If you made any changes in Pure these will be visible here soon.

Personal profile

Quote

"The security of cryptographic systems is based on the stupidity of us mathematicians, that is, our inability to solve certain hard math problems. The important research question therefore is: how stupid are we really?"

Research profile

Benne de Weger is an Associate Professor in the Department of Mathematics and Computer Science at Eindhoven University of Technology (TU/e). His research interests are computational number theory and cryptology.

Currently, cryptology and Information Security is presently his main field of interest, in particular RSA cryptanalysis, applications of hash collisions, relations to number theory, identity management, traitor tracing, lattice based cryptology. His original field of interest is number theory, in particular computational number theory, Diophantine equations, the abc-conjecture and the 3n+1-conjecture.

Academic background

Benne de Weger holds MSc and PhD degrees in Mathematics from Leiden University. From 1983 to 1997, he had teaching and research positions at the universities of Leiden, Twente and Rotterdam. From 1998 to 2002 he was employed at Concord-Eracom, Amsterdam, and  CMG, Amstelveen, as cryptographic software engineer and consultant information security. Since 2002 he is assistant professor of cryptology, and since 2017 associate professor of cryptanalysis at TU/e. 

Fingerprint Fingerprint is based on mining the text of the person's scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

De Bruijn Graph Mathematics
Diophantine equation Mathematics
Distribution functions Engineering & Materials Science
Group Theory Mathematics
Network protocols Engineering & Materials Science
Integer Mathematics
Finite Group Mathematics
Watermarking Engineering & Materials Science

Research Output 1986 2017

Binomial collisions and near collisions

Blokhuis, A., Brouwer, A. E. & de Weger, B. M. M., 2017, In : Integers : Electronic Journal of Combinatorial Number Theory. 17, 2, p. 1-8 #A64

Research output: Contribution to journalArticleAcademicpeer-review

Search problems in cryptography: from fingerprinting to lattice sieving

Laarhoven, T., 16 Feb 2016, Eindhoven: Technische Universiteit Eindhoven. 219 p.

Research output: ThesisPhd Thesis 1 (Research TU/e / Graduation TU/e)Academic

Open Access
File

Faster sieving for shortest lattice vectors using spherical locality-sensitive hashing

Laarhoven, T. M. M. & Weger, de, B. M. M., 2015, IACR. 15 p. (Cryptology ePrint Archive; vol. 2015/211)

Research output: Book/ReportReportAcademic

Open Access
File
Sieves
Nearest neighbor search
13 Citations

Faster sieving for shortest lattice vectors using spherical locality-sensitive hashing

Laarhoven, T. M. M. & Weger, de, B. M. M., 2015, Progress in Cryptology - LATINCRYPT 2015 (Fourth International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015). Lauter, K. & Rodríguez-Henríquez, F. (eds.). Berlin: Springer, p. 101-118 (Lecture Notes in Computer Science; vol. 9230)

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Sieves
Nearest neighbor search

A generalized Ramanujan-Nagell equation related to certain strongly regular graphs

Weger, de, B. M. M., 2014, In : Integers : Electronic Journal of Combinatorial Number Theory. 14, p. A35/1-13 13 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
Exponential Diophantine Equations
ABC Conjecture
Strongly Regular Graph
Quadratic field
Class Group

Courses

Algebra for security

1/09/13 → …

Course

Calculus variant A

1/09/12 → …

Course

Calculus variant B

1/09/11 → …

Course

Calculus variant C

1/09/12 → …

Course

Student theses

(Ab)using Bitcoin for anti-censorship tool

Author: Okupski, K., 31 Dec 2014

Supervisor: Skoric, B. (Supervisor 1), de Weger, B. (Supervisor 2) & Serebrenik, A. (Supervisor 2)

Student thesis: Master

File

A diskless cluster architecture for hashing operations

Author: Antakis, S., 31 Aug 2010

Supervisor: de Weger, B. (Supervisor 1) & Garvey, P. (External person) (Supervisor 2)

Student thesis: Master

File

Algebraic attacks from a Gröbner basis perspective

Author: Segers, A., 30 Nov 2004

Supervisor: van Tilborg, H. (Supervisor 1), de Weger, B. (Supervisor 2), Schmitz, G. (Supervisor 2) & Bours, P. (Supervisor 2)

Student thesis: Master

File

Analysis of current and future phishing attacks on internet banking services

Author: Hegt, S., 30 Jun 2008

Supervisor: de Weger, B. (Supervisor 1), Lukkien, J. (Supervisor 2) & Smeets, M. (External person) (External coach)

Student thesis: Master

File

Collusion-resistant traitor tracing schemes

Author: Laarhoven, T., 31 Aug 2011

Supervisor: de Weger, B. (Supervisor 1) & Doumen, J. (Supervisor 2)

Student thesis: Master

File