Towards measuring anonymity C Diaz, S Seys, J Claessens, B Preneel International Workshop on Privacy Enhancing Technologies, 54-68, 2002 | 1058 | 2002 |
Mutual information analysis: A generic side-channel distinguisher B Gierlichs, L Batina, P Tuyls, B Preneel International Workshop on Cryptographic Hardware and Embedded Systems, 426-442, 2008 | 868 | 2008 |
RIPEMD-160: A strengthened version of RIPEMD H Dobbertin, A Bosselaers, B Preneel International Workshop on Fast Software Encryption, 71-82, 1996 | 763 | 1996 |
Analysis and design of cryptographic hash functions B Preneel Katholieke Universiteit te Leuven, 1993 | 682 | 1993 |
A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements M Deng, K Wuyts, R Scandariato, B Preneel, W Joosen Requirements Engineering 16 (1), 3-32, 2011 | 630 | 2011 |
Trivium C De Cannière, B Preneel New Stream Cipher Designs, 244-266, 2008 | 622 | 2008 |
Hash functions based on block ciphers: A synthetic approach B Preneel, R Govaerts, J Vandewalle Advances in Cryptology—CRYPTO’93: 13th Annual International Cryptology …, 1994 | 562 | 1994 |
Differential and linear cryptanalysis using mixed-integer linear programming N Mouha, Q Wang, D Gu, B Preneel Information Security and Cryptology: 7th International Conference, Inscrypt …, 2012 | 504 | 2012 |
FPDetective: dusting the web for fingerprinters G Acar, M Juarez, N Nikiforakis, C Diaz, S Gürses, F Piessens, B Preneel Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 463 | 2013 |
Propagation characteristics of Boolean functions B Preneel, W Van Leekwijck, L Van Linden, R Govaerts, J Vandewalle Advances in Cryptology—EUROCRYPT’90, 161-173, 1990 | 420 | 1990 |
MDx-MAC and building fast MACs from hash functions B Preneel, PC Van Oorschot Annual International Cryptology Conference, 1-14, 1995 | 382 | 1995 |
The Cipher SHARK V Rijmen, J Daemen, B Preneel, A Bosselaers, E De Win Fast Software Encryption, 99-111, 1996 | 361 | 1996 |
Power-analysis attack on an ASIC AES implementation SB Ors, F Gurkaynak, E Oswald, B Preneel International Conference on Information Technology: Coding and Computing …, 2004 | 344 | 2004 |
Decentralized privacy-preserving proximity tracing C Troncoso, M Payer, JP Hubaux, M Salathé, J Larus, E Bugnion, ... arXiv preprint arXiv:2005.12273, 2020 | 342 | 2020 |
Sancus: Low-cost trustworthy extensible networked devices with a zero-software trusted computing base J Noorman, P Agten, W Daniels, R Strackx, A Van Herrewege, C Huygens, ... 22nd USENIX Security Symposium (USENIX Security 13), 479-498, 2013 | 319 | 2013 |
ARM: Anonymous routing protocol for mobile ad hoc networks S Seys, B Preneel International Journal of Wireless and Mobile Computing 3 (3), 145-155, 2009 | 311 | 2009 |
Flip feng shui: Hammering a needle in the software stack K Razavi, B Gras, E Bosman, B Preneel, C Giuffrida, H Bos 25th USENIX Security Symposium (USENIX Security 16), 1-18, 2016 | 305 | 2016 |
Cryptographic hash functions B Preneel European Transactions on Telecommunications 5 (4), 431-448, 1994 | 292 | 1994 |
Chaskey: an efficient MAC algorithm for 32-bit microcontrollers N Mouha, B Mennink, A Van Herrewege, D Watanabe, B Preneel, ... Selected Areas in Cryptography--SAC 2014: 21st International Conference …, 2014 | 290 | 2014 |
On the security of today’s online electronic banking systems J Claessens, V Dem, D De Cock, B Preneel, J Vandewalle Computers & Security 21 (3), 253-265, 2002 | 268 | 2002 |