If you made any changes in Pure these will be visible here soon.

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2002 2019

Doubly half-injective PRGs for incompressible white-box cryptography

Alpirez Bock, E., Amadori, A., Bos, J. W., Brzuska, C. & Michiels, W., 3 Feb 2019, Topics in Cryptology – CT-RSA 2019 - The Cryptographers’ Track at the RSA Conference 2019, Proceedings. Matsui, M. (ed.). Cham: Springer, p. 189-209 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11405 LNCS)

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Cryptography
Injective
Attack
Digital Rights Management
Incompressibility

White-box cryptography: don’t forget about grey-box attacks

Alpirez Bock, E., Bos, J. W., Brzuska, C., Hubain, C., Michiels, W., Mune, C., Sanfelix Gonzalez, E., Teuwen, P. & Treff, A., 12 Feb 2019, In : Journal of Cryptology.

Research output: Contribution to journalArticleAcademicpeer-review

Cryptography
Attack
Fault Analysis
Reverse engineering
Fault Injection

On the ineffectiveness of internal encodings - Revisiting the DCA attack on white-box cryptography

Alpirez Bock, E., Brzuska, C., Michiels, W. & Treff, A., 1 Jan 2018, Applied Cryptography and Network Security - 16th International Conference, ACNS 2018, Proceedings. Springer, p. 103-120 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10892 LNCS)

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Computational Analysis
Cryptography
Encoding
Attack
Internal

Theory of local search

Michiels, W., Aarts, E. H. L. & Korst, J., 13 Aug 2018, Handbook of heuristics. Martí, R., Pardalos, P. & Resende, M. (eds.). Cham: Springer, p. 299-339 41 p.

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

Combinatorial optimization
Local Search
Heuristic methods
Combinatorial Optimization Problem
Computational complexity
22 Citations (Scopus)

Differential computation analysis: hiding your white-box designs is not enough

Bos, J. W., Hubain, C., Michiels, W. & Teuwen, P., 2016, Cryptographic Hardware and Embedded Systems – CHES 2016: 18th International Conference, Santa Barbara, California, August 17-19, 2016, Proceedings. Gierlichs, B. & Poschmann, A. Y. (eds.). Dordrecht: Springer, p. 215-236 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9813)

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Reverse engineering
Box Product
Trace
Attack
Differential Power Analysis

Student theses

Automated 2G traffic interception and penetration testing

Author: Veens, T., 26 Nov 2018

Supervisor: Michiels, W. (Supervisor 1) & Moonen, R. (External person) (External coach)

Student thesis: Master

File

Block placement on multi-zone disks

Author: Michiels, W., 31 Jul 1999

Supervisor: Aarts, E. (Supervisor 1) & Korst, J. H. (External person) (Supervisor 2)

Student thesis: Master

Differential fault analysis of white-box cryptographic implementations

Author: Ezepue, B., 31 Aug 2017

Supervisor: Michiels, W. (Supervisor 1)

Student thesis: Master

File

Hardening against neural network model stealing using a mixture of periodic and aperiodic activation functions

Author: Derks, G., 17 Dec 2018

Supervisor: Michiels, W. (Supervisor 1), Bouman, N. (Supervisor 2) & van Vredendaal, C. (External coach)

Student thesis: Master