• Publications
  • Influence
Towards Measuring Anonymity
An information theoretic model that allows to quantify the degree of anonymity provided by schemes for anonymous connections is introduced, which is based on the probabilities an attacker, after observing the system, assigns to the different users of the system as being the originators of a message. Expand
Mutual Information Analysis
This work builds a distinguisher that uses the value of the Mutual Information between the observed measurements and a hypothetical leakage to rank key guesses and demonstrates that the model and the attack work effectively in an attack scenario against DPA-resistant logic. Expand
A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements
This paper presents a comprehensive framework to model privacy threats in software-based systems and provides an extensive catalog of privacy-specific threat tree patterns that can be used to detail the threat analysis outlined above. Expand
ARM: Anonymous Routing Protocol for Mobile Ad hoc Networks
  • S. Seys, B. Preneel
  • Computer Science
  • 20th International Conference on Advanced…
  • 18 April 2006
This paper presents a novel anonymous on demand routing scheme for MANETs and identifies a number of problems of previously proposed works and proposes an efficient solution that provides anonymity in a stronger adversary model. Expand
RIPEMD-160: A Strengthened Version of RIPEMD
A new version of RIPEMD with a 160-bit result is proposed, as well as a plug-in substitute for RIPEMd with a 128- bit result, and the software performance of several MD4-based algorithms is compared. Expand
Trivium Specifications ?
This document specifies Trivium, a hardware oriented synchronous stream cipher which aims to provide a flexible trade-off between speed and area. The description of the cipher is followed by someExpand
FPDetective: dusting the web for fingerprinters
The design, implementation and deployment of FPDetective, a framework for the detection and analysis of web-based fingerprinters, are reported on, showing that there needs to be a change in the way users, companies and legislators engage with fingerprinting. Expand
Decentralized Privacy-Preserving Proximity Tracing
This system, referred to as DP3T, provides a technological foundation to help slow the spread of SARS-CoV-2 by simplifying and accelerating the process of notifying people who might have been exposed to the virus so that they can take appropriate measures to break its transmission chain. Expand
Hash Functions Based on Block Ciphers: A Synthetic Approach
64 possible schemes exist, and it is shown that 12 of these are secure; they can be reduced to 2 classes based on linear transformations of variables and a new attack is presented on a scheme suggested by R. Merkle. Expand
Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers
It is proved that Chaskey is secure in the standard model, based on the security of an underlying Even-Mansour block cipher, which is designed to perform well on a wide range of 32-bit microcontrollers. Expand