Follow
Brecht Wyseur
Brecht Wyseur
Nagra Kudelski Group, COSIC-KULeuven
Verified email at nagra.com - Homepage
Title
Cited by
Cited by
Year
Remote attestation on legacy operating systems with trusted platform modules
D Schellekens, B Wyseur, B Preneel
Science of Computer Programming 74 (1-2), 13-22, 2008
1672008
Cryptanalysis of white-box DES implementations with arbitrary external encodings
B Wyseur, W Michiels, P Gorissen, B Preneel
Selected Areas in Cryptography: 14th International Workshop, SAC 2007 …, 2007
1652007
White-Box Cryptography.
B Wyseur
Encyclopedia of Cryptography and Security (2nd Ed.), 1386-1387, 2011
1302011
Cryptanalysis of a perturbated white-box AES implementation
Y De Mulder, B Wyseur, B Preneel
Progress in Cryptology-INDOCRYPT 2010: 11th International Conference on …, 2010
1152010
Towards security notions for white-box cryptography
A Saxena, B Wyseur, B Preneel
Information Security, 49-58, 2009
65*2009
White-box cryptography: hiding keys in software
W Brecht
NAGRA Kudelski Group, 2012
172012
Software-Based Protection Is Moving to the Mainstream
YX GU, B WYSEUR, B PRENEEL
IEEE software 28 (2), 2011
12*2011
Condensed white-box implementations
B Wyseur, B Preneel
Proceedings of the 26th Symposium on Information Theory in the Benelux, 296-301, 2005
122005
Software protection decision support and evaluation methodologies (dagstuhl seminar 19331)
B De Sutter, C Collberg, M Dalla Preda, B Wyseur
Schloss-Dagstuhl-Leibniz Zentrum für Informatik, 2019
112019
A reference architecture for software protection
B De Sutter, P Falcarin, B Wyseur, C Basile, M Ceccato, J d'Annoville, ...
2016 13th Working IEEE/IFIP Conference on Software Architecture (WICSA), 291-294, 2016
112016
Lexical natural language steganography systems with human interaction
B Wyseur, K Wouters, B Preneel
Proceedings of the 6th European Conference on Information Warfare and …, 2008
102008
Code renewability for native software protection
B Abrath, B Coppens, JVD Broeck, B Wyseur, A Cabutto, P Falcarin, ...
ACM Transactions on Privacy and Security (TOPS) 23 (4), 1-31, 2020
72020
Software security techniques
J Cappaert, B Wyseur, B Preneel
Internal report, COSIC, Katholieke Universiteit Leuven, 2004
62004
Towards a Formal Model for Software Tamper Resistance
C Basile, S Di Carlo, T Herlea, J Nagra, B Wyseur
52009
White-box cryptography
B Preneel, B Wyseur
Dagstuhl workshop on security hardware in theory and practice—a marriage of …, 2008
52008
On the design of a secure multimedia archive
B Wyseur, K Wouters, M Deng, T Herlea, B Preneel
1st Benelux Workshop on Information and System Security (WISSec 2006), 14, 2006
42006
A survey of homomorphic encryption schemes
B Wyseur, M Deng, T Herlea
COSIC internal report, Katholieke Universiteit Leuven, 2007. 40, 0
4
The ASPIRE framework for software protection
B De Sutter, C Basile, M Ceccato, P Falcarin, M Zunke, B Wyseur, ...
Proceedings of the 2016 ACM Workshop on Software PROtection, 91-92, 2016
32016
Lexical natural language steganography systems with human interaction
K Wouters, B Wyseur, B Preneel
IEEE Spectrum Magazine 35 (8), 303-312, 2014
32014
Re-trust: Trustworthy execution of sw on remote untrusted platforms
B Wyseur
ISSE 2009 Securing Electronic Business Processes: Highlights of the …, 2010
32010
The system can't perform the operation now. Try again later.
Articles 1–20