Search

Your search keyword '"Preneel, Bart"' showing total 2,412 results

Search Constraints

Start Over You searched for: Author "Preneel, Bart" Remove constraint Author: "Preneel, Bart"
2,412 results on '"Preneel, Bart"'

Search Results

1. Breaking the Balance of Power: Commitment Attacks on Ethereum's Reward Mechanism

2. GitHub Copilot: the perfect Code compLeeter?

3. Fast Evaluation of S-boxes with Garbled Circuits

4. MaSTer: Maliciously Secure Truncation for Replicated Secret Sharing Without Pre-processing

5. Automated Generation of Masked Nonlinear Components : From Lookup Tables to Private Circuits

6. Arithmetic Circuit Implementations of S-boxes for SKINNY and PHOTON in MPC

7. A Survey of Security and Privacy Issues in V2X Communication Systems

8. HERMES: Scalable, Secure, and Privacy-Enhancing Vehicle Access System

9. Towards a common performance and effectiveness terminology for digital proximity tracing applications

11. Threshold Structure-Preserving Signatures

12. Reusable, Instant and Private Payment Guarantees for Cryptocurrencies

13. Cryptanalysis of SPEEDY

14. A Novel Demodulation Scheme for Secure and Reliable UWB Distance Bounding

15. Decentralized Privacy-Preserving Proximity Tracing

16. The Fifth International Students' Olympiad in Cryptography -- NSUCRYPTO: problems and their solutions

17. Stretching Cube Attacks: Improved Methods to Recover Massive Superpolies

18. Implicit White-Box Implementations: White-Boxing ARX Ciphers

19. A White-Box Speck Implementation Using Self-equivalence Encodings

20. A Greater GIFT: Strengthening GIFT Against Statistical Cryptanalysis

21. On the Susceptibility of Texas Instruments SimpleLink Platform Microcontrollers to Non-invasive Physical Attacks

22. Provable Secure Software Masking in the Real-World

23. A New Privacy Enhancing Beacon Scheme in V2X Communication

25. Problems and solutions of the Fourth International Students' Olympiad in Cryptography NSUCRYPTO

26. Cross-Domain Attribute-Based Access Control Encryption

27. Categorization of Faulty Nonce Misuse Resistant Message Authentication

28. On Self-equivalence Encodings in White-Box Implementations

29. Block-Anti-Circulant Unbalanced Oil and Vinegar

37. A Collaborative Cybersecurity Education Program

38. Public Key Compression for Constrained Linear Signature Schemes

42. Optimal Forgeries Against Polynomial-Based MACs and GCM

43. Short Solutions to Nonlinear Systems of Equations

44. A Privacy-Preserving Device Tracking System Using a Low-Power Wide-Area Network

48. Field Lifting for Smaller UOV Public Keys

49. SePCAR: A Secure and Privacy-Enhancing Protocol for Car Access Provision

50. Towards Quantum Distance Bounding Protocols

Catalog

Books, media, physical & digital resources