A toolbox for cryptanalysis: Linear and affine equivalence algorithms A Biryukov, C De Canniere, A Braeken, B Preneel International conference on the theory and applications of cryptographic …, 2003 | 185 | 2003 |
On the algebraic immunity of symmetric Boolean functions A Braeken, B Preneel International Conference on Cryptology in India, 35-48, 2005 | 179 | 2005 |
Sensor systems based on FPGAs and their applications: A survey A De La Piedra, A Braeken, A Touhafi Sensors 12 (9), 12235-12264, 2012 | 136 | 2012 |
Group key establishment for enabling secure multicast communication in wireless sensor networks deployed for IoT applications P Porambage, A Braeken, C Schmitt, A Gurtov, M Ylianttila, B Stiller IEEE Access 3, 1503-1511, 2015 | 85 | 2015 |
A study of the security of Unbalanced Oil and Vinegar signature schemes A Braeken, C Wolf, B Preneel Cryptographers’ Track at the RSA Conference, 29-43, 2005 | 85 | 2005 |
Anonymous secure framework in connected smart home environments P Kumar, A Braeken, A Gurtov, J Iinatti, PH Ha IEEE Transactions on Information Forensics and Security 12 (4), 968-979, 2017 | 80 | 2017 |
Efficient cryptanalysis of rse (2) pkc and rsse (2) pkc C Wolf, A Braeken, B Preneel International Conference on Security in Communication Networks, 294-309, 2004 | 74 | 2004 |
A compact FPGA-based architecture for elliptic curve cryptography over prime fields J Vliegen, N Mentens, J Genoe, A Braeken, S Kubera, A Touhafi, ... ASAP 2010-21st IEEE International Conference on Application-specific Systems …, 2010 | 58 | 2010 |
Classification of Boolean functions of 6 variables or less with respect to some cryptographic properties A Braeken, Y Borissov, S Nikova, B Preneel International Colloquium on Automata, Languages, and Programming, 324-334, 2005 | 58 | 2005 |
PUF based authentication protocol for IoT A Braeken Symmetry 10 (8), 352, 2018 | 53 | 2018 |
Comparison of SRAM and FF PUF in 65nm technology M Claes, V van der Leest, A Braeken Nordic Conference on Secure IT Systems, 47-64, 2011 | 47 | 2011 |
SFINKS: A synchronous stream cipher for restricted hardware environments A Braeken, J Lano, N Mentens, B Preneel, I Verbauwhede SKEW-Symmetric Key Encryption Workshop 55, 72, 2005 | 44 | 2005 |
BMRF: Bidirectional multicast RPL forwarding GG Lorente, B Lemmens, M Carlier, A Braeken, K Steenhaut Ad Hoc Networks 54, 69-84, 2017 | 42 | 2017 |
Performance modeling for FPGAs: extending the roofline model with high-level synthesis tools B Da Silva, A Braeken, EH D’Hollander, A Touhafi International Journal of Reconfigurable Computing 2013, 2013 | 41 | 2013 |
On Boolean functions with generalized cryptographic properties A Braeken, V Nikov, S Nikova, B Preneel International Conference on Cryptology in India, 120-135, 2004 | 36 | 2004 |
Blockchain utilization in healthcare: Key requirements and challenges T Kumar, V Ramani, I Ahmad, A Braeken, E Harjula, M Ylianttila 2018 IEEE 20th International Conference on e-Health Networking, Applications …, 2018 | 35 | 2018 |
Secure and efficient data accessibility in blockchain based healthcare systems V Ramani, T Kumar, A Bracken, M Liyanage, M Ylianttila 2018 IEEE Global Communications Conference (GLOBECOM), 206-212, 2018 | 34 | 2018 |
Secure end-to-end communication for constrained devices in IoT-enabled Ambient Assisted Living systems P Porambage, A Braeken, A Gurtov, M Ylianttila, S Spinsante 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), 711-714, 2015 | 34 | 2015 |
Enabling RPL multihop communications based on LoRa B Sartori, S Thielemans, M Bezunartea, A Braeken, K Steenhaut 2017 IEEE 13th International Conference on Wireless and Mobile Computing …, 2017 | 33 | 2017 |
Identity privacy preserving biometric based authentication scheme for naked healthcare environment T Kumar, A Braeken, M Liyanage, M Ylianttila 2017 IEEE international conference on communications (ICC), 1-7, 2017 | 33 | 2017 |