• 964 Citations
1986 …2019

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Report
2015

Faster sieving for shortest lattice vectors using spherical locality-sensitive hashing

Laarhoven, T. M. M. & Weger, de, B. M. M., 2015, IACR. 15 p. (Cryptology ePrint Archive; vol. 2015/211)

Research output: Book/ReportReportAcademic

Open Access
File
166 Downloads (Pure)
2013

Discrete distributions in the Tardos scheme, revisited

Laarhoven, T. M. M. & Weger, de, B. M. M., 2013, s.n. 4 p. (arXiv.org; vol. 1302.1741 [cs.CR])

Research output: Book/ReportReportAcademic

8 Citations (Scopus)
2012

A formal privacy analysis of identity management systems

Veeningen, M. G., Weger, de, B. M. M. & Zannone, N., 2012, s.n. 52 p. (arXiv.org; vol. 1206.7111 [cs.CR])

Research output: Book/ReportReportAcademic

Open Access
File
32 Downloads (Pure)

Solving hard lattice problems and the security of lattice-based cryptosystems

Laarhoven, T. M. M., Pol, van de, J. & Weger, de, B. M. M., 2012, 17 p. (Cryptology ePrint Archive; vol. 2012/533)

Research output: Book/ReportReportAcademic

Open Access
File
39 Downloads (Pure)

The Collatz conjecture and De Bruijn graphs

Laarhoven, T. M. M. & Weger, de, B. M. M., 2012, s.n. 9 p. (arXiv.org; vol. 1209.3495 [math.NT])

Research output: Book/ReportReportAcademic

2011

Dynamic Tardos traitor tracing schemes

Laarhoven, T., Doumen, J., Roelse, P., Skoric, B. & Weger, de, B., 2011, s.n. 17 p. (arXiv.org [cs.CR]; vol. 1111.3597)

Research output: Book/ReportReportAcademic

Optimal symmetric Tardos traitor tracing schemes

Laarhoven, T. M. M. & Weger, de, B. M. M., 2011, s.n. 17 p. (arXiv.org [cs.CR]; vol. 1107.3441)

Research output: Book/ReportReportAcademic

Open Access
File
59 Downloads (Pure)
2009

Short chosen-prefix collisions for MD5 and the creation of a rogue CA certificate

Stevens, M. M. J., Sotirov, A., Appelbaum, J. R., Lenstra, A. K., Molnar, D., Osvik, D. A. & Weger, de, B. M. M., 2009, s.n. 17 p. (Cryptology ePrint Archive; vol. 2009/111)

Research output: Book/ReportReportAcademic

93 Citations (Scopus)
1 Downloads (Pure)

Some Diophantine equations from finite group theory: $\Phi_m (x) = 2p^n -1$

Luca, F., Moree, P. & Weger, de, B. M. M., 2009, s.n. 17 p. (arXiv.org; vol. 0907.5323)

Research output: Book/ReportReportAcademic

2008
Open Access
File
49 Downloads (Pure)
2007

Predicting the winner of the 2008 US Presidential Elections using a Sony PlayStation 3

Stevens, M. M. J., Lenstra, A. K. & Weger, de, B. M. M., 2007, Eindhoven: Technische Universiteit Eindhoven.

Research output: Book/ReportReportAcademic

2 Downloads (Pure)
2006

Target collisions for MD5 and colliding X.509 certificates for different identities

Stevens, M. M. J., Lenstra, A. K. & Weger, de, B. M. M., 2006, s.n. 15 p. (Cryptology ePrint Archive; vol. 2006/360)

Research output: Book/ReportReportAcademic