357 results on '"Preneel, Bart"'
Search Results
2. A Greater GIFT: Strengthening GIFT Against Statistical Cryptanalysis
3. On the Susceptibility of Texas Instruments SimpleLink Platform Microcontrollers to Non-invasive Physical Attacks
4. Provable Secure Software Masking in the Real-World
5. A New Privacy Enhancing Beacon Scheme in V2X Communication
6. Cross-Domain Attribute-Based Access Control Encryption
7. Categorization of Faulty Nonce Misuse Resistant Message Authentication
8. On Self-equivalence Encodings in White-Box Implementations
9. Block-Anti-Circulant Unbalanced Oil and Vinegar
10. Improved Interpolation Attacks on Cryptographic Primitives of Low Algebraic Degree
11. On the Susceptibility of Texas Instruments SimpleLink Platform Microcontrollers to Non-invasive Physical Attacks
12. A White-Box Speck Implementation Using Self-equivalence Encodings
13. A Greater GIFT: Strengthening GIFT Against Statistical Cryptanalysis
14. Provable Secure Software Masking in the Real-World
15. Public Key Compression for Constrained Linear Signature Schemes
16. Optimal Forgeries Against Polynomial-Based MACs and GCM
17. Short Solutions to Nonlinear Systems of Equations
18. A Privacy-Preserving Device Tracking System Using a Low-Power Wide-Area Network
19. On Self-equivalence Encodings in White-Box Implementations
20. Cross-Domain Attribute-Based Access Control Encryption
21. Field Lifting for Smaller UOV Public Keys
22. SePCAR: A Secure and Privacy-Enhancing Protocol for Car Access Provision
23. Towards Quantum Distance Bounding Protocols
24. MQ Signatures for PKI
25. Publish or Perish: A Backward-Compatible Defense Against Selfish Mining in Bitcoin
26. Collateral Damage of Facebook Apps: Friends, Providers, and Privacy Interdependence
27. An Implementation of a High Assurance Smart Meter Using Protected Module Architectures
28. A Privacy-Preserving Remote Healthcare System Offering End-to-End Security
29. Forgery and Subkey Recovery on CAESAR Candidate iFeed
30. Extension Field Cancellation: A New Central Trapdoor for Multivariate Quadratic Systems
31. An Efficient Entity Authentication Protocol with Enhanced Security and Privacy Properties
32. A Privacy-Preserving Model for Biometric Fusion
33. Public Key Compression for Constrained Linear Signature Schemes
34. A Survey on Multimodal Biometrics and the Protection of Their Templates
35. On the XOR of Multiple Random Permutations
36. Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers
37. Breaking and Fixing Cryptophia’s Short Combiner
38. The Future of Information Security Research: Cryptology and Beyond
39. Optimal Forgeries Against Polynomial-Based MACs and GCM
40. A Privacy-Preserving Device Tracking System Using a Low-Power Wide-Area Network
41. Publish or Perish: A Backward-Compatible Defense Against Selfish Mining in Bitcoin
42. SePCAR: A Secure and Privacy-Enhancing Protocol for Car Access Provision
43. MQ Signatures for PKI
44. Towards Quantum Distance Bounding Protocols
45. A Privacy-Preserving Model for Biometric Fusion
46. A Privacy-Preserving Remote Healthcare System Offering End-to-End Security
47. Extension Field Cancellation: A New Central Trapdoor for Multivariate Quadratic Systems
48. An Efficient Entity Authentication Protocol with Enhanced Security and Privacy Properties
49. An Implementation of a High Assurance Smart Meter Using Protected Module Architectures
50. Collateral Damage of Facebook Apps: Friends, Providers, and Privacy Interdependence
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.