关注
Yoni De Mulder
Yoni De Mulder
在 esat.kuleuven.be 的电子邮件经过验证
标题
引用次数
引用次数
年份
Identification via location-profiling in GSM networks
Y De Mulder, G Danezis, L Batina, B Preneel
Proceedings of the 7th ACM workshop on Privacy in the electronic society, 23-32, 2008
1512008
Cryptanalysis of the Xiao–Lai white-box AES implementation
Y De Mulder, P Roelse, B Preneel
Selected Areas in Cryptography: 19th International Conference, SAC 2012 …, 2013
1412013
Two attacks on a white-box AES implementation
T Lepoint, M Rivain, Y De Mulder, P Roelse, B Preneel
International conference on selected areas in cryptography, 265-285, 2013
1372013
Cryptanalysis of a perturbated white-box AES implementation
Y De Mulder, B Wyseur, B Preneel
Progress in Cryptology-INDOCRYPT 2010: 11th International Conference on …, 2010
1252010
Revisiting the BGE attack on a white-box AES implementation
Y De Mulder, P Roelse, B Preneel
Cryptology ePrint Archive, 2013
332013
White-box cryptography: analysis of white-box AES implementations
Y De Mulder
Ku Leuven Arenberg Doctoral School,—Belgium, 1-244, 2014
172014
Updating key information
P Roelse, Y De Mulder
US Patent 10,333,702, 2019
92019
White-Box Cryptography: Analysis of White-Box AES Implementations (White-Box Cryptografie: Analyse van White-Box AES implementaties).
Y De Mulder
Katholieke Universiteit Leuven, Belgium, 2014
22014
A privacy-preserving ID-based group key agreement scheme applied in VPAN
Y De Mulder, K Wouters, B Preneel
SOFSEM 2011: Theory and Practice of Computer Science: 37th Conference on …, 2011
12011
FM-BIASED
S Cleemput, G Deconinck, Y De Mulder, K Devos, B Preneel, S Seys, ...
2014
Anonymous ID-based Group Key Agreement scheme applied in Virtual Private Ad Hoc Networks
Y De Mulder, K Wouters, B Preneel
Perturbated Functions: a new approach to Obfuscation and Diversity
Y De Mulder, N Kisserli, J Cappaert, N Mavrogiannopoulos, B Preneel
系统目前无法执行此操作,请稍后再试。
文章 1–12