Sakiyama} and {Lejla Batina} and {Bart Preneel} and {Ingrid Verbauwhede}}
}
@article{journals/cn/Preneel07,
title = {A survey of recent developments in cryptographic algorithms for smart cards.},
year = {2007},
journal = {Comput. Networks},
author = {{Bart Preneel}}
}
@inproceedings{journals/entcs/SchellekensWP08,
title = {Remote Attestation on Legacy Operating Systems With Trusted Platform Modules.},
year = {2007},
booktitle = {REM@ESORICS},
author = {{Dries Schellekens} and {Brecht Wyseur} and {Bart Preneel}},
publisher = {Elsevier},
booktitle = {Proceedings of the First International Workshop on Run Time Enforcement for Mobile and Distributed Systems, REM@ESORICS 2007, Dresden, Germany, September 27, 2007}
}
@article{journals/iacr/AndreevaNPS07,
title = {Seven-Property-Preserving Iterated Hashing: ROX.},
year = {2007},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Elena Andreeva 001} and {Gregory Neven} and {Bart Preneel} and {Thomas Shrimpton}}
}
@article{journals/iacr/SekarPP07,
title = {Weaknesses in the Pseudorandom Bit Generation Algorithms of the Stream Ciphers TPypy and TPy.},
year = {2007},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Gautham Sekar} and {Souradyuti Paul} and {Bart Preneel}}
}
@article{journals/iacr/SekarPP07a,
title = {New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py.},
year = {2007},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Gautham Sekar} and {Souradyuti Paul} and {Bart Preneel}}
}
@article{journals/iacr/SekarPP07b,
title = {New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B.},
year = {2007},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Gautham Sekar} and {Souradyuti Paul} and {Bart Preneel}}
}
@article{journals/iacr/WyseurMGP07,
title = {Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings.},
year = {2007},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Brecht Wyseur} and {Wil Michiels} and {Paul Gorissen} and {Bart Preneel}}
}
@article{journals/ijisec/BackesGP07,
title = {Preface.},
year = {2007},
journal = {Int. J. Inf. Sec.},
author = {{Michael Backes 001} and {Stefanos Gritzalis} and {Bart Preneel}}
}
@article{journals/monet/SakiyamaBPV07,
title = {High-performance Public-key Cryptoprocessor for Wireless Mobile Applications.},
year = {2007},
journal = {Mob. Networks Appl.},
author = {{Kazuo Sakiyama} and {Lejla Batina} and {Bart Preneel} and {Ingrid Verbauwhede}}
}
@article{journals/tc/SakiyamaBPV07,
title = {Multicore Curve-Based Cryptoprocessor with Reconfigurable Modular Arithmetic Logic Units over GF(2n).},
year = {2007},
journal = {IEEE Trans. Computers},
author = {{Kazuo Sakiyama} and {Lejla Batina} and {Bart Preneel} and {Ingrid Verbauwhede}}
}
@inproceedings{conf/IEEEares/WoutersSLP08,
title = {Secure and Privacy-Friendly Logging for eGovernment Services.},
year = {2008},
booktitle = {ARES},
author = {{Karel Wouters} and {Koen Simoens} and {Danny Lathouwers} and {Bart Preneel}},
publisher = {IEEE Computer Society},
booktitle = {Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain}
}
@inproceedings{conf/adhoc-now/SingeleeLBPSCPMB08,
title = {A Secure Cross-Layer Protocol for Multi-hop Wireless Body Area Networks.},
year = {2008},
booktitle = {ADHOC-NOW},
author = {{Dave Singelée} and {Benoît Latré} and {Bart Braem} and {Michaël Peeters} and {Marijke De Soete} and {Peter De Cleyn} and {Bart Preneel} and {Ingrid Moerman} and {Chris Blondia}},
publisher = {Springer},
booktitle = {Ad-hoc, Mobile and Wireless Networks, 7th International Conference, ADHOC-NOW 2008, Sophia-Antipolis, France, September 10-12, 2008, Proceedings}
}
@inproceedings{conf/africacrypt/CanniereKP08,
title = {Analysis of Grain's Initialization Algorithm.},
year = {2008},
booktitle = {AFRICACRYPT},
author = {{Christophe De Cannière} and {Özgül Küçük} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Progress in Cryptology - AFRICACRYPT 2008, First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings}
}
@inproceedings{conf/biosig/PeetersSCP08,
title = {Cross-Context Delegation through Identity Federation.},
year = {2008},
booktitle = {BIOSIG},
author = {{Roel Peeters} and {Koen Simoens} and {Danny De Cock} and {Bart Preneel}},
publisher = {GI},
booktitle = {BIOSIG 2008 - Proceedings of the Special Interest Group on Biometrics and Electronic Signatures, 11.-12. September 2008 in Darmstadt, Germany}
}
@inproceedings{conf/ches/GierlichsBTP08,
title = {Mutual Information Analysis.},
year = {2008},
booktitle = {CHES},
author = {{Benedikt Gierlichs} and {Lejla Batina} and {Pim Tuyls} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings}
}
@inproceedings{conf/cisc/Preneel08,
title = {The State of Hash Functions and the NIST SHA-3 Competition.},
year = {2008},
booktitle = {Inscrypt},
author = {{Bart Preneel}},
publisher = {Springer},
booktitle = {Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers}
}
@inproceedings{conf/crypto/HandschuhP08,
title = {Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms.},
year = {2008},
booktitle = {CRYPTO},
author = {{Helena Handschuh} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings}
}
@inproceedings{conf/esorics/DiazTP08,
title = {A Framework for the Analysis of Mix-Based Steganographic File Systems.},
year = {2008},
booktitle = {ESORICS},
author = {{Claudia Díaz} and {Carmela Troncoso} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings}
}
@inproceedings{conf/euc/ZhangGP08,
title = {Reliable Key Establishment Scheme Exploiting Unidirectional Links in Wireless Sensor Networks.},
year = {2008},
booktitle = {EUC (1)},
author = {{Yuanyuan Zhang 002} and {Dawu Gu} and {Bart Preneel}},
publisher = {IEEE Computer Society},
booktitle = {2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), Shanghai, China, December 17-20, 2008, Volume I}
}
@inproceedings{conf/eurocrypt/IndesteegeKDBP08,
title = {A Practical Attack on KeeLoq.},
year = {2008},
booktitle = {EUROCRYPT},
author = {{Sebastiaan Indesteege} and {Nathan Keller} and {Orr Dunkelman} and {Eli Biham} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings}
}
@inproceedings{conf/iciw/DengP08,
title = {On Secure and Anonymous Buyer-Seller Watermarking Protocol.},
year = {2008},
booktitle = {ICIW},
author = {{Mina Deng} and {Bart Preneel}},
publisher = {IEEE Computer Society},
booktitle = {Third International Conference on Internet and Web Applications and Services, ICIW 2008, 8-13 June 2008, Athens, Greece}
}
@inproceedings{conf/isecs/DengP08,
title = {Attacks on Two Buyer-Seller Watermarking Protocols and an Improvement for Revocable Anonymity.},
year = {2008},
booktitle = {ISECS},
author = {{Mina Deng} and {Bart Preneel}},
publisher = {IEEE Computer Society},
booktitle = {Proceedings of The International Symposium on Electronic Commerce and Security, ISECS 2008, August 3-5, 2008, Guangzhou, China}
}
@inproceedings{conf/ispec/CappaertPAMB08,
title = {Towards Tamper Resistant Code Encryption: Practice and Experience.},
year = {2008},
booktitle = {ISPEC},
author = {{Jan Cappaert} and {Bart Preneel} and {Bertrand Anckaert} and {Matias Madou} and {Koen De Bosschere}},
publisher = {Springer},
booktitle = {Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings}
}
@inproceedings{conf/isw/IndesteegeP08,
title = {Collisions for RC4-Hash.},
year = {2008},
booktitle = {ISC},
author = {{Sebastiaan Indesteege} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings}
}
@inproceedings{conf/otm/ParkPSZ08,
title = {IS 2008 PC Co-chairs' Message.},
year = {2008},
booktitle = {OTM Conferences (2)},
author = {{Jong Hyuk Park} and {Bart Preneel} and {Ravi S. Sandhu} and {André Zúquete}},
publisher = {Springer},
booktitle = {On the Move to Meaningful Internet Systems: OTM 2008, OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008, Monterrey, Mexico, November 9-14, 2008, Proceedings, Part II}
}
@inproceedings{conf/pet/TroncosoGPV08,
title = {Perfect Matching Disclosure Attacks.},
year = {2008},
booktitle = {Privacy Enhancing Technologies},
author = {{Carmela Troncoso} and {Benedikt Gierlichs} and {Bart Preneel} and {Ingrid Verbauwhede}},
publisher = {Springer},
booktitle = {Privacy Enhancing Technologies, 8th International Symposium, PETS 2008, Leuven, Belgium, July 23-25, 2008, Proceedings}
}
@inproceedings{conf/sacrypt/AndreevaP08,
title = {A Three-Property-Secure Hash Function.},
year = {2008},
booktitle = {Selected Areas in Cryptography},
author = {{Elena Andreeva 001} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Selected Areas in Cryptography, 15th International Workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers}
}
@inproceedings{conf/secrypt/Preneel08,
title = {Cryptographic Algorithms - Successes, Failures and Challenges.},
year = {2008},
booktitle = {SECRYPT},
author = {{Bart Preneel}},
publisher = {INSTICC Press},
booktitle = {SECRYPT 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications}
}
@inproceedings{conf/sigmap/DengWP08,
title = {Anonymous Buyer-Seller Watermarking Protocol wth Additive Homomorphism.},
year = {2008},
booktitle = {SIGMAP},
author = {{Mina Deng} and {Li Weng} and {Bart Preneel}},
publisher = {INSTICC Press},
booktitle = {SIGMAP 2008 - Proceedings of the International Conference on Signal Processing and Multimedia Applications, Porto, Portugal, July 26-29, 2008, SIGMAP is part of ICETE - The International Joint Conference on e-Business and Telecommunications}
}
@inproceedings{conf/storagess/TroncosoCP08,
title = {Improving secure long-term archival of digitally signed documents.},
year = {2008},
booktitle = {StorageSS},
author = {{Carmela Troncoso} and {Danny De Cock} and {Bart Preneel}},
publisher = {ACM},
booktitle = {Proceedings of the 2008 ACM Workshop On Storage Security And Survivability, StorageSS 2008, Alexandria, VA, USA, October 31, 2008}
}
@inproceedings{conf/trust/SchellekensTP08,
title = {Embedded Trusted Computing with Authenticated Non-volatile Memory.},
year = {2008},
booktitle = {TRUST},
author = {{Dries Schellekens} and {Pim Tuyls} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings}
}
@inproceedings{conf/wcnc/WanRLP08,
title = {Anonymous ID-Based Group Key Agreement for Wireless Networks.},
year = {2008},
booktitle = {WCNC},
author = {{Zhiguo Wan} and {Kui Ren 001} and {Wenjing Lou} and {Bart Preneel}},
publisher = {IEEE},
booktitle = {WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008 - April 3 2008, Las Vegas, Nevada, USA, Conference Proceedings}
}
@inproceedings{conf/wd/DengSCPJ08,
title = {Identity in federated electronic healthcare.},
year = {2008},
booktitle = {Wireless Days},
author = {{Mina Deng} and {Riccardo Scandariato} and {Danny De Cock} and {Bart Preneel} and {Wouter Joosen}},
publisher = {IEEE},
booktitle = {1st IFIP Wireless Days, WD 2008, Dubai, UAE, November 24-27, 2008}
}
@inproceedings{conf/winsys/KnezevicVPV08,
title = {On the Practical Performance of Rateless Codes.},
year = {2008},
booktitle = {WINSYS},
author = {{Miroslav Knezevic} and {Vesselin Velichkov} and {Bart Preneel} and {Ingrid Verbauwhede}},
publisher = {INSTICC Press},
booktitle = {WINSYS 2008 - Proceedings of the International Conference on Wireless Information Networks and Systems, Porto, Portugal, July 26-29, 2008, WINSYS is part of ICETE - The International Joint Conference on e-Business and Telecommunications}
}
@inproceedings{conf/wisec/WanRP08,
title = {A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks.},
year = {2008},
booktitle = {WISEC},
author = {{Zhiguo Wan} and {Kui Ren 001} and {Bart Preneel}},
publisher = {ACM},
booktitle = {Proceedings of the First ACM Conference on Wireless Network Security, WISEC 2008, Alexandria, VA, USA, March 31 - April 02, 2008}
}
@inproceedings{conf/wpes/GierlichsTDPV08,
title = {Revisiting a combinatorial approach toward measuring anonymity.},
year = {2008},
booktitle = {WPES},
author = {{Benedikt Gierlichs} and {Carmela Troncoso} and {Claudia Díaz} and {Bart Preneel} and {Ingrid Verbauwhede}},
publisher = {ACM},
booktitle = {Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, WPES 2008, Alexandria, VA, USA, October 27, 2008}
}
@inproceedings{conf/wpes/MulderDBP08,
title = {Identification via location-profiling in GSM networks.},
year = {2008},
booktitle = {WPES},
author = {{Yoni De Mulder} and {George Danezis} and {Lejla Batina} and {Bart Preneel}},
publisher = {ACM},
booktitle = {Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, WPES 2008, Alexandria, VA, USA, October 27, 2008}
}
@article{journals/iacr/IndesteegeMPR08,
title = {Collisions and other Non-Random Properties for Step-Reduced SHA-256.},
year = {2008},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Sebastiaan Indesteege} and {Florian Mendel} and {Bart Preneel} and {Christian Rechberger}}
}
@article{journals/iacr/SaxenaWP08,
title = {White-Box Cryptography: Formal Notions and (Im)possibility Results.},
year = {2008},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Amitabh Saxena} and {Brecht Wyseur} and {Bart Preneel}}
}
@article{journals/ijes/OrsBPV08,
title = {Hardware implementation of an elliptic curve processor over GF(p) with Montgomery modular multiplier.},
year = {2008},
journal = {Int. J. Embed. Syst.},
author = {{Siddika Berna Örs} and {Lejla Batina} and {Bart Preneel} and {Joos Vandewalle}}
}
@article{journals/istr/CockSP08,
title = {Insights on identity documents based on the Belgian case study.},
year = {2008},
journal = {Inf. Secur. Tech. Rep.},
author = {{Danny De Cock} and {Koen Simoens} and {Bart Preneel}}
}
@article{journals/jucs/ChenSWWDLMMMPPS08,
title = {Cryptography in Computer System Security.},
year = {2008},
journal = {J. Univers. Comput. Sci.},
author = {{Liqun Chen} and {Willy Susilo} and {Huaxiong Wang} and {Duncan S. Wong} and {Ed Dawson} and {Xuejia Lai} and {Masahiro Mambo} and {Atsuko Miyaji} and {Yi Mu 001} and {David Pointcheval} and {Bart Preneel} and {Nigel P. Smart}}
}
@incollection{series/lncs/CanniereP08,
title = {Trivium.},
year = {2008},
booktitle = {The eSTREAM Finalists},
author = {{Christophe De Cannière} and {Bart Preneel}},
publisher = {Springer},
booktitle = {New Stream Cipher Designs - The eSTREAM Finalists}
}
@inproceedings{conf/cisc/MouhaSAPTTP09,
title = {Cryptanalysis of the ESSENCE Family of Hash Functions.},
year = {2009},
booktitle = {Inscrypt},
author = {{Nicky Mouha} and {Gautham Sekar} and {Jean-Philippe Aumasson} and {Thomas Peyrin} and {Søren S. Thomsen} and {Meltem Sönmez Turan} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Information Security and Cryptology - 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers}
}
@inproceedings{conf/dagstuhl/GuajardoPST09,
title = {09282 Executive Summary - Foundations for Forgery-Resilient Cryptographic Hardware.},
year = {2009},
booktitle = {Foundations for Forgery-Resilient Cryptographic Hardware},
author = {{Jorge Guajardo} and {Bart Preneel} and {Ahmad-Reza Sadeghi} and {Pim Tuyls}},
publisher = {Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany},
booktitle = {Foundations for Forgery-Resilient Cryptographic Hardware, 05.07. - 08.07.2009}
}
@inproceedings{conf/dagstuhl/GuajardoPTS09,
title = {09282 Abstracts Collection - Foundations for Forgery-Resilient Cryptographic Hardware.},
year = {2009},
booktitle = {Foundations for Forgery-Resilient Cryptographic Hardware},
author = {{Jorge Guajardo} and {Bart Preneel} and {Pim Tuyls} and {Ahmad-Reza Sadeghi}},
publisher = {Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany},
booktitle = {Foundations for Forgery-Resilient Cryptographic Hardware, 05.07. - 08.07.2009}
}
@inproceedings{conf/dagstuhl/HandschuhLPR09,
title = {09031 Abstracts Collection - Symmetric Cryptography.},
year = {2009},
booktitle = {Symmetric Cryptography},
author = {{Helena Handschuh} and {Stefan Lucks} and {Bart Preneel} and {Phillip Rogaway}},
publisher = {Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany},
booktitle = {Symmetric Cryptography, 11.01. - 16.01.2009}
}
@inproceedings{conf/dagstuhl/HandschuhLPR09a,
title = {09031 Executive Summary - Symmetric Cryptography.},
year = {2009},
booktitle = {Symmetric Cryptography},
author = {{Helena Handschuh} and {Stefan Lucks} and {Bart Preneel} and {Phillip Rogaway}},
publisher = {Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany},
booktitle = {Symmetric Cryptography, 11.01. - 16.01.2009}
}
@inproceedings{conf/dagstuhl/IndesteegeACDKN09,
title = {The Lane hash function.},
year = {2009},
booktitle = {Symmetric Cryptography},
author = {{Sebastiaan Indesteege} and {Elena Andreeva 001} and {Christophe De Cannière} and {Orr Dunkelman} and {Emilia Käsper} and {Svetla Nikova} and {Bart Preneel} and {Elmar Tischhauser}},
publisher = {Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany},
booktitle = {Symmetric Cryptography, 11.01. - 16.01.2009}
}
@inproceedings{conf/dagstuhl/IndesteegeP09a,
title = {Practical Preimages for Maraca.},
year = {2009},
booktitle = {Symmetric Cryptography},
author = {{Sebastiaan Indesteege} and {Bart Preneel}},
publisher = {Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany},
booktitle = {Symmetric Cryptography, 11.01. - 16.01.2009}
}
@inproceedings{conf/ddecs/MulderAPVV09,
title = {Case Study : A class E power amplifier for ISO-14443A.},
year = {2009},
booktitle = {DDECS},
author = {{Elke De Mulder} and {Wim Aerts} and {Bart Preneel} and {Ingrid Verbauwhede} and {Guy A. E. Vandenbosch}},
publisher = {IEEE Computer Society},
booktitle = {Proceedings of the 2009 IEEE Symposium on Design and Diagnostics of Electronic Circuits and Systems, DDECS 2009, April 15-17, 2009, Liberec, Czech Republic}
}
@inproceedings{conf/ecctd/GierlichsMPV09,
title = {Empirical comparison of side channel analysis distinguishers on DES in hardware.},
year = {2009},
booktitle = {ECCTD},
author = {{Benedikt Gierlichs} and {Elke De Mulder} and {Bart Preneel} and {Ingrid Verbauwhede}},
publisher = {IEEE},
booktitle = {19th European Conference on Circuit Theory and Design, ECCTD 2009, Antalya, Turkey, August 23-27, 2009}
}
@inproceedings{conf/icmcs/WengP09,
title = {Shape-based features for image hashing.},
year = {2009},
booktitle = {ICME},
author = {{Li Weng} and {Bart Preneel}},
publisher = {IEEE},
booktitle = {Proceedings of the 2009 IEEE International Conference on Multimedia and Expo, ICME 2009, June 28 - July 2, 2009, New York City, NY, USA}
}
@inproceedings{conf/ifip11-4/PeetersKP09,
title = {Threshold Things That Think: Authorisation for Resharing.},
year = {2009},
booktitle = {iNetSeC},
author = {{Roel Peeters} and {Markulf Kohlweiss} and {Bart Preneel}},
publisher = {Springer},
booktitle = {iNetSec 2009 - Open Research Problems in Network Security - IFIP WG 11.4 International Workshop, Zurich, Switzerland, April 23-24, 2009, Revised Selected Papers}
}
@inproceedings{conf/isw/NakaharaSFCSP09,
title = {A New Approach to chi2 Cryptanalysis of Block Ciphers.},
year = {2009},
booktitle = {ISC},
author = {{Jorge Nakahara Jr.} and {Gautham Sekar} and {Daniel Santana de Freitas} and {Chang Chiann} and {Ramon Hugo de Souza} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings}
}
@inproceedings{conf/isw/SaxenaWP09,
title = {Towards Security Notions for White-Box Cryptography.},
year = {2009},
booktitle = {ISC},
author = {{Amitabh Saxena} and {Brecht Wyseur} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings}
}
@inproceedings{conf/iwsec/Preneel09,
title = {The Future of Cryptographic Algorithms.},
year = {2009},
booktitle = {IWSEC},
author = {{Bart Preneel}},
publisher = {Springer},
booktitle = {Advances in Information and Computer Security, 4th International Workshop on Security, IWSEC 2009, Toyama, Japan, October 28-30, 2009, Proceedings}
}
@inproceedings{conf/iwsec/SekarP09,
title = {Improved Distinguishing Attacks on HC-256.},
year = {2009},
booktitle = {IWSEC},
author = {{Gautham Sekar} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Advances in Information and Computer Security, 4th International Workshop on Security, IWSEC 2009, Toyama, Japan, October 28-30, 2009, Proceedings}
}
@inproceedings{conf/mmsec/DengBPP09,
title = {An efficient buyer-seller watermarking protocol based on composite signal representation.},
year = {2009},
booktitle = {MM&Sec},
author = {{Mina Deng} and {Tiziano Bianchi} and {Alessandro Piva} and {Bart Preneel}},
publisher = {ACM},
booktitle = {Multimedia and Security Workshop, MM&Sec 2009, Princeton, NJ, USA, September 07 - 08, 2009}
}
@inproceedings{conf/pairing/RialKP09,
title = {Universally Composable Adaptive Priced Oblivious Transfer.},
year = {2009},
booktitle = {Pairing},
author = {{Alfredo Rial} and {Markulf Kohlweiss} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Pairing-Based Cryptography - Pairing 2009, Third International Conference, Palo Alto, CA, USA, August 12-14, 2009, Proceedings}
}
@inproceedings{conf/sacrypt/IndesteegeMPS09,
title = {Practical Collisions for SHAMATA-256.},
year = {2009},
booktitle = {Selected Areas in Cryptography},
author = {{Sebastiaan Indesteege} and {Florian Mendel} and {Bart Preneel} and {Martin Schläffer}},
publisher = {Springer},
booktitle = {Selected Areas in Cryptography, 16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers}
}
@inproceedings{conf/sigcomm/DammeWKP09,
title = {Offline NFC payments with electronic vouchers.},
year = {2009},
booktitle = {MobiHeld},
author = {{Gauthier Van Damme} and {Karel Wouters} and {Hakan Karahan} and {Bart Preneel}},
publisher = {ACM},
booktitle = {Proceedings of the 1st ACM SIGCOMM Workshop on Networking, Systems, and Applications for Mobile Handhelds, MobiHeld 2009, Barcelona, Spain, August 17, 2009}
}
@inproceedings{conf/soups/PeetersKPS09,
title = {Threshold things that think: usable authorization for resharing.},
year = {2009},
booktitle = {SOUPS},
author = {{Roel Peeters} and {Markulf Kohlweiss} and {Bart Preneel} and {Nicky Sulmon}},
publisher = {ACM},
booktitle = {Proceedings of the 5th Symposium on Usable Privacy and Security, SOUPS 2009, Mountain View, California, USA, July 15-17, 2009}
}
@inproceedings{conf/sp/SimoensTP09,
title = {Privacy Weaknesses in Biometric Sketches.},
year = {2009},
booktitle = {SP},
author = {{Koen Simoens} and {Pim Tuyls} and {Bart Preneel}},
publisher = {IEEE Computer Society},
booktitle = {30th IEEE Symposium on Security and Privacy (SP 2009), 17-20 May 2009, Oakland, California, USA}
}
@inproceedings{conf/wifs/SterckxGPV09,
title = {Efficient implementation of anonymous credentials on Java Card smart cards.},
year = {2009},
booktitle = {WIFS},
author = {{Michaël Sterckx} and {Benedikt Gierlichs} and {Bart Preneel} and {Ingrid Verbauwhede}},
publisher = {IEEE},
booktitle = {First IEEE International Workshop on Information Forensics and Security, WIFS 2009, London, UK, December 6-9, 2009}
}
@inproceedings{conf/wisa/MouhaCIP09,
title = {Finding Collisions for a 45-Step Simplified HAS-V.},
year = {2009},
booktitle = {WISA},
author = {{Nicky Mouha} and {Christophe De Cannière} and {Sebastiaan Indesteege} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Information Security Applications, 10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers}
}
@article{journals/clsr/AlsenoyCSDP09,
title = {Delegation and digital mandates: Legal requirements and security objectives.},
year = {2009},
journal = {Comput. Law Secur. Rev.},
author = {{Brendan Van Alsenoy} and {Danny De Cock} and {Koen Simoens} and {Jos Dumortier} and {Bart Preneel}}
}
@article{journals/iacr/AumassonDIP09,
title = {Cryptanalysis of Dynamic SHA(2).},
year = {2009},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Jean-Philippe Aumasson} and {Orr Dunkelman} and {Sebastiaan Indesteege} and {Bart Preneel}}
}
@article{journals/iacr/DingGP09,
title = {Precise Bounded-Concurrent Zero-Knowledge in Almost Constant Rounds.},
year = {2009},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Ning Ding 001} and {Dawu Gu} and {Bart Preneel}}
}
@article{journals/iacr/GierlichsBPV09,
title = {Revisiting Higher-Order DPA Attacks: Multivariate Mutual Information Analysis.},
year = {2009},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Benedikt Gierlichs} and {Lejla Batina} and {Bart Preneel} and {Ingrid Verbauwhede}}
}
@article{journals/iacr/Hermans0BVP09,
title = {Parallel Shortest Lattice Vector Enumeration on Graphics Cards.},
year = {2009},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Jens Hermans} and {Michael Schneider 002} and {Johannes Buchmann 001} and {Frederik Vercauteren} and {Bart Preneel}}
}
@article{journals/iacr/MulderGPV09,
title = {Practical DPA Attacks on MDPL.},
year = {2009},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Elke De Mulder} and {Benedikt Gierlichs} and {Bart Preneel} and {Ingrid Verbauwhede}}
}
@article{journals/ijwmc/SeysP09,
title = {ARM: anonymous routing protocol for mobile ad hoc networks.},
year = {2009},
journal = {Int. J. Wirel. Mob. Comput.},
author = {{Stefaan Seys} and {Bart Preneel}}
}
@article{journals/jcst/WanDBPG09,
title = {n PAKE+: A Tree-Based Group Password-Authenticated Key Exchange Protocol Using Different Passwords.},
year = {2009},
journal = {J. Comput. Sci. Technol.},
author = {{Zhiguo Wan} and {Robert H. Deng} and {Feng Bao 001} and {Bart Preneel} and {Ming Gu 001}}
}
@article{journals/oir/DengCP09,
title = {Towards a cross-context identity management framework in e-health.},
year = {2009},
journal = {Online Inf. Rev.},
author = {{Mina Deng} and {Danny De Cock} and {Bart Preneel}}
}
@article{journals/tifs/RivestCPRSV09,
title = {Guest editorial: special issue on electronic voting.},
year = {2009},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Ronald L. Rivest} and {David Chaum} and {Bart Preneel} and {Aviel D. Rubin} and {Donald G. Saari} and {Poorvi L. Vora}}
}
@incollection{series/natosec/IndesteegeP09,
title = {Coding Theory and Hash Function Design - A Case Study: The Lane Hash Function.},
year = {2009},
booktitle = {Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes},
author = {{Sebastiaan Indesteege} and {Bart Preneel}},
publisher = {IOS Press},
booktitle = {Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes}
}
@inproceedings{conf/africacrypt/RialP10,
title = {Optimistic Fair Priced Oblivious Transfer.},
year = {2010},
booktitle = {AFRICACRYPT},
author = {{Alfredo Rial} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Progress in Cryptology - AFRICACRYPT 2010, Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings}
}
@inproceedings{conf/btas/SimoensCP10,
title = {Reversing protected minutiae vicinities.},
year = {2010},
booktitle = {BTAS},
author = {{Koen Simoens} and {Chi-Ming Chang} and {Bart Preneel}},
publisher = {IEEE},
booktitle = {Fourth IEEE International Conference on Biometrics: Theory Applications and Systems, BTAS 2010, Washington, DC, USA, 27-29 September, 2010}
}
@inproceedings{conf/ctrsa/GierlichsBPV10,
title = {Revisiting Higher-Order DPA Attacks: .},
year = {2010},
booktitle = {CT-RSA},
author = {{Benedikt Gierlichs} and {Lejla Batina} and {Bart Preneel} and {Ingrid Verbauwhede}},
publisher = {Springer},
booktitle = {Topics in Cryptology - CT-RSA 2010, The Cryptographers' Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings}
}
@inproceedings{conf/ctrsa/HermansVP10,
title = {Speed Records for NTRU.},
year = {2010},
booktitle = {CT-RSA},
author = {{Jens Hermans} and {Frederik Vercauteren} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Topics in Cryptology - CT-RSA 2010, The Cryptographers' Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings}
}
@inproceedings{conf/ctrsa/Preneel10,
title = {The First 30 Years of Cryptographic Hash Functions and the NIST SHA-3 Competition.},
year = {2010},
booktitle = {CT-RSA},
author = {{Bart Preneel}},
publisher = {Springer},
booktitle = {Topics in Cryptology - CT-RSA 2010, The Cryptographers' Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings}
}
@inproceedings{conf/date/BalaschVP10,
title = {An embedded platform for privacy-friendly road charging applications.},
year = {2010},
booktitle = {DATE},
author = {{Josep Balasch} and {Ingrid Verbauwhede} and {Bart Preneel}},
publisher = {IEEE Computer Society},
booktitle = {Design, Automation and Test in Europe, DATE 2010, Dresden, Germany, March 8-12, 2010}
}
@inproceedings{conf/drm/CappaertP10,
title = {A general model for hiding control flow.},
year = {2010},
booktitle = {Digital Rights Management Workshop},
author = {{Jan Cappaert} and {Bart Preneel}},
publisher = {ACM},
booktitle = {Proceedings of the 10th ACM Workshop on Digital Rights Management, Chicago, Illinois, USA, October 4, 2010}
}
@inproceedings{conf/host/FanGMSPV10,
title = {State-of-the-art of Secure ECC Implementations: A Survey on Known Side-channel Attacks and Countermeasures.},
year = {2010},
booktitle = {HOST},
author = {{Junfeng Fan} and {Xu Guo 001} and {Elke De Mulder} and {Patrick Schaumont} and {Bart Preneel} and {Ingrid Verbauwhede}},
publisher = {IEEE Computer Society},
booktitle = {HOST 2010, Proceedings of the 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 13-14 June 2010, Anaheim Convention Center, California, USA}
}
@inproceedings{conf/icisc/HiroseIKOPY10,
title = {A Lightweight 256-Bit Hash Function for Hardware and Low-End Devices: Lesamnta-LW.},
year = {2010},
booktitle = {ICISC},
author = {{Shoichi Hirose} and {Kota Ideguchi} and {Hidenori Kuwakado} and {Toru Owada} and {Bart Preneel} and {Hirotaka Yoshida}},
publisher = {Springer},
booktitle = {Information Security and Cryptology - ICISC 2010 - 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers}
}
@inproceedings{conf/indocrypt/MulderWP10,
title = {Cryptanalysis of a Perturbated White-Box AES Implementation.},
year = {2010},
booktitle = {INDOCRYPT},
author = {{Yoni De Mulder} and {Brecht Wyseur} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Progress in Cryptology - INDOCRYPT 2010 - 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010. Proceedings}
}
@inproceedings{conf/indocrypt/Preneel10,
title = {Cryptographic Hash Functions: Theory and Practice.},
year = {2010},
booktitle = {INDOCRYPT},
author = {{Bart Preneel}},
publisher = {Springer},
booktitle = {Progress in Cryptology - INDOCRYPT 2010 - 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010. Proceedings}
}
@inproceedings{conf/mm/WengP10,
title = {A novel video hash algorithm.},
year = {2010},
booktitle = {ACM Multimedia},
author = {{Li Weng} and {Bart Preneel}},
publisher = {ACM},
booktitle = {Proceedings of the 18th International Conference on Multimedia 2010, Firenze, Italy, October 25-29, 2010}
}
@inproceedings{conf/mmm/WengP10,
title = {From Image Hashing to Video Hashing.},
year = {2010},
booktitle = {MMM},
author = {{Li Weng} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Advances in Multimedia Modeling, 16th International Multimedia Modeling Conference, MMM 2010, Chongqing, China, January 6-8, 2010. Proceedings}
}
@inproceedings{conf/mmmacns/Preneel10,
title = {Cryptography for Network Security: Failures, Successes and Challenges.},
year = {2010},
booktitle = {MMM-ACNS},
author = {{Bart Preneel}},
publisher = {Springer},
booktitle = {Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings}
}
@inproceedings{conf/mobisec/OttoyHPSG10,
title = {AES Data Encryption in a ZigBee Network: Software or Hardware?},
year = {2010},
booktitle = {MobiSec},
author = {{Geoffrey Ottoy} and {Tom Hamelinckx} and {Bart Preneel} and {Lieven De Strycker} and {Jean-Pierre Goemaere}},
publisher = {Springer},
booktitle = {Security and Privacy in Mobile Information and Communication Systems - Second International ICST Conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010, Revised Selected Papers}
}
@inproceedings{conf/sacrypt/MouhaVCP10,
title = {The Differential Analysis of S-Functions.},
year = {2010},
booktitle = {Selected Areas in Cryptography},
author = {{Nicky Mouha} and {Vesselin Velichkov} and {Christophe De Cannière} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Selected Areas in Cryptography - 17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers}
}
@inproceedings{conf/securecomm/StrackxPP10,
title = {Efficient Isolation of Trusted Subsystems in Embedded Systems.},
year = {2010},
booktitle = {SecureComm},
author = {{Raoul Strackx} and {Frank Piessens} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Security and Privacy in Communication Networks - 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings}
}
@inproceedings{conf/uss/BalaschRTPVG10,
title = {PrETP: Privacy-Preserving Electronic Toll Pricing.},
year = {2010},
booktitle = {USENIX Security Symposium},
author = {{Josep Balasch} and {Alfredo Rial} and {Carmela Troncoso} and {Bart Preneel} and {Ingrid Verbauwhede} and {Christophe Geuens}},
publisher = {USENIX Association},
booktitle = {19th USENIX Security Symposium, Washington, DC, USA, August 11-13, 2010, Proceedings}
}
@article{journals/ahswn/SingeleeLBPSCPMB10,
title = {A Secure Low-Delay Protocol for Wireless Body Area Networks.},
year = {2010},
journal = {Ad Hoc Sens. Wirel. Networks},
author = {{Dave Singelée} and {Benoît Latré} and {Bart Braem} and {Michaël Peeters} and {Marijke De Soete} and {Peter De Cleyn} and {Bart Preneel} and {Ingrid Moerman} and {Chris Blondia}}
}
@article{journals/dcc/BeuleEKKNPSS10,
title = {Galois geometries and applications.},
year = {2010},
journal = {Des. Codes Cryptogr.},
author = {{Jan De Beule} and {Yves Edel} and {Emilia Käsper} and {Andreas Klein 001} and {Svetla Nikova} and {Bart Preneel} and {Jeroen Schillewaert} and {Leo Storme}}
}
@article{journals/iacr/AndreevaMP10,
title = {On the Indifferentiability of the Gröstl Hash Function.},
year = {2010},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Elena Andreeva 001} and {Bart Mennink} and {Bart Preneel}}
}
@article{journals/iacr/AndreevaMP10a,
title = {Security Reductions of the Second Round SHA-3 Candidates.},
year = {2010},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Elena Andreeva 001} and {Bart Mennink} and {Bart Preneel}}
}
@article{journals/iacr/IdeguchiTP10,
title = {Improved Collision Attacks on the Reduced-Round Gröstl Hash Function.},
year = {2010},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Kota Ideguchi} and {Elmar Tischhauser} and {Bart Preneel}}
}
@article{journals/iacr/KimHPBDK10,
title = {Related-Key Boomerang and Rectangle Attacks.},
year = {2010},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Jongsung Kim} and {Seokhie Hong} and {Bart Preneel} and {Eli Biham} and {Orr Dunkelman} and {Nathan Keller}}
}
@article{journals/iacr/SimoensPP10,
title = {Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares.},
year = {2010},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Koen Simoens} and {Roel Peeters} and {Bart Preneel}}
}
@article{journals/iacr/WolfP10,
title = {MQ*-IP: An Identity-based Identification Scheme without Number-theoretic Assumptions.},
year = {2010},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Christopher Wolf} and {Bart Preneel}}
}
@article{journals/iet-ifs/VelichkovRP10,
title = {Algebraic cryptanalysis of a small-scale version of stream cipher Lex.},
year = {2010},
journal = {IET Inf. Secur.},
author = {{Vesselin Velichkov} and {Vincent Rijmen} and {Bart Preneel}}
}
@article{journals/jips/AndreevaMP10,
title = {Security Properties of Domain Extenders for Cryptographic Hash Functions.},
year = {2010},
journal = {J. Inf. Process. Syst.},
author = {{Elena Andreeva 001} and {Bart Mennink} and {Bart Preneel}}
}
@article{journals/tifs/RialDBPP10,
title = {A Provably Secure Anonymous Buyer-Seller Watermarking Protocol.},
year = {2010},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Alfredo Rial} and {Mina Deng} and {Tiziano Bianchi} and {Alessandro Piva} and {Bart Preneel}}
}
@article{journals/tvt/WanRZPG10,
title = {Anonymous User Communication for Privacy Protection in Wireless Metropolitan Mesh Networks.},
year = {2010},
journal = {IEEE Trans. Veh. Technol.},
author = {{Zhiguo Wan} and {Kui Ren 001} and {Bo Zhu 001} and {Bart Preneel} and {Ming Gu 001}}
}
@incollection{series/isc/LeeBSPV10,
title = {Anti-counterfeiting, Untraceability and Other Security Challenges for RFID Systems: Public-Key-Based Protocols and Hardware.},
year = {2010},
booktitle = {Towards Hardware-Intrinsic Security},
author = {{Yong Ki Lee} and {Lejla Batina} and {Dave Singelée} and {Bart Preneel} and {Ingrid Verbauwhede}},
publisher = {Springer},
booktitle = {Towards Hardware-Intrinsic Security - Foundations and Practice}
}
@inproceedings{conf/acisp/PreneelYW11,
title = {Finding Collisions for Reduced Luffa-256 v2 (Poster).},
year = {2011},
booktitle = {ACISP},
author = {{Bart Preneel} and {Hirotaka Yoshida} and {Dai Watanabe}},
publisher = {Springer},
booktitle = {Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}
}
@inproceedings{conf/acisp/WangSMP11,
title = {Algebraic Techniques in Differential Cryptanalysis Revisited.},
year = {2011},
booktitle = {ACISP},
author = {{Meiqin Wang} and {Yue Sun} and {Nicky Mouha} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}
}
@inproceedings{conf/africacrypt/Preneel11,
title = {The NIST SHA-3 Competition: A Perspective on the Final Year.},
year = {2011},
booktitle = {AFRICACRYPT},
author = {{Bart Preneel}},
publisher = {Springer},
booktitle = {Progress in Cryptology - AFRICACRYPT 2011 - 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings}
}
@inproceedings{conf/cisc/MouhaWGP11,
title = {Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming.},
year = {2011},
booktitle = {Inscrypt},
author = {{Nicky Mouha} and {Qingju Wang 001} and {Dawu Gu} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Information Security and Cryptology - 7th International Conference, Inscrypt 2011, Beijing, China, November 30 - December 3, 2011. Revised Selected Papers}
}
@inproceedings{conf/cms/NguyenWP11,
title = {Radon Transform-Based Secure Image Hashing.},
year = {2011},
booktitle = {Communications and Multimedia Security},
author = {{Dung Q. Nguyen} and {Li Weng} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Communications and Multimedia Security, 12th IFIP TC 6 / TC 11 International Conference, CMS 2011, Ghent, Belgium, October 19-21,2011. Proceedings}
}
@inproceedings{conf/cms/OttoyMSPSGH11,
title = {A Modular Test Platform for Evaluation of Security Protocols in NFC Applications.},
year = {2011},
booktitle = {Communications and Multimedia Security},
author = {{Geoffrey Ottoy} and {Jeroen Martens} and {Nick Saeys} and {Bart Preneel} and {Lieven De Strycker} and {Jean-Pierre Goemaere} and {Tom Hamelinckx}},
publisher = {Springer},
booktitle = {Communications and Multimedia Security, 12th IFIP TC 6 / TC 11 International Conference, CMS 2011, Ghent, Belgium, October 19-21,2011. Proceedings}
}
@inproceedings{conf/cms/WengP11,
title = {A Secure Perceptual Hash Algorithm for Image Content Authentication.},
year = {2011},
booktitle = {Communications and Multimedia Security},
author = {{Li Weng} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Communications and Multimedia Security, 12th IFIP TC 6 / TC 11 International Conference, CMS 2011, Ghent, Belgium, October 19-21,2011. Proceedings}
}
@inproceedings{conf/ctrsa/SekarMVP11,
title = {Meet-in-the-Middle Attacks on Reduced-Round XTEA.},
year = {2011},
booktitle = {CT-RSA},
author = {{Gautham Sekar} and {Nicky Mouha} and {Vesselin Velichkov} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Topics in Cryptology - CT-RSA 2011 - The Cryptographers' Track at the RSA Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings}
}
@inproceedings{conf/esorics/HermansPVP11,
title = {A New RFID Privacy Model.},
year = {2011},
booktitle = {ESORICS},
author = {{Jens Hermans} and {Andreas Pashalidis} and {Frederik Vercauteren} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings}
}
@inproceedings{conf/fse/VelichkovMCP11,
title = {The Additive Differential Probability of ARX.},
year = {2011},
booktitle = {FSE},
author = {{Vesselin Velichkov} and {Nicky Mouha} and {Christophe De Cannière} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Fast Software Encryption - 18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers}
}
@inproceedings{conf/mmm/WengP11,
title = {Image Distortion Estimation by Hash Comparison.},
year = {2011},
booktitle = {MMM (1)},
author = {{Li Weng} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Advances in Multimedia Modeling - 17th International Multimedia Modeling Conference, MMM 2011, Taipei, Taiwan, January 5-7, 2011, Proceedings, Part I}
}
@inproceedings{conf/sofsem/MulderWP11,
title = {A Privacy-Preserving ID-Based Group Key Agreement Scheme Applied in VPAN.},
year = {2011},
booktitle = {SOFSEM},
author = {{Yoni De Mulder} and {Karel Wouters} and {Bart Preneel}},
publisher = {Springer},
booktitle = {SOFSEM 2011: Theory and Practice of Computer Science - 37th Conference on Current Trends in Theory and Practice of Computer Science, Nový Smokovec, Slovakia, January 22-28, 2011. Proceedings}
}
@inproceedings{conf/wisa/SekarP11,
title = {Practical Attacks on a Cryptosystem Proposed in Patent WO/2009/066313.},
year = {2011},
booktitle = {WISA},
author = {{Gautham Sekar} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Information Security Applications - 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers}
}
@article{journals/compsec/MavrogiannopoulosKP11,
title = {A taxonomy of self-modifying code for obfuscation.},
year = {2011},
journal = {Comput. Secur.},
author = {{Nikos Mavrogiannopoulos} and {Nessim Kisserli} and {Bart Preneel}}
}
@article{journals/dagstuhl-reports/KatzenbeisserKPS11,
title = {Privacy and Security in Smart Energy Grids (Dagstuhl Seminar 11511).},
year = {2011},
journal = {Dagstuhl Reports},
author = {{Stefan Katzenbeisser 001} and {Klaus Kursawe} and {Bart Preneel} and {Ahmad-Reza Sadeghi}}
}
@article{journals/iacr/ChenWP11,
title = {Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT.},
year = {2011},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Jiazhe Chen} and {Meiqin Wang} and {Bart Preneel}}
}
@article{journals/iacr/MenninkP11,
title = {Hash Functions Based on Three Permutations: A Generic Security Analysis.},
year = {2011},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Bart Mennink} and {Bart Preneel}}
}
@article{journals/ijhcr/PeetersSP11,
title = {Threshold-Based Location-Aware Access Control.},
year = {2011},
journal = {Int. J. Handheld Comput. Res.},
author = {{Roel Peeters} and {Dave Singelée} and {Bart Preneel}}
}
@article{journals/integration/SakiyamaKFPV11,
title = {Tripartite modular multiplication.},
year = {2011},
journal = {Integr.},
author = {{Kazuo Sakiyama} and {Miroslav Knezevic} and {Junfeng Fan} and {Bart Preneel} and {Ingrid Verbauwhede}}
}
@article{journals/jmc/WolfP11,
title = {Equivalent keys in ℳultivariate uadratic public key systems.},
year = {2011},
journal = {J. Math. Cryptol.},
author = {{Christopher Wolf} and {Bart Preneel}}
}
@article{journals/joc/IndesteegeP11,
title = {Practical Collisions for EnRUPT.},
year = {2011},
journal = {J. Cryptol.},
author = {{Sebastiaan Indesteege} and {Bart Preneel}}
}
@article{journals/re/DengWSPJ11,
title = {A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements.},
year = {2011},
journal = {Requir. Eng.},
author = {{Mina Deng} and {Kim Wuyts} and {Riccardo Scandariato} and {Bart Preneel} and {Wouter Joosen}}
}
@article{journals/software/GuWPAS11,
title = {Point/Counterpoint.},
year = {2011},
journal = {IEEE Softw.},
author = {{Yuan Xiang Gu} and {Brecht Wyseur} and {Bart Preneel} and {Jean-Daniel Aussel} and {Reiner Sailer}}
}
@article{journals/tdsc/TroncosoDKBP11,
title = {PriPAYD: Privacy-Friendly Pay-As-You-Drive Insurance.},
year = {2011},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Carmela Troncoso} and {George Danezis} and {Eleni Kosta} and {Josep Balasch} and {Bart Preneel}}
}
@article{journals/tifs/RialBP11,
title = {A Privacy-Preserving Buyer-Seller Watermarking Protocol Based on Priced Oblivious Transfer.},
year = {2011},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Alfredo Rial} and {Josep Balasch} and {Bart Preneel}}
}
@incollection{reference/crypt/Preneel11,
title = {AHS Competition/SHA-3.},
year = {2011},
booktitle = {Encyclopedia of Cryptography and Security (2nd Ed.)},
author = {{Bart Preneel}},
publisher = {Springer},
booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.}
}
@incollection{reference/crypt/Preneel11a,
title = {CBC-MAC and Variants.},
year = {2011},
booktitle = {Encyclopedia of Cryptography and Security (2nd Ed.)},
author = {{Bart Preneel}},
publisher = {Springer},
booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.}
}
@incollection{reference/crypt/Preneel11b,
title = {CMAC.},
year = {2011},
booktitle = {Encyclopedia of Cryptography and Security (2nd Ed.)},
author = {{Bart Preneel}},
publisher = {Springer},
booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.}
}
@incollection{reference/crypt/Preneel11c,
title = {Collision Attack.},
year = {2011},
booktitle = {Encyclopedia of Cryptography and Security (2nd Ed.)},
author = {{Bart Preneel}},
publisher = {Springer},
booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.}
}
@incollection{reference/crypt/Preneel11d,
title = {Collision Resistance.},
year = {2011},
booktitle = {Encyclopedia of Cryptography and Security (2nd Ed.)},
author = {{Bart Preneel}},
publisher = {Springer},
booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.}
}
@incollection{reference/crypt/Preneel11e,
title = {Correcting-Block Attack.},
year = {2011},
booktitle = {Encyclopedia of Cryptography and Security (2nd Ed.)},
author = {{Bart Preneel}},
publisher = {Springer},
booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.}
}
@incollection{reference/crypt/Preneel11f,
title = {Davies-Meyer.},
year = {2011},
booktitle = {Encyclopedia of Cryptography and Security (2nd Ed.)},
author = {{Bart Preneel}},
publisher = {Springer},
booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.}
}
@incollection{reference/crypt/Preneel11g,
title = {GMAC.},
year = {2011},
booktitle = {Encyclopedia of Cryptography and Security (2nd Ed.)},
author = {{Bart Preneel}},
publisher = {Springer},
booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.}
}
@incollection{reference/crypt/Preneel11h,
title = {Hash Functions.},
year = {2011},
booktitle = {Encyclopedia of Cryptography and Security (2nd Ed.)},
author = {{Bart Preneel}},
publisher = {Springer},
booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.}
}
@incollection{reference/crypt/Preneel11i,
title = {HMAC.},
year = {2011},
booktitle = {Encyclopedia of Cryptography and Security (2nd Ed.)},
author = {{Bart Preneel}},
publisher = {Springer},
booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.}
}
@incollection{reference/crypt/Preneel11j,
title = {MAA.},
year = {2011},
booktitle = {Encyclopedia of Cryptography and Security (2nd Ed.)},
author = {{Bart Preneel}},
publisher = {Springer},
booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.}
}
@incollection{reference/crypt/Preneel11k,
title = {MAC Algorithms.},
year = {2011},
booktitle = {Encyclopedia of Cryptography and Security (2nd Ed.)},
author = {{Bart Preneel}},
publisher = {Springer},
booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.}
}
@incollection{reference/crypt/Preneel11l,
title = {MASH Hash Functions (Modular Arithmetic Secure Hash).},
year = {2011},
booktitle = {Encyclopedia of Cryptography and Security (2nd Ed.)},
author = {{Bart Preneel}},
publisher = {Springer},
booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.}
}
@incollection{reference/crypt/Preneel11m,
title = {MDC-2 and MDC-4.},
year = {2011},
booktitle = {Encyclopedia of Cryptography and Security (2nd Ed.)},
author = {{Bart Preneel}},
publisher = {Springer},
booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.}
}
@incollection{reference/crypt/Preneel11n,
title = {Modes of Operation of a Block Cipher.},
year = {2011},
booktitle = {Encyclopedia of Cryptography and Security (2nd Ed.)},
author = {{Bart Preneel}},
publisher = {Springer},
booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.}
}
@incollection{reference/crypt/Preneel11o,
title = {NESSIE Project.},
year = {2011},
booktitle = {Encyclopedia of Cryptography and Security (2nd Ed.)},
author = {{Bart Preneel}},
publisher = {Springer},
booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.}
}
@incollection{reference/crypt/Preneel11p,
title = {PMAC.},
year = {2011},
booktitle = {Encyclopedia of Cryptography and Security (2nd Ed.)},
author = {{Bart Preneel}},
publisher = {Springer},
booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.}
}
@incollection{reference/crypt/Preneel11q,
title = {Preimage Resistance.},
year = {2011},
booktitle = {Encyclopedia of Cryptography and Security (2nd Ed.)},
author = {{Bart Preneel}},
publisher = {Springer},
booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.}
}
@incollection{reference/crypt/Preneel11r,
title = {Second Preimage Resistance.},
year = {2011},
booktitle = {Encyclopedia of Cryptography and Security (2nd Ed.)},
author = {{Bart Preneel}},
publisher = {Springer},
booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.}
}
@incollection{reference/crypt/Preneel11s,
title = {Universal One-Way Hash Functions (UOWHF).},
year = {2011},
booktitle = {Encyclopedia of Cryptography and Security (2nd Ed.)},
author = {{Bart Preneel}},
publisher = {Springer},
booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.}
}
@inproceedings{conf/africacrypt/AndreevaMPS12,
title = {Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein.},
year = {2012},
booktitle = {AFRICACRYPT},
author = {{Elena Andreeva 001} and {Bart Mennink} and {Bart Preneel} and {Marjan Skrobot}},
publisher = {Springer},
booktitle = {Progress in Cryptology - AFRICACRYPT 2012 - 5th International Conference on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings}
}
@inproceedings{conf/asap/UhsadelUVP12,
title = {Interface Design for Mapping a Variety of RSA Exponentiation Algorithms on a HW/SW Co-design Platform.},
year = {2012},
booktitle = {ASAP},
author = {{Leif Uhsadel} and {Markus Ullrich} and {Ingrid Verbauwhede} and {Bart Preneel}},
publisher = {IEEE Computer Society},
booktitle = {23rd IEEE International Conference on Application-Specific Systems, Architectures and Processors, ASAP 2012, Delft, The Netherlands, July 9-11, 2012}
}
@inproceedings{conf/birthday/IndesteegeP12,
title = {DES Collisions Revisited.},
year = {2012},
booktitle = {Cryptography and Security},
author = {{Sebastiaan Indesteege} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Cryptography and Security: From Theory to Applications - Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday}
}
@inproceedings{conf/ccs/MavrogiannopoulosPP12,
title = {Security implications in Kerberos by the introduction of smart cards.},
year = {2012},
booktitle = {AsiaCCS},
author = {{Nikos Mavrogiannopoulos} and {Andreas Pashalidis} and {Bart Preneel}},
publisher = {ACM},
booktitle = {7th ACM Symposium on Information, Compuer and Communications Security, ASIACCS '12, Seoul, Korea, May 2-4, 2012}
}
@inproceedings{conf/ccs/MavrogiannopoulosVVP12,
title = {A cross-protocol attack on the TLS protocol.},
year = {2012},
booktitle = {CCS},
author = {{Nikos Mavrogiannopoulos} and {Frederik Vercauteren} and {Vesselin Velichkov} and {Bart Preneel}},
publisher = {ACM},
booktitle = {the ACM Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}
}
@inproceedings{conf/ches/LeestPS12,
title = {Soft Decision Error Correction for Compact Memory-Based PUFs Using a Single Enrollment.},
year = {2012},
booktitle = {CHES},
author = {{Vincent van der Leest} and {Bart Preneel} and {Erik van der Sluis}},
publisher = {Springer},
booktitle = {Cryptographic Hardware and Embedded Systems - CHES 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings}
}
@inproceedings{conf/fdtc/Preneel12,
title = {It's Not My Fault - On Fault Attacks on Symmetric Cryptography.},
year = {2012},
booktitle = {FDTC},
author = {{Bart Preneel}},
publisher = {IEEE Computer Society},
booktitle = {2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, Leuven, Belgium, September 9, 2012}
}
@inproceedings{conf/fse/VelichkovMCP12,
title = {UNAF: A Special Set of Additive Differences with Application to the Differential Analysis of ARX.},
year = {2012},
booktitle = {FSE},
author = {{Vesselin Velichkov} and {Nicky Mouha} and {Christophe De Cannière} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Fast Software Encryption - 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers}
}
@inproceedings{conf/fse/WangSTP12,
title = {A Model for Structure Attacks, with Applications to PRESENT and Serpent.},
year = {2012},
booktitle = {FSE},
author = {{Meiqin Wang} and {Yue Sun} and {Elmar Tischhauser} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Fast Software Encryption - 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers}
}
@inproceedings{conf/icb/SimoensYZBBNP12,
title = {Criteria towards metrics for benchmarking template protection algorithms.},
year = {2012},
booktitle = {ICB},
author = {{Koen Simoens} and {Bian Yang} and {Xuebing Zhou} and {Filipe Beato} and {Christoph Busch 001} and {Elaine M. Newton} and {Bart Preneel}},
publisher = {IEEE},
booktitle = {5th IAPR International Conference on Biometrics, ICB 2012, New Delhi, India, March 29 - April 1, 2012}
}
@inproceedings{conf/icmcs/WengBDPS12,
title = {Robust Image Content Authentication with Tamper Location.},
year = {2012},
booktitle = {ICME},
author = {{Li Weng} and {Geert Braeckman} and {Ann Dooms} and {Bart Preneel} and {Peter Schelkens}},
publisher = {IEEE Computer Society},
booktitle = {Proceedings of the 2012 IEEE International Conference on Multimedia and Expo, ICME 2012, Melbourne, Australia, July 9-13, 2012}
}
@inproceedings{conf/pcm/WengDPMD12,
title = {Robust Image Content Authentication Using Perceptual Hashing and Watermarking.},
year = {2012},
booktitle = {PCM},
author = {{Li Weng} and {Rony Darazi} and {Bart Preneel} and {Benoît Macq} and {Ann Dooms}},
publisher = {Springer},
booktitle = {Advances in Multimedia Information Processing - PCM 2012 - 13th Pacific-Rim Conference on Multimedia, Singapore, December 4-6, 2012. Proceedings}
}
@inproceedings{conf/sac/MavrogiannopoulosTP12,
title = {A linux kernel cryptographic framework: decoupling cryptographic keys from applications.},
year = {2012},
booktitle = {SAC},
author = {{Nikos Mavrogiannopoulos} and {Miloslav Trmac} and {Bart Preneel}},
publisher = {ACM},
booktitle = {Proceedings of the ACM Symposium on Applied Computing, SAC 2012, Riva, Trento, Italy, March 26-30, 2012}
}
@inproceedings{conf/sacrypt/MulderRP12,
title = {Cryptanalysis of the Xiao - Lai White-Box AES Implementation.},
year = {2012},
booktitle = {Selected Areas in Cryptography},
author = {{Yoni De Mulder} and {Peter Roelse} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Selected Areas in Cryptography, 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers}
}
@article{journals/dagstuhl-reports/ArmknechtLPR12,
title = {Symmetric Cryptography (Dagstuhl Seminar 12031).},
year = {2012},
journal = {Dagstuhl Reports},
author = {{Frederik Armknecht} and {Stefan Lucks} and {Bart Preneel} and {Phillip Rogaway}}
}
@article{journals/iacr/LuykxAMP12,
title = {Impossibility Results for Indifferentiability with Resets.},
year = {2012},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Atul Luykx} and {Elena Andreeva 001} and {Bart Mennink} and {Bart Preneel}}
}
@article{journals/ieicet/HiroseIKOPY12,
title = {An AES Based 256-bit Hash Function for Lightweight Applications: Lesamnta-LW.},
year = {2012},
journal = {IEICE Trans. Fundam. Electron. Commun. Comput. Sci.},
author = {{Shoichi Hirose} and {Kota Ideguchi} and {Hidenori Kuwakado} and {Toru Owada} and {Bart Preneel} and {Hirotaka Yoshida}}
}
@article{journals/ijisec/AndreevaBMPR12,
title = {On security arguments of the second round SHA-3 candidates.},
year = {2012},
journal = {Int. J. Inf. Sec.},
author = {{Elena Andreeva 001} and {Andrey Bogdanov} and {Bart Mennink} and {Bart Preneel} and {Christian Rechberger}}
}
@article{journals/ijisec/AndreevaMP12,
title = {The parazoa family: generalizing the sponge hash functions.},
year = {2012},
journal = {Int. J. Inf. Sec.},
author = {{Elena Andreeva 001} and {Bart Mennink} and {Bart Preneel}}
}
@article{journals/jmc/MouhaSP12,
title = {Challenging the increased resistance of regular hash functions against birthday attacks.},
year = {2012},
journal = {J. Math. Cryptol.},
author = {{Nicky Mouha} and {Gautham Sekar} and {Bart Preneel}}
}
@article{journals/joc/AertsBMMDIKPVV12,
title = {A Practical Attack on KeeLoq.},
year = {2012},
journal = {J. Cryptol.},
author = {{Wim Aerts} and {Eli Biham} and {Dieter De Moitie} and {Elke De Mulder} and {Orr Dunkelman} and {Sebastiaan Indesteege} and {Nathan Keller} and {Bart Preneel} and {Guy A. E. Vandenbosch} and {Ingrid Verbauwhede}}
}
@article{journals/mcm/PreneelKS12,
title = {Advanced theory and practice for cryptography and future security.},
year = {2012},
journal = {Math. Comput. Model.},
author = {{Bart Preneel} and {Jongsung Kim} and {Damien Sauveron}}
}
@article{journals/pervasive/PeetersSP12,
title = {Toward More Secure and Reliable Access Control.},
year = {2012},
journal = {IEEE Pervasive Comput.},
author = {{Roel Peeters} and {Dave Singelée} and {Bart Preneel}}
}
@article{journals/tit/KimHPBDK12,
title = {Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis.},
year = {2012},
journal = {IEEE Trans. Inf. Theory},
author = {{Jongsung Kim} and {Seokhie Hong} and {Bart Preneel} and {Eli Biham} and {Orr Dunkelman} and {Nathan Keller}}
}
@article{journals/tkde/PashalidisP12,
title = {Evaluating Tag-Based Preference Obfuscation Systems.},
year = {2012},
journal = {IEEE Trans. Knowl. Data Eng.},
author = {{Andreas Pashalidis} and {Bart Preneel}}
}
@inproceedings{conf/arc/OttoyPGS13,
title = {Flexible Design of a Modular Simultaneous Exponentiation Core for Embedded Platforms.},
year = {2013},
booktitle = {ARC},
author = {{Geoffrey Ottoy} and {Bart Preneel} and {Jean-Pierre Goemaere} and {Lieven De Strycker}},
publisher = {Springer},
booktitle = {Reconfigurable Computing: Architectures, Tools and Applications - 9th International Symposium, ARC 2013, Los Angeles, CA, USA, March 25-27, 2013. Proceedings}
}
@inproceedings{conf/ccs/AcarJNDGPP13,
title = {FPDetective: dusting the web for fingerprinters.},
year = {2013},
booktitle = {CCS},
author = {{Gunes Acar} and {Marc Juarez} and {Nick Nikiforakis} and {Claudia Díaz} and {Seda F. Gürses} and {Frank Piessens} and {Bart Preneel}},
publisher = {ACM},
booktitle = {2013 ACM SIGSAC Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}
}
@inproceedings{conf/cms/OttoyLNPS13,
title = {Dedicated Hardware for Attribute-Based Credential Verification.},
year = {2013},
booktitle = {Communications and Multimedia Security},
author = {{Geoffrey Ottoy} and {Jorn Lapon} and {Vincent Naessens} and {Bart Preneel} and {Lieven De Strycker}},
publisher = {Springer},
booktitle = {Communications and Multimedia Security - 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September 25-26, 2013. Proceedings}
}
@inproceedings{conf/codaspy/BeatoICPL13,
title = {For some eyes only: protecting online information sharing.},
year = {2013},
booktitle = {CODASPY},
author = {{Filipe Beato} and {Iulia Ion} and {Srdjan Capkun} and {Bart Preneel} and {Marc Langheinrich}},
publisher = {ACM},
booktitle = {Third ACM Conference on Data and Application Security and Privacy, CODASPY'13, San Antonio, TX, USA, February 18-20, 2013}
}
@inproceedings{conf/icip/WallendaelCLBLPW13,
title = {Format-compliant encryption techniques for high efficiency video coding.},
year = {2013},
booktitle = {ICIP},
author = {{Glenn Van Wallendael} and {Jan De Cock} and {Sebastiaan Van Leuven} and {Andras Boho} and {Peter Lambert} and {Bart Preneel} and {Rik Van de Walle}},
publisher = {IEEE},
booktitle = {IEEE International Conference on Image Processing, ICIP 2013, Melbourne, Australia, September 15-18, 2013}
}
@inproceedings{conf/isse/StrackxNVPP13,
title = {Protected Software Module Architectures.},
year = {2013},
booktitle = {ISSE},
author = {{Raoul Strackx} and {Job Noorman} and {Ingrid Verbauwhede} and {Bart Preneel} and {Frank Piessens}},
publisher = {Springer},
booktitle = {ISSE 2013 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2013 Conference, Brussels, Belgium, October 22-23, 2013}
}
@inproceedings{conf/percom/BeatoCP13,
title = {Friend in the Middle (FiM): Tackling de-anonymization in social networks.},
year = {2013},
booktitle = {PerCom Workshops},
author = {{Filipe Beato} and {Mauro Conti} and {Bart Preneel}},
publisher = {IEEE Computer Society},
booktitle = {2013 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM 2013 Workshops, San Diego, CA, USA, March 18-22, 2013}
}
@inproceedings{conf/sacrypt/LepointRMRP13,
title = {Two Attacks on a White-Box AES Implementation.},
year = {2013},
booktitle = {Selected Areas in Cryptography},
author = {{Tancrède Lepoint} and {Matthieu Rivain} and {Yoni De Mulder} and {Peter Roelse} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Selected Areas in Cryptography - SAC 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers}
}
@inproceedings{conf/sdmw/Preneel13,
title = {The Future of Information Security Research: Cryptology and Beyond.},
year = {2013},
booktitle = {Secure Data Management},
author = {{Bart Preneel}},
publisher = {Springer},
booktitle = {Secure Data Management - 10th VLDB Workshop, SDM 2013, Trento, Italy, August 30, 2013, Proceedings}
}
@inproceedings{conf/sin/Preneel13,
title = {The SHA-3 competition: lessons learned.},
year = {2013},
booktitle = {SIN},
author = {{Bart Preneel}},
publisher = {ACM},
booktitle = {The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013}
}
@inproceedings{conf/uss/NoormanADSHHPVP13,
title = {Sancus: Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base.},
year = {2013},
booktitle = {USENIX Security Symposium},
author = {{Job Noorman} and {Pieter Agten} and {Wilfried Daniels} and {Raoul Strackx} and {Anthony Van Herrewege} and {Christophe Huygens} and {Bart Preneel} and {Ingrid Verbauwhede} and {Frank Piessens}},
publisher = {USENIX Association},
booktitle = {Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013}
}
@inproceedings{conf/wpes/HerrmannTDP13,
title = {Optimal sporadic location privacy preserving systems in presence of bandwidth constraints.},
year = {2013},
booktitle = {WPES},
author = {{Michael Herrmann 003} and {Carmela Troncoso} and {Claudia Díaz} and {Bart Preneel}},
publisher = {ACM},
booktitle = {Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, WPES 2013, Berlin, Germany, November 4, 2013}
}
@article{journals/cma/LopezNPPP13,
title = {Preface.},
year = {2013},
journal = {Comput. Math. Appl.},
author = {{Javier López 001} and {Svetla Nikova} and {Andreas Pashalidis} and {Günther Pernul} and {Bart Preneel}}
}
@article{journals/iacr/MouhaP13,
title = {A Proof that the ARX Cipher Salsa20 is Secure against Differential Cryptanalysis.},
year = {2013},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Nicky Mouha} and {Bart Preneel}}
}
@article{journals/iacr/MulderRP13,
title = {Revisiting the BGE Attack on a White-Box AES Implementation.},
year = {2013},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Yoni De Mulder} and {Peter Roelse} and {Bart Preneel}}
}
@article{journals/iacr/WuP13,
title = {AEGIS: A Fast Authenticated Encryption Algorithm.},
year = {2013},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Hongjun Wu 001} and {Bart Preneel}}
}
@article{journals/spm/BohoWDCBSPW13,
title = {End-To-End Security for Video Distribution: The Combination of Encryption, Watermarking, and Video Adaptation.},
year = {2013},
journal = {IEEE Signal Process. Mag.},
author = {{Andras Boho} and {Glenn Van Wallendael} and {Ann Dooms} and {Jan De Cock} and {Geert Braeckman} and {Peter Schelkens} and {Bart Preneel} and {Rik Van de Walle}}
}
@inproceedings{conf/cans/MenninkP14,
title = {Breaking and Fixing Cryptophia's Short Combiner.},
year = {2014},
booktitle = {CANS},
author = {{Bart Mennink} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Cryptology and Network Security - 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings}
}
@inproceedings{conf/cns/BeatoCPV14,
title = {VirtualFriendship: Hiding interactions on Online Social Networks.},
year = {2014},
booktitle = {CNS},
author = {{Filipe Beato} and {Mauro Conti} and {Bart Preneel} and {Dario Vettore}},
publisher = {IEEE},
booktitle = {IEEE Conference on Communications and Network Security, CNS 2014, San Francisco, CA, USA, October 29-31, 2014}
}
@inproceedings{conf/p2p/HerrmannZNDP14,
title = {Censorship-resistant and privacy-preserving distributed web search.},
year = {2014},
booktitle = {P2P},
author = {{Michael Herrmann 003} and {Ren Zhang 003} and {Kai-Chun Ning} and {Claudia Díaz} and {Bart Preneel}},
publisher = {IEEE},
booktitle = {14th IEEE International Conference on Peer-to-Peer Computing, P2P 2014, London, United Kingdom, September 9-11, 2014, Proceedings}
}
@inproceedings{conf/primelife/ToliP14,
title = {A Survey on Multimodal Biometrics and the Protection of Their Templates.},
year = {2014},
booktitle = {Privacy and Identity Management},
author = {{Christina-Angeliki Toli} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Privacy and Identity Management for the Future Internet in the Age of Globalisation - 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Patras, Greece, September 7-12, 2014, Revised Selected Papers}
}
@inproceedings{conf/wisec/HerrmannRDP14,
title = {Practical privacy-preserving location-sharing based services with aggregate statistics.},
year = {2014},
booktitle = {WISEC},
author = {{Michael Herrmann 003} and {Alfredo Rial} and {Claudia Díaz} and {Bart Preneel}},
publisher = {ACM},
booktitle = {7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014}
}
@article{journals/cacm/Preneel14,
title = {Attacking a problem from the middle: technical perspective.},
year = {2014},
journal = {Commun. ACM},
author = {{Bart Preneel}}
}
@article{journals/dagstuhl-reports/ArmknechtHIP14,
title = {Symmetric Cryptography (Dagstuhl Seminar 14021).},
year = {2014},
journal = {Dagstuhl Reports},
author = {{Frederik Armknecht} and {Helena Handschuh} and {Tetsu Iwata} and {Bart Preneel}}
}
@article{journals/dagstuhl-reports/PreneelRRR14,
title = {Privacy and Security in an Age of Surveillance (Dagstuhl Perspectives Workshop 14401).},
year = {2014},
journal = {Dagstuhl Reports},
author = {{Bart Preneel} and {Phillip Rogaway} and {Mark Dermot Ryan} and {Peter Y. A. Ryan}}
}
@article{journals/dcc/IdeguchiTP14,
title = {Internal differential collision attacks on the reduced-round Grøstl-0 hash function.},
year = {2014},
journal = {Des. Codes Cryptogr.},
author = {{Kota Ideguchi} and {Elmar Tischhauser} and {Bart Preneel}}
}
@article{journals/iacr/MenninkP14,
title = {Triple and Quadruple Encryption: Bridging the Gaps.},
year = {2014},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Bart Mennink} and {Bart Preneel}}
}
@article{journals/iacr/MouhaMHWPV14,
title = {Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers.},
year = {2014},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Nicky Mouha} and {Bart Mennink} and {Anthony Van Herrewege} and {Dai Watanabe} and {Bart Preneel} and {Ingrid Verbauwhede}}
}
@article{journals/ijisec/MavrogiannopoulosPP14,
title = {Toward a secure Kerberos key exchange with smart cards.},
year = {2014},
journal = {Int. J. Inf. Sec.},
author = {{Nikos Mavrogiannopoulos} and {Andreas Pashalidis} and {Bart Preneel}}
}
@article{journals/tmc/HermansPP14,
title = {Proper RFID Privacy: Model and Protocols.},
year = {2014},
journal = {IEEE Trans. Mob. Comput.},
author = {{Jens Hermans} and {Roel Peeters} and {Bart Preneel}}
}
@inproceedings{conf/acns/MenninkP15,
title = {On the XOR of Multiple Random Permutations.},
year = {2015},
booktitle = {ACNS},
author = {{Bart Mennink} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Applied Cryptography and Network Security - 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers}
}
@inproceedings{conf/icse/Preneel15,
title = {Software Security: Squaring the Circle?},
year = {2015},
booktitle = {SPRO@ICSE},
author = {{Bart Preneel}},
publisher = {IEEE Computer Society},
booktitle = {1st IEEE/ACM International Workshop on Software Protection, SPRO 2015, Florence, Italy, May 19, 2015}
}
@inproceedings{conf/icse/Preneel15a,
title = {Cryptography and Information Security in the Post-Snowden Era.},
year = {2015},
booktitle = {TELERISE@ICSE},
author = {{Bart Preneel}},
publisher = {IEEE Computer Society},
booktitle = {1st IEEE/ACM International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity, TELERISE 2015, Florence, Italy, May 18, 2015}
}
@inproceedings{conf/sacmat/Preneel15,
title = {Post-Snowden Threat Models.},
year = {2015},
booktitle = {SACMAT},
author = {{Bart Preneel}},
publisher = {ACM},
booktitle = {Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, Vienna, Austria, June 1-3, 2015}
}
@inproceedings{conf/sacrypt/SchroeM0P15,
title = {Forgery and Subkey Recovery on CAESAR Candidate iFeed.},
year = {2015},
booktitle = {SAC},
author = {{Willem Schroé} and {Bart Mennink} and {Elena Andreeva 001} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Selected Areas in Cryptography - SAC 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers}
}
@inproceedings{conf/worldcis/ToliP15,
title = {Provoking security: Spoofing attacks against crypto-biometric systems.},
year = {2015},
booktitle = {WorldCIS},
author = {{Christina-Angeliki Toli} and {Bart Preneel}},
publisher = {IEEE},
booktitle = {2015 World Congress on Internet Security, WorldCIS 2015, Dublin, Ireland, October 19-21, 2015}
}
@article{journals/dcc/AndreevaMP15,
title = {Open problems in hash function security.},
year = {2015},
journal = {Des. Codes Cryptogr.},
author = {{Elena Andreeva 001} and {Bart Mennink} and {Bart Preneel}}
}
@article{journals/iacr/AgievichGKNPRST15,
title = {Problems, solutions and experience of the first international student's Olympiad in cryptography.},
year = {2015},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Sergey Agievich} and {Anastasiya Gorodilova} and {Nikolay Kolomeec} and {Svetla Nikova} and {Bart Preneel} and {Vincent Rijmen} and {George Shushuev} and {Natalia N. Tokareva} and {Valeriya Vitkup}}
}
@article{journals/iacr/MenninkP15,
title = {On the Impact of Known-Key Attacks on Hash Functions.},
year = {2015},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Bart Mennink} and {Bart Preneel}}
}
@article{journals/iacr/SymeonidsBTP15,
title = {Collateral damage of Facebook Apps: an enhanced privacy scoring model.},
year = {2015},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Iraklis Symeonidis} and {Filipe Beato} and {Pagona Tsormpatzoudi} and {Bart Preneel}}
}
@article{journals/iacr/SzepieniecDP15,
title = {Extension Field Cancellation: a New Central Trapdoor for Multivariate Quadratic Systems.},
year = {2015},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Alan Szepieniec} and {Jintai Ding} and {Bart Preneel}}
}
@article{journals/iacr/SzepieniecP15,
title = {New Techniques for Electronic Voting.},
year = {2015},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Alan Szepieniec} and {Bart Preneel}}
}
@article{journals/jmc/LuykxMPW15,
title = {Two-permutation-based hashing with binary mixing.},
year = {2015},
journal = {J. Math. Cryptol.},
author = {{Atul Luykx} and {Bart Mennink} and {Bart Preneel} and {Laura Winnen}}
}
@article{journals/tecs/ScheirBRPV15,
title = {Anonymous Split E-Cash - Toward Mobile Anonymous Payments.},
year = {2015},
journal = {ACM Trans. Embed. Comput. Syst.},
author = {{Marijn Scheir} and {Josep Balasch} and {Alfredo Rial} and {Bart Preneel} and {Ingrid Verbauwhede}}
}
@inproceedings{conf/acsac/MarinSGCWP16,
title = {On the (in)security of the latest generation implantable cardiac defibrillators and how to secure them.},
year = {2016},
booktitle = {ACSAC},
author = {{Eduard Marin} and {Dave Singelée} and {Flavio D. Garcia} and {Tom Chothia} and {Rik Willems} and {Bart Preneel}},
publisher = {ACM},
booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Los Angeles, CA, USA, December 5-9, 2016}
}
@inproceedings{conf/adhoc-now/MarinMSP16,
title = {A Privacy-Preserving Remote Healthcare System Offering End-to-End Security.},
year = {2016},
booktitle = {ADHOC-NOW},
author = {{Eduard Marin} and {Mustafa A. Mustafa} and {Dave Singelée} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Ad-hoc, Mobile, and Wireless Networks - 15th International Conference, ADHOC-NOW 2016, Lille, France, July 4-6, 2016, Proceedings}
}
@inproceedings{conf/cans/AbidinAP16,
title = {An Efficient Entity Authentication Protocol with Enhanced Security and Privacy Properties.},
year = {2016},
booktitle = {CANS},
author = {{Aysajan Abidin} and {Enrique Argones-Rúa} and {Bart Preneel}},
booktitle = {Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings}
}
@inproceedings{conf/cans/ToliAP16,
title = {A Privacy-Preserving Model for Biometric Fusion.},
year = {2016},
booktitle = {CANS},
author = {{Christina-Angeliki Toli} and {Abdelrahaman Aly} and {Bart Preneel}},
booktitle = {Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings}
}
@inproceedings{conf/codaspy/MarinS0VP16,
title = {On the Feasibility of Cryptography for a Wireless Insulin Pump System.},
year = {2016},
booktitle = {CODASPY},
author = {{Eduard Marin} and {Dave Singelée} and {Bohan Yang 001} and {Ingrid Verbauwhede} and {Bart Preneel}},
publisher = {ACM},
booktitle = {Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, CODASPY 2016, New Orleans, LA, USA, March 9-11, 2016}
}
@inproceedings{conf/date/ClercqKC0MBPSV16,
title = {SOFIA: Software and control flow integrity architecture.},
year = {2016},
booktitle = {DATE},
author = {{Ruan de Clercq} and {Ronald De Keulenaer} and {Bart Coppens 001} and {Bohan Yang 001} and {Pieter Maene} and {Koen De Bosschere} and {Bart Preneel} and {Bjorn De Sutter} and {Ingrid Verbauwhede}},
publisher = {IEEE},
booktitle = {2016 Design, Automation & Test in Europe Conference & Exhibition, DATE 2016, Dresden, Germany, March 14-18, 2016}
}
@inproceedings{conf/hase/CleemputMP16,
title = {High Assurance Smart Metering.},
year = {2016},
booktitle = {HASE},
author = {{Sara Cleemput} and {Mustafa A. Mustafa} and {Bart Preneel}},
publisher = {IEEE Computer Society},
booktitle = {17th IEEE International Symposium on High Assurance Systems Engineering, HASE 2016, Orlando, FL, USA, January 7-9, 2016}
}
@inproceedings{conf/icissp/SymeonidisTP16,
title = {Collateral Damage of Online Social Network Applications.},
year = {2016},
booktitle = {ICISSP},
author = {{Iraklis Symeonidis} and {Pagona Tsormpatzoudi} and {Bart Preneel}},
publisher = {SciTePress},
booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, ICISSP 2016, Rome, Italy, February 19-21, 2016.}
}
@inproceedings{conf/iit/Preneel16,
title = {Keynote speakers: The future of information security.},
year = {2016},
booktitle = {IIT},
author = {{Bart Preneel}},
publisher = {IEEE Computer Society},
booktitle = {2016 12th International Conference on Innovations in Information Technology (IIT), Al-Ain, United Arab Emirates, November 28-30, 2016}
}
@inproceedings{conf/iolts/KimHPV16,
title = {Binary decision diagram to design balanced secure logic styles.},
year = {2016},
booktitle = {IOLTS},
author = {{Hyunmin Kim} and {Seokhie Hong} and {Bart Preneel} and {Ingrid Verbauwhede}},
publisher = {IEEE},
booktitle = {22nd IEEE International Symposium on On-Line Testing and Robust System Design, IOLTS 2016, Sant Feliu de Guixols, Spain, July 4-6, 2016}
}
@inproceedings{conf/isc2/SymeonidisMP16,
title = {Keyless car sharing system: A security and privacy analysis.},
year = {2016},
booktitle = {ISC2},
author = {{Iraklis Symeonidis} and {Mustafa A. Mustafa} and {Bart Preneel}},
publisher = {IEEE},
booktitle = {IEEE International Smart Cities Conference, ISC2 2016, Trento, Italy, September 12-15, 2016}
}
@inproceedings{conf/rfidsec/AbidinMSP16,
title = {Towards Quantum Distance Bounding Protocols.},
year = {2016},
booktitle = {RFIDSec},
author = {{Aysajan Abidin} and {Eduard Marin} and {Dave Singelée} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Radio Frequency Identification and IoT Security - 12th International Workshop, RFIDSec 2016, Hong Kong, China, November 30 - December 2, 2016, Revised Selected Papers}
}
@inproceedings{conf/sec/SymeonidisSBPP16,
title = {Collateral Damage of Facebook Apps: Friends, Providers, and Privacy Interdependence.},
year = {2016},
booktitle = {SEC},
author = {{Iraklis Symeonidis} and {Fatemeh Shirazi} and {Gergely Biczók} and {Cristina Pérez-Solà} and {Bart Preneel}},
publisher = {Springer},
booktitle = {ICT Systems Security and Privacy Protection - 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings}
}
@inproceedings{conf/uss/RazaviGBPGB16,
title = {Flip Feng Shui: Hammering a Needle in the Software Stack.},
year = {2016},
booktitle = {USENIX Security Symposium},
author = {{Kaveh Razavi} and {Ben Gras} and {Erik Bosman} and {Bart Preneel} and {Cristiano Giuffrida} and {Herbert Bos}},
publisher = {USENIX Association},
booktitle = {25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10-12, 2016.}
}
@inproceedings{conf/wistp/MuhlbergCMBPP16,
title = {An Implementation of a High Assurance Smart Meter Using Protected Module Architectures.},
year = {2016},
booktitle = {WISTP},
author = {{Jan Tobias Mühlberg} and {Sara Cleemput} and {Mustafa A. Mustafa} and {Jo Van Bulck} and {Bart Preneel} and {Frank Piessens}},
publisher = {Springer},
booktitle = {Information Security Theory and Practice - 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings}
}
@article{journals/comcom/BeatoMP16,
title = {Practical identity-based private sharing for online social networks.},
year = {2016},
journal = {Comput. Commun.},
author = {{Filipe Beato} and {Stijn Meul} and {Bart Preneel}}
}
@article{journals/dagstuhl-reports/ArmknechtINP16,
title = {Symmetric Cryptography (Dagstuhl Seminar 16021).},
year = {2016},
journal = {Dagstuhl Reports},
author = {{Frederik Armknecht} and {Tetsu Iwata} and {Kaisa Nyberg} and {Bart Preneel}}
}
@article{journals/dagstuhl-reports/Danezis0PP16,
title = {Privacy and Security in Smart Energy Grids (Dagstuhl Seminar 16032).},
year = {2016},
journal = {Dagstuhl Reports},
author = {{George Danezis} and {Stefan Katzenbeisser 001} and {Christiane Peters} and {Bart Preneel}}
}
@article{journals/iacr/LuykxPSY16,
title = {On the Influence of Message Length in PMAC's Security Bounds.},
year = {2016},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Atul Luykx} and {Bart Preneel} and {Alan Szepieniec} and {Kan Yasuda}}
}
@article{journals/iacr/LuykxPTY16,
title = {A MAC Mode for Lightweight Block Ciphers.},
year = {2016},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Atul Luykx} and {Bart Preneel} and {Elmar Tischhauser} and {Kan Yasuda}}
}
@article{journals/iacr/MarinASP16,
title = {A survey on physiological-signal-based security for medical devices.},
year = {2016},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Eduard Marin} and {Enrique Argones-Rúa} and {Dave Singelée} and {Bart Preneel}}
}
@article{journals/iacr/SymeonidsP16,
title = {Collateral Damage in Online Social Networks: computing the significance of information collection.},
year = {2016},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Iraklis Symeonidis} and {Bart Preneel}}
}
@article{journals/ijisec/MenninkP16,
title = {Efficient parallelizable hashing using small non-compressing primitives.},
year = {2016},
journal = {Int. J. Inf. Sec.},
author = {{Bart Mennink} and {Bart Preneel}}
}
@article{journals/scn/OttoyHPSG16,
title = {On the choice of the appropriate AES data encryption method for ZigBee nodes.},
year = {2016},
journal = {Secur. Commun. Networks},
author = {{Geoffrey Ottoy} and {Tom Hamelinckx} and {Bart Preneel} and {Lieven De Strycker} and {Jean-Pierre Goemaere}}
}
@inproceedings{conf/cans/AshurDLMMNRRS0P17,
title = {A Privacy-Preserving Device Tracking System Using a Low-Power Wide-Area Network.},
year = {2017},
booktitle = {CANS},
author = {{Tomer Ashur} and {Jeroen Delvaux} and {Sanghan Lee} and {Pieter Maene} and {Eduard Marin} and {Svetla Nikova} and {Oscar Reparaz} and {Vladimir Rozic} and {Dave Singelée} and {Bohan Yang 001} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Cryptology and Network Security - 16th International Conference, CANS 2017, Hong Kong, China, November 30 - December 2, 2017, Revised Selected Papers}
}
@inproceedings{conf/ccs/ClercqKMPSV17,
title = {SCM: Secure Code Memory Architecture.},
year = {2017},
booktitle = {AsiaCCS},
author = {{Ruan de Clercq} and {Ronald De Keulenaer} and {Pieter Maene} and {Bart Preneel} and {Bjorn De Sutter} and {Ingrid Verbauwhede}},
publisher = {ACM},
booktitle = {Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017}
}
@inproceedings{conf/ctrsa/ZhangP17,
title = {Publish or Perish: A Backward-Compatible Defense Against Selfish Mining in Bitcoin.},
year = {2017},
booktitle = {CT-RSA},
author = {{Ren Zhang 003} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Topics in Cryptology - CT-RSA 2017 - The Cryptographers' Track at the RSA Conference 2017, San Francisco, CA, USA, February 14-17, 2017, Proceedings}
}
@inproceedings{conf/esorics/SymeonidisAMMDP17,
title = {SePCAR: A Secure and Privacy-Enhancing Protocol for Car Access Provision.},
year = {2017},
booktitle = {ESORICS (2)},
author = {{Iraklis Symeonidis} and {Abdelrahaman Aly} and {Mustafa A. Mustafa} and {Bart Mennink} and {Siemen Dhooghe} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II}
}
@inproceedings{conf/eurosp/EtemadBKP17,
title = {Are You Really My Friend? Efficient and Secure Friend-Matching in Mobile Social Networks.},
year = {2017},
booktitle = {EuroS&P Workshops},
author = {{Mohammad Etemad} and {Filipe Beato} and {Alptekin Küpçü} and {Bart Preneel}},
publisher = {IEEE},
booktitle = {2017 IEEE European Symposium on Security and Privacy Workshops, EuroS&P Workshops 2017, Paris, France, April 26-28, 2017}
}
@inproceedings{conf/icissp/Preneel17,
title = {The Future of Information Security.},
year = {2017},
booktitle = {ICISSP},
author = {{Bart Preneel}},
publisher = {SciTePress},
booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, ICISSP 2017, Porto, Portugal, February 19-21, 2017.}
}
@inproceedings{conf/isvlsi/KimHPV17,
title = {STBC: Side Channel Attack Tolerant Balanced Circuit with Reduced Propagation Delay.},
year = {2017},
booktitle = {ISVLSI},
author = {{Hyunmin Kim} and {Seokhie Hong} and {Bart Preneel} and {Ingrid Verbauwhede}},
publisher = {IEEE Computer Society},
booktitle = {2017 IEEE Computer Society Annual Symposium on VLSI, ISVLSI 2017, Bochum, Germany, July 3-5, 2017}
}
@inproceedings{conf/wisec/RobynsMLQSP17,
title = {Physical-layer fingerprinting of LoRa devices using supervised and zero-shot learning.},
year = {2017},
booktitle = {WISEC},
author = {{Pieter Robyns} and {Eduard Marin} and {Wim Lamotte} and {Peter Quax} and {Dave Singelée} and {Bart Preneel}},
publisher = {ACM},
booktitle = {Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20, 2017}
}
@article{journals/iacr/BeullensP17,
title = {Field lifting for smaller UOV public keys.},
year = {2017},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Ward Beullens} and {Bart Preneel}}
}
@article{journals/iacr/ChenLMP17,
title = {Efficient Length Doubling From Tweakable Block Ciphers.},
year = {2017},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Yu Long Chen} and {Atul Luykx} and {Bart Mennink} and {Bart Preneel}}
}
@article{journals/iacr/SymeonidisAMP17,
title = {PePTCAP: A Privacy-enhancing Protocol for(Temporary) Car Access Provision.},
year = {2017},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Iraklis Symeonidis} and {Abdelrahaman Aly} and {Mustafa A. Mustafa} and {Bart Preneel}}
}
@article{journals/iacr/SzepieniecBP17,
title = {MQ Signatures for PKI.},
year = {2017},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Alan Szepieniec} and {Ward Beullens} and {Bart Preneel}}
}
@article{journals/iacr/SzepieniecP17,
title = {Short Solutions to Nonlinear Systems of Equations.},
year = {2017},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Alan Szepieniec} and {Bart Preneel}}
}
@article{journals/iacr/ZhangP17,
title = {On the Necessity of a Prescribed Block Validity Consensus: Analyzing Bitcoin Unlimited Mining Protocol.},
year = {2017},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Ren Zhang 003} and {Bart Preneel}}
}
@article{journals/tissec/NoormanBMPMPVGM17,
title = {Sancus 2.0: A Low-Cost Security Architecture for IoT Devices.},
year = {2017},
journal = {ACM Trans. Priv. Secur.},
author = {{Job Noorman} and {Jo Van Bulck} and {Jan Tobias Mühlberg} and {Frank Piessens} and {Pieter Maene} and {Bart Preneel} and {Ingrid Verbauwhede} and {Johannes Götzfried} and {Tilo Müller} and {Felix C. Freiling}}
}
@article{journals/tosc/Naya-PlasenciaP17,
title = {Preface.},
year = {2017},
journal = {IACR Trans. Symmetric Cryptol.},
author = {{María Naya-Plasencia} and {Bart Preneel}}
}
@inproceedings{conf/codaspy/MarinS0VVNP18,
title = {Securing Wireless Neurostimulators.},
year = {2018},
booktitle = {CODASPY},
author = {{Eduard Marin} and {Dave Singelée} and {Bohan Yang 001} and {Vladimir Volskiy} and {Guy A. E. Vandenbosch} and {Bart Nuttin} and {Bart Preneel}},
publisher = {ACM},
booktitle = {Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018}
}
@inproceedings{conf/giots/CleemputMMP18,
title = {De-pseudonymization of Smart Metering Data: Analysis and Countermeasures.},
year = {2018},
booktitle = {GIoTS},
author = {{Sara Cleemput} and {Mustafa A. Mustafa} and {Eduard Marin} and {Bart Preneel}},
publisher = {IEEE},
booktitle = {2018 Global Internet of Things Summit, GIoTS 2018, Bilbao, Spain, June 4-7, 2018}
}
@inproceedings{conf/icissp/ToliP18,
title = {Privacy-preserving Biometric Authentication Model for e-Finance Applications.},
year = {2018},
booktitle = {ICISSP},
author = {{Christina-Angeliki Toli} and {Bart Preneel}},
publisher = {SciTePress},
booktitle = {Proceedings of the 4th International Conference on Information Systems Security and Privacy, ICISSP 2018, Funchal, Madeira - Portugal, January 22-24, 2018.}
}
@article{journals/ccds/HellesethP18,
title = {Editorial: Special issue on recent trends in cryptography.},
year = {2018},
journal = {Cryptogr. Commun.},
author = {{Tor Helleseth} and {Bart Preneel}}
}
@article{journals/compsec/SymeonidisBSPSP18,
title = {Collateral damage of Facebook third-party applications: a comprehensive study.},
year = {2018},
journal = {Comput. Secur.},
author = {{Iraklis Symeonidis} and {Gergely Biczók} and {Fatemeh Shirazi} and {Cristina Pérez-Solà} and {Jessica Schroers} and {Bart Preneel}}
}
@article{journals/corr/abs-1806-02059,
title = {Problems and solutions of the Fourth International Students' Olympiad in Cryptography NSUCRYPTO.},
year = {2018},
journal = {CoRR},
author = {{Anastasiya Gorodilova} and {Sergey Agievich} and {Claude Carlet} and {Evgeny Gorkunov} and {Valeriya Idrisova} and {Nikolay Kolomeec} and {Alexandr Kutsenko} and {Svetla Nikova} and {Alexey Oblaukhov} and {Stjepan Picek} and {Bart Preneel} and {Vincent Rijmen} and {Natalia N. Tokareva}}
}
@article{journals/iacr/BeullensPS18,
title = {Public Key Compression for Constrained Linear Signature Schemes.},
year = {2018},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Ward Beullens} and {Bart Preneel} and {Alan Szepieniec}}
}
@article{journals/iacr/LuykxP18,
title = {Optimal Forgeries Against Polynomial-Based MACs and GCM.},
year = {2018},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Atul Luykx} and {Bart Preneel}}
}
@article{journals/iacr/SymeonidisBSPSP18,
title = {Collateral Damage of Facebook Applications: a Comprehensive Study.},
year = {2018},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Iraklis Symeonidis} and {Gergely Biczók} and {Fatemeh Shirazi} and {Cristina Pérez-Solà} and {Jessica Schroers} and {Bart Preneel}}
}
@article{journals/iacr/SzepieniecRP18,
title = {Key Encapsulation from Noisy Key Agreement in the Quantum Random Oracle Model.},
year = {2018},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Alan Szepieniec} and {Reza Reyhanitabar} and {Bart Preneel}}
}
@article{journals/tifs/BiesmansBRPV18,
title = {Private Mobile Pay-TV From Priced Oblivious Transfer.},
year = {2018},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Wouter Biesmans} and {Josep Balasch} and {Alfredo Rial} and {Bart Preneel} and {Ingrid Verbauwhede}}
}
@inproceedings{conf/cscn/YoshizawaP19,
title = {Survey of Security Aspect of V2X Standards and Related Issues.},
year = {2019},
booktitle = {CSCN},
author = {{Takahito Yoshizawa} and {Bart Preneel}},
publisher = {IEEE},
booktitle = {2019 IEEE Conference on Standards for Communications and Networking, CSCN 2019, Granada, Spain, October 28-30, 2019}
}
@inproceedings{conf/icissp/MadhusudanSMZP19,
title = {SC2Share: Smart Contract for Secure Car Sharing.},
year = {2019},
booktitle = {ICISSP},
author = {{Akash Madhusudan} and {Iraklis Symeonidis} and {Mustafa A. Mustafa} and {Ren Zhang 003} and {Bart Preneel}},
publisher = {SciTePress},
booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, ICISSP 2019, Prague, Czech Republic, February 23-25, 2019.}
}
@inproceedings{conf/sacmat/MarinASP19,
title = {On the Difficulty of Using Patient's Physiological Signals in Cryptographic Protocols.},
year = {2019},
booktitle = {SACMAT},
author = {{Eduard Marin} and {Enrique Argones-Rúa} and {Dave Singelée} and {Bart Preneel}},
publisher = {ACM},
booktitle = {Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, SACMAT 2019, Toronto, ON, Canada, June 03-06, 2019}
}
@inproceedings{conf/sp/0003P19,
title = {Lay Down the Common Metrics: Evaluating Proof-of-Work Consensus Protocols' Security.},
year = {2019},
booktitle = {IEEE Symposium on Security and Privacy},
author = {{Ren Zhang 003} and {Bart Preneel}},
publisher = {IEEE},
booktitle = {2019 IEEE Symposium on Security and Privacy, SP 2019, San Francisco, CA, USA, May 19-23, 2019}
}
@article{journals/cryptologia/GorodilovaACGIK19,
title = {Problems and solutions from the fourth International Students' Olympiad in Cryptography (NSUCRYPTO).},
year = {2019},
journal = {Cryptologia},
author = {{Anastasiya Gorodilova} and {Sergey Agievich} and {Claude Carlet} and {Evgeny Gorkunov} and {Valeriya Idrisova} and {Nikolay Kolomeec} and {Alexandr Kutsenko} and {Svetla Nikova} and {Alexey Oblaukhov} and {Stjepan Picek} and {Bart Preneel} and {Vincent Rijmen} and {Natalia N. Tokareva}}
}
@article{journals/iacr/LiP19,
title = {Improved Interpolation Attacks on Cryptographic Primitives of Low Algebraic Degree.},
year = {2019},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Chaoyun Li} and {Bart Preneel}}
}
@article{journals/iacr/SzepieniecP19,
title = {Block-Anti-Circulant Unbalanced Oil and Vinegar.},
year = {2019},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Alan Szepieniec} and {Bart Preneel}}
}
@article{journals/tches/WoutersMAGP19,
title = {Fast, Furious and Insecure: Passive Keyless Entry and Start Systems in Modern Supercars.},
year = {2019},
journal = {IACR Trans. Cryptogr. Hardw. Embed. Syst.},
author = {{Lennert Wouters} and {Eduard Marin} and {Tomer Ashur} and {Benedikt Gierlichs} and {Bart Preneel}}
}
@inproceedings{conf/aiccsa/Preneel20,
title = {Big Data against Corona: Mass Surveillance or Privacy by Design? Keynote.},
year = {2020},
booktitle = {AICCSA},
author = {{Bart Preneel}},
publisher = {IEEE},
booktitle = {17th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2020, Antalya, Turkey, November 2-5, 2020}
}
@inproceedings{conf/mobiwac/YoshizawaP20,
title = {Verification Schemes of Multi-SIM Devices in Mobile Communication Systems.},
year = {2020},
booktitle = {MobiWac},
author = {{Takahito Yoshizawa} and {Bart Preneel}},
publisher = {ACM},
booktitle = {Proceedings of the 18th ACM International Symposium on Mobility Management and Wireless Access, MobiWac 2020, Alicante, Spain, November 16-20, 2020.}
}
@inproceedings{conf/sac/ReniersG00MLNLL20,
title = {Authenticated and auditable data sharing via smart contract.},
year = {2020},
booktitle = {SAC},
author = {{Vincent Reniers} and {Yuan Gao} and {Ren Zhang 003} and {Paolo Viviani 001} and {Akash Madhusudan} and {Bert Lagaisse} and {Svetla Nikova} and {Dimitri Van Landuyt} and {Riccardo Lombardi} and {Bart Preneel} and {Wouter Joosen}},
publisher = {ACM},
booktitle = {SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30 - April 3, 2020}
}
@article{journals/corr/abs-2005-12273,
title = {Decentralized Privacy-Preserving Proximity Tracing.},
year = {2020},
journal = {CoRR},
author = {{Carmela Troncoso} and {Mathias Payer} and {Jean-Pierre Hubaux} and {Marcel Salathé} and {James R. Larus} and {Edouard Bugnion} and {Wouter Lueks} and {Theresa Stadler} and {Apostolos Pyrgelis} and {Daniele Antonioli} and {Ludovic Barman} and {Sylvain Chatel} and {Kenneth G. Paterson} and {Srdjan Capkun} and {David A. Basin} and {Jan Beutel} and {Dennis Jackson} and {Marc Roeschlin} and {Patrick Leu} and {Bart Preneel} and {Nigel P. Smart} and {Aysajan Abidin} and {Seda F. Gürses} and {Michael Veale} and {Cas Cremers} and {Michael Backes 001} and {Nils Ole Tippenhauer} and {Reuben Binns} and {Ciro Cattuto} and {Alain Barrat} and {Dario Fiore 001} and {Manuel Barbosa} and {Rui Oliveira 001} and {José Pereira 001}}
}
@article{journals/corr/abs-2012-12927,
title = {Towards a common performance and effectiveness terminology for digital proximity tracing applications.},
year = {2020},
journal = {CoRR},
author = {{Justus Benzler} and {Dan Bogdanov} and {Göran Kirchner} and {Wouter Lueks} and {Raquel Lucas} and {Rui Oliveira 001} and {Bart Preneel} and {Marcel Salathé} and {Carmela Troncoso} and {Viktor von Wyl}}
}
@article{journals/cryptologia/GorodilovaACHIK20,
title = {The Fifth International Students' Olympiad in cryptography - NSUCRYPTO: Problems and their solutions.},
year = {2020},
journal = {Cryptologia},
author = {{Anastasiya Gorodilova} and {Sergey Agievich} and {Claude Carlet} and {Xiang-dong Hou} and {Valeriya Idrisova} and {Nikolay Kolomeec} and {Alexandr Kutsenko} and {Luca Mariot} and {Alexey Oblaukhov} and {Stjepan Picek} and {Bart Preneel} and {Razvan Rosie} and {Natalia N. Tokareva}}
}
@article{journals/debu/TroncosoPHSLLSP20,
title = {Decentralized Privacy-Preserving Proximity Tracing.},
year = {2020},
journal = {IEEE Data Eng. Bull.},
author = {{Carmela Troncoso} and {Mathias Payer} and {Jean-Pierre Hubaux} and {Marcel Salathé} and {James R. Larus} and {Wouter Lueks} and {Theresa Stadler} and {Apostolos Pyrgelis} and {Daniele Antonioli} and {Ludovic Barman} and {Sylvain Chatel} and {Kenneth G. Paterson} and {Srdjan Capkun} and {David A. Basin} and {Jan Beutel} and {Dennis Jackson} and {Marc Roeschlin} and {Patrick Leu} and {Bart Preneel} and {Nigel P. Smart} and {Aysajan Abidin} and {Seda Gurses} and {Michael Veale} and {Cas Cremers} and {Michael Backes 001} and {Nils Ole Tippenhauer} and {Reuben Binns} and {Ciro Cattuto} and {Alain Barrat} and {Dario Fiore 001} and {Manuel Barbosa} and {Rui Oliveira 001} and {José Pereira 001}}
}
@article{journals/iacr/RaneaP20,
title = {On Self-Equivalence Encodings in White-Box Implementations.},
year = {2020},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Adrián Ranea} and {Bart Preneel}}
}
@article{journals/iacr/ZhangZWXP20,
title = {NC-Max: Breaking the Throughput Limit of Nakamoto Consensus.},
year = {2020},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Ren Zhang 003} and {Dingwei Zhang} and {Quake Wang} and {Jan Xie} and {Bart Preneel}}
}
@article{journals/tches/WoutersAGP20,
title = {Revisiting a Methodology for Efficient CNN Architectures in Profiling Attacks.},
year = {2020},
journal = {IACR Trans. Cryptogr. Hardw. Embed. Syst.},
author = {{Lennert Wouters} and {Victor Arribas} and {Benedikt Gierlichs} and {Bart Preneel}}
}
@article{journals/tches/WoutersHGOGP20,
title = {Dismantling DST80-based Immobiliser Systems.},
year = {2020},
journal = {IACR Trans. Cryptogr. Hardw. Embed. Syst.},
author = {{Lennert Wouters} and {Jan Van den Herrewegen} and {Flavio D. Garcia} and {David F. Oswald} and {Benedikt Gierlichs} and {Bart Preneel}}
}
@inproceedings{conf/esorics/YoshizawaSP21,
title = {A New Privacy Enhancing Beacon Scheme in V2X Communication.},
year = {2021},
booktitle = {DPM/CBT@ESORICS},
author = {{Takahito Yoshizawa} and {Dave Singelée} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2021 International Workshops, DPM 2021 and CBT 2021, Darmstadt, Germany, October 8, 2021, Revised Selected Papers}
}
@inproceedings{conf/isgt/0002MEP21,
title = {Off-chain state channels in the energy domain.},
year = {2021},
booktitle = {ISGT},
author = {{Clemens Brunner 002} and {Akash Madhusudan} and {Dominik Engel} and {Bart Preneel}},
publisher = {IEEE},
booktitle = {IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, ISGT 2021, Washington, DC, USA, February 16-18, 2021}
}
@inproceedings{conf/sac/FigueiredoMRNP21,
title = {Exploring the storj network: a security analysis.},
year = {2021},
booktitle = {SAC},
author = {{Sammy de Figueiredo} and {Akash Madhusudan} and {Vincent Reniers} and {Svetla Nikova} and {Bart Preneel}},
publisher = {ACM},
booktitle = {SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, Republic of Korea, March 22-26, 2021}
}
@article{journals/fdgth/LueksBBKL0PSTW21,
title = {Toward a Common Performance and Effectiveness Terminology for Digital Proximity Tracing Applications.},
year = {2021},
journal = {Frontiers Digit. Health},
author = {{Wouter Lueks} and {Justus Benzler} and {Dan Bogdanov} and {Göran Kirchner} and {Raquel Lucas} and {Rui Oliveira 001} and {Bart Preneel} and {Marcel Salathé} and {Carmela Troncoso} and {Viktor von Wyl}}
}
@article{journals/iacr/AndreevaBPV21,
title = {1, 2, 3, Fork: Counter Mode Variants based on a Generalized Forkcipher.},
year = {2021},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Elena Andreeva 001} and {Amit Singh Bhati} and {Bart Preneel} and {Damian Vizár}}
}
@article{journals/iacr/ChenMP21,
title = {Categorization of Faulty Nonce Misuse Resistant Message Authentication.},
year = {2021},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Yu Long Chen} and {Bart Mennink} and {Bart Preneel}}
}
@article{journals/iacr/SedaghatP21,
title = {Cross-Domain Attribute-Based Access Control Encryption.},
year = {2021},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Mahdi Sedaghat} and {Bart Preneel}}
}
@article{journals/tches/WoutersGP21,
title = {My other car is your car: compromising the Tesla Model X keyless entry system.},
year = {2021},
journal = {IACR Trans. Cryptogr. Hardw. Embed. Syst.},
author = {{Lennert Wouters} and {Benedikt Gierlichs} and {Bart Preneel}}
}
@article{journals/tit/ChenLMP21,
title = {Systematic Security Analysis of Stream Encryption With Key Erasure.},
year = {2021},
journal = {IEEE Trans. Inf. Theory},
author = {{Yu Long Chen} and {Atul Luykx} and {Bart Mennink} and {Bart Preneel}}
}
@inproceedings{conf/acns/VandersmissenRP22,
title = {A White-Box Speck Implementation Using Self-equivalence Encodings.},
year = {2022},
booktitle = {ACNS},
author = {{Joachim Vandersmissen} and {Adrián Ranea} and {Bart Preneel}},
publisher = {Springer},
booktitle = {Applied Cryptography and Network Security - 20th International Conference, ACNS 2022, Rome, Italy, June 20-23, 2022, Proceedings}
}
@inproceedings{conf/ccnc/DuttaguptaSP22,
title = {T-HIBE: A Novel Key Establishment Solution for Decentralized, Multi-Tenant IoT Systems.},
year = {2022},
booktitle = {CCNC},
author = {{Sayon Duttagupta} and {Dave Singelée} and {Bart Preneel}},
publisher = {IEEE},
booktitle = {19th IEEE Annual Consumer Communications & Networking Conference, CCNC 2022, Las Vegas, NV, USA, January 8-11, 2022}
}
@inproceedings{conf/cscn/YoshizawaP22,
title = {Misbehaviour Reporting in ETSI ITS Standard Considered Broken.},
year = {2022},
booktitle = {CSCN},
author = {{Takahito Yoshizawa} and {Bart Preneel}},
publisher = {IEEE},
booktitle = {IEEE Conference on Standards for Communications and Networking, CSCN 2022, Thessaloniki, Greece, November 28-30, 2022}
}
@inproceedings{conf/ndss/0003ZWWXP22,
title = {NC-Max: Breaking the Security-Performance Tradeoff in Nakamoto Consensus.},
year = {2022},
booktitle = {NDSS},
author = {{Ren Zhang 003} and {Dingwei Zhang} and {Quake Wang} and {Shichen Wu} and {Jan Xie} and {Bart Preneel}},
publisher = {The Internet Society},
booktitle = {29th Annual Network and Distributed System Security Symposium, NDSS 2022, San Diego, California, USA, April 24-28, 2022}
}
@inproceedings{conf/wimob/YoshizawaP22,
title = {On Handling of Certificate Digest in V2X Communication.},
year = {2022},
booktitle = {WiMob},
author = {{Takahito Yoshizawa} and {Bart Preneel}},
publisher = {IEEE},
booktitle = {18th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2022, Thessaloniki, Greece, October 10-12, 2022}
}
@article{journals/access/AghabagherlooDM22,
title = {An Efficient and Physically Secure Privacy-Preserving Authentication Scheme for Vehicular Ad-hoc NETworks (VANETs).},
year = {2022},
journal = {IEEE Access},
author = {{Alireza Aghabagherloo} and {Mahshid Delavar} and {Javad Mohajeri} and {Mahmoud Salmasizadeh} and {Bart Preneel}}
}
@article{journals/cacm/TroncosoBBCCGHJ22,
title = {Deploying decentralized, privacy-preserving proximity tracing.},
year = {2022},
journal = {Commun. ACM},
author = {{Carmela Troncoso} and {Dan Bogdanov} and {Edouard Bugnion} and {Sylvain Chatel} and {Cas Cremers} and {Seda F. Gürses} and {Jean-Pierre Hubaux} and {Dennis Jackson} and {James R. Larus} and {Wouter Lueks} and {Rui Oliveira 001} and {Mathias Payer} and {Bart Preneel} and {Apostolos Pyrgelis} and {Marcel Salathé} and {Theresa Stadler} and {Michael Veale}}
}
@article{journals/iacr/BeckersWGPV22,
title = {Provable Secure Software Masking in the Real-World.},
year = {2022},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Arthur Beckers} and {Lennert Wouters} and {Benedikt Gierlichs} and {Bart Preneel} and {Ingrid Verbauwhede}}
}
@article{journals/iacr/ChaumCCLNPSYYZZ22,
title = {VoteXX: A Solution to Improper Influence in Voter-Verifiable Elections.},
year = {2022},
journal = {IACR Cryptol. ePrint Arch.},
author = {{David Chaum} and {Richard Carback} and {Jeremy Clark} and {Chao Liu} and {Mahdi Nejadgholi} and {Bart Preneel} and {Alan T. Sherman} and {Mario Yaksetig} and {Zeyuan Yin} and {Filip Zagórski} and {Bingsheng Zhang}}
}
@article{journals/iacr/He0PW22,
title = {Stretching Cube Attacks: Improved Methods to Recover Massive Superpolies.},
year = {2022},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Jiahui He} and {Kai Hu 001} and {Bart Preneel} and {Meiqin Wang}}
}
@article{journals/iacr/MadhusudanSJP22,
title = {Nirvana: Instant and Anonymous Payment-Guarantees.},
year = {2022},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Akash Madhusudan} and {Mahdi Sedaghat} and {Philipp Jovanovic} and {Bart Preneel}}
}
@article{journals/iacr/PohleAP22,
title = {Fast Evaluation of S-boxes with Garbled Circuits.},
year = {2022},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Erik Pohle} and {Aysajan Abidin} and {Bart Preneel}}
}
@article{journals/iacr/RaneaVP22,
title = {Implicit White-Box Implementations: White-Boxing ARX Ciphers.},
year = {2022},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Adrián Ranea} and {Joachim Vandersmissen} and {Bart Preneel}}
}
@article{journals/iacr/SedaghatSKP22,
title = {Structure-Preserving Threshold Signatures.},
year = {2022},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Mahdi Sedaghat} and {Daniel Slamanig} and {Markulf Kohlweiss} and {Bart Preneel}}
}
@article{journals/iacr/SunPWW22,
title = {A Greater GIFT: Strengthening GIFT against Statistical Cryptanalysis.},
year = {2022},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Ling Sun 001} and {Bart Preneel} and {Wei Wang 035} and {Meiqin Wang}}
}
@article{journals/iacr/VandersmissenRP22,
title = {A White-Box Speck Implementation using Self-Equivalence Encodings (Full Version).},
year = {2022},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Joachim Vandersmissen} and {Adrián Ranea} and {Bart Preneel}}
}
@article{journals/iacr/WoutersGP22,
title = {On the susceptibility of Texas Instruments SimpleLink platform microcontrollers to non-invasive physical attacks.},
year = {2022},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Lennert Wouters} and {Benedikt Gierlichs} and {Bart Preneel}}
}
@article{journals/imwut/AyalonLPR22,
title = {Not Only for Contact Tracing: Use of Belgium's Contact Tracing App among Young Adults.},
year = {2022},
journal = {Proc. ACM Interact. Mob. Wearable Ubiquitous Technol.},
author = {{Oshrat Ayalon} and {Sophie Li} and {Bart Preneel} and {Elissa M. Redmiles}}
}
@article{journals/iotj/SymeonidisRMMPP22,
title = {HERMES: Scalable, Secure, and Privacy-Enhancing Vehicular Sharing-Access System.},
year = {2022},
journal = {IEEE Internet Things J.},
author = {{Iraklis Symeonidis} and {Dragos Rotaru} and {Mustafa A. Mustafa} and {Bart Mennink} and {Bart Preneel} and {Panos Papadimitratos}}
}
@inproceedings{conf/asiacrypt/CritesKPSS23,
title = {Threshold Structure-Preserving Signatures.},
year = {2023},
booktitle = {ASIACRYPT (2)},
author = {{Elizabeth C. Crites} and {Markulf Kohlweiss} and {Bart Preneel} and {Mahdi Sedaghat} and {Daniel Slamanig}},
publisher = {Springer},
booktitle = {Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part II}
}
@inproceedings{conf/cf/HellemansRPM23,
title = {Yes we CAN!: Towards bringing security to legacy-restricted Controller Area Networks. A review.},
year = {2023},
booktitle = {CF},
author = {{Wouter Hellemans} and {Md Masoom Rabbani} and {Bart Preneel} and {Nele Mentens}},
publisher = {ACM},
booktitle = {Proceedings of the 20th ACM International Conference on Computing Frontiers, CF 2023, Bologna, Italy, May 9-11, 2023}
}
@inproceedings{conf/codaspy/DuttaguptaMSP23,
title = {HAT: Secure and Practical Key Establishment for Implantable Medical Devices.},
year = {2023},
booktitle = {CODASPY},
author = {{Sayon Duttagupta} and {Eduard Marin} and {Dave Singelée} and {Bart Preneel}},
publisher = {ACM},
booktitle = {Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, CODASPY 2023, Charlotte, NC, USA, April 24-26, 2023.}
}
@inproceedings{conf/cscn/YoshizawaP23,
title = {Open Questions in VRU Standards from Security and Privacy Perspectives.},
year = {2023},
booktitle = {CSCN},
author = {{Takahito Yoshizawa} and {Bart Preneel}},
publisher = {IEEE},
booktitle = {IEEE Conference on Standards for Communications and Networking, CSCN 2023, Munich, Germany, November 6-8, 2023}
}
@inproceedings{conf/sp/AghabagherlooGP23,
title = {On the Brittleness of Robust Features: An Exploratory Analysis of Model Robustness and Illusionary Robust Features.},
year = {2023},
booktitle = {SP (Workshops)},
author = {{Alireza Aghabagherloo} and {Rafa Gálvez} and {Davy Preuveneers} and {Bart Preneel}},
publisher = {IEEE},
booktitle = {2023 IEEE Security and Privacy Workshops (SPW), San Francisco, CA, USA, May 25, 2023}
}
@inproceedings{conf/vnc/YoshizawaP23,
title = {A New Approach To Pseudonym Certificate Management in V2X Communication.},
year = {2023},
booktitle = {VNC},
author = {{Takahito Yoshizawa} and {Bart Preneel}},
publisher = {IEEE},
booktitle = {IEEE Vehicular Networking Conference, VNC 2023, Istanbul, Turkey, April 26-28, 2023}
}
@inproceedings{conf/vtc/YoshizawaP23,
title = {Post-Quantum Impacts on V2X Certificates - Already at The End of The Road.},
year = {2023},
booktitle = {VTC2023-Spring},
author = {{Takahito Yoshizawa} and {Bart Preneel}},
publisher = {IEEE},
booktitle = {97th IEEE Vehicular Technology Conference, VTC Spring 2023, Florence, Italy, June 20-23, 2023}
}
@article{journals/csur/YoshizawaSMDTHP23,
title = {A Survey of Security and Privacy Issues in V2X Communication Systems.},
year = {2023},
journal = {ACM Comput. Surv.},
author = {{Takahito Yoshizawa} and {Dave Singelée} and {Jan Tobias Mühlberg} and {Stéphane Delbruel} and {Amir Taherkordi} and {Danny Hughes 001} and {Bart Preneel}}
}
@article{journals/iacr/AbidinPP23,
title = {Arithmetic Circuit Implementations of S-boxes for SKINNY and PHOTON in MPC.},
year = {2023},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Aysajan Abidin} and {Erik Pohle} and {Bart Preneel}}
}
@article{journals/iacr/BhatiDARP23,
title = {Skye: A Fast KDF based on Expanding PRF and its Application to Signal.},
year = {2023},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Amit Singh Bhati} and {Antonin Dufka} and {Elena Andreeva 001} and {Arnab Roy 005} and {Bart Preneel}}
}
@article{journals/iacr/BhatiPAAP23,
title = {Let's Go Eevee! A Friendly and Suitable Family of AEAD Modes for IoT-to-Cloud Secure Computation.},
year = {2023},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Amit Singh Bhati} and {Erik Pohle} and {Aysajan Abidin} and {Elena Andreeva 001} and {Bart Preneel}}
}
@article{journals/iacr/LiuPZW23,
title = {Improved Quantum Circuits for AES: Reducing the Depth and the Number of Qubits.},
year = {2023},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Qun Liu 006} and {Bart Preneel} and {Zheng Zhao} and {Meiqin Wang}}
}
@article{journals/iacr/MadhusudanSTCP23,
title = {Reusable, Instant and Private Payment Guarantees for Cryptocurrencies.},
year = {2023},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Akash Madhusudan} and {Mahdi Sedaghat} and {Samarth Tiwari} and {Kelong Cong} and {Bart Preneel}}
}
@article{journals/iacr/WangNLLPW23,
title = {Cryptanalysis of SPEEDY.},
year = {2023},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Jinliang Wang} and {Chao Niu} and {Qun Liu 006} and {Muzhou Li} and {Bart Preneel} and {Meiqin Wang}}
}
@article{journals/iacr/WuFPWW23,
title = {An automated generation tool of hardware masked S-box: AGEMA+.},
year = {2023},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Lixuan Wu} and {Yanhong Fan 001} and {Bart Preneel} and {Weijia Wang 003} and {Meiqin Wang}}
}
@article{journals/iacr/SarencheZNP24,
title = {Time-Averaged Analysis of Selfish Mining in Bitcoin.},
year = {2024},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Roozbeh Sarenche} and {Ren Zhang 003} and {Svetla Nikova} and {Bart Preneel}}
}