If you made any changes in Pure these will be visible here soon.

Fingerprint Dive into the research topics where Wil P.A.J. Michiels is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

Cryptography Engineering & Materials Science
Attack Mathematics
Reverse engineering Engineering & Materials Science
Tuners Engineering & Materials Science
Computer-assisted Proof Mathematics
Hardware Engineering & Materials Science
Mixed Integer Linear Programming Mathematics
Software Mathematics

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2002 2019

2 Citations (Scopus)

Doubly half-injective PRGs for incompressible white-box cryptography

Alpirez Bock, E., Amadori, A., Bos, J. W., Brzuska, C. & Michiels, W., 3 Feb 2019, Topics in Cryptology – CT-RSA 2019 - The Cryptographers’ Track at the RSA Conference 2019, Proceedings. Matsui, M. (ed.). Cham: Springer, p. 189-209 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11405 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Cryptography
Injective
Attack
Digital Rights Management
Incompressibility
1 Citation (Scopus)

White-box cryptography: don’t forget about grey-box attacks

Alpirez Bock, E., Bos, J. W., Brzuska, C., Hubain, C., Michiels, W., Mune, C., Sanfelix Gonzalez, E., Teuwen, P. & Treff, A., 1 Oct 2019, In : Journal of Cryptology. 32, 4, p. 1095-1143 49 p.

Research output: Contribution to journalArticleAcademicpeer-review

Cryptography
Attack
Fault Analysis
Reverse engineering
Fault Injection
2 Citations (Scopus)

On the ineffectiveness of internal encodings - Revisiting the DCA attack on white-box cryptography

Alpirez Bock, E., Brzuska, C., Michiels, W. & Treff, A., 1 Jan 2018, Applied Cryptography and Network Security - 16th International Conference, ACNS 2018, Proceedings. Springer, p. 103-120 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10892 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Computational Analysis
Cryptography
Encoding
Attack
Internal

Theory of local search

Michiels, W., Aarts, E. H. L. & Korst, J., 13 Aug 2018, Handbook of heuristics. Martí, R., Pardalos, P. & Resende, M. (eds.). Cham: Springer, p. 299-339 41 p.

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

Combinatorial optimization
Local Search
Heuristic methods
Combinatorial Optimization Problem
Computational complexity
25 Citations (Scopus)

Differential computation analysis: hiding your white-box designs is not enough

Bos, J. W., Hubain, C., Michiels, W. & Teuwen, P., 2016, Cryptographic Hardware and Embedded Systems – CHES 2016: 18th International Conference, Santa Barbara, California, August 17-19, 2016, Proceedings. Gierlichs, B. & Poschmann, A. Y. (eds.). Dordrecht: Springer, p. 215-236 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9813).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Reverse engineering
Box Product
Trace
Attack
Differential Power Analysis

Student theses

Automated 2G traffic interception and penetration testing

Author: Veens, T., 26 Nov 2018

Supervisor: Michiels, W. (Supervisor 1) & Moonen, R. (External person) (External coach)

Student thesis: Master

File

Block placement on multi-zone disks

Author: Michiels, W., 31 Jul 1999

Supervisor: Aarts, E. (Supervisor 1) & Korst, J. H. (External person) (Supervisor 2)

Student thesis: Master

Differential fault analysis of white-box cryptographic implementations

Author: Ezepue, B., 31 Aug 2017

Supervisor: Michiels, W. (Supervisor 1)

Student thesis: Master

File

Hardening against neural network model stealing using a mixture of periodic and aperiodic activation functions

Author: Derks, G., 17 Dec 2018

Supervisor: Michiels, W. (Supervisor 1), Bouman, N. (Supervisor 2) & van Vredendaal, C. (External coach)

Student thesis: Master