Identification via location-profiling in GSM networks Y De Mulder, G Danezis, L Batina, B Preneel Proceedings of the 7th ACM workshop on Privacy in the electronic society, 23-32, 2008 | 151 | 2008 |
Cryptanalysis of the Xiao–Lai white-box AES implementation Y De Mulder, P Roelse, B Preneel Selected Areas in Cryptography: 19th International Conference, SAC 2012 …, 2013 | 141 | 2013 |
Two attacks on a white-box AES implementation T Lepoint, M Rivain, Y De Mulder, P Roelse, B Preneel International conference on selected areas in cryptography, 265-285, 2013 | 137 | 2013 |
Cryptanalysis of a perturbated white-box AES implementation Y De Mulder, B Wyseur, B Preneel Progress in Cryptology-INDOCRYPT 2010: 11th International Conference on …, 2010 | 125 | 2010 |
Revisiting the BGE attack on a white-box AES implementation Y De Mulder, P Roelse, B Preneel Cryptology ePrint Archive, 2013 | 33 | 2013 |
White-box cryptography: analysis of white-box AES implementations Y De Mulder Ku Leuven Arenberg Doctoral School,—Belgium, 1-244, 2014 | 17 | 2014 |
Updating key information P Roelse, Y De Mulder US Patent 10,333,702, 2019 | 9 | 2019 |
White-Box Cryptography: Analysis of White-Box AES Implementations (White-Box Cryptografie: Analyse van White-Box AES implementaties). Y De Mulder Katholieke Universiteit Leuven, Belgium, 2014 | 2 | 2014 |
A privacy-preserving ID-based group key agreement scheme applied in VPAN Y De Mulder, K Wouters, B Preneel SOFSEM 2011: Theory and Practice of Computer Science: 37th Conference on …, 2011 | 1 | 2011 |
FM-BIASED S Cleemput, G Deconinck, Y De Mulder, K Devos, B Preneel, S Seys, ... | | 2014 |
Anonymous ID-based Group Key Agreement scheme applied in Virtual Private Ad Hoc Networks Y De Mulder, K Wouters, B Preneel | | |
Perturbated Functions: a new approach to Obfuscation and Diversity Y De Mulder, N Kisserli, J Cappaert, N Mavrogiannopoulos, B Preneel | | |