Volgen
Yoni De Mulder
Yoni De Mulder
Geverifieerd e-mailadres voor esat.kuleuven.be
Titel
Geciteerd door
Geciteerd door
Jaar
Identification via location-profiling in GSM networks
Y De Mulder, G Danezis, L Batina, B Preneel
Proceedings of the 7th ACM workshop on Privacy in the electronic society, 23-32, 2008
1512008
Cryptanalysis of the Xiao–Lai white-box AES implementation
Y De Mulder, P Roelse, B Preneel
Selected Areas in Cryptography: 19th International Conference, SAC 2012 …, 2013
1312013
Two attacks on a white-box AES implementation
T Lepoint, M Rivain, Y De Mulder, P Roelse, B Preneel
International conference on selected areas in cryptography, 265-285, 2013
1242013
Cryptanalysis of a perturbated white-box AES implementation
Y De Mulder, B Wyseur, B Preneel
Progress in Cryptology-INDOCRYPT 2010: 11th International Conference on …, 2010
1152010
Revisiting the BGE attack on a white-box AES implementation
Y De Mulder, P Roelse, B Preneel
Cryptology ePrint Archive, 2013
312013
White-box cryptography: analysis of white-box AES implementations
Y De Mulder
Ku Leuven Arenberg Doctoral School,—Belgium, 1-244, 2014
172014
Updating key information
P Roelse, Y De Mulder
US Patent 10,333,702, 2019
82019
White-Box Cryptography: Analysis of White-Box AES Implementations (White-Box Cryptografie: Analyse van White-Box AES implementaties)
Y De Mulder
22014
A privacy-preserving ID-based group key agreement scheme applied in VPAN
Y De Mulder, K Wouters, B Preneel
SOFSEM 2011: Theory and Practice of Computer Science: 37th Conference on …, 2011
12011
FM-BIASED
S Cleemput, G Deconinck, Y De Mulder, K Devos, B Preneel, S Seys, ...
2014
White-Box Cryptography
Y De Mulder
2014
Anonymous ID-based Group Key Agreement scheme applied in Virtual Private Ad Hoc Networks
Y De Mulder, K Wouters, B Preneel
Perturbated Functions: a new approach to Obfuscation and Diversity
Y De Mulder, N Kisserli, J Cappaert, N Mavrogiannopoulos, B Preneel
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–13