Search filters

List of works by Bart Preneel

A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher

article

A general model for hiding control flow

article

A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements

journal article from 'Requirements Engineering' published in 2011

A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks

A taxonomy of self-modifying code for obfuscation

scientific article published in 2011

An FPGA implementation of an elliptic curve processor GF(2 <sup>m</sup> )

scientific article published on 20 July 2004

An efficient buyer-seller watermarking protocol based on composite signal representation

scientific article published on 08 September 2009

Anonymous User Communication for Privacy Protection in Wireless Metropolitan Mesh Networks

Anonymous user communication for privacy protection in wireless metropolitan mesh networks

Attacks on Fast Double Block Length Hash Functions

scholarly article

Authenticated and auditable data sharing via smart contract

scientific article published on 29 March 2020

Authentication and payment in future mobile systems

scientific article published in 2000

Challenging the increased resistance of regular hash functions against birthday attacks

scientific article published in 2012

Collateral damage of Facebook third-party applications: a comprehensive study

scientific article published in 2018

Coronalert

Mobile app

Cryptanalysis of Reduced Variants of the FORK-256 Hash Function

scientific article (publication date: 2006)

Cryptanalysis of a fast cryptographic checksum algorithm

scientific article published in 1990

Cryptographic Hardware and Embedded Systems — CHES 2011

13th International Workshop, Nara, Japan, September 28 — October 1, 2011, Proceedings

Delegation and digital mandates: Legal requirements and security objectives

scientific article published in 2009

Deploying decentralized, privacy-preserving proximity tracing

scientific article published on 19 August 2022

Dismantling DST80-based Immobiliser Systems

scientific article published in 2020

Efficient Length Doubling From Tweakable Block Ciphers

scientific article published in 2017

Efficient pipelining for modular multiplication architectures in prime fields

scientific article published on 05 April 2007

End-To-End Security for Video Distribution: The Combination of Encryption, Watermarking, and Video Adaptation

scientific article published in 2013

Evaluating the Resistance of Stream Ciphers with Linear Feedback Against Fast Algebraic Attacks

scientific article published in 2006

Exploring the storj network

scientific article published on 23 April 2021

FPDetective

scientific article published on 12 November 2013

Generalized Mersenne Prime

article published 2011

HAT: Secure and Practical Key Establishment for Implantable Medical Devices

scientific article published on 20 April 2023

Let's Go Eevee! A Friendly and Suitable Family of AEAD Modes for IoT-to-Cloud Secure Computation

scientific article published on 21 November 2023

Location verification using secure distance bounding protocols

scholarly article

Machiavelli Confronts 21st Century Digital Technology: Democracy in a Network Society

My other car is your car: compromising the Tesla Model X keyless entry system

scientific article published in 2021

Not Only for Contact Tracing

scientific article published on 11 January 2023

Offline NFC payments with electronic vouchers

scientific article published on 24 August 2009

On The Necessity Of A Prescribed Block Validity Consensus: Analyzing Bitcoin Unlimited Mining Protocol

manuscript published in 2017

On the Algebraic Immunity of Symmetric Boolean Functions

scientific article published in 2005

On the Feasibility of Cryptography for a Wireless Insulin Pump System

scientific article published on 04 March 2016

On the Security of Today’s Online Electronic Banking Systems

On the security of stepwise triangular systems

scientific article published in September 2006

Open problems in hash function security

scientific article published in 2015

Physical Security

Power Analysis Attacks Against FPGA Implementations of the DES

Power Analysis of an FPGA

Probabilistic Algebraic Attacks

scientific article published in 2005

Pseudorandomness of Basic Structures in the Block Cipher KASUMI

scientific article published in 2003

Publish Or Perish: A Backward-Compatible Defense Against Selfish Mining In Bitcoin

journal article published in 2016

Recent attacks on alleged SecurID and their practical implications

scientific article published in 2005

Reply to Lucas & Henneberg: Are human faces unique?

scientific article published on 21 February 2019

Revisiting a Methodology for Efficient CNN Architectures in Profiling Attacks

scientific article published in 2020

Secure Audit Logs

article

Secure Logging

article

Securing Wireless Neurostimulators

scientific article published on 15 March 2018

Security analysis of the message authenticator algorithm (MAA)

scientific article published in 1997

Security implications in Kerberos by the introduction of smart cards

scientific article published on 17 December 2012

Side-channel resistant system-level design flow for public-key cryptography

scientific article published on 05 April 2007

Speed Records for NTRU

scholarly article

State-of-the-art ciphers for commercial applications

scientific article published in 1999

Systematic Security Analysis of Stream Encryption With Key Erasure

scientific article published in 2021

The Encryption Debate: An Enduring Struggle

scientific article published on 10 June 2024

Towards a framework for evaluating certificate status information mechanisms

Yes we CAN!

scientific article published on 04 August 2023

nPAKE+: A Tree-Based Group Password-Authenticated Key Exchange Protocol Using Different Passwords

scientific article published in 2009