Search

Your search keyword '"Preneel, Bart"' showing total 357 results

Search Constraints

Start Over You searched for: Author "Preneel, Bart" Remove constraint Author: "Preneel, Bart" Publisher springer international publishing Remove constraint Publisher: springer international publishing
357 results on '"Preneel, Bart"'

Search Results

1. A White-Box Speck Implementation Using Self-equivalence Encodings

2. A Greater GIFT: Strengthening GIFT Against Statistical Cryptanalysis

3. On the Susceptibility of Texas Instruments SimpleLink Platform Microcontrollers to Non-invasive Physical Attacks

4. Provable Secure Software Masking in the Real-World

5. A New Privacy Enhancing Beacon Scheme in V2X Communication

6. Cross-Domain Attribute-Based Access Control Encryption

7. Categorization of Faulty Nonce Misuse Resistant Message Authentication

8. On Self-equivalence Encodings in White-Box Implementations

9. Block-Anti-Circulant Unbalanced Oil and Vinegar

15. Public Key Compression for Constrained Linear Signature Schemes

16. Optimal Forgeries Against Polynomial-Based MACs and GCM

17. Short Solutions to Nonlinear Systems of Equations

18. A Privacy-Preserving Device Tracking System Using a Low-Power Wide-Area Network

21. Field Lifting for Smaller UOV Public Keys

22. SePCAR: A Secure and Privacy-Enhancing Protocol for Car Access Provision

23. Towards Quantum Distance Bounding Protocols

24. MQ Signatures for PKI

25. Publish or Perish: A Backward-Compatible Defense Against Selfish Mining in Bitcoin

26. Collateral Damage of Facebook Apps: Friends, Providers, and Privacy Interdependence

27. An Implementation of a High Assurance Smart Meter Using Protected Module Architectures

28. A Privacy-Preserving Remote Healthcare System Offering End-to-End Security

29. Forgery and Subkey Recovery on CAESAR Candidate iFeed

30. Extension Field Cancellation: A New Central Trapdoor for Multivariate Quadratic Systems

31. An Efficient Entity Authentication Protocol with Enhanced Security and Privacy Properties

32. A Privacy-Preserving Model for Biometric Fusion

34. A Survey on Multimodal Biometrics and the Protection of Their Templates

35. On the XOR of Multiple Random Permutations

36. Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers

37. Breaking and Fixing Cryptophia’s Short Combiner

38. The Future of Information Security Research: Cryptology and Beyond

Catalog

Books, media, physical & digital resources