Bart Preneel
Top View
- Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition
- Modern Cryptology: an Introduction
- Bnl09 Preneel Owasp Benelux09
- Cryptanalysis of HMAC/NMAC-Whirlpool
- ECRYPT II Yearly Report on Algorithms and Keysizes (2011-2012)
- Which Estream Ciphers Have Been Broken?
- State of the Art in Lightweight Symmetric Cryptography
- Cryptographic Hash Functions: Theory and Practice
- Distinguishing Attacks on the Stream Cipher Py?
- 4.2 Cipher Categorisation
- RC4 Encryption-A Literature Survey
- Cryptographic Algorithms February 2018 Bart Preneel
- Lecture Notes in Computer Science 4986 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan Van Leeuwen
- The Cryptographic Hash Function Crisis and the SHA-3 Competition
- Open Problems in Hash Function Security
- Distinguishing Attacks on the Stream Cipher Py?
- Image Encryption Using Gingerbreadman Map and RC4A Stream Cipher
- PY (Roo): a Fast and Secure Stream Cipher Using Rolling Arrays