• 964 Citations
1986 …2019

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

2019

Finding closest lattice vectors using approximate voronoi cells

Doulgerakis, E., Laarhoven, T. & de Weger, B., 1 Jan 2019, Post-Quantum Cryptography - 10th International Conference, PQCrypto 2019, Revised Selected Papers. Ding, J. & Steinwandt, R. (eds.). Cham: Springer, p. 3-22 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11505 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

4 Citations (Scopus)
2017

Binomial collisions and near collisions

Blokhuis, A., Brouwer, A. E. & de Weger, B. M. M., 2017, In : Integers : Electronic Journal of Combinatorial Number Theory. 17, 2, p. 1-8 #A64.

Research output: Contribution to journalArticleAcademicpeer-review

5 Downloads (Pure)
2015

Faster sieving for shortest lattice vectors using spherical locality-sensitive hashing

Laarhoven, T. M. M. & Weger, de, B. M. M., 2015, IACR. 15 p. (Cryptology ePrint Archive; vol. 2015/211)

Research output: Book/ReportReportAcademic

Open Access
File
168 Downloads (Pure)

Faster sieving for shortest lattice vectors using spherical locality-sensitive hashing

Laarhoven, T. M. M. & Weger, de, B. M. M., 2015, Progress in Cryptology - LATINCRYPT 2015 (Fourth International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015). Lauter, K. & Rodríguez-Henríquez, F. (eds.). Berlin: Springer, p. 101-118 (Lecture Notes in Computer Science; vol. 9230).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

16 Citations (Scopus)
2014

A generalized Ramanujan-Nagell equation related to certain strongly regular graphs

Weger, de, B. M. M., 2014, In : Integers : Electronic Journal of Combinatorial Number Theory. 14, p. A35/1-13 13 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
42 Downloads (Pure)

Data minimisation in communication protocols : a formal analysis framework and application to identity management

Veeningen, M. G., Weger, de, B. M. M. & Zannone, N., 2014, In : International Journal of Information Security. 13, 6, p. 529-569 41 p.

Research output: Contribution to journalArticleAcademicpeer-review

4 Citations (Scopus)
2 Downloads (Pure)

Het 3n+1-vermoeden

Weger, de, B. M. M., 2014, In : Nieuw Archief voor Wiskunde. 5/15, 1, p. 40-50 11 p.

Research output: Contribution to journalArticleProfessional

Open Access
File
86 Downloads (Pure)

Optimal symmetric Tardos traitor tracing schemes

Laarhoven, T. M. M. & Weger, de, B. M. M., 2014, In : Designs, Codes and Cryptography. 71, 1, p. 83-103 21 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
8 Citations (Scopus)
67 Downloads (Pure)
2013

Discrete distributions in the Tardos scheme, revisited

Laarhoven, T. M. M. & Weger, de, B. M. M., 2013, First ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec'13, Montpellier, France, June 17-19, 2013). New York NY: Association for Computing Machinery, Inc, p. 13-17

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

8 Citations (Scopus)

Discrete distributions in the Tardos scheme, revisited

Laarhoven, T. M. M. & Weger, de, B. M. M., 2013, s.n. 4 p. (arXiv.org; vol. 1302.1741 [cs.CR])

Research output: Book/ReportReportAcademic

8 Citations (Scopus)

Dynamic Tardos traitor tracing schemes

Laarhoven, T. M. M., Doumen, J., Roelse, P., Skoric, B. & Weger, de, B. M. M., 2013, In : IEEE Transactions on Information Theory. 59, 7, p. 4230-4242

Research output: Contribution to journalArticleAcademicpeer-review

21 Citations (Scopus)

Formal modelling of (de)pseudonymisation : a case study in health care privacy

Veeningen, M. G., Weger, de, B. M. M. & Zannone, N., 2013, Security and Trust Management (8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012. Revised selected papers). Jøsang, A., Samarati, P. & Petrocchi, M. (eds.). Berlin: Springer, p. 145-160 (Lecture Notes in Computer Science; vol. 7783).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

3 Citations (Scopus)
2 Downloads (Pure)

Het 3n+1-vermoeden

Weger, de, B. M. M., 2013, Wiskunde in wording. Wiegerinck, J. J. O. O. (ed.). Amsterdam: Platform Wiskunde Nederland (PWN), p. 1-30 (Syllabus Vakantiecursus 2013).

Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

Open Access
File
2 Citations (Scopus)
57 Downloads (Pure)

Symbolic privacy analysis through linkability and detectability

Veeningen, M. G., Weger, de, B. M. M. & Zannone, N., 2013, Trust Management VII (7th IFIP WG 11.11 International Conference, IFIPTM 2013, Malaga, Spain, June 3-7, 2013. Proceedings). Fernández-Gago, C., Martinelli, F., Pearson, S. & Agudo, I. (eds.). Berlin: Springer, p. 1-16 (IFIP Advances in Information and Communication Technology; vol. 401).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)
4 Downloads (Pure)

The Collatz conjecture and De Bruijn graphs

Laarhoven, T. M. M. & Weger, de, B. M. M., 2013, In : Indagationes Mathematicae. New Series. 24, 4, p. 971-983 13 p.

Research output: Contribution to journalArticleAcademicpeer-review

3 Citations (Scopus)
2012

A formal privacy analysis of identity management systems

Veeningen, M. G., Weger, de, B. M. M. & Zannone, N., 2012, s.n. 52 p. (arXiv.org; vol. 1206.7111 [cs.CR])

Research output: Book/ReportReportAcademic

Open Access
File
32 Downloads (Pure)

Chosen-prefix collisions for MD5 and applications

Stevens, M. M. J., Lenstra, A. K. & Weger, de, B. M. M., 2012, In : International Journal of Applied Cryptography. 2, 4, p. 322-359

Research output: Contribution to journalArticleAcademicpeer-review

19 Citations (Scopus)

Solving hard lattice problems and the security of lattice-based cryptosystems

Laarhoven, T. M. M., Pol, van de, J. & Weger, de, B. M. M., 2012, 17 p. (Cryptology ePrint Archive; vol. 2012/533)

Research output: Book/ReportReportAcademic

Open Access
File
39 Downloads (Pure)

The Collatz conjecture and De Bruijn graphs

Laarhoven, T. M. M. & Weger, de, B. M. M., 2012, s.n. 9 p. (arXiv.org; vol. 1209.3495 [math.NT])

Research output: Book/ReportReportAcademic

2011

Book review: Algorithmic Number Theory

Weger, de, B. M. M., 2011, In : Nieuw Archief voor Wiskunde. 5/12, p. 145-145

Research output: Contribution to journalBook reviewProfessional

Dynamic Tardos traitor tracing schemes

Laarhoven, T., Doumen, J., Roelse, P., Skoric, B. & Weger, de, B., 2011, s.n. 17 p. (arXiv.org [cs.CR]; vol. 1111.3597)

Research output: Book/ReportReportAcademic

Elementaire getaltheorie en asymmetrische cryptografie

Weger, de, B. M. M., 2011, gew. 2e ed. Utrecht: Epsilon. (Epsilon uitgaven; vol. 63)

Research output: Book/ReportBookProfessional

Formal privacy analysis of communication protocols for identity management

Veeningen, M. G., Weger, de, B. M. M. & Zannone, N., 2011, Information Systems Security (7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011. Proceedings). Jajodia, S. & Mazumdar, C. (eds.). Berlin: Springer, p. 235-249 (Lecture Notes in Computer Science; vol. 7093).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

7 Citations (Scopus)
2 Downloads (Pure)

Liber amicorum voor Henk van Tilborg : Klabotscrypt

Asch, van, A. G. (ed.), Klooster, J. G. W. (ed.), Schoenmakers, L. A. M. (ed.) & Weger, de, B. M. M. (ed.), 2011, Eindhoven: Technische Universiteit Eindhoven. 169 p.

Research output: Book/ReportBook editingAcademic

Modeling identity-related properties and their privacy strength

Veeningen, M. G., Weger, de, B. M. M. & Zannone, N., 2011, Formal Aspects of Security and Trust (7th International Workshop, FAST'10, Pisa, Italy, September 16-17, 2010. Revised Selected Papers). Degano, P., Etalle, S. & Guttman, J. (eds.). Berlin: Springer, p. 126-140 (Lecture Notes in Computer Science; vol. 6561).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

8 Citations (Scopus)
2 Downloads (Pure)

Optimal symmetric Tardos traitor tracing schemes

Laarhoven, T. M. M. & Weger, de, B. M. M., 2011, s.n. 17 p. (arXiv.org [cs.CR]; vol. 1107.3441)

Research output: Book/ReportReportAcademic

Open Access
File
59 Downloads (Pure)

Some Diophantine equations from finite group theory: $\Phi_m (x) = 2p^n -1$

Luca, F., Moree, P. & Weger, de, B. M. M., 2011, In : Publicationes Mathematicae. Institutum Mathematicum Universitatis Debreceniensis. 78, 2, p. 377-392

Research output: Contribution to journalArticleAcademicpeer-review

2010

$ \sigma_k(F_m) = F_n $

Luca, F. & Weger, de, B. M. M., 2010, In : New Zealand Journal of Mathematics. 40, p. 1-13

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
36 Downloads (Pure)

Hoe je het cryptosysteem RSA soms kunt kraken

Weger, de, B. M. M., 2010, Wiskunde: de uitdaging (Vakantiecursus 2010). Wiegerinck, J. J. O. O. (ed.). Amsterdam: Centrum voor Wiskunde en Informatica, p. 83-100 (CWI Syllabus; vol. 60).

Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

1 Downloads (Pure)
2009

Book review: Mathematical Constants

Weger, de, B. M. M., 2009, In : Nieuw Archief voor Wiskunde. 5/10, p. 69-

Research output: Contribution to journalBook reviewProfessional

Elementaire getaltheorie en asymmetrische cryptografie

Weger, de, B. M. M., 2009, Utrecht: Epsilon. 180 p. (Epsilon uitgaven; vol. 63)

Research output: Book/ReportBookProfessional

Short chosen-prefix collisions for MD5 and the creation of a rogue CA certificate

Stevens, M. M. J., Sotirov, A., Appelbaum, J. R., Lenstra, A. K., Molnar, D., Osvik, D. A. & Weger, de, B. M. M., 2009, s.n. 17 p. (Cryptology ePrint Archive; vol. 2009/111)

Research output: Book/ReportReportAcademic

93 Citations (Scopus)
1 Downloads (Pure)

Short chosen-prefix collisions for MD5 and the creation of a rogue CA certificate

Stevens, M. M. J., Sotirov, A., Appelbaum, J. R., Lenstra, A. K., Molnar, D., Osvik, D. A. & Weger, de, B. M. M., 2009, Advances in Cryptology - CRYPTO 2009 (29th Annual International Cryptology Conference, Santa Barbara CA, USA, August 16-20, 2009. Proceedings). Halevi, S. (ed.). Berlin: Springer, p. 55-69 (Lecture Notes in Computer Science; vol. 5677).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
93 Citations (Scopus)
98 Downloads (Pure)

Some Diophantine equations from finite group theory: $\Phi_m (x) = 2p^n -1$

Luca, F., Moree, P. & Weger, de, B. M. M., 2009, s.n. 17 p. (arXiv.org; vol. 0907.5323)

Research output: Book/ReportReportAcademic

Zwakke sleutels bij het RSA-cryptosysteem, deel 1

Weger, de, B. M. M., 2009, In : Euclides. 84, 7, p. 256-260

Research output: Contribution to journalArticlePopular

1 Downloads (Pure)

Zwakke sleutels bij het RSA-cryptosysteem, deel 2

Weger, de, B. M. M., 2009, In : Euclides. 84, 8, p. 306-308

Research output: Contribution to journalArticlePopular

1 Downloads (Pure)
2008

Book review: Unsolved problems in number theory

Weger, de, B. M. M., 2008, In : Nieuw Archief voor Wiskunde. 5/9, p. 299-300

Research output: Contribution to journalBook reviewProfessional

Open Access
File
49 Downloads (Pure)
2007

Book review: Topics in the theory of numbers

Weger, de, B. M. M., 2007, In : Nieuw Archief voor Wiskunde. 5/8, p. 147-148

Research output: Contribution to journalBook reviewProfessional

Chosen-prefix collisions for MD5 and colliding X.509 certificates for different identities

Stevens, M. M. J., Lenstra, A. K. & Weger, de, B. M. M., 2007, Proceedings of the 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt 2007) 20-24 May 2007, Barcelona, Spain. Naor, M. (ed.). Berlin, Germany: Springer, p. 1-22 (Lecture Notes in Computer Science; vol. 4515).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

96 Citations (Scopus)

Predicting the winner of the 2008 US Presidential Elections using a Sony PlayStation 3

Stevens, M. M. J., Lenstra, A. K. & Weger, de, B. M. M., 2007, Eindhoven: Technische Universiteit Eindhoven.

Research output: Book/ReportReportAcademic

2 Downloads (Pure)
2006

A partial key exposure attack on RSA using a 2-dimensional lattice

Jochemsz, E. & Weger, de, B. M. M., 2006, Information Security (Proceedings 9th International Conference, ISC 2006, Samos, Greece, August 30-September 2, 2006). Katsikas, S. K., Lopez, J., Backes, M., Gritzalis, S. & Preneel, B. (eds.). Berlin: Springer, p. 203-216 (Lecture Notes in Computer Science; vol. 4176).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

5 Citations (Scopus)
1 Downloads (Pure)

Target collisions for MD5 and colliding X.509 certificates for different identities

Stevens, M. M. J., Lenstra, A. K. & Weger, de, B. M. M., 2006, s.n. 15 p. (Cryptology ePrint Archive; vol. 2006/360)

Research output: Book/ReportReportAcademic

2005

On the possibility of constructing meaningful hash collisions for public keys

Lenstra, A. K. & Weger, de, B. M. M., 2005, Information Security and Privacy : 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005. Proceedings . Boyd, C. & González Nieto, J. M. (eds.). Berlin: Springer, p. 267-279 13 p. (Lecture Notes in Computer Science (LNCS); vol. 3574).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

18 Citations (Scopus)

Partial key exposure attacks on RSA up to full size exponents

Ernst, M., Jochemsz, E., May, A. & Weger, de, B. M. M., 2005, Advances in Cryptology - Eurocrypt 2005 (24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings). Cramer, R. (ed.). Berlin: Springer, p. 371-386 (Lecture Notes in Computer Science; vol. 3494).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

71 Citations (Scopus)
1 Downloads (Pure)

Theoretical and computational bounds for m-cycles of the 3n+1-problem

Simons, J. L. & Weger, de, B. M. M., 2005, In : Acta Arithmetica. 117, 1, p. 51-70

Research output: Contribution to journalArticleAcademicpeer-review

14 Citations (Scopus)

Twin RSA

Lenstra, A. K. & Weger, de, B. M. M., 2005, Progress in Cryptology - MyCrypt 2005 (Proceedings First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005). Dawson, E. & Vaudenay, S. (eds.). Berlin: Springer, p. 222-228 (Lecture Notes in Computer Science; vol. 3715).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

4 Citations (Scopus)
2004

Mersenne en het Syracuseprobleem (NMC-225 prijsvraag)

Simons, J. L. & Weger, de, B. M. M., 2004, In : Nieuw Archief voor Wiskunde. 5/5, 3, p. 218-220

Research output: Contribution to journalArticleAcademicpeer-review

On integral zeroes of binary Krawtchouk polynomials

Stroeker, R. J. & Weger, de, B. M. M., 2004, Development of the mathematical ideas of Mykhailo Kravchuk (Krawtchouk). Virchenko, N., Katchanovksi, I., Haidey, V., Andrushkiw, R. & Voronka, R. (eds.). New York NY, USA: Shevchenko Scientific Society, p. 623-633

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

2002

Cryptanalysis of RSA with small prime difference

Weger, de, B. M. M., 2002, In : Applicable Algebra in Engineering, Communication and Computing. 13, 1, p. 17-28

Research output: Contribution to journalArticleAcademicpeer-review

75 Citations (Scopus)
2 Downloads (Pure)