Bart Preneel


Ontology type: schema:Person     


Person Info

NAME

Bart

SURNAME

Preneel

Publications in SciGraph latest 50 shown

  • 2022-06-18 A White-Box Speck Implementation Using Self-equivalence Encodings in APPLIED CRYPTOGRAPHY AND NETWORK SECURITY
  • 2022-05-25 A Greater GIFT: Strengthening GIFT Against Statistical Cryptanalysis in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2022
  • 2022-03-26 Provable Secure Software Masking in the Real-World in CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN
  • 2022-03-26 On the Susceptibility of Texas Instruments SimpleLink Platform Microcontrollers to Non-invasive Physical Attacks in CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN
  • 2022-01-23 A New Privacy Enhancing Beacon Scheme in V2X Communication in DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY
  • 2021-12-09 Cross-Domain Attribute-Based Access Control Encryption in CRYPTOLOGY AND NETWORK SECURITY
  • 2021-12-01 Categorization of Faulty Nonce Misuse Resistant Message Authentication in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2021
  • 2021-07-21 On Self-equivalence Encodings in White-Box Implementations in SELECTED AREAS IN CRYPTOGRAPHY
  • 2020-01-10 Block-Anti-Circulant Unbalanced Oil and Vinegar in SELECTED AREAS IN CRYPTOGRAPHY – SAC 2019
  • 2020-01-10 Improved Interpolation Attacks on Cryptographic Primitives of Low Algebraic Degree in SELECTED AREAS IN CRYPTOGRAPHY – SAC 2019
  • 2019-01-13 Public Key Compression for Constrained Linear Signature Schemes in SELECTED AREAS IN CRYPTOGRAPHY – SAC 2018
  • 2018-11-10 A Privacy-Preserving Device Tracking System Using a Low-Power Wide-Area Network in CRYPTOLOGY AND NETWORK SECURITY
  • 2018-03-31 Optimal Forgeries Against Polynomial-Based MACs and GCM in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2018
  • 2018-02-28 Short Solutions to Nonlinear Systems of Equations in NUMBER-THEORETIC METHODS IN CRYPTOLOGY
  • 2017-11-30 Field Lifting for Smaller UOV Public Keys in PROGRESS IN CRYPTOLOGY – INDOCRYPT 2017
  • 2017-11-25 Editorial: Special issue on recent trends in cryptography in CRYPTOGRAPHY AND COMMUNICATIONS
  • 2017-08-12 SePCAR: A Secure and Privacy-Enhancing Protocol for Car Access Provision in COMPUTER SECURITY – ESORICS 2017
  • 2017-07-20 Towards Quantum Distance Bounding Protocols in RADIO FREQUENCY IDENTIFICATION AND IOT SECURITY
  • 2017-06-04 MQ Signatures for PKI in POST-QUANTUM CRYPTOGRAPHY
  • 2017-01-10 Publish or Perish: A Backward-Compatible Defense Against Selfish Mining in Bitcoin in TOPICS IN CRYPTOLOGY – CT-RSA 2017
  • 2016-10-28 A Privacy-Preserving Model for Biometric Fusion in CRYPTOLOGY AND NETWORK SECURITY
  • 2016-10-28 An Efficient Entity Authentication Protocol with Enhanced Security and Privacy Properties in CRYPTOLOGY AND NETWORK SECURITY
  • 2016-09-17 An Implementation of a High Assurance Smart Meter Using Protected Module Architectures in INFORMATION SECURITY THEORY AND PRACTICE
  • 2016-07-20 A MAC Mode for Lightweight Block Ciphers in FAST SOFTWARE ENCRYPTION
  • 2016-06-18 A Privacy-Preserving Remote Healthcare System Offering End-to-End Security in AD-HOC, MOBILE, AND WIRELESS NETWORKS
  • 2016-05-11 Collateral Damage of Facebook Apps: Friends, Providers, and Privacy Interdependence in ICT SYSTEMS SECURITY AND PRIVACY PROTECTION
  • 2016-04-28 On the Influence of Message Length in PMAC’s Security Bounds in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2016
  • 2016-02-04 Extension Field Cancellation: A New Central Trapdoor for Multivariate Quadratic Systems in POST-QUANTUM CRYPTOGRAPHY
  • 2016 Forgery and Subkey Recovery on CAESAR Candidate iFeed in SELECTED AREAS IN CRYPTOGRAPHY – SAC 2015
  • 2015-12-30 On the Impact of Known-Key Attacks on Hash Functions in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2015
  • 2015-05-28 Open problems in hash function security in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2015-05-10 A Survey on Multimodal Biometrics and the Protection of Their Templates in PRIVACY AND IDENTITY MANAGEMENT FOR THE FUTURE INTERNET IN THE AGE OF GLOBALISATION
  • 2015-04-29 Efficient parallelizable hashing using small non-compressing primitives in INTERNATIONAL JOURNAL OF INFORMATION SECURITY
  • 2015 On the XOR of Multiple Random Permutations in APPLIED CRYPTOGRAPHY AND NETWORK SECURITY
  • 2014-11-29 Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers in SELECTED AREAS IN CRYPTOGRAPHY -- SAC 2014
  • 2014-05-21 Two Attacks on a White-Box AES Implementation in SELECTED AREAS IN CRYPTOGRAPHY -- SAC 2013
  • 2014-05-21 AEGIS: A Fast Authenticated Encryption Algorithm in SELECTED AREAS IN CRYPTOGRAPHY -- SAC 2013
  • 2014-05-15 The Future of Information Security Research: Cryptology and Beyond in SECURE DATA MANAGEMENT
  • 2014 Breaking and Fixing Cryptophia’s Short Combiner in CRYPTOLOGY AND NETWORK SECURITY
  • 2013-10-04 Toward a secure Kerberos key exchange with smart cards in INTERNATIONAL JOURNAL OF INFORMATION SECURITY
  • 2013 Dedicated Hardware for Attribute-Based Credential Verification in COMMUNICATIONS AND MULTIMEDIA SECURITY
  • 2013 Flexible Design of a Modular Simultaneous Exponentiation Core for Embedded Platforms in RECONFIGURABLE COMPUTING: ARCHITECTURES, TOOLS AND APPLICATIONS
  • 2013 Protected Software Module Architectures in ISSE 2013 SECURING ELECTRONIC BUSINESS PROCESSES
  • 2013 Cryptanalysis of the Xiao – Lai White-Box AES Implementation in SELECTED AREAS IN CRYPTOGRAPHY
  • 2012-04-21 Internal differential collision attacks on the reduced-round Grøstl-0 hash function in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2012-02-11 On security arguments of the second round SHA-3 candidates in INTERNATIONAL JOURNAL OF INFORMATION SECURITY
  • 2012-02-05 The parazoa family: generalizing the sponge hash functions in INTERNATIONAL JOURNAL OF INFORMATION SECURITY
  • 2012 Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein in PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2012
  • 2012 Practical Attacks on a Cryptosystem Proposed in Patent WO/2009/066313 in INFORMATION SECURITY APPLICATIONS
  • 2012 UNAF: A Special Set of Additive Differences with Application to the Differential Analysis of ARX in FAST SOFTWARE ENCRYPTION
  • JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "affiliation": [
          {
            "affiliation": {
              "id": "http://www.grid.ac/institutes/grid.5596.f", 
              "type": "Organization"
            }, 
            "isCurrent": true, 
            "type": "OrganizationRole"
          }, 
          {
            "id": "http://www.grid.ac/institutes/grid.56912.39", 
            "type": "Organization"
          }, 
          {
            "id": "http://www.grid.ac/institutes/grid.425011.3", 
            "type": "Organization"
          }, 
          {
            "id": "http://www.grid.ac/institutes/grid.15762.37", 
            "type": "Organization"
          }
        ], 
        "familyName": "Preneel", 
        "givenName": "Bart", 
        "id": "sg:person.011115044357.39", 
        "identifier": [
          {
            "name": "orcid_id", 
            "type": "PropertyValue", 
            "value": "0000-0003-2005-9651"
          }
        ], 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011115044357.39", 
          "https://orcid.org/0000-0003-2005-9651"
        ], 
        "sdDataset": "persons", 
        "sdDatePublished": "2022-08-04T17:39", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-springernature-scigraph/baseset/20220804/entities/gbq_results/person/person_95.jsonl", 
        "type": "Person"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/person.011115044357.39'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/person.011115044357.39'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/person.011115044357.39'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/person.011115044357.39'


     

    This table displays all metadata directly associated to this object as RDF triples.

    27 TRIPLES      11 PREDICATES      16 URIs      8 LITERALS      3 BLANK NODES

    Subject Predicate Object
    1 sg:person.011115044357.39 schema:affiliation Nd5d52adbbfb947a2b96c4538d12d2f55
    2 grid-institutes:grid.15762.37
    3 grid-institutes:grid.425011.3
    4 grid-institutes:grid.56912.39
    5 schema:familyName Preneel
    6 schema:givenName Bart
    7 schema:identifier N720b79d796634cceb88fcf6611ba5699
    8 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011115044357.39
    9 https://orcid.org/0000-0003-2005-9651
    10 schema:sdDatePublished 2022-08-04T17:39
    11 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    12 schema:sdPublisher Nde5a291fb2c54d0c85d1d883330014c4
    13 sgo:license sg:explorer/license/
    14 sgo:sdDataset persons
    15 rdf:type schema:Person
    16 N720b79d796634cceb88fcf6611ba5699 schema:name orcid_id
    17 schema:value 0000-0003-2005-9651
    18 rdf:type schema:PropertyValue
    19 Nd5d52adbbfb947a2b96c4538d12d2f55 schema:affiliation grid-institutes:grid.5596.f
    20 sgo:isCurrent true
    21 rdf:type schema:OrganizationRole
    22 Nde5a291fb2c54d0c85d1d883330014c4 schema:name Springer Nature - SN SciGraph project
    23 rdf:type schema:Organization
    24 grid-institutes:grid.15762.37 schema:Organization
    25 grid-institutes:grid.425011.3 schema:Organization
    26 grid-institutes:grid.5596.f schema:Organization
    27 grid-institutes:grid.56912.39 schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...