Bart Preneel

From MaRDI portal


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Improved quantum circuits for AES: reducing the depth and the number of qubits
 
2024-08-30Paper
Threshold structure-preserving signatures
 
2024-06-26Paper
Cryptanalysis of \texttt{SPEEDY}
 
2024-01-11Paper
Provable secure software masking in the real-world
Constructive Side-Channel Analysis and Secure Design
2023-12-12Paper
Stretching cube attacks: improved methods to recover massive superpolies
Advances in Cryptology – ASIACRYPT 2022
2023-08-21Paper
Implicit white-box implementations: white-boxing ARX ciphers
Advances in Cryptology – CRYPTO 2022
2023-06-12Paper
Categorization of faulty nonce misuse resistant message authentication
Lecture Notes in Computer Science
2023-05-12Paper
A white-box speck implementation using self-equivalence encodings
 
2022-11-09Paper
A greater \texttt{GIFT}: strengthening \texttt{GIFT} against statistical cryptanalysis
 
2022-08-30Paper
Cross-domain attribute-based access control encryption
 
2022-06-29Paper
On self-equivalence encodings in white-box implementations
 
2022-03-25Paper
Systematic Security Analysis of Stream Encryption With Key Erasure
IEEE Transactions on Information Theory
2022-02-17Paper
Meet-in-the-middle attacks on reduced-round GOST
Matematicheskie Voprosy Kriptografii [Mathematical Aspects of Cryptography]
2021-09-20Paper
PROBLEMS, SOLUTIONS AND EXPERIENCE OF THE FIRST INTERNATIONAL STUDENT’S OLYMPIAD IN CRYPTOGRAPHY
PRIKLADNAYa DISKRETNAYa MATEMATIKA
2021-02-15Paper
Improved interpolation attacks on cryptographic primitives of low algebraic degree
 
2020-07-21Paper
Block-anti-circulant unbalanced oil and vinegar
 
2020-07-21Paper
Public key compression for constrained linear signature schemes
 
2019-02-20Paper
An efficient entity authentication protocol with enhanced security and privacy properties
 
2018-10-26Paper
MQ signatures for PKI
 
2018-09-12Paper
Optimal forgeries against polynomial-based MACs and GCM
 
2018-07-09Paper
Multicore Curve-Based Cryptoprocessor with Reconfigurable Modular Arithmetic Logic Units over GF(2^n)
IEEE Transactions on Computers
2018-06-12Paper
Short solutions to nonlinear systems of equations
 
2018-06-05Paper
A family of trapdoor ciphers
Fast Software Encryption
2018-05-09Paper
A MAC mode for lightweight block ciphers
Fast Software Encryption
2018-05-09Paper
Field lifting for smaller UOV public keys
 
2018-04-26Paper
The cipher SHARK
Fast Software Encryption
2017-11-15Paper
RIPEMD-160: a strengthened version of RIPEMD
Fast Software Encryption
2017-11-15Paper
Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis
IEEE Transactions on Information Theory
2017-07-12Paper
Publish or Perish: A Backward-Compatible Defense Against Selfish Mining in Bitcoin
Topics in Cryptology – CT-RSA 2017
2017-04-12Paper
On the influence of message length in PMAC's security bounds
Advances in Cryptology – EUROCRYPT 2016
2016-09-09Paper
Mathematicians discuss the Snowden revelations: cryptographic standards, mass surveillance, and the NSA
Notices of the American Mathematical Society
2016-06-15Paper
Forgery and subkey recovery on CAESAR candidate iFeed
Lecture Notes in Computer Science
2016-05-19Paper
Extension field cancellation: a new central trapdoor for multivariate quadratic systems
Post-Quantum Cryptography
2016-04-26Paper
Chaskey: an efficient MAC algorithm for 32-bit microcontrollers
Selected Areas in Cryptography -- SAC 2014
2016-04-13Paper
On the impact of known-key attacks on hash functions
Advances in Cryptology – ASIACRYPT 2015
2016-03-23Paper
On the XOR of multiple random permutations
Applied Cryptography and Network Security
2016-03-10Paper
Cryptanalysis of the Xiao-Lai white-box AES implementation
Selected Areas in Cryptography
2015-12-04Paper
Open problems in hash function security
Designs, Codes and Cryptography
2015-10-26Paper
Two-permutation-based hashing with binary mixing
Journal of Mathematical Cryptology
2015-10-13Paper
AEGIS: a fast authenticated encryption algorithm
Selected Areas in Cryptography -- SAC 2013
2015-10-01Paper
Two attacks on a white-box AES implementation
Selected Areas in Cryptography -- SAC 2013
2015-10-01Paper
Breaking and Fixing Cryptophia’s Short Combiner
Cryptology and Network Security
2015-02-10Paper
On the security of two MAC algorithms
Advances in Cryptology — EUROCRYPT ’96
2014-08-20Paper
Internal differential collision attacks on the reduced-round Grøstl-0 hash function
Designs, Codes and Cryptography
2014-03-17Paper
Challenging the increased resistance of regular hash functions against birthday attacks
Journal of Mathematical Cryptology
2013-01-17Paper
A model for structure attacks, with applications to PRESENT and Serpent
Fast Software Encryption
2013-01-08Paper
UNAF: a special set of additive differences with application to the differential analysis of ARX
Fast Software Encryption
2013-01-08Paper
Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming
Information Security and Cryptology
2013-01-07Paper
Hash functions based on three permutations: a generic security analysis
Lecture Notes in Computer Science
2012-09-25Paper
Impossible differential cryptanalysis of the lightweight block ciphers TEA, XTEA and HIGHT
Progress in Cryptology - AFRICACRYPT 2012
2012-07-23Paper
Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein
Progress in Cryptology - AFRICACRYPT 2012
2012-07-23Paper
DES collisions revisited
Cryptography and Security: From Theory to Applications
2012-06-08Paper
A practical attack on KeeLoq
Journal of Cryptology
2012-05-23Paper
A lightweight 256-bit hash function for hardware and low-end devices: Lesamnta-LW
Information Security and Cryptology - ICISC 2010
2011-10-27Paper
Algebraic techniques in differential cryptanalysis revisited
Information Security and Privacy
2011-07-07Paper
Finding Collisions for Reduced Luffa-256 v2 (Poster)
Information Security and Privacy
2011-07-07Paper
The Additive Differential Probability of ARX
Fast Software Encryption
2011-07-07Paper
The NIST SHA-3 Competition: A Perspective on the Final Year
Lecture Notes in Computer Science
2011-06-29Paper
Equivalent keys in \(\mathcal M\)ultivariate \(\mathcal Q\)uadratic public key systems
Journal of Mathematical Cryptology
2011-05-13Paper
Practical collisions for EnRUPT
Journal of Cryptology
2011-04-01Paper
The differential analysis of S-functions
Selected Areas in Cryptography
2011-03-15Paper
A privacy-preserving ID-based group key agreement scheme applied in VPAN
SOFSEM 2011: Theory and Practice of Computer Science
2011-02-15Paper
Security reductions of the second round SHA-3 candidates
Lecture Notes in Computer Science
2011-02-11Paper
Meet-in-the-middle attacks on reduced-round XTEA
Topics in Cryptology – CT-RSA 2011
2011-02-11Paper
Improved collision attacks on the reduced-round Grøstl hash function
Lecture Notes in Computer Science
2011-02-11Paper
Cryptographic hash functions: theory and practice
Progress in Cryptology - INDOCRYPT 2010
2010-12-07Paper
Cryptanalysis of a perturbated white-box AES implementation
Progress in Cryptology - INDOCRYPT 2010
2010-12-07Paper
Increased resilience in threshold cryptography: sharing a secret with devices that cannot store shares
Lecture Notes in Computer Science
2010-11-26Paper
Cryptanalysis of the ESSENCE family of hash functions
Information Security and Cryptology
2010-11-23Paper
On the indifferentiability of the Grøstl hash function
Lecture Notes in Computer Science
2010-09-10Paper
Optimistic fair priced oblivious transfer
Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings
2010-05-04Paper
Parallel shortest lattice vector enumeration on graphics cards
Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings
2010-05-04Paper
Speed records for NTRU
Topics in Cryptology - CT-RSA 2010
2010-03-16Paper
Revisiting Higher-Order DPA Attacks:
Topics in Cryptology - CT-RSA 2010
2010-03-16Paper
The first 30 years of cryptographic hash functions and the NIST SHA-3 competition
Topics in Cryptology - CT-RSA 2010
2010-03-16Paper
A note on weak keys of PES, IDEA, and some extended variants
Lecture Notes in Computer Science
2010-02-09Paper
Cryptanalysis of 3-pass HAVAL
Lecture Notes in Computer Science
2010-01-05Paper
Cryptanalysis of Sober-t32.
Lecture Notes in Computer Science
2010-01-05Paper
A concrete security analysis for 3GPP-MAC.
Lecture Notes in Computer Science
2010-01-05Paper
Practical collisions for SHAMATA-256
Selected Areas in Cryptography
2009-12-09Paper
Cryptanalysis of dynamic SHA(2)
Selected Areas in Cryptography
2009-12-09Paper
Collisions and Other Non-random Properties for Step-Reduced SHA-256
Selected Areas in Cryptography
2009-11-03Paper
A Three-Property-Secure Hash Function
Selected Areas in Cryptography
2009-11-03Paper
Improved Distinguishing Attacks on HC-256
Advances in Information and Computer Security
2009-10-28Paper
The Future of Cryptographic Algorithms
Advances in Information and Computer Security
2009-10-28Paper
Towards Security Notions for White-Box Cryptography
Lecture Notes in Computer Science
2009-09-29Paper
A New Approach to χ 2 Cryptanalysis of Block Ciphers
Lecture Notes in Computer Science
2009-09-29Paper
Spectral characterization of cryptographic Boolean functions satisfying the (extended) propagation criterion of degreeland order \(k\)
Information Processing Letters
2009-08-27Paper
Universally Composable Adaptive Priced Oblivious Transfer
Pairing-Based Cryptography – Pairing 2009
2009-08-18Paper
Practical Collisions for EnRUPT
Fast Software Encryption
2009-08-11Paper
The State of Hash Functions and the NIST SHA-3 Competition
Information Security and Cryptology
2009-04-29Paper
Cryptanalysis of the Stream Cipher DECIM
Fast Software Encryption
2009-04-02Paper
Distinguishing Attacks on the Stream Cipher Py
Fast Software Encryption
2009-04-02Paper
Resynchronization Attacks on WG and LEX
Fast Software Encryption
2009-04-02Paper
Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms
Lecture Notes in Computer Science
2009-02-10Paper
On Boolean functions with generalized cryptographic properties
 
2009-02-09Paper
Classification of the cosets of \(\text{RM}(1,7)\) in \(\text{RM}(3,7)\) revisited
 
2009-02-09Paper
New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B
Research in Cryptology
2009-01-22Paper
Preimages for Reduced-Round Tiger
Research in Cryptology
2009-01-22Paper
Remote attestation on legacy operating systems with trusted platform modules
Science of Computer Programming
2009-01-09Paper
On the Covering Radii of Binary Reed–Muller Codes in the Set of Resilient Boolean Functions
IEEE Transactions on Information Theory
2008-12-21Paper
A new inequality in discrete fourier theory
IEEE Transactions on Information Theory
2008-12-21Paper
Classification of cubic (n-4)-resilient Boolean functions
IEEE Transactions on Information Theory
2008-12-21Paper
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract)
Lecture Notes in Computer Science
2008-11-27Paper
Collisions for RC4-Hash
Lecture Notes in Computer Science
2008-11-20Paper
Related-Key Rectangle Attacks on Reduced AES-192 and AES-256
Fast Software Encryption
2008-09-16Paper
Differential-Linear Attacks Against the Stream Cipher Phelix
Fast Software Encryption
2008-09-16Paper
Trivium
Lecture Notes in Computer Science
2008-07-03Paper
scientific article; zbMATH DE number 5295623 (Why is no real title available?)
 
2008-07-01Paper
On proactive verifiable secret sharing schemes
 
2008-07-01Paper
New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py
Lecture Notes in Computer Science
2008-06-24Paper
Efficient Negative Databases from Cryptographic Hash Functions
Lecture Notes in Computer Science
2008-06-24Paper
Analysis of Grain’s Initialization Algorithm
Progress in Cryptology – AFRICACRYPT 2008
2008-06-13Paper
Seven-Property-Preserving Iterated Hashing: ROX
Advances in Cryptology – ASIACRYPT 2007
2008-05-15Paper
On the (In)security of Stream Ciphers Based on Arrays and Modular Addition
Advances in Cryptology – ASIACRYPT 2006
2008-04-24Paper
A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols
Advances in Cryptology – ASIACRYPT 2006
2008-04-24Paper
Cryptanalysis of Reduced Variants of the FORK-256 Hash Function
Lecture Notes in Computer Science
2008-04-17Paper
A Practical Attack on KeeLoq
Advances in Cryptology – EUROCRYPT 2008
2008-04-15Paper
Improved Meet-in-the-Middle Attacks on Reduced-Round DES
Lecture Notes in Computer Science
2008-04-11Paper
Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses
Lecture Notes in Computer Science
2008-04-11Paper
Update on Tiger
Progress in Cryptology - INDOCRYPT 2006
2008-04-11Paper
Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings
Selected Areas in Cryptography
2008-03-25Paper
nPAKE + : A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords
Information and Communications Security
2008-03-25Paper
Cryptanalysis of the two-dimensional circulation encryption algorithm
EURASIP Journal on Applied Signal Processing
2008-03-20Paper
On the Algebraic Immunity of Symmetric Boolean Functions
Progress in Cryptology - INDOCRYPT 2005
2008-03-17Paper
Near Optimal Algorithms for Solving Differential Equations of Addition with Batch Queries
Progress in Cryptology - INDOCRYPT 2005
2008-03-17Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2008-02-19Paper
Blind Differential Cryptanalysis for Enhanced Power Attacks
Selected Areas in Cryptography
2007-11-29Paper
Progress in Cryptology - INDOCRYPT 2003
Lecture Notes in Computer Science
2007-11-29Paper
Progress in Cryptology - INDOCRYPT 2003
Lecture Notes in Computer Science
2007-11-29Paper
Cryptanalysis of the Stream Cipher ABC v2
Selected Areas in Cryptography
2007-11-29Paper
Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy
Advances in Cryptology - EUROCRYPT 2007
2007-11-29Paper
Cryptography and Coding
Lecture Notes in Computer Science
2007-11-28Paper
HW/SW co-design for public-key cryptosystems on the 8051 micro-controller
Computers and Electrical Engineering
2007-10-10Paper
Differential power and electromagnetic attacks on a FPGA implementation of elliptic curve cryptosystems
Computers and Electrical Engineering
2007-10-10Paper
Evaluating the Resistance of Stream Ciphers with Linear Feedback Against Fast Algebraic Attacks
Information Security and Privacy
2007-09-07Paper
A survey of recent developments in cryptographic algorithms for smart cards
Computer Networks
2007-06-04Paper
On the security of stepwise triangular systems
Designs, Codes and Cryptography
2006-11-22Paper
Cryptography and Coding
Lecture Notes in Computer Science
2006-11-01Paper
Cryptography and Coding
Lecture Notes in Computer Science
2006-11-01Paper
Information and Communications Security
Lecture Notes in Computer Science
2006-10-24Paper
Selected Areas in Cryptography
Lecture Notes in Computer Science
2006-10-10Paper
Security in Communication Networks
Lecture Notes in Computer Science
2006-10-10Paper
Security in Communication Networks
Lecture Notes in Computer Science
2006-10-10Paper
Security in Communication Networks
Lecture Notes in Computer Science
2006-10-10Paper
Security in Communication Networks
Lecture Notes in Computer Science
2006-10-10Paper
Progress in Cryptology – Mycrypt 2005
Lecture Notes in Computer Science
2006-10-05Paper
scientific article; zbMATH DE number 5041007 (Why is no real title available?)
 
2006-07-14Paper
Fast Software Encryption
Lecture Notes in Computer Science
2006-06-22Paper
Information Security and Privacy
Lecture Notes in Computer Science
2006-06-22Paper
Automata, Languages and Programming
Lecture Notes in Computer Science
2006-01-10Paper
Fast Software Encryption
Lecture Notes in Computer Science
2005-12-27Paper
Selected Areas in Cryptography
Lecture Notes in Computer Science
2005-12-27Paper
Progress in Cryptology - INDOCRYPT 2004
Lecture Notes in Computer Science
2005-12-22Paper
Topics in Cryptology – CT-RSA 2005
Lecture Notes in Computer Science
2005-12-08Paper
Topics in Cryptology – CT-RSA 2005
Lecture Notes in Computer Science
2005-12-08Paper
Public Key Cryptography - PKC 2005
Lecture Notes in Computer Science
2005-12-07Paper
Information Security and Privacy
Lecture Notes in Computer Science
2005-09-07Paper
Cryptographic Hardware and Embedded Systems - CHES 2004
Lecture Notes in Computer Science
2005-08-23Paper
Information and Communications Security
Lecture Notes in Computer Science
2005-08-19Paper
On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds
 
2005-08-12Paper
Higher Order Universal One-Way Hash Functions
 
2005-08-12Paper
Construction of secure and fast hash functions using nonbinary error-correcting codes
IEEE Transactions on Information Theory
2005-05-11Paper
scientific article; zbMATH DE number 2163010 (Why is no real title available?)
 
2005-04-29Paper
scientific article; zbMATH DE number 2090930 (Why is no real title available?)
 
2004-08-13Paper
scientific article; zbMATH DE number 2089312 (Why is no real title available?)
 
2004-08-12Paper
scientific article; zbMATH DE number 2089136 (Why is no real title available?)
 
2004-08-12Paper
Producing Collisions for PANAMA
Fast Software Encryption
2004-08-12Paper
scientific article; zbMATH DE number 2085431 (Why is no real title available?)
 
2004-08-09Paper
scientific article; zbMATH DE number 2085438 (Why is no real title available?)
 
2004-08-09Paper
scientific article; zbMATH DE number 2085215 (Why is no real title available?)
 
2004-08-09Paper
scientific article; zbMATH DE number 2077194 (Why is no real title available?)
 
2004-07-01Paper
scientific article; zbMATH DE number 2077187 (Why is no real title available?)
 
2004-07-01Paper
scientific article; zbMATH DE number 2077191 (Why is no real title available?)
 
2004-07-01Paper
scientific article; zbMATH DE number 2009947 (Why is no real title available?)
 
2003-11-26Paper
scientific article; zbMATH DE number 1980970 (Why is no real title available?)
 
2003-09-15Paper
scientific article; zbMATH DE number 1955807 (Why is no real title available?)
 
2003-07-29Paper
scientific article; zbMATH DE number 1955809 (Why is no real title available?)
 
2003-07-29Paper
scientific article; zbMATH DE number 1952896 (Why is no real title available?)
 
2003-07-24Paper
scientific article; zbMATH DE number 1759316 (Why is no real title available?)
 
2003-01-25Paper
scientific article; zbMATH DE number 1810472 (Why is no real title available?)
 
2002-11-25Paper
scientific article; zbMATH DE number 1759274 (Why is no real title available?)
 
2002-10-13Paper
scientific article; zbMATH DE number 1808207 (Why is no real title available?)
 
2002-09-30Paper
scientific article; zbMATH DE number 1700373 (Why is no real title available?)
 
2002-02-10Paper
Attacks on fast double block length hash functions
Journal of Cryptology
2001-11-22Paper
scientific article; zbMATH DE number 1504779 (Why is no real title available?)
 
2000-11-07Paper
scientific article; zbMATH DE number 1504537 (Why is no real title available?)
 
2000-10-30Paper
scientific article; zbMATH DE number 1504780 (Why is no real title available?)
 
2000-09-12Paper
scientific article; zbMATH DE number 1504778 (Why is no real title available?)
 
2000-09-12Paper
Design principles for dedicated hash functions
Fast Software Encryption
2000-08-30Paper
scientific article; zbMATH DE number 1455101 (Why is no real title available?)
 
2000-06-05Paper
scientific article; zbMATH DE number 1455100 (Why is no real title available?)
 
2000-06-05Paper
scientific article; zbMATH DE number 1418241 (Why is no real title available?)
 
2000-03-19Paper
scientific article; zbMATH DE number 1418255 (Why is no real title available?)
 
2000-03-19Paper
scientific article; zbMATH DE number 1418243 (Why is no real title available?)
 
2000-03-19Paper
Software Performance of Universal Hash Functions
Advances in Cryptology — EUROCRYPT ’99
2000-03-13Paper
scientific article; zbMATH DE number 1304190 (Why is no real title available?)
 
2000-03-07Paper
scientific article; zbMATH DE number 1304281 (Why is no real title available?)
 
2000-02-15Paper
On the security of iterated message authentication codes
IEEE Transactions on Information Theory
1999-11-21Paper
scientific article; zbMATH DE number 1186947 (Why is no real title available?)
 
1999-06-29Paper
Analysis Methods for (Alleged) RC4
Lecture Notes in Computer Science
1999-06-17Paper
scientific article; zbMATH DE number 1088255 (Why is no real title available?)
 
1998-03-10Paper
On weaknesses of non-surjective round functions
Designs, Codes and Cryptography
1998-01-07Paper
scientific article; zbMATH DE number 1024002 (Why is no real title available?)
 
1997-08-26Paper
scientific article; zbMATH DE number 1030977 (Why is no real title available?)
 
1997-08-14Paper
scientific article; zbMATH DE number 1024038 (Why is no real title available?)
 
1997-08-10Paper
scientific article; zbMATH DE number 1024070 (Why is no real title available?)
 
1997-06-18Paper
scientific article; zbMATH DE number 1024058 (Why is no real title available?)
 
1997-06-18Paper
scientific article; zbMATH DE number 1182525 (Why is no real title available?)
 
1997-01-01Paper
scientific article; zbMATH DE number 177031 (Why is no real title available?)
 
1993-05-18Paper
Boolean Functions Satisfying Higher Order Propagation Criteria
Advances in Cryptology — EUROCRYPT ’91
1993-05-18Paper
scientific article; zbMATH DE number 30323 (Why is no real title available?)
 
1992-06-27Paper
A Chosen Text Attack on The Modified Cryptographic Checksum Algorithm of Cohen and Huang
Advances in Cryptology — CRYPTO’ 89 Proceedings
1990-01-01Paper


Research outcomes over time


This page was built for person: Bart Preneel