Bart Preneel
Bart Preneel
Professor, KU Leuven
Verified email at
Cited by
Cited by
Towards measuring anonymity
C Diaz, S Seys, J Claessens, B Preneel
Privacy Enhancing Technologies: Second International Workshop, PET 2002 San …, 2003
Mutual information analysis: A generic side-channel distinguisher
B Gierlichs, L Batina, P Tuyls, B Preneel
Cryptographic Hardware and Embedded Systems–CHES 2008: 10th International …, 2008
RIPEMD-160: A strengthened version of RIPEMD
H Dobbertin, A Bosselaers, B Preneel
Fast Software Encryption: Third International Workshop Cambridge, UK …, 1996
Analysis and design of cryptographic hash functions
B Preneel
Katholieke Universiteit te Leuven, 1993
C De Cannière, B Preneel
New Stream Cipher Designs, 244-266, 2008
Hash functions based on block ciphers: A synthetic approach
B Preneel, R Govaerts, J Vandewalle
Advances in Cryptology—CRYPTO’93: 13th Annual International Cryptology …, 1994
A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements
M Deng, K Wuyts, R Scandariato, B Preneel, W Joosen
Requirements Engineering 16 (1), 3-32, 2011
FPDetective: dusting the web for fingerprinters
G Acar, M Juarez, N Nikiforakis, C Diaz, S Gürses, F Piessens, B Preneel
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
Differential and linear cryptanalysis using mixed-integer linear programming
N Mouha, Q Wang, D Gu, B Preneel
Information Security and Cryptology: 7th International Conference, Inscrypt …, 2012
Propagation characteristics of Boolean functions
B Preneel, W Van Leekwijck, L Van Linden, R Govaerts, J Vandewalle
Advances in Cryptology—EUROCRYPT’90, 161-173, 1990
MDx-MAC and building fast MACs from hash functions
B Preneel, PC Van Oorschot
Advances in Cryptology—CRYPT0’95: 15th Annual International Cryptology …, 2001
The Cipher SHARK
V Rijmen, J Daemen, B Preneel, A Bosselaers, E De Win
Fast Software Encryption, 99-111, 1996
Power-analysis attack on an ASIC AES implementation
SB Ors, F Gurkaynak, E Oswald, B Preneel
International Conference on Information Technology: Coding and Computing …, 2004
ARM: Anonymous routing protocol for mobile ad hoc networks
S Seys, B Preneel
International Journal of Wireless and Mobile Computing 3 (3), 145-155, 2009
Decentralized privacy-preserving proximity tracing
C Troncoso, M Payer, JP Hubaux, M Salathé, J Larus, E Bugnion, ...
arXiv preprint arXiv:2005.12273, 2020
Sancus: Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base.
J Noorman, P Agten, W Daniels, R Strackx, A Van Herrewege, C Huygens, ...
USENIX Security Symposium, 479-494, 2013
Cryptographic hash functions
B Preneel
European Transactions on Telecommunications 5 (4), 431-448, 1994
On the security of today’s online electronic banking systems
J Claessens, V Dem, D De Cock, B Preneel, J Vandewalle
Computers & Security 21 (3), 253-265, 2002
Chaskey: an efficient MAC algorithm for 32-bit microcontrollers
N Mouha, B Mennink, A Van Herrewege, D Watanabe, B Preneel, ...
Selected Areas in Cryptography--SAC 2014: 21st International Conference …, 2014
Flip Feng Shui: Hammering a Needle in the Software Stack.
K Razavi, B Gras, E Bosman, B Preneel, C Giuffrida, H Bos
USENIX Security symposium 25, 1-18, 2016
The system can't perform the operation now. Try again later.
Articles 1–20