Filter
Conferentiebijdrage

Zoekresultaten

  • 2020

    Sieve, Enumerate, Slice, and Lift: - Hybrid Lattice Algorithms for SVP via CVPP.

    Doulgerakis, E., Laarhoven, T. & de Weger, B., 2020, Progress in Cryptology - AFRICACRYPT 2020 - 12th International Conference on Cryptology in Africa, Proceedings. Nitaj, A. & Youssef, A. (uitgave). Springer, blz. 301-320 20 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12174 LNCS).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    Open Access
    2 Citaten (Scopus)
  • 2019

    Finding closest lattice vectors using approximate voronoi cells

    Doulgerakis, E., Laarhoven, T. & de Weger, B., 2019, Post-Quantum Cryptography - 10th International Conference, PQCrypto 2019, Revised Selected Papers. Ding, J. & Steinwandt, R. (uitgave). Cham: Springer, blz. 3-22 20 blz. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11505 LNCS).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    12 Citaten (Scopus)
    1 Downloads (Pure)
  • 2015

    Faster sieving for shortest lattice vectors using spherical locality-sensitive hashing

    Laarhoven, T. & Weger, B. D., 2015, Progress in Cryptology - LATINCRYPT 2015 (Fourth International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015). Lauter, K. & Rodríguez-Henríquez, F. (uitgave). Berlin: Springer, blz. 101-118 18 blz. (Lecture Notes in Computer Science; vol. 9230).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    28 Citaten (Scopus)
  • 2013

    Discrete distributions in the Tardos scheme, revisited

    Laarhoven, T. & Weger, B. D., 2013, First ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec'13, Montpellier, France, June 17-19, 2013). New York NY: Association for Computing Machinery, Inc, blz. 13-17 5 blz.

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    8 Citaten (Scopus)
  • Formal modelling of (de)pseudonymisation : a case study in health care privacy

    Veeningen, M. G., Weger, de, B. M. M. & Zannone, N., 2013, Security and Trust Management (8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012. Revised selected papers). Jøsang, A., Samarati, P. & Petrocchi, M. (uitgave). Berlin: Springer, blz. 145-160 (Lecture Notes in Computer Science; vol. 7783).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    5 Citaten (Scopus)
    2 Downloads (Pure)
  • Symbolic privacy analysis through linkability and detectability

    Veeningen, M. G., Weger, de, B. M. M. & Zannone, N., 2013, Trust Management VII (7th IFIP WG 11.11 International Conference, IFIPTM 2013, Malaga, Spain, June 3-7, 2013. Proceedings). Fernández-Gago, C., Martinelli, F., Pearson, S. & Agudo, I. (uitgave). Berlin: Springer, blz. 1-16 (IFIP Advances in Information and Communication Technology; vol. 401).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    3 Citaten (Scopus)
    4 Downloads (Pure)
  • 2011

    Formal privacy analysis of communication protocols for identity management

    Veeningen, M. G., Weger, de, B. M. M. & Zannone, N., 2011, Information Systems Security (7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011. Proceedings). Jajodia, S. & Mazumdar, C. (uitgave). Berlin: Springer, blz. 235-249 (Lecture Notes in Computer Science; vol. 7093).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    7 Citaten (Scopus)
    2 Downloads (Pure)
  • Modeling identity-related properties and their privacy strength

    Veeningen, M. G., Weger, de, B. M. M. & Zannone, N., 2011, Formal Aspects of Security and Trust (7th International Workshop, FAST'10, Pisa, Italy, September 16-17, 2010. Revised Selected Papers). Degano, P., Etalle, S. & Guttman, J. (uitgave). Berlin: Springer, blz. 126-140 (Lecture Notes in Computer Science; vol. 6561).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    8 Citaten (Scopus)
    2 Downloads (Pure)
  • 2009

    Short chosen-prefix collisions for MD5 and the creation of a rogue CA certificate

    Stevens, M. M. J., Sotirov, A., Appelbaum, J. R., Lenstra, A. K., Molnar, D., Osvik, D. A. & Weger, de, B. M. M., 2009, Advances in Cryptology - CRYPTO 2009 (29th Annual International Cryptology Conference, Santa Barbara CA, USA, August 16-20, 2009. Proceedings). Halevi, S. (uitgave). Berlin: Springer, blz. 55-69 (Lecture Notes in Computer Science; vol. 5677).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    Open Access
    Bestand
    118 Citaten (Scopus)
    234 Downloads (Pure)
  • 2007

    Chosen-prefix collisions for MD5 and colliding X.509 certificates for different identities

    Stevens, M. M. J., Lenstra, A. K. & Weger, de, B. M. M., 2007, Proceedings of the 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt 2007) 20-24 May 2007, Barcelona, Spain. Naor, M. (uitgave). Berlin, Germany: Springer, blz. 1-22 (Lecture Notes in Computer Science; vol. 4515).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    129 Citaten (Scopus)
  • 2006

    A partial key exposure attack on RSA using a 2-dimensional lattice

    Jochemsz, E. & Weger, de, B. M. M., 2006, Information Security (Proceedings 9th International Conference, ISC 2006, Samos, Greece, August 30-September 2, 2006). Katsikas, S. K., Lopez, J., Backes, M., Gritzalis, S. & Preneel, B. (uitgave). Berlin: Springer, blz. 203-216 (Lecture Notes in Computer Science; vol. 4176).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    5 Citaten (Scopus)
    1 Downloads (Pure)
  • 2005

    On the possibility of constructing meaningful hash collisions for public keys

    Lenstra, A. K. & Weger, de, B. M. M., 2005, Information Security and Privacy : 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005. Proceedings . Boyd, C. & González Nieto, J. M. (uitgave). Berlin: Springer, blz. 267-279 13 blz. (Lecture Notes in Computer Science (LNCS); vol. 3574).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    27 Citaten (Scopus)
  • Partial key exposure attacks on RSA up to full size exponents

    Ernst, M., Jochemsz, E., May, A. & Weger, de, B. M. M., 2005, Advances in Cryptology - Eurocrypt 2005 (24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings). Cramer, R. (uitgave). Berlin: Springer, blz. 371-386 (Lecture Notes in Computer Science; vol. 3494).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    95 Citaten (Scopus)
    1 Downloads (Pure)
  • Twin RSA

    Lenstra, A. K. & Weger, de, B. M. M., 2005, Progress in Cryptology - MyCrypt 2005 (Proceedings First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005). Dawson, E. & Vaudenay, S. (uitgave). Berlin: Springer, blz. 222-228 (Lecture Notes in Computer Science; vol. 3715).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    6 Citaten (Scopus)
  • 1991

    On the practical solution of the Thue-Mahler equation

    Weger, de, B. M. M., 1991, Computational Number Theory (Debrecen, Hungary, September 4-9, 1989). Pethö, A., Pohst, M. E., Williams, H. C. & Zimmer, H. G. (uitgave). Berlin: Walter de Gruyter GmbH, blz. 289-294

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

  • 1990

    On the practical solution of Thue-Mahler equations, an outline

    Weger, de, B. M. M., 1990, Number Theory. Volume II. Diophantine and algebraic (Budapest, Hungary, July 20-25, 1987). Györy, K. & Halász, G. (uitgave). Amsterdam: North-Holland Publishing Company, blz. 1037-1050 (Colloquia Mathematica Societatis János Bolyai; vol. 51).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

  • 1989

    A Diophantine equation of Antoniadis

    Weger, de, B. M. M., 1989, Number Theory and Applications (Banff AB, Canada, April 27-May 5, 1988). Mollin, R. A. (uitgave). Dordrecht: Kluwer Academic Publishers, blz. 575-589 (NATO ASI Series, Series C: Mathematical and Physical Sciences; vol. 265).

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review