Search

Your search keyword '"Preneel, Bart"' showing total 128 results

Search Constraints

Start Over You searched for: Author "Preneel, Bart" Remove constraint Author: "Preneel, Bart" Topic discrete mathematics in computer science Remove constraint Topic: discrete mathematics in computer science
128 results on '"Preneel, Bart"'

Search Results

1. Seven-Property-Preserving Iterated Hashing: ROX.

2. Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy.

3. Related-Key Rectangle Attacks on Reduced AES-192 and AES-256.

4. Differential-Linear Attacks Against the Stream Cipher Phelix.

5. A Game-Theoretic Approach to Deciding Higher-Order Matching.

6. The Wadge Hierarchy of Deterministic Tree Languages.

7. Recursive Concurrent Stochastic Games.

8. Lower Bounds for Complementation of ω-Automata Via the Full Automata Technique.

9. Flat Parametric Counter Automata.

10. Constructing Exponential-Size Deterministic Zielonka Automata.

11. Interpreting Tree-to-Tree Queries.

12. The Complexity of Enriched μ-Calculi.

13. Invisible Safety of Distributed Protocols.

14. On Intersection Problems for Polynomially Generated Sets.

15. Theories of HNN-Extensions and Amalgamated Products.

16. A Finite Equational Base for CCS with Left Merge and Communication Merge.

17. On the Axiomatizability of Priority.

18. Communication of Two Stacks and Rewriting.

19. λ-RBAC: Programming with Role-Based Access Control.

20. Jumbo λ-Calculus.

21. On Complexity of Grammars Related to the Safety Problem.

22. Timed Petri Nets and Timed Automata: On the Discriminating Power of Zeno Sequences.

23. Commutative Locative Quantifiers for Multiplicative Linear Logic.

24. Interpreting Polymorphic FPC into Domain Theoretic Models of Parametric Polymorphism.

25. Typed GoI for Exponentials.

26. Descriptive and Relative Completeness of Logics for Higher-Order Functions.

27. Half-Positional Determinacy of Infinite Games.

28. Multipartite Secret Sharing by Bivariate Interpolation.

29. Identity-Based Encryption Gone Wild.

30. Deterministic Priority Mean-Payoff Games as Limits of Discounted Games.

31. An Adaptively Secure Mix-Net Without Erasures.

32. Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability.

33. A Probabilistic Hoare-style Logic for Game-Based Cryptographic Proofs.

34. Hardness of Distinguishing the MSB or LSB of Secret Keys in Diffie-Hellman Schemes.

35. Efficient Pseudorandom Generators from Exponentially Hard One-Way Functions.

36. On Everlasting Security in the Hybrid Bounded Storage Model.

37. Quantum Hardcore Functions by Complexity-Theoretical Quantum List Decoding.

38. On the Impossibility of Extracting Classical Randomness Using a Quantum Computer.

39. Constructing Single- and Multi-output Boolean Functions with Maximal Algebraic Immunity.

40. A Tight Bound for EMAC.

41. Symbolic Protocol Analysis in Presence of a Homomorphism Operator and Exclusive Or.

42. An Efficient Provable Distinguisher for HFE.

43. Generalized Compact Knapsacks Are Collision Resistant.

44. Preserving Secrecy Under Refinement.

45. Quantifying Information Leakage in Process Calculi.

46. A Dolev-Yao-Based Definition of Abuse-Free Protocols.

47. Cryptographically Sound Implementations for Communicating Processes.

48. Corrupting One vs. Corrupting Many: The Case of Broadcast and Multicast Encryption.

49. New Extensions of Pairing-Based Signatures into Universal Designated Verifier Signatures.

50. An Efficient Compiler from Σ-Protocol to 2-Move Deniable Zero-Knowledge.

Catalog

Books, media, physical & digital resources