• 964 Citations
1986 …2019

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Conference contribution
2019

Finding closest lattice vectors using approximate voronoi cells

Doulgerakis, E., Laarhoven, T. & de Weger, B., 1 Jan 2019, Post-Quantum Cryptography - 10th International Conference, PQCrypto 2019, Revised Selected Papers. Ding, J. & Steinwandt, R. (eds.). Cham: Springer, p. 3-22 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11505 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

3 Citations (Scopus)
2015

Faster sieving for shortest lattice vectors using spherical locality-sensitive hashing

Laarhoven, T. M. M. & Weger, de, B. M. M., 2015, Progress in Cryptology - LATINCRYPT 2015 (Fourth International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015). Lauter, K. & Rodríguez-Henríquez, F. (eds.). Berlin: Springer, p. 101-118 (Lecture Notes in Computer Science; vol. 9230).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

16 Citations (Scopus)
2013

Discrete distributions in the Tardos scheme, revisited

Laarhoven, T. M. M. & Weger, de, B. M. M., 2013, First ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec'13, Montpellier, France, June 17-19, 2013). New York NY: Association for Computing Machinery, Inc, p. 13-17

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

8 Citations (Scopus)

Formal modelling of (de)pseudonymisation : a case study in health care privacy

Veeningen, M. G., Weger, de, B. M. M. & Zannone, N., 2013, Security and Trust Management (8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012. Revised selected papers). Jøsang, A., Samarati, P. & Petrocchi, M. (eds.). Berlin: Springer, p. 145-160 (Lecture Notes in Computer Science; vol. 7783).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

3 Citations (Scopus)
2 Downloads (Pure)

Symbolic privacy analysis through linkability and detectability

Veeningen, M. G., Weger, de, B. M. M. & Zannone, N., 2013, Trust Management VII (7th IFIP WG 11.11 International Conference, IFIPTM 2013, Malaga, Spain, June 3-7, 2013. Proceedings). Fernández-Gago, C., Martinelli, F., Pearson, S. & Agudo, I. (eds.). Berlin: Springer, p. 1-16 (IFIP Advances in Information and Communication Technology; vol. 401).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)
4 Downloads (Pure)
2011

Formal privacy analysis of communication protocols for identity management

Veeningen, M. G., Weger, de, B. M. M. & Zannone, N., 2011, Information Systems Security (7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011. Proceedings). Jajodia, S. & Mazumdar, C. (eds.). Berlin: Springer, p. 235-249 (Lecture Notes in Computer Science; vol. 7093).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

7 Citations (Scopus)
2 Downloads (Pure)

Modeling identity-related properties and their privacy strength

Veeningen, M. G., Weger, de, B. M. M. & Zannone, N., 2011, Formal Aspects of Security and Trust (7th International Workshop, FAST'10, Pisa, Italy, September 16-17, 2010. Revised Selected Papers). Degano, P., Etalle, S. & Guttman, J. (eds.). Berlin: Springer, p. 126-140 (Lecture Notes in Computer Science; vol. 6561).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

8 Citations (Scopus)
2 Downloads (Pure)
2009

Short chosen-prefix collisions for MD5 and the creation of a rogue CA certificate

Stevens, M. M. J., Sotirov, A., Appelbaum, J. R., Lenstra, A. K., Molnar, D., Osvik, D. A. & Weger, de, B. M. M., 2009, Advances in Cryptology - CRYPTO 2009 (29th Annual International Cryptology Conference, Santa Barbara CA, USA, August 16-20, 2009. Proceedings). Halevi, S. (ed.). Berlin: Springer, p. 55-69 (Lecture Notes in Computer Science; vol. 5677).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
93 Citations (Scopus)
97 Downloads (Pure)
2007

Chosen-prefix collisions for MD5 and colliding X.509 certificates for different identities

Stevens, M. M. J., Lenstra, A. K. & Weger, de, B. M. M., 2007, Proceedings of the 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt 2007) 20-24 May 2007, Barcelona, Spain. Naor, M. (ed.). Berlin, Germany: Springer, p. 1-22 (Lecture Notes in Computer Science; vol. 4515).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

96 Citations (Scopus)
2006

A partial key exposure attack on RSA using a 2-dimensional lattice

Jochemsz, E. & Weger, de, B. M. M., 2006, Information Security (Proceedings 9th International Conference, ISC 2006, Samos, Greece, August 30-September 2, 2006). Katsikas, S. K., Lopez, J., Backes, M., Gritzalis, S. & Preneel, B. (eds.). Berlin: Springer, p. 203-216 (Lecture Notes in Computer Science; vol. 4176).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

5 Citations (Scopus)
1 Downloads (Pure)
2005

On the possibility of constructing meaningful hash collisions for public keys

Lenstra, A. K. & Weger, de, B. M. M., 2005, Information Security and Privacy : 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005. Proceedings . Boyd, C. & González Nieto, J. M. (eds.). Berlin: Springer, p. 267-279 13 p. (Lecture Notes in Computer Science (LNCS); vol. 3574).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

18 Citations (Scopus)

Partial key exposure attacks on RSA up to full size exponents

Ernst, M., Jochemsz, E., May, A. & Weger, de, B. M. M., 2005, Advances in Cryptology - Eurocrypt 2005 (24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings). Cramer, R. (ed.). Berlin: Springer, p. 371-386 (Lecture Notes in Computer Science; vol. 3494).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

71 Citations (Scopus)
1 Downloads (Pure)

Twin RSA

Lenstra, A. K. & Weger, de, B. M. M., 2005, Progress in Cryptology - MyCrypt 2005 (Proceedings First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005). Dawson, E. & Vaudenay, S. (eds.). Berlin: Springer, p. 222-228 (Lecture Notes in Computer Science; vol. 3715).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

4 Citations (Scopus)
1991

On the practical solution of the Thue-Mahler equation

Weger, de, B. M. M., 1991, Computational Number Theory (Debrecen, Hungary, September 4-9, 1989). Pethö, A., Pohst, M. E., Williams, H. C. & Zimmer, H. G. (eds.). Berlin: Walter de Gruyter GmbH, p. 289-294

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1990

On the practical solution of Thue-Mahler equations, an outline

Weger, de, B. M. M., 1990, Number Theory. Volume II. Diophantine and algebraic (Budapest, Hungary, July 20-25, 1987). Györy, K. & Halász, G. (eds.). Amsterdam: North-Holland Publishing Company, p. 1037-1050 (Colloquia Mathematica Societatis János Bolyai; vol. 51).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1989

A Diophantine equation of Antoniadis

Weger, de, B. M. M., 1989, Number Theory and Applications (Banff AB, Canada, April 27-May 5, 1988). Mollin, R. A. (ed.). Dordrecht: Kluwer Academic Publishers, p. 575-589 (NATO ASI Series, Series C: Mathematical and Physical Sciences; vol. 265).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review