646 results on '"Preneel, Bart"'
Search Results
2. Stretching Cube Attacks: Improved Methods to Recover Massive Superpolies
3. Implicit White-Box Implementations: White-Boxing ARX Ciphers
4. A White-Box Speck Implementation Using Self-equivalence Encodings
5. A New Privacy Enhancing Beacon Scheme in V2X Communication
6. A Greater GIFT: Strengthening GIFT Against Statistical Cryptanalysis
7. Provable Secure Software Masking in the Real-World
8. A Collaborative Cybersecurity Education Program
9. Categorization of Faulty Nonce Misuse Resistant Message Authentication
10. On Self-equivalence Encodings in White-Box Implementations
11. Cross-Domain Attribute-Based Access Control Encryption
12. Block-Anti-Circulant Unbalanced Oil and Vinegar
13. Improved Interpolation Attacks on Cryptographic Primitives of Low Algebraic Degree
14. A Collaborative Cybersecurity Education Program
15. Public Key Compression for Constrained Linear Signature Schemes
16. Optimal Forgeries Against Polynomial-Based MACs and GCM
17. A Privacy-Preserving Device Tracking System Using a Low-Power Wide-Area Network
18. Publish or Perish: A Backward-Compatible Defense Against Selfish Mining in Bitcoin
19. Field Lifting for Smaller UOV Public Keys
20. SePCAR: A Secure and Privacy-Enhancing Protocol for Car Access Provision
21. MQ Signatures for PKI
22. Towards Quantum Distance Bounding Protocols
23. A MAC Mode for Lightweight Block Ciphers
24. Forgery and Subkey Recovery on CAESAR Candidate iFeed
25. A Privacy-Preserving Model for Biometric Fusion
26. A Privacy-Preserving Remote Healthcare System Offering End-to-End Security
27. On the Influence of Message Length in PMAC’s Security Bounds
28. Extension Field Cancellation: A New Central Trapdoor for Multivariate Quadratic Systems
29. An Efficient Entity Authentication Protocol with Enhanced Security and Privacy Properties
30. An Implementation of a High Assurance Smart Meter Using Protected Module Architectures
31. Collateral Damage of Facebook Apps: Friends, Providers, and Privacy Interdependence
32. Foreword
33. On the Impact of Known-Key Attacks on Hash Functions
34. On the XOR of Multiple Random Permutations
35. A Survey on Multimodal Biometrics and the Protection of Their Templates
36. Breaking and Fixing Cryptophia’s Short Combiner
37. The Future of Information Security Research: Cryptology and Beyond
38. Two Attacks on a White-Box AES Implementation
39. Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers
40. AEGIS: A Fast Authenticated Encryption Algorithm
41. Cryptanalysis of the Xiao – Lai White-Box AES Implementation
42. Threshold-Based Location-Aware Access Control
43. Protected Software Module Architectures
44. Flexible Design of a Modular Simultaneous Exponentiation Core for Embedded Platforms
45. Dedicated Hardware for Attribute-Based Credential Verification
46. Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT
47. DES Collisions Revisited
48. Soft Decision Error Correction for Compact Memory-Based PUFs Using a Single Enrollment
49. A Model for Structure Attacks, with Applications to PRESENT and Serpent
50. Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.