The following pages link to Bart Preneel (Q421041):
Displaying 50 items.
- A practical attack on KeeLoq (Q421044) (← links)
- Two-permutation-based hashing with binary mixing (Q745103) (← links)
- Improved interpolation attacks on cryptographic primitives of low algebraic degree (Q778917) (← links)
- Block-anti-circulant unbalanced oil and vinegar (Q778958) (← links)
- On self-equivalence encodings in white-box implementations (Q832398) (← links)
- Spectral characterization of cryptographic Boolean functions satisfying the (extended) propagation criterion of degreeland order \(k\) (Q834982) (← links)
- On the security of stepwise triangular systems (Q851759) (← links)
- A survey of recent developments in cryptographic algorithms for smart cards (Q883244) (← links)
- Open problems in hash function security (Q887443) (← links)
- On weaknesses of non-surjective round functions (Q1369725) (← links)
- Attacks on fast double block length hash functions (Q1382149) (← links)
- Optimal forgeries against polynomial-based MACs and GCM (Q1648808) (← links)
- MQ signatures for PKI (Q1673608) (← links)
- Public key compression for constrained linear signature schemes (Q1726681) (← links)
- Field lifting for smaller UOV public keys (Q1746842) (← links)
- An efficient entity authentication protocol with enhanced security and privacy properties (Q1801204) (← links)
- A white-box speck implementation using self-equivalence encodings (Q2096645) (← links)
- Cross-domain attribute-based access control encryption (Q2149810) (← links)
- A greater \texttt{GIFT}: strengthening \texttt{GIFT} against statistical cryptanalysis (Q2170083) (← links)
- HW/SW co-design for public-key cryptosystems on the 8051 micro-controller (Q2384544) (← links)
- Differential power and electromagnetic attacks on a FPGA implementation of elliptic curve cryptosystems (Q2384552) (← links)
- Practical collisions for EnRUPT (Q2429710) (← links)
- Internal differential collision attacks on the reduced-round Grøstl-0 hash function (Q2439730) (← links)
- Cryptanalysis of the two-dimensional circulation encryption algorithm (Q2478636) (← links)
- Remote attestation on legacy operating systems with trusted platform modules (Q2517830) (← links)
- Short solutions to nonlinear systems of equations (Q2636462) (← links)
- (Q2768921) (← links)
- On the XOR of Multiple Random Permutations (Q2794522) (← links)
- On the Impact of Known-Key Attacks on Hash Functions (Q2795966) (← links)
- Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers (Q2798625) (← links)
- Extension Field Cancellation: A New Central Trapdoor for Multivariate Quadratic Systems (Q2802617) (← links)
- Forgery and Subkey Recovery on CAESAR Candidate iFeed (Q2807205) (← links)
- On the Influence of Message Length in PMAC’s Security Bounds (Q2820498) (← links)
- On the Security of Two MAC Algorithms (Q2876884) (← links)
- DES Collisions Revisited (Q2889748) (← links)
- Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT (Q2900613) (← links)
- Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein (Q2900626) (← links)
- Hash Functions Based on Three Permutations: A Generic Security Analysis (Q2914268) (← links)
- AEGIS: A Fast Authenticated Encryption Algorithm (Q2949529) (← links)
- Two Attacks on a White-Box AES Implementation (Q2949534) (← links)
- Publish or Perish: A Backward-Compatible Defense Against Selfish Mining in Bitcoin (Q2975809) (← links)
- Equivalent keys in ℳultivariate uadratic public key systems (Q2999553) (← links)
- The NIST SHA-3 Competition: A Perspective on the Final Year (Q3011930) (← links)
- Algebraic Techniques in Differential Cryptanalysis Revisited (Q3012982) (← links)
- Finding Collisions for Reduced Luffa-256 v2 (Poster) (Q3013010) (← links)
- The Additive Differential Probability of ARX (Q3013093) (← links)
- (Q3043938) (← links)
- (Q3043946) (← links)
- (Q3046354) (← links)
- Producing Collisions for PANAMA (Q3046587) (← links)