Search

Your search keyword '"Preneel, Bart"' showing total 2,413 results

Search Constraints

Start Over You searched for: Author "Preneel, Bart" Remove constraint Author: "Preneel, Bart"
2,413 results on '"Preneel, Bart"'

Search Results

1. CovFUZZ: Coverage-based fuzzer for 4G&5G protocols

2. Breaking the Balance of Power: Commitment Attacks on Ethereum's Reward Mechanism

3. GitHub Copilot: the perfect Code compLeeter?

4. Fast Evaluation of S-boxes with Garbled Circuits

5. MaSTer: Maliciously Secure Truncation for Replicated Secret Sharing Without Pre-processing

6. Automated Generation of Masked Nonlinear Components : From Lookup Tables to Private Circuits

7. Arithmetic Circuit Implementations of S-boxes for SKINNY and PHOTON in MPC

8. A Survey of Security and Privacy Issues in V2X Communication Systems

9. HERMES: Scalable, Secure, and Privacy-Enhancing Vehicle Access System

10. Towards a common performance and effectiveness terminology for digital proximity tracing applications

12. Threshold Structure-Preserving Signatures

13. Reusable, Instant and Private Payment Guarantees for Cryptocurrencies

14. Cryptanalysis of SPEEDY

15. A Novel Demodulation Scheme for Secure and Reliable UWB Distance Bounding

16. Decentralized Privacy-Preserving Proximity Tracing

17. The Fifth International Students' Olympiad in Cryptography -- NSUCRYPTO: problems and their solutions

18. Stretching Cube Attacks: Improved Methods to Recover Massive Superpolies

19. Implicit White-Box Implementations: White-Boxing ARX Ciphers

20. A White-Box Speck Implementation Using Self-equivalence Encodings

21. A Greater GIFT: Strengthening GIFT Against Statistical Cryptanalysis

22. On the Susceptibility of Texas Instruments SimpleLink Platform Microcontrollers to Non-invasive Physical Attacks

23. Provable Secure Software Masking in the Real-World

24. A New Privacy Enhancing Beacon Scheme in V2X Communication

26. Problems and solutions of the Fourth International Students' Olympiad in Cryptography NSUCRYPTO

27. Cross-Domain Attribute-Based Access Control Encryption

28. Categorization of Faulty Nonce Misuse Resistant Message Authentication

29. On Self-equivalence Encodings in White-Box Implementations

30. Block-Anti-Circulant Unbalanced Oil and Vinegar

38. A Collaborative Cybersecurity Education Program

39. Public Key Compression for Constrained Linear Signature Schemes

41. Optimal Forgeries Against Polynomial-Based MACs and GCM

42. Short Solutions to Nonlinear Systems of Equations

43. A Privacy-Preserving Device Tracking System Using a Low-Power Wide-Area Network

49. Field Lifting for Smaller UOV Public Keys

50. SePCAR: A Secure and Privacy-Enhancing Protocol for Car Access Provision

Catalog

Books, media, physical & digital resources