Bart Preneel

From MaRDI portal
(Redirected from Person:421041)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Improved quantum circuits for AES: reducing the depth and the number of qubits2024-08-30Paper
Threshold structure-preserving signatures2024-06-26Paper
Cryptanalysis of \texttt{SPEEDY}2024-01-11Paper
Provable secure software masking in the real-world
Constructive Side-Channel Analysis and Secure Design
2023-12-12Paper
Stretching cube attacks: improved methods to recover massive superpolies
Advances in Cryptology – ASIACRYPT 2022
2023-08-21Paper
Implicit white-box implementations: white-boxing ARX ciphers
Advances in Cryptology – CRYPTO 2022
2023-06-12Paper
Categorization of faulty nonce misuse resistant message authentication
Lecture Notes in Computer Science
2023-05-12Paper
A white-box speck implementation using self-equivalence encodings2022-11-09Paper
A greater \texttt{GIFT}: strengthening \texttt{GIFT} against statistical cryptanalysis2022-08-30Paper
Cross-domain attribute-based access control encryption2022-06-29Paper
On self-equivalence encodings in white-box implementations2022-03-25Paper
Systematic Security Analysis of Stream Encryption With Key Erasure
IEEE Transactions on Information Theory
2022-02-17Paper
Meet-in-the-middle attacks on reduced-round GOST
Matematicheskie Voprosy Kriptografii [Mathematical Aspects of Cryptography]
2021-09-20Paper
PROBLEMS, SOLUTIONS AND EXPERIENCE OF THE FIRST INTERNATIONAL STUDENT’S OLYMPIAD IN CRYPTOGRAPHY
PRIKLADNAYa DISKRETNAYa MATEMATIKA
2021-02-15Paper
PROBLEMS, SOLUTIONS AND EXPERIENCE OF THE FIRST INTERNATIONAL STUDENT’S OLYMPIAD IN CRYPTOGRAPHY
PRIKLADNAYa DISKRETNAYa MATEMATIKA
2021-02-15Paper
Improved interpolation attacks on cryptographic primitives of low algebraic degree2020-07-21Paper
Block-anti-circulant unbalanced oil and vinegar2020-07-21Paper
Public key compression for constrained linear signature schemes2019-02-20Paper
An efficient entity authentication protocol with enhanced security and privacy properties2018-10-26Paper
MQ signatures for PKI2018-09-12Paper
Optimal forgeries against polynomial-based MACs and GCM2018-07-09Paper
Multicore Curve-Based Cryptoprocessor with Reconfigurable Modular Arithmetic Logic Units over GF(2^n)
IEEE Transactions on Computers
2018-06-12Paper
Short solutions to nonlinear systems of equations2018-06-05Paper
A family of trapdoor ciphers
Fast Software Encryption
2018-05-09Paper
A MAC mode for lightweight block ciphers
Fast Software Encryption
2018-05-09Paper
Field lifting for smaller UOV public keys2018-04-26Paper
The cipher SHARK
Fast Software Encryption
2017-11-15Paper
RIPEMD-160: a strengthened version of RIPEMD
Fast Software Encryption
2017-11-15Paper
Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis
IEEE Transactions on Information Theory
2017-07-12Paper
Publish or Perish: A Backward-Compatible Defense Against Selfish Mining in Bitcoin
Topics in Cryptology – CT-RSA 2017
2017-04-12Paper
On the influence of message length in PMAC's security bounds
Advances in Cryptology – EUROCRYPT 2016
2016-09-09Paper
Mathematicians discuss the Snowden revelations: cryptographic standards, mass surveillance, and the NSA
Notices of the American Mathematical Society
2016-06-15Paper
Forgery and subkey recovery on CAESAR candidate iFeed
Lecture Notes in Computer Science
2016-05-19Paper
Extension field cancellation: a new central trapdoor for multivariate quadratic systems
Post-Quantum Cryptography
2016-04-26Paper
Chaskey: an efficient MAC algorithm for 32-bit microcontrollers
Selected Areas in Cryptography -- SAC 2014
2016-04-13Paper
On the impact of known-key attacks on hash functions
Advances in Cryptology – ASIACRYPT 2015
2016-03-23Paper
On the XOR of multiple random permutations
Applied Cryptography and Network Security
2016-03-10Paper
Cryptanalysis of the Xiao-Lai white-box AES implementation
Selected Areas in Cryptography
2015-12-04Paper
Open problems in hash function security
Designs, Codes and Cryptography
2015-10-26Paper
Two-permutation-based hashing with binary mixing
Journal of Mathematical Cryptology
2015-10-13Paper
AEGIS: a fast authenticated encryption algorithm
Selected Areas in Cryptography -- SAC 2013
2015-10-01Paper
Two attacks on a white-box AES implementation
Selected Areas in Cryptography -- SAC 2013
2015-10-01Paper
Breaking and Fixing Cryptophia’s Short Combiner
Cryptology and Network Security
2015-02-10Paper
On the security of two MAC algorithms
Advances in Cryptology — EUROCRYPT ’96
2014-08-20Paper
Internal differential collision attacks on the reduced-round Grøstl-0 hash function
Designs, Codes and Cryptography
2014-03-17Paper
Challenging the increased resistance of regular hash functions against birthday attacks
Journal of Mathematical Cryptology
2013-01-17Paper
A model for structure attacks, with applications to PRESENT and Serpent
Fast Software Encryption
2013-01-08Paper
UNAF: a special set of additive differences with application to the differential analysis of ARX
Fast Software Encryption
2013-01-08Paper
Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming
Information Security and Cryptology
2013-01-07Paper
Hash functions based on three permutations: a generic security analysis
Lecture Notes in Computer Science
2012-09-25Paper
Impossible differential cryptanalysis of the lightweight block ciphers TEA, XTEA and HIGHT
Progress in Cryptology - AFRICACRYPT 2012
2012-07-23Paper
Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein
Progress in Cryptology - AFRICACRYPT 2012
2012-07-23Paper
DES collisions revisited
Cryptography and Security: From Theory to Applications
2012-06-08Paper
A practical attack on KeeLoq
Journal of Cryptology
2012-05-23Paper
A lightweight 256-bit hash function for hardware and low-end devices: Lesamnta-LW
Information Security and Cryptology - ICISC 2010
2011-10-27Paper
Algebraic techniques in differential cryptanalysis revisited
Information Security and Privacy
2011-07-07Paper
Finding Collisions for Reduced Luffa-256 v2 (Poster)
Information Security and Privacy
2011-07-07Paper
The Additive Differential Probability of ARX
Fast Software Encryption
2011-07-07Paper
The NIST SHA-3 Competition: A Perspective on the Final Year
Lecture Notes in Computer Science
2011-06-29Paper
Equivalent keys in \(\mathcal M\)ultivariate \(\mathcal Q\)uadratic public key systems
Journal of Mathematical Cryptology
2011-05-13Paper
Practical collisions for EnRUPT
Journal of Cryptology
2011-04-01Paper
The differential analysis of S-functions
Selected Areas in Cryptography
2011-03-15Paper
A privacy-preserving ID-based group key agreement scheme applied in VPAN
SOFSEM 2011: Theory and Practice of Computer Science
2011-02-15Paper
Security reductions of the second round SHA-3 candidates
Lecture Notes in Computer Science
2011-02-11Paper
Meet-in-the-middle attacks on reduced-round XTEA
Topics in Cryptology – CT-RSA 2011
2011-02-11Paper
Improved collision attacks on the reduced-round Grøstl hash function
Lecture Notes in Computer Science
2011-02-11Paper
Cryptographic hash functions: theory and practice
Progress in Cryptology - INDOCRYPT 2010
2010-12-07Paper
Cryptanalysis of a perturbated white-box AES implementation
Progress in Cryptology - INDOCRYPT 2010
2010-12-07Paper
Increased resilience in threshold cryptography: sharing a secret with devices that cannot store shares
Lecture Notes in Computer Science
2010-11-26Paper
Cryptanalysis of the ESSENCE family of hash functions
Information Security and Cryptology
2010-11-23Paper
On the indifferentiability of the Grøstl hash function
Lecture Notes in Computer Science
2010-09-10Paper
Optimistic fair priced oblivious transfer
Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings
2010-05-04Paper
Parallel shortest lattice vector enumeration on graphics cards
Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings
2010-05-04Paper
Speed records for NTRU
Topics in Cryptology - CT-RSA 2010
2010-03-16Paper
Revisiting Higher-Order DPA Attacks:
Topics in Cryptology - CT-RSA 2010
2010-03-16Paper
The first 30 years of cryptographic hash functions and the NIST SHA-3 competition
Topics in Cryptology - CT-RSA 2010
2010-03-16Paper
A note on weak keys of PES, IDEA, and some extended variants
Lecture Notes in Computer Science
2010-02-09Paper
Cryptanalysis of 3-pass HAVAL
Lecture Notes in Computer Science
2010-01-05Paper
Cryptanalysis of Sober-t32.
Lecture Notes in Computer Science
2010-01-05Paper
A concrete security analysis for 3GPP-MAC.
Lecture Notes in Computer Science
2010-01-05Paper
Practical collisions for SHAMATA-256
Selected Areas in Cryptography
2009-12-09Paper
Cryptanalysis of dynamic SHA(2)
Selected Areas in Cryptography
2009-12-09Paper
Collisions and Other Non-random Properties for Step-Reduced SHA-256
Selected Areas in Cryptography
2009-11-03Paper
A Three-Property-Secure Hash Function
Selected Areas in Cryptography
2009-11-03Paper
Improved Distinguishing Attacks on HC-256
Advances in Information and Computer Security
2009-10-28Paper
The Future of Cryptographic Algorithms
Advances in Information and Computer Security
2009-10-28Paper
Towards Security Notions for White-Box Cryptography
Lecture Notes in Computer Science
2009-09-29Paper
A New Approach to χ 2 Cryptanalysis of Block Ciphers
Lecture Notes in Computer Science
2009-09-29Paper
Spectral characterization of cryptographic Boolean functions satisfying the (extended) propagation criterion of degreeland order \(k\)
Information Processing Letters
2009-08-27Paper
Universally Composable Adaptive Priced Oblivious Transfer
Pairing-Based Cryptography – Pairing 2009
2009-08-18Paper
Practical Collisions for EnRUPT
Fast Software Encryption
2009-08-11Paper
The State of Hash Functions and the NIST SHA-3 Competition
Information Security and Cryptology
2009-04-29Paper
Cryptanalysis of the Stream Cipher DECIM
Fast Software Encryption
2009-04-02Paper
Distinguishing Attacks on the Stream Cipher Py
Fast Software Encryption
2009-04-02Paper
Resynchronization Attacks on WG and LEX
Fast Software Encryption
2009-04-02Paper
Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms
Lecture Notes in Computer Science
2009-02-10Paper
On Boolean functions with generalized cryptographic properties2009-02-09Paper
Classification of the cosets of \(\text{RM}(1,7)\) in \(\text{RM}(3,7)\) revisited2009-02-09Paper
New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B
Research in Cryptology
2009-01-22Paper
Preimages for Reduced-Round Tiger
Research in Cryptology
2009-01-22Paper
Remote attestation on legacy operating systems with trusted platform modules
Science of Computer Programming
2009-01-09Paper
On the Covering Radii of Binary Reed–Muller Codes in the Set of Resilient Boolean Functions
IEEE Transactions on Information Theory
2008-12-21Paper
A new inequality in discrete fourier theory
IEEE Transactions on Information Theory
2008-12-21Paper
Classification of cubic (n-4)-resilient Boolean functions
IEEE Transactions on Information Theory
2008-12-21Paper
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract)
Lecture Notes in Computer Science
2008-11-27Paper
Collisions for RC4-Hash
Lecture Notes in Computer Science
2008-11-20Paper
Related-Key Rectangle Attacks on Reduced AES-192 and AES-256
Fast Software Encryption
2008-09-16Paper
Differential-Linear Attacks Against the Stream Cipher Phelix
Fast Software Encryption
2008-09-16Paper
Trivium
Lecture Notes in Computer Science
2008-07-03Paper
scientific article; zbMATH DE number 5295623 (Why is no real title available?)2008-07-01Paper
On proactive verifiable secret sharing schemes2008-07-01Paper
New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py
Lecture Notes in Computer Science
2008-06-24Paper
Efficient Negative Databases from Cryptographic Hash Functions
Lecture Notes in Computer Science
2008-06-24Paper
Analysis of Grain’s Initialization Algorithm
Progress in Cryptology – AFRICACRYPT 2008
2008-06-13Paper
Seven-Property-Preserving Iterated Hashing: ROX
Advances in Cryptology – ASIACRYPT 2007
2008-05-15Paper
On the (In)security of Stream Ciphers Based on Arrays and Modular Addition
Advances in Cryptology – ASIACRYPT 2006
2008-04-24Paper
A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols
Advances in Cryptology – ASIACRYPT 2006
2008-04-24Paper
Cryptanalysis of Reduced Variants of the FORK-256 Hash Function
Lecture Notes in Computer Science
2008-04-17Paper
A Practical Attack on KeeLoq
Advances in Cryptology – EUROCRYPT 2008
2008-04-15Paper
Improved Meet-in-the-Middle Attacks on Reduced-Round DES
Lecture Notes in Computer Science
2008-04-11Paper
Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses
Lecture Notes in Computer Science
2008-04-11Paper
Update on Tiger
Progress in Cryptology - INDOCRYPT 2006
2008-04-11Paper
Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings
Selected Areas in Cryptography
2008-03-25Paper
nPAKE + : A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords
Information and Communications Security
2008-03-25Paper
Cryptanalysis of the two-dimensional circulation encryption algorithm
EURASIP Journal on Applied Signal Processing
2008-03-20Paper
On the Algebraic Immunity of Symmetric Boolean Functions
Progress in Cryptology - INDOCRYPT 2005
2008-03-17Paper
Near Optimal Algorithms for Solving Differential Equations of Addition with Batch Queries
Progress in Cryptology - INDOCRYPT 2005
2008-03-17Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2008-02-19Paper
Blind Differential Cryptanalysis for Enhanced Power Attacks
Selected Areas in Cryptography
2007-11-29Paper
Progress in Cryptology - INDOCRYPT 2003
Lecture Notes in Computer Science
2007-11-29Paper
Progress in Cryptology - INDOCRYPT 2003
Lecture Notes in Computer Science
2007-11-29Paper
Cryptanalysis of the Stream Cipher ABC v2
Selected Areas in Cryptography
2007-11-29Paper
Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy
Advances in Cryptology - EUROCRYPT 2007
2007-11-29Paper
Cryptography and Coding
Lecture Notes in Computer Science
2007-11-28Paper
HW/SW co-design for public-key cryptosystems on the 8051 micro-controller
Computers and Electrical Engineering
2007-10-10Paper
Differential power and electromagnetic attacks on a FPGA implementation of elliptic curve cryptosystems
Computers and Electrical Engineering
2007-10-10Paper
Evaluating the Resistance of Stream Ciphers with Linear Feedback Against Fast Algebraic Attacks
Information Security and Privacy
2007-09-07Paper
A survey of recent developments in cryptographic algorithms for smart cards
Computer Networks
2007-06-04Paper
On the security of stepwise triangular systems
Designs, Codes and Cryptography
2006-11-22Paper
Cryptography and Coding
Lecture Notes in Computer Science
2006-11-01Paper
Cryptography and Coding
Lecture Notes in Computer Science
2006-11-01Paper
Information and Communications Security
Lecture Notes in Computer Science
2006-10-24Paper
Selected Areas in Cryptography
Lecture Notes in Computer Science
2006-10-10Paper
Security in Communication Networks
Lecture Notes in Computer Science
2006-10-10Paper
Security in Communication Networks
Lecture Notes in Computer Science
2006-10-10Paper
Security in Communication Networks
Lecture Notes in Computer Science
2006-10-10Paper
Security in Communication Networks
Lecture Notes in Computer Science
2006-10-10Paper
Progress in Cryptology – Mycrypt 2005
Lecture Notes in Computer Science
2006-10-05Paper
scientific article; zbMATH DE number 5041007 (Why is no real title available?)2006-07-14Paper
Fast Software Encryption
Lecture Notes in Computer Science
2006-06-22Paper
Information Security and Privacy
Lecture Notes in Computer Science
2006-06-22Paper
Automata, Languages and Programming
Lecture Notes in Computer Science
2006-01-10Paper
Fast Software Encryption
Lecture Notes in Computer Science
2005-12-27Paper
Selected Areas in Cryptography
Lecture Notes in Computer Science
2005-12-27Paper
Progress in Cryptology - INDOCRYPT 2004
Lecture Notes in Computer Science
2005-12-22Paper
Topics in Cryptology – CT-RSA 2005
Lecture Notes in Computer Science
2005-12-08Paper
Topics in Cryptology – CT-RSA 2005
Lecture Notes in Computer Science
2005-12-08Paper
Public Key Cryptography - PKC 2005
Lecture Notes in Computer Science
2005-12-07Paper
Information Security and Privacy
Lecture Notes in Computer Science
2005-09-07Paper
Cryptographic Hardware and Embedded Systems - CHES 2004
Lecture Notes in Computer Science
2005-08-23Paper
Information and Communications Security
Lecture Notes in Computer Science
2005-08-19Paper
On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds2005-08-12Paper
Higher Order Universal One-Way Hash Functions2005-08-12Paper
Construction of secure and fast hash functions using nonbinary error-correcting codes
IEEE Transactions on Information Theory
2005-05-11Paper
scientific article; zbMATH DE number 2163010 (Why is no real title available?)2005-04-29Paper
scientific article; zbMATH DE number 2090930 (Why is no real title available?)2004-08-13Paper
scientific article; zbMATH DE number 2089312 (Why is no real title available?)2004-08-12Paper
scientific article; zbMATH DE number 2089136 (Why is no real title available?)2004-08-12Paper
Producing Collisions for PANAMA
Fast Software Encryption
2004-08-12Paper
scientific article; zbMATH DE number 2085431 (Why is no real title available?)2004-08-09Paper
scientific article; zbMATH DE number 2085438 (Why is no real title available?)2004-08-09Paper
scientific article; zbMATH DE number 2085215 (Why is no real title available?)2004-08-09Paper
scientific article; zbMATH DE number 2077194 (Why is no real title available?)2004-07-01Paper
scientific article; zbMATH DE number 2077187 (Why is no real title available?)2004-07-01Paper
scientific article; zbMATH DE number 2077191 (Why is no real title available?)2004-07-01Paper
scientific article; zbMATH DE number 2009947 (Why is no real title available?)2003-11-26Paper
scientific article; zbMATH DE number 1980970 (Why is no real title available?)2003-09-15Paper
scientific article; zbMATH DE number 1955807 (Why is no real title available?)2003-07-29Paper
scientific article; zbMATH DE number 1955809 (Why is no real title available?)2003-07-29Paper
scientific article; zbMATH DE number 1952896 (Why is no real title available?)2003-07-24Paper
scientific article; zbMATH DE number 1759316 (Why is no real title available?)2003-01-25Paper
scientific article; zbMATH DE number 1810472 (Why is no real title available?)2002-11-25Paper
scientific article; zbMATH DE number 1759274 (Why is no real title available?)2002-10-13Paper
scientific article; zbMATH DE number 1808207 (Why is no real title available?)2002-09-30Paper
scientific article; zbMATH DE number 1700373 (Why is no real title available?)2002-02-10Paper
Attacks on fast double block length hash functions
Journal of Cryptology
2001-11-22Paper
scientific article; zbMATH DE number 1504779 (Why is no real title available?)2000-11-07Paper
scientific article; zbMATH DE number 1504537 (Why is no real title available?)2000-10-30Paper
scientific article; zbMATH DE number 1504780 (Why is no real title available?)2000-09-12Paper
scientific article; zbMATH DE number 1504778 (Why is no real title available?)2000-09-12Paper
Design principles for dedicated hash functions
Fast Software Encryption
2000-08-30Paper
scientific article; zbMATH DE number 1455101 (Why is no real title available?)2000-06-05Paper
scientific article; zbMATH DE number 1455100 (Why is no real title available?)2000-06-05Paper
scientific article; zbMATH DE number 1418241 (Why is no real title available?)2000-03-19Paper
scientific article; zbMATH DE number 1418255 (Why is no real title available?)2000-03-19Paper
scientific article; zbMATH DE number 1418243 (Why is no real title available?)2000-03-19Paper
Software Performance of Universal Hash Functions
Advances in Cryptology — EUROCRYPT ’99
2000-03-13Paper
scientific article; zbMATH DE number 1304190 (Why is no real title available?)2000-03-07Paper
scientific article; zbMATH DE number 1304281 (Why is no real title available?)2000-02-15Paper
On the security of iterated message authentication codes
IEEE Transactions on Information Theory
1999-11-21Paper
scientific article; zbMATH DE number 1186947 (Why is no real title available?)1999-06-29Paper
Analysis Methods for (Alleged) RC4
Lecture Notes in Computer Science
1999-06-17Paper
scientific article; zbMATH DE number 1088255 (Why is no real title available?)1998-03-10Paper
On weaknesses of non-surjective round functions
Designs, Codes and Cryptography
1998-01-07Paper
scientific article; zbMATH DE number 1024002 (Why is no real title available?)1997-08-26Paper
scientific article; zbMATH DE number 1030977 (Why is no real title available?)1997-08-14Paper
scientific article; zbMATH DE number 1024038 (Why is no real title available?)1997-08-10Paper
scientific article; zbMATH DE number 1024070 (Why is no real title available?)1997-06-18Paper
scientific article; zbMATH DE number 1024058 (Why is no real title available?)1997-06-18Paper
scientific article; zbMATH DE number 1182525 (Why is no real title available?)1997-01-01Paper
scientific article; zbMATH DE number 177031 (Why is no real title available?)1993-05-18Paper
Boolean Functions Satisfying Higher Order Propagation Criteria
Advances in Cryptology — EUROCRYPT ’91
1993-05-18Paper
scientific article; zbMATH DE number 30323 (Why is no real title available?)1992-06-27Paper
A Chosen Text Attack on The Modified Cryptographic Checksum Algorithm of Cohen and Huang
Advances in Cryptology — CRYPTO’ 89 Proceedings
1990-01-01Paper


Research outcomes over time


This page was built for person: Bart Preneel