Bart Preneel
Bart Preneel
Professor, KU Leuven
Email verificata su
TitoloCitata daAnno
Towards measuring anonymity
C Diaz, S Seys, J Claessens, B Preneel
International Workshop on Privacy Enhancing Technologies, 54-68, 2002
RIPEMD-160: A strengthened version of RIPEMD
H Dobbertin, A Bosselaers, B Preneel
International Workshop on Fast Software Encryption, 71-82, 1996
Analysis and design of cryptographic hash functions
B Preneel
Katholieke Universiteit te Leuven, 1993
Mutual information analysis
B Gierlichs, L Batina, P Tuyls, B Preneel
International Workshop on Cryptographic Hardware and Embedded Systems, 426-442, 2008
Hash functions based on block ciphers: A synthetic approach
B Preneel, R Govaerts, J Vandewalle
Annual International Cryptology Conference, 368-378, 1993
Propagation characteristics of Boolean functions
B Preneel, W Van Leekwijck, L Van Linden, R Govaerts, J Vandewalle
Advances in Cryptology—EUROCRYPT’90, 161-173, 1990
MDx-MAC and building fast MACs from hash functions
B Preneel, PC Van Oorschot
Annual International Cryptology Conference, 1-14, 1995
The Cipher SHARK
V Rijmen, J Daemen, B Preneel, A Bosselaers, E De Win
Fast Software Encryption, 99-111, 1996
ARM: Anonymous routing protocol for mobile ad hoc networks
S Seys, B Preneel
20th International Conference on Advanced Information Networking andá…, 2006
FPDetective: dusting the web for fingerprinters
G Acar, M Juarez, N Nikiforakis, C Diaz, S GŘrses, F Piessens, B Preneel
Proceedings of the 2013 ACM SIGSAC conference on Computer & communicationsá…, 2013
Power-Analysis Attack on an ASIC AES implementation
SB Ors, F Gurkaynak, E Oswald, B Preneel
International Conference on Information Technology: Coding and Computingá…, 2004
A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements
M Deng, K Wuyts, R Scandariato, B Preneel, W Joosen
Requirements Engineering 16 (1), 3-32, 2011
C De CanniŔre, B Preneel
New Stream Cipher Designs, 244-266, 2008
Trivium specifications
C De Canniere, B Preneel
http://www. ecrypt. eu. org/stream/p3ciphers/trivium/trivium_p3. pdf, 2005
On the security of today’s online electronic banking systems
J Claessens, V Dem, D De Cock, B Preneel, J Vandewalle
Computers & Security 21 (3), 253-265, 2002
Analysis methods for (alleged) RC4
LR Knudsen, W Meier, B Preneel, V Rijmen, S Verdoolaege
International Conference on the Theory and Application of Cryptology andá…, 1998
Power-analysis attacks on an FPGA–first experimental results
SB Írs, E Oswald, B Preneel
International Workshop on Cryptographic Hardware and Embedded Systems, 35-50, 2003
A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher
S Paul, B Preneel
International Workshop on Fast Software Encryption, 245-259, 2004
Privacy weaknesses in biometric sketches
K Simoens, P Tuyls, B Preneel
2009 30th IEEE Symposium on Security and Privacy, 188-203, 2009
Authentication and payment in future mobile systems
G Horn, B Preneel
European Symposium on Research in Computer Security, 277-293, 1998
Il sistema al momento non pu˛ eseguire l'operazione. Riprova pi¨ tardi.
Articoli 1–20