If you made any changes in Pure these will be visible here soon.

Personal profile

Quote

"The security of cryptographic systems is based on the stupidity of us mathematicians, that is, our inability to solve certain hard math problems. The important research question therefore is: how stupid are we really?"

Research profile

Benne de Weger is an Associate Professor in the Department of Mathematics and Computer Science at Eindhoven University of Technology (TU/e). His research interests are computational number theory and cryptology.

Currently, cryptology and Information Security is presently his main field of interest, in particular RSA cryptanalysis, applications of hash collisions, relations to number theory, identity management, traitor tracing, lattice based cryptology. His original field of interest is number theory, in particular computational number theory, Diophantine equations, the abc-conjecture and the 3n+1-conjecture.

Academic background

Benne de Weger holds MSc and PhD degrees in Mathematics from Leiden University. From 1983 to 1997, he had teaching and research positions at the universities of Leiden, Twente and Rotterdam. From 1998 to 2002 he was employed at Concord-Eracom, Amsterdam, and  CMG, Amstelveen, as cryptographic software engineer and consultant information security. Since 2002 he is assistant professor of cryptology, and since 2017 associate professor of cryptanalysis at TU/e. 

Fingerprint Dive into the research topics where Benne M.M. de Weger is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

De Bruijn Graph Mathematics
Diophantine equation Mathematics
Distribution functions Engineering & Materials Science
Group Theory Mathematics
Network protocols Engineering & Materials Science
Integer Mathematics
Finite Group Mathematics
Watermarking Engineering & Materials Science

Research Output 1986 2019

Finding closest lattice vectors using approximate voronoi cells

Doulgerakis, E., Laarhoven, T. & de Weger, B., 1 Jan 2019, Post-Quantum Cryptography - 10th International Conference, PQCrypto 2019, Revised Selected Papers. Steinwandt, R. & Ding, J. (eds.). Cham: Springer, p. 3-22 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11505 LNCS)

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Voronoi Cell
Vector Lattice
Enumeration
Data storage equipment
Slicing

Binomial collisions and near collisions

Blokhuis, A., Brouwer, A. E. & de Weger, B. M. M., 2017, In : Integers : Electronic Journal of Combinatorial Number Theory. 17, 2, p. 1-8 #A64

Research output: Contribution to journalArticleAcademicpeer-review

Search problems in cryptography: from fingerprinting to lattice sieving

Laarhoven, T., 16 Feb 2016, Eindhoven: Technische Universiteit Eindhoven. 219 p.

Research output: ThesisPhd Thesis 1 (Research TU/e / Graduation TU/e)Academic

Open Access
File

Faster sieving for shortest lattice vectors using spherical locality-sensitive hashing

Laarhoven, T. M. M. & Weger, de, B. M. M., 2015, IACR. 15 p. (Cryptology ePrint Archive; vol. 2015/211)

Research output: Book/ReportReportAcademic

Open Access
File
Sieves
Nearest neighbor search
15 Citations (Scopus)

Faster sieving for shortest lattice vectors using spherical locality-sensitive hashing

Laarhoven, T. M. M. & Weger, de, B. M. M., 2015, Progress in Cryptology - LATINCRYPT 2015 (Fourth International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015). Lauter, K. & Rodríguez-Henríquez, F. (eds.). Berlin: Springer, p. 101-118 (Lecture Notes in Computer Science; vol. 9230)

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Sieves
Nearest neighbor search

Courses

Algebra for security

1/09/13 → …

Course

Calculus variant 2

1/09/11 → …

Course

Digital security engineering

1/09/1331/08/21

Course

Student theses

(Ab)using Bitcoin for anti-censorship tool

Author: Okupski, K., 31 Dec 2014

Supervisor: Skoric, B. (Supervisor 1), de Weger, B. (Supervisor 2) & Serebrenik, A. (Supervisor 2)

Student thesis: Master

File

A diskless cluster architecture for hashing operations

Author: Antakis, S., 31 Aug 2010

Supervisor: de Weger, B. (Supervisor 1) & Garvey, P. (External person) (Supervisor 2)

Student thesis: Master

File

Algebraic attacks from a Gröbner basis perspective

Author: Segers, A., 30 Nov 2004

Supervisor: van Tilborg, H. (Supervisor 1), de Weger, B. (Supervisor 2), Schmitz, G. (Supervisor 2) & Bours, P. (Supervisor 2)

Student thesis: Master

File

Analysis of current and future phishing attacks on internet banking services

Author: Hegt, S., 30 Jun 2008

Supervisor: de Weger, B. (Supervisor 1), Lukkien, J. (Supervisor 2) & Smeets, M. (External person) (External coach)

Student thesis: Master

File

Brabocoin: an educational cryptocurrency based on Bitcoin

Author: van den Berg, D. P., Dekker, D., van den Eerenbeemt, S. & Wessel, S., 18 Apr 2019

Supervisor: de Weger, B. (Supervisor 1) & Skoric, B. (Supervisor 2)

Student thesis: Bachelor

File