!Partial List of Publications
\\
Bart Preneel has co-authored more than 300 international publications, which have received more than 12000 citations in Google Scholar (h-index 54), see http://scholar.google.nl/citations?user=omio-RsAAAAJ&hl=en\\
\\
1. C. Troncoso, G. Danezis, E. Kosta, J. Balasch, and B. Preneel, "PriPAYD: Privacy Friendly Pay-As-You-Drive Insurance," IEEE Transactions on Dependable and Secure Computing 8( 5), pp. 742-755, 2011\\
\\
2. S. Seys, and B. Preneel, "ARM: Anonymous Routing Protocol for Mobile Ad hoc Networks," International Journal of Wireless and Mobile Computing 3(3), pp. 145-155, 2009\\
\\
3. B. Gierlichs, L. Batina, P. Tuyls, and B. Preneel, "Mutual Information Analysis - A Generic Side-Channel Distinguisher," In Cryptographic Hardware and Embedded Systems - CHES 2008, Lecture Notes in Computer Science 5154, E. Oswald, and P. Rohatgi (eds.), Springer-Verlag, pp. 426-442, 2008\\
\\
4. M. Quisquater, B. Preneel, and J. Vandewalle, "A new inequality in discrete Fourier theory," IEEE Transactions on Information Theory 49(8), pp. 2038-2040, 2003.\\
\\
5. C. Diaz, S. Seys, J. Claessens, and B. Preneel, "Towards measuring anonymity," In Proceedings of Privacy Enhancing Technologies, 2nd International Workshop, PET 2002, Lecture Notes in Computer Science 2482, R. Dingledine, and P. F. Syverson (eds.), Springer-Verlag, pp. 54-68, 2002.\\
\\
6. Günther Horn, Bart Preneel: Authentication and Payment in Future Mobile Systems. Journal of Computer Security 8(2/3): 183-207 (2000)\\
\\
7. B. Preneel, and P. C. van Oorschot, "On the security of iterated Message Authentication Codes," IEEE Transactions on Information Theory 45(1), pp. 188-199, 1999. \\
\\
8. L. R. Knudsen, X. Lai, and B. Preneel, "Attacks on fast double block length hash functions," Journal of Cryptology 11(1), pp. 59-72, 1998.\\
\\
9. H. Dobbertin, A. Bosselaers, and B. Preneel, "RIPEMD-160: A Strengthened Version of RIPEMD," In Fast Software Encryption, FSE 1996, Lecture Notes in Computer Science 1039, D. Gollmann (ed.), Springer-Verlag, pp. 71-82, 1996\\
\\
10. B. Preneel, R. Govaerts, and J. Vandewalle, "Hash Functions Based on Block Ciphers: A Synthetic Approach," In Advances in Cryptology - CRYPTO 1993, Lecture Notes in Computer Science 773, D. R. Stinson (ed.), Springer-Verlag, pp. 368-378, 1993