An Braeken
TitleCited byYear
A toolbox for cryptanalysis: Linear and affine equivalence algorithms
A Biryukov, C De Canniere, A Braeken, B Preneel
International Conference on the Theory and Applications of Cryptographic …, 2003
On the algebraic immunity of symmetric Boolean functions
A Braeken, B Preneel
International Conference on Cryptology in India, 35-48, 2005
Sensor systems based on FPGAs and their applications: A survey
A De La Piedra, A Braeken, A Touhafi
Sensors 12 (9), 12235-12264, 2012
A study of the security of Unbalanced Oil and Vinegar signature schemes
A Braeken, C Wolf, B Preneel
Cryptographers’ Track at the RSA Conference, 29-43, 2005
Efficient cryptanalysis of rse (2) pkc and rsse (2) pkc
C Wolf, A Braeken, B Preneel
International Conference on Security in Communication Networks, 294-309, 2004
Group key establishment for enabling secure multicast communication in wireless sensor networks deployed for IoT applications
P Porambage, A Braeken, C Schmitt, A Gurtov, M Ylianttila, B Stiller
IEEE Access 3, 1503-1511, 2015
A compact FPGA-based architecture for elliptic curve cryptography over prime fields
J Vliegen, N Mentens, J Genoe, A Braeken, S Kubera, A Touhafi, ...
ASAP 2010-21st IEEE International Conference on Application-specific Systems …, 2010
Anonymous secure framework in connected smart home environments
P Kumar, A Braeken, A Gurtov, J Iinatti, PH Ha
IEEE Transactions on Information Forensics and Security 12 (4), 968-979, 2017
Classification of Boolean functions of 6 variables or less with respect to some cryptographic properties
A Braeken, Y Borissov, S Nikova, B Preneel
International Colloquium on Automata, Languages, and Programming, 324-334, 2005
SFINKS: A synchronous stream cipher for restricted hardware environments
A Braeken, J Lano, N Mentens, B Preneel, I Verbauwhede
SKEW-Symmetric Key Encryption Workshop 55, 72, 2005
Comparison of SRAM and FF PUF in 65nm technology
M Claes, V van der Leest, A Braeken
Nordic Conference on Secure IT Systems, 47-64, 2011
BMRF: Bidirectional multicast RPL forwarding
GG Lorente, B Lemmens, M Carlier, A Braeken, K Steenhaut
Ad Hoc Networks 54, 69-84, 2017
On Boolean functions with generalized cryptographic properties
A Braeken, V Nikov, S Nikova, B Preneel
International Conference on Cryptology in India, 120-135, 2004
Performance modeling for FPGAs: extending the roofline model with high-level synthesis tools
B Da Silva, A Braeken, EH D’Hollander, A Touhafi
International Journal of Reconfigurable Computing 2013, 2013
Probabilistic algebraic attacks
A Braeken, B Preneel
IMA International Conference on Cryptography and Coding, 290-303, 2005
On the (im) possibility of practical and secure nonlinear filters and combiners
A Braeken, J Lano
International Workshop on Selected Areas in Cryptography, 159-174, 2005
Secure end-to-end communication for constrained devices in IoT-enabled Ambient Assisted Living systems
P Porambage, A Braeken, A Gurtov, M Ylianttila, S Spinsante
2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), 711-714, 2015
Ultrasonic multiple-access ranging system using spread spectrum and MEMS technology for indoor localization
L Segers, J Tiete, A Braeken, A Touhafi
Sensors 14 (2), 3172-3187, 2014
On the security of stepwise triangular systems
C Wolf, A Braeken, B Preneel
Designs, Codes and Cryptography 40 (3), 285-302, 2006
On the covering radii of binary Reed-Muller codes in the set of resilient Boolean functions
Y Borissov, A Braeken, S Nikova, B Preneel
IEEE Transactions on Information Theory 51 (3), 1182-1189, 2005
The system can't perform the operation now. Try again later.
Articles 1–20