2013 - Member of Academia Europaea
Cryptography, Computer security, Theoretical computer science, Algorithm and Block cipher are his primary areas of study. His studies deal with areas such as Key, Embedded system and Encryption as well as Cryptography. His Computer security research includes themes of Internet privacy and Implementation.
The concepts of his Theoretical computer science study are interwoven with issues in Context, Measure, Hash function, Scheme and MD4. His studies in Hash function integrate themes in fields like Discrete mathematics and Message authentication code. His Algorithm study integrates concerns from other disciplines, such as Cipher, Information theory, Byte, Key and Arithmetic.
His primary areas of investigation include Computer security, Cryptography, Theoretical computer science, Hash function and Algorithm. In his research, Wireless is intimately related to Computer network, which falls under the overarching field of Computer security. His research in Cryptography intersects with topics in Key and Encryption.
Theoretical computer science is frequently linked to Security of cryptographic hash functions in his study. His Cryptographic hash function research integrates issues from Message authentication code and Hash-based message authentication code. His study in Block cipher is interdisciplinary in nature, drawing from both Stream cipher and Arithmetic.
Bart Preneel mainly investigates Computer security, Cryptography, Internet privacy, Encryption and Embedded system. Computer security and Protocol are commonly linked in his work. Bart Preneel has included themes like Computer network, Spoofing attack, Key, Hash function and Exploit in his Cryptography study.
His Hash function study combines topics in areas such as Olympiad and Theoretical computer science. His Encryption research is multidisciplinary, incorporating elements of Algorithm and Computer hardware. His Algorithm research is multidisciplinary, relying on both Byte and Public-key cryptography.
The scientist’s investigation covers issues in Computer security, Internet privacy, Embedded system, Cryptography and Protocol. Computer security and Upload are frequently intertwined in his study. His Internet privacy research includes elements of Online advertising, World Wide Web, Information sharing and Personally identifiable information.
His Embedded system research incorporates elements of Component-based software engineering, Resource-oriented architecture, Critical infrastructure, Operating system and Software security assurance. The study incorporates disciplines such as Motion vector, Key, Coding and Authentication in addition to Cryptography. His Protocol research is multidisciplinary, incorporating perspectives in Adversary, Law enforcement, Revocation and Identification.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Advances in Cryptology - EUROCRYPT 2000
Towards measuring anonymity
Claudia Díaz;Stefaan Seys;Joris Claessens;Bart Preneel.
privacy enhancing technologies (2002)
RIPEMD-160: A Strengthened Version of RIPEMD
Hans Dobbertin;Antoon Bosselaers;Bart Preneel.
fast software encryption (1996)
Mutual Information Analysis
Benedikt Gierlichs;Lejla Batina;Pim Tuyls;Bart Preneel.
cryptographic hardware and embedded systems (2008)
Hash functions based on block ciphers: a synthetic approach
Bart Preneel;René Govaerts;Joos Vandewalle.
international cryptology conference (1993)
A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements
Mina Deng;Kim Wuyts;Riccardo Scandariato;Bart Preneel.
Requirements Engineering (2011)
The Cipher SHARK
Vincent Rijmen;Joan Daemen;Bart Preneel;Anton Bossalaers.
fast software encryption (1996)
FPDetective: dusting the web for fingerprinters
Gunes Acar;Marc Juarez;Nick Nikiforakis;Claudia Diaz.
computer and communications security (2013)
Propagation characteristics of Boolean functions
Bart Preneel;Werner Van Leekwijck;Luc Van Linden;René Govaerts.
theory and application of cryptographic techniques (1991)
ARM: anonymous routing protocol for mobile ad hoc networks
Stefaan Seys;Bart Preneel.
International Journal of Wireless and Mobile Computing (2009)
Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: