Cryptographers' World
 

Bart Preneel


Author's Web Page Link

85 papers in database with 2874 citations StarStarStar

Editor of 4 conference proceedings books

H-number: 28

Conference Proceedings

 
1. Bart PreneelStafford E. Tavares, editors, Selected Areas in Cryptography, 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers. Springer, 2006. ISBN 3-540-33108-5.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

2. Bart Preneel, editor, Topics in Cryptology - CT-RSA 2002, The Cryptographer's Track at the RSA Conference, 2002, San Jose, CA, USA, February 18-22, 2002, Proceedings. Springer, 2002. ISBN 3-540-43224-8.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

3. Bart Preneel, editor, Advances in Cryptology - EUROCRYPT 2000, International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000, Proceeding. Springer, 2000. ISBN 3-540-67517-5.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

4. Bart Preneel, editor, Fast Software Encryption: Second International Workshop. Leuven, Belgium, 14-16 December 1994, Proceedings. Springer, 1995. ISBN 3-540-58108-1.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Christopher Wolf,  An Braeken,  Bart Preneel,  On the security of stepwise triangular systems, Designs, Codes and Cryptography, Volume 40(3), pp. 285 - 302, Springer, 2006.

[Electronic Edition][No citation]

2. Lars R. Knudsen,  Xuejia Lai,  Bart Preneel,  Attacks on Fast Double Block Length Hash Functions, Journal of Cryptology, Volume 11(1), pp. 59 - 72, Springer, 1998.

[Cited 57 times Red Star]

3. Vincent Rijmen,  Bart Preneel,  Erik De Win,  On Weaknesses of Non-surjective Round Functions, Designs, Codes and Cryptography, Volume 12(3), pp. 253 - 266, Springer, 1997.

[Electronic Edition][Cited 28 times ]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Sebastiaan Indesteege,  Bart Preneel,  Practical Collisions for EnRUPT, pp. 246 - 259, FSE 2009.

[Electronic Edition][Cited 11 times ]

2. Benedikt Gierlichs,  Lejla Batina,  Pim Tuyls,  Bart Preneel,  Mutual Information Analysis, pp. 426 - 442, CHES 2008.

[Electronic Edition][Cited 48 times ]

3. Helena Handschuh,  Bart Preneel,  Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms, pp. 144 - 161, CRYPTO 2008.

[Electronic Edition][Cited 19 times ]

4. Christophe De Cannière,  Özgül Küçük,  Bart Preneel,  Analysis of Grain's Initialization Algorithm, pp. 276 - 289, AFRICACRYPT 2008.

[Electronic Edition][Cited 6 times ]

5. Sebastiaan Indesteege,  Nathan Keller,  Orr Dunkelman,  Eli Biham,  Bart Preneel,  A Practical Attack on KeeLoq, pp. 1 - 18, EUROCRYPT 2008.

[Electronic Edition][Cited 30 times ]

6. Orr Dunkelman,  Gautham Sekar,  Bart Preneel,  Improved Meet-in-the-Middle Attacks on Reduced-Round DES, pp. 86 - 100, INDOCRYPT 2007.

[Electronic Edition][Cited 6 times ]

7. Gautham Sekar,  Souradyuti Paul,  Bart Preneel,  Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses, pp. 58 - 72, INDOCRYPT 2007.

[Electronic Edition][Cited 5 times ]

8. Jongsung Kim,  Seokhie Hong,  Bart Preneel,  Related-Key Rectangle Attacks on Reduced AES-192 and AES-256, pp. 225 - 241, FSE 2007.

[Electronic Edition][Cited 45 times ]

9. Hongjun Wu,  Bart Preneel,  Differential-Linear Attacks Against the Stream Cipher Phelix, pp. 87 - 100, FSE 2007.

[Electronic Edition][Cited 8 times ]

10. Florian Mendel,  Joseph Lano,  Bart Preneel,  Cryptanalysis of Reduced Variants of the FORK-256 Hash Function, pp. 85 - 100, CT-RSA 2007.

[Electronic Edition][Cited 13 times ]

11. Hongjun Wu,  Bart Preneel,  Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy, pp. 276 - 290, EUROCRYPT 2007.

[Electronic Edition][Cited 10 times ]

12. Brecht Wyseur,  Wil Michiels,  Paul Gorissen,  Bart Preneel,  Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings, pp. 264 - 277, SAC 2007.

[Electronic Edition][Cited 18 times ]

13. Hirotaka Yoshida,  Dai Watanabe,  Katsuyuki Okeya,  Jun Kitahara,  Hongjun Wu,  Özgül Küçük,  Bart Preneel,  MAME: A Compression Function with Reduced Hardware Requirements, pp. 148 - 165, CHES 2007.

[Electronic Edition][Cited 8 times ]

14. Elena Andreeva,  Gregory Neven,  Bart Preneel,  Thomas Shrimpton,  Seven-Property-Preserving Iterated Hashing: ROX, pp. 130 - 146, ASIACRYPT 2007.

[Electronic Edition][Cited 35 times ]

15. Florian Mendel,  Bart Preneel,  Vincent Rijmen,  Hirotaka Yoshida,  Dai Watanabe,  Update on Tiger, pp. 63 - 79, INDOCRYPT 2006.

[Electronic Edition][Cited 13 times ]

16. Hongjun Wu,  Bart Preneel,  Resynchronization Attacks on WG and LEX, pp. 422 - 432, FSE 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 14 times ]

17. Souradyuti Paul,  Bart Preneel,  Gautham Sekar,  Distinguishing Attacks on the Stream Cipher Py, pp. 405 - 421, FSE 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 23 times ]

18. Hongjun Wu,  Bart Preneel,  Cryptanalysis of the Stream Cipher DECIM, pp. 30 - 40, FSE 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 10 times ]

19. Helena Handschuh,  Bart Preneel,  Blind Differential Cryptanalysis for Enhanced Power Attacks, pp. 163 - 173, SAC 2006.

[Electronic Edition][Cited 15 times ]

20. Hongjun Wu,  Bart Preneel,  Cryptanalysis of the Stream Cipher ABC v2, pp. 56 - 66, SAC 2006.

[Electronic Edition][Cited 4 times ]

21. Souradyuti Paul,  Bart Preneel,  On the (In)security of Stream Ciphers Based on Arrays and Modular Addition, pp. 69 - 83, ASIACRYPT 2006.

[Electronic Edition][Cited 21 times ]

22. Ventzislav Nikov,  Svetla Nikova,  Bart Preneel,  A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols, pp. 348 - 363, ASIACRYPT 2006.

[Electronic Edition][Cited 4 times ]

23. Kazuo Sakiyama,  Lejla Batina,  Bart Preneel,  Ingrid Verbauwhede,  Superscalar Coprocessor for High-Speed Curve-Based Cryptography, pp. 415 - 429, CHES 2006.

[Electronic Edition][Cited 26 times ]

24. An Braeken,  Bart Preneel,  On the Algebraic Immunity of Symmetric Boolean Functions, pp. 35 - 48, INDOCRYPT 2005.

[Electronic Edition][Cited 64 times Red Star]

25. Souradyuti Paul,  Bart Preneel,  Near Optimal Algorithms for Solving Differential Equations of Addition with Batch Queries, pp. 90 - 103, INDOCRYPT 2005.

[Electronic Edition][Cited 9 times ]

26. Christopher Wolf,  Bart Preneel,  Equivalent keys in HFE, C∗, and variations, pp. 33 - 49, MYCRYPT 2005.

[Electronic Edition][Cited 26 times ]

27. Lejla Batina,  David Hwang,  Alireza Hodjat,  Bart Preneel,  Ingrid Verbauwhede,  Hardware/Software Co-design for Hyperelliptic Curve Cryptography (HECC) on the 8051µP, pp. 106 - 118, CHES 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 15 times ]

28. An Braeken,  Christopher Wolf,  Bart Preneel,  A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes, pp. 29 - 43, CT-RSA 2005.

[Electronic Edition][Cited 35 times ]

29. Nele Mentens,  Lejla Batina,  Bart Preneel,  Ingrid Verbauwhede,  A Systematic Evaluation of Compact Hardware Implementations for the Rijndael S-Box, pp. 323 - 333, CT-RSA 2005.

[Electronic Edition][Cited 27 times ]

30. Seokhie Hong,  Jongsung Kim,  Sangjin Lee,  Bart Preneel,  Related-Key Rectangle Attacks on Reduced Versions of SHACAL-1 and AES-192, pp. 368 - 383, FSE 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 58 times Red Star]

31. Christopher Wolf,  Bart Preneel,  Large Superfluous Keys in Multivariate Quadratic Asymmetric Systems, pp. 275 - 287, PKC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 28 times ]

32. An Braeken,  Ventzislav Nikov,  Svetla Nikova,  Bart Preneel,  On Boolean Functions with Generalized Cryptographic Properties, pp. 120 - 135, INDOCRYPT 2004.

[Electronic Edition][Cited 12 times ]

33. Deukjo Hong,  Bart Preneel,  Sangjin Lee,  Higher Order Universal One-Way Hash Functions, pp. 201 - 213, ASIACRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 9 times ]

34. Taizo Shirai,  Bart Preneel,  On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds, pp. 1 - 15, ASIACRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 11 times ]

35. Frederik Armknecht,  Joseph Lano,  Bart Preneel,  Extending the Resynchronization Attack, pp. 19 - 38, SAC 2004.

[Electronic Edition][Cited 29 times ]

36. François-Xavier Standaert,  Siddika Berna Örs,  Bart Preneel,  Power Analysis of an FPGA: Implementation of Rijndael: Is Pipelining a DPA Countermeasure?, pp. 30 - 44, CHES 2004.

[Electronic Edition][Cited 45 times ]

37. Souradyuti Paul,  Bart Preneel,  A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher, pp. 245 - 259, FSE 2004.

[Electronic Edition][Cited 63 times Red Star]

38. Ventzislav Nikov,  Svetla Nikova,  Bart Preneel,  On Multiplicative Linear Secret Sharing Schemes, pp. 135 - 147, INDOCRYPT 2003.

[Electronic Edition][Cited 7 times ]

39. Souradyuti Paul,  Bart Preneel,  Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator, pp. 52 - 67, INDOCRYPT 2003.

[Electronic Edition][Cited 29 times ]

40. Bart Van Rompay,  Alex Biryukov,  Bart Preneel,  Joos Vandewalle,  Cryptanalysis of 3-Pass HAVAL, pp. 228 - 245, ASIACRYPT 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 25 times ]

41. Ventzislav Nikov,  Svetla Nikova,  Bart Preneel,  Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case, pp. 1 - 15, ACNS 2003.

[Electronic Edition][Cited 4 times ]

42. Siddika Berna Örs,  Elisabeth Oswald,  Bart Preneel,  Power-Analysis Attacks on an FPGA - First Experimental Results, pp. 35 - 50, CHES 2003.

[Electronic Edition][Cited 87 times Red Star]

43. Alex Biryukov,  Joseph Lano,  Bart Preneel,  Cryptanalysis of the Alleged SecurID Hash Function, pp. 130 - 144, SAC 2003.

[Electronic Edition][Cited 21 times ]

44. Alex Biryukov,  Christophe De Cannière,  An Braeken,  Bart Preneel,  A Toolbox for Cryptanalysis: Linear and Affine Equivalence Algorithms, pp. 33 - 50, EUROCRYPT 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 40 times ]

45. Steve Babbage,  Christophe De Cannière,  Joseph Lano,  Bart Preneel,  Joos Vandewalle,  Cryptanalysis of SOBER-t32, pp. 111 - 128, FSE 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 17 times ]

46. Dowon Hong,  Ju-Sung Kang,  Bart Preneel,  Heuisu Ryu,  A Concrete Security Analysis for 3GPP-MAC, pp. 154 - 169, FSE 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 9 times ]

47. Ventzislav Nikov,  Svetla Nikova,  Bart Preneel,  Joos Vandewalle,  On Unconditionally Secure Distributed Oblivious Transfer, pp. 395 - 408, INDOCRYPT 2002.

[Electronic Edition][Cited 8 times ]

48. Ventzislav Nikov,  Svetla Nikova,  Bart Preneel,  Joos Vandewalle,  On Distributed Key Distribution Centers and Unconditionally Secure Proactive Verifiable Secret Sharing Schemes Based on General Access Structure, pp. 422 - 436, INDOCRYPT 2002.

[Electronic Edition][Cited 6 times ]

49. Dai Watanabe,  Soichi Furuya,  Hirotaka Yoshida,  Kazuo Takaragi,  Bart Preneel,  A New Keystream Generator MUGI, pp. 179 - 194, FSE 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 50 times Red Star]

50. Bart Preneel,  New European Schemes for Signature, Integrity and Encryption (NESSIE): A Status Report, pp. 297 - 309, PKC 2002.

[Electronic Edition][Cited 4 times ]

51. Michaël Quisquater,  Bart Preneel,  Joos Vandewalle,  On the Security of the Threshold Scheme Based on the Chinese Remainder Theorem, pp. 199 - 210, PKC 2002.

[Electronic Edition][Cited 17 times ]

52. Bert den Boer,  Bart Van Rompay,  Bart Preneel,  Joos Vandewalle,  New (Two-Track-)MAC Based on the Two Trails of RIPEMD, pp. 314 - 324, SAC 2001.

[Electronic Edition][Cited 5 times ]

53. Frederik Vercauteren,  Bart Preneel,  Joos Vandewalle,  A Memory Efficient Version of Satoh's Algorithm, pp. 1 - 13, EUROCRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 41 times ]

54. Bart Preneel,  NESSIE: A European Approach to Evaluate Cryptographic Algorithms, pp. 267 - 276, FSE 2001.

[Electronic Edition][Cited 2 times ]

55. Paulo S. L. M. Barreto,  Vincent Rijmen,  Jorge Nakahara Jr.,  Bart Preneel,  Joos Vandewalle,  Hae Yong Kim,  Improved SQUARE Attacks against Reduced-Round HIEROCRYPT, pp. 165 - 173, FSE 2001.

[Electronic Edition][Cited 15 times ]

56. Vincent Rijmen,  Bart Van Rompay,  Bart Preneel,  Joos Vandewalle,  Producing Collisions for PANAMA, pp. 37 - 51, FSE 2001.

[Electronic Edition][Cited 19 times ]

57. Jorge Nakahara Jr.,  Bart Preneel,  Joos Vandewalle,  Linear Cryptanalysis of Reduced-Round Versions of the SAFER Block Cipher Family, pp. 244 - 261, FSE 2000.

[Electronic Edition][Cited 9 times ]

58. Carl D'Halluin,  Gert Bijnens,  Bart Preneel,  Vincent Rijmen,  Equivalent Keys of HPC, pp. 29 - 42, ASIACRYPT 1999.

[Electronic Edition][Cited 5 times ]

59. Wim Nevelsteen,  Bart Preneel,  Software Performance of Universal Hash Functions, pp. 24 - 41, EUROCRYPT 1999.

[Electronic Edition][Cited 54 times Red Star]

60. Carl D'Halluin,  Gert Bijnens,  Vincent Rijmen,  Bart Preneel,  Attack on Six Rounds of Crypton, pp. 46 - 59, FSE 1999.

[Electronic Edition][Cited 15 times ]

61. Johan Borst,  Bart Preneel,  Joos Vandewalle,  Linear Cryptanalysis of RC5 and RC6, pp. 16 - 30, FSE 1999.

[Electronic Edition][Cited 30 times ]

62. Helena Handschuh,  Bart Preneel,  On the Security of Double and 2-Key Triple Modes of Operation, pp. 215 - 230, FSE 1999.

[Electronic Edition][Cited 10 times ]

63. Lars R. Knudsen,  Willi Meier,  Bart Preneel,  Vincent Rijmen,  Sven Verdoolaege,  Analysis Methods for (Alleged) RC4, pp. 327 - 341, ASIACRYPT 1998.

[Electronic Edition][Cited 91 times Red Star]

64. Lars R. Knudsen,  Bart Preneel,  Fast and Secure Hashing Based on Codes, pp. 485 - 498, CRYPTO 1997.

[Electronic Edition][Cited 37 times ]

65. Vincent Rijmen,  Bart Preneel,  A Family of Trapdoor Ciphers, pp. 139 - 148, FSE 1997.

[Electronic Edition][Cited 10 times ]

66. Lars R. Knudsen,  Bart Preneel,  Hash Functions Based on Block Ciphers and Quaternary Codes, pp. 77 - 90, ASIACRYPT 1996.

[Electronic Edition][Cited 23 times ]

67. Bart Preneel,  Paul C. van Oorschot,  On the Security of Two MAC Algorithms, pp. 19 - 32, EUROCRYPT 1996.

[Electronic Edition][Cited 74 times Red Star]

68. Vincent Rijmen,  Joan Daemen,  Bart Preneel,  Antoon Bosselaers,  Erik De Win,  The Cipher SHARK, pp. 99 - 111, FSE 1996.

[Electronic Edition][Cited 125 times Red StarRed Star]

69. Hans Dobbertin,  Antoon Bosselaers,  Bart Preneel,  RIPEMD-160: A Strengthened Version of RIPEMD, pp. 71 - 82, FSE 1996.

[Electronic Edition][Cited 361 times Red StarRed StarRed Star]

70. Bart Preneel,  Paul C. van Oorschot,  MDx-MAC and Building Fast MACs from Hash Functions, pp. 1 - 14, CRYPTO 1995.

[Electronic Edition][Cited 160 times Red StarRed Star]

71. Bart Preneel,  FSE'94 - Introduction, pp. 1 - 5, FSE 1994.

[Electronic Edition][No citation]

72. Vincent Rijmen,  Bart Preneel,  Cryptanalysis of McGuffin, pp. 353 - 358, FSE 1994.

[Electronic Edition][Cited 6 times ]

73. Vincent Rijmen,  Bart Preneel,  Improved Characteristics for Differential Cryptanalysis of Hash Functions Based on Block Ciphers, pp. 242 - 248, FSE 1994.

[Electronic Edition][Cited 16 times ]

74. Bart Preneel,  Design Principles for Dedicated Hash Functions, pp. 71 - 82, FSE 1993.

[Electronic Edition][Cited 9 times ]

75. Bart Preneel,  Marnix Nuttin,  Vincent Rijmen,  Johan Buelens,  Cryptanalysis of the CFB Mode of the DES with a Reduced Number of Rounds, pp. 212 - 223, CRYPTO 1993.

[Electronic Edition][Cited 26 times ]

76. Bart Preneel,  René Govaerts,  Joos Vandewalle,  Hash Functions Based on Block Ciphers: A Synthetic Approach, pp. 368 - 378, CRYPTO 1993.

[Electronic Edition][Cited 206 times Red StarRed Star]

77. Bart Preneel,  René Govaerts,  Joos Vandewalle,  An Attack on Two Hash Functions by Zheng-Matsumoto-Imai, pp. 535 - 538, ASIACRYPT 1992.

[Electronic Edition][Cited 5 times ]

78. Bart Preneel,  René Govaerts,  Joos Vandewalle,  On the Power of Memory in the Design of Collision Resistant Hash Functions, pp. 105 - 121, ASIACRYPT 1992.

[Electronic Edition][Cited 16 times ]

79. Bart Preneel,  René Govaerts,  Joos Vandewalle,  Boolean Functions Satisfying Higher Order Propagation Criteria, pp. 141 - 152, EUROCRYPT 1991.

[Electronic Edition][Cited 51 times Red Star]

80. Bart Preneel,  David Chaum,  Walter Fumy,  Cees J. A. Jansen,  Peter Landrock,  Gert Roelofsen,  Race Integrity Primitives Evaluation (RIPE): A Status Report, pp. 547 - 551, EUROCRYPT 1991.

[Electronic Edition][Cited 5 times ]

81. Bart Preneel,  Werner Van Leekwijck,  Luc Van Linden,  René Govaerts,  Joos Vandewalle,  Propagation Characteristics of Boolean Functions, pp. 161 - 173, EUROCRYPT 1990.

[Electronic Edition][Cited 208 times Red StarRed Star]

82. Bart Preneel,  Antoon Bosselaers,  René Govaerts,  Joos Vandewalle,  A Chosen Text Attack on The Modified Cryptographic Checksum Algorithm of Cohen and Huang, pp. 154 - 163, CRYPTO 1989.

[Electronic Edition][Cited 8 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...