• 212 Citations
20022019

Research output per year

If you made any changes in Pure these will be visible here soon.

Fingerprint Dive into the research topics where Wil P.A.J. Michiels is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output

Doubly half-injective PRGs for incompressible white-box cryptography

Alpirez Bock, E., Amadori, A., Bos, J. W., Brzuska, C. & Michiels, W., 3 Feb 2019, Topics in Cryptology – CT-RSA 2019 - The Cryptographers’ Track at the RSA Conference 2019, Proceedings. Matsui, M. (ed.). Cham: Springer, p. 189-209 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11405 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • 2 Citations (Scopus)

    White-box cryptography: don’t forget about grey-box attacks

    Alpirez Bock, E., Bos, J. W., Brzuska, C., Hubain, C., Michiels, W., Mune, C., Sanfelix Gonzalez, E., Teuwen, P. & Treff, A., 1 Oct 2019, In : Journal of Cryptology. 32, 4, p. 1095-1143 49 p.

    Research output: Contribution to journalArticleAcademicpeer-review

  • 1 Citation (Scopus)

    On the ineffectiveness of internal encodings - Revisiting the DCA attack on white-box cryptography

    Alpirez Bock, E., Brzuska, C., Michiels, W. & Treff, A., 1 Jan 2018, Applied Cryptography and Network Security - 16th International Conference, ACNS 2018, Proceedings. Springer, p. 103-120 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10892 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • 2 Citations (Scopus)

    Theory of local search

    Michiels, W., Aarts, E. H. L. & Korst, J., 13 Aug 2018, Handbook of heuristics. Martí, R., Pardalos, P. & Resende, M. (eds.). Cham: Springer, p. 299-339 41 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

  • Differential computation analysis: hiding your white-box designs is not enough

    Bos, J. W., Hubain, C., Michiels, W. & Teuwen, P., 2016, Cryptographic Hardware and Embedded Systems – CHES 2016: 18th International Conference, Santa Barbara, California, August 17-19, 2016, Proceedings. Gierlichs, B. & Poschmann, A. Y. (eds.). Dordrecht: Springer, p. 215-236 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9813).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • 28 Citations (Scopus)

    Student theses

    Automated 2G traffic interception and penetration testing

    Author: Veens, T., 26 Nov 2018

    Supervisor: Michiels, W. (Supervisor 1) & Moonen, R. (External person) (External coach)

    Student thesis: Master

    File

    Block placement on multi-zone disks

    Author: Michiels, W., 31 Jul 1999

    Supervisor: Aarts, E. (Supervisor 1) & Korst, J. H. (External person) (Supervisor 2)

    Student thesis: Master

    Differential fault analysis of white-box cryptographic implementations

    Author: Ezepue, B., 31 Aug 2017

    Supervisor: Michiels, W. (Supervisor 1)

    Student thesis: Master

    File

    Hardening against neural network model stealing using a mixture of periodic and aperiodic activation functions

    Author: Derks, G., 17 Dec 2018

    Supervisor: Michiels, W. (Supervisor 1), Bouman, N. (Supervisor 2) & van Vredendaal, C. (External coach)

    Student thesis: Master

    File