Research Output per year

## Personal profile

### Quote

"The security of cryptographic systems is based on the stupidity of us mathematicians, that is, our inability to solve certain hard math problems. The important research question therefore is: how stupid are we really?"

### Research profile

Benne de Weger is an Associate Professor in the Department of Mathematics and Computer Science at Eindhoven University of Technology (TU/e). His research interests are computational number theory and cryptology.

Currently, cryptology and Information Security is presently his main field of interest, in particular RSA cryptanalysis, applications of hash collisions, relations to number theory, identity management, traitor tracing, lattice based cryptology. His original field of interest is number theory, in particular computational number theory, Diophantine equations, the abc-conjecture and the 3n+1-conjecture.

### Academic background

Benne de Weger holds MSc and PhD degrees in Mathematics from Leiden University. From 1983 to 1997, he had teaching and research positions at the universities of Leiden, Twente and Rotterdam. From 1998 to 2002 he was employed at Concord-Eracom, Amsterdam, and CMG, Amstelveen, as cryptographic software engineer and consultant information security. Since 2002 he is assistant professor of cryptology, and since 2017 associate professor of cryptanalysis at TU/e.

## Fingerprint Fingerprint is based on mining the text of the person's scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

## Research Output 1986 2017

## Binomial collisions and near collisions

Blokhuis, A., Brouwer, A. E. & de Weger, B. M. M., 2017, In : Integers : Electronic Journal of Combinatorial Number Theory. 17, 2, p. 1-8 #A64Research output: Contribution to journal › Article › Academic › peer-review

## Search problems in cryptography: from fingerprinting to lattice sieving

Laarhoven, T., 16 Feb 2016, Eindhoven: Technische Universiteit Eindhoven. 219 p.Research output: Thesis › Phd Thesis 1 (Research TU/e / Graduation TU/e) › Academic

## Faster sieving for shortest lattice vectors using spherical locality-sensitive hashing

Laarhoven, T. M. M. & Weger, de, B. M. M., 2015, IACR. 15 p. (Cryptology ePrint Archive; vol. 2015/211)Research output: Book/Report › Report › Academic

## Faster sieving for shortest lattice vectors using spherical locality-sensitive hashing

Laarhoven, T. M. M. & Weger, de, B. M. M., 2015,*Progress in Cryptology - LATINCRYPT 2015 (Fourth International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015).*Lauter, K. & Rodríguez-Henríquez, F. (eds.). Berlin: Springer, p. 101-118 (Lecture Notes in Computer Science; vol. 9230)

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review

## A generalized Ramanujan-Nagell equation related to certain strongly regular graphs

Weger, de, B. M. M., 2014, In : Integers : Electronic Journal of Combinatorial Number Theory. 14, p. A35/1-13 13 p.Research output: Contribution to journal › Article › Academic › peer-review

## Courses

## Student theses

## (Ab)using Bitcoin for anti-censorship tool

Author: Okupski, K., 31 Dec 2014Supervisor: Skoric, B. (Supervisor 1), de Weger, B. (Supervisor 2) & Serebrenik, A. (Supervisor 2)

Student thesis: Master

## A diskless cluster architecture for hashing operations

Author: Antakis, S., 31 Aug 2010Supervisor: de Weger, B. (Supervisor 1) & Garvey, P. (External person) (Supervisor 2)

Student thesis: Master

## Algebraic attacks from a Gröbner basis perspective

Author: Segers, A., 30 Nov 2004Supervisor: van Tilborg, H. (Supervisor 1), de Weger, B. (Supervisor 2), Schmitz, G. (Supervisor 2) & Bours, P. (Supervisor 2)

Student thesis: Master

## Analysis of current and future phishing attacks on internet banking services

Author: Hegt, S., 30 Jun 2008Supervisor: de Weger, B. (Supervisor 1), Lukkien, J. (Supervisor 2) & Smeets, M. (External person) (External coach)

Student thesis: Master

## Collusion-resistant traitor tracing schemes

Author: Laarhoven, T., 31 Aug 2011Supervisor: de Weger, B. (Supervisor 1) & Doumen, J. (Supervisor 2)

Student thesis: Master