Brecht Wyseur
Brecht Wyseur
Nagra Kudelski Group, COSIC-KULeuven
Verified email at nagra.com - Homepage
Title
Cited by
Cited by
Year
Remote attestation on legacy operating systems with trusted platform modules
D Schellekens, B Wyseur, B Preneel
Science of Computer Programming 74 (1-2), 13-22, 2008
1432008
Cryptanalysis of white-box DES implementations with arbitrary external encodings
B Wyseur, W Michiels, P Gorissen, B Preneel
International Workshop on Selected Areas in Cryptography, 264-277, 2007
1342007
Cryptanalysis of a perturbated white-box AES implementation
Y De Mulder, B Wyseur, B Preneel
International Conference on Cryptology in India, 292-310, 2010
852010
White-Box Cryptography.
B Wyseur
Encyclopedia of Cryptography and Security (2nd Ed.), 1386-1387, 2011
792011
Towards security notions for white-box cryptography
A Saxena, B Wyseur, B Preneel
Information Security, 49-58, 2009
53*2009
Method for converting a conditional access content and receiver for the implementation for said method
C Schwarz, B Wyseur
US Patent 9,641,331, 2017
292017
White-box cryptography: hiding keys in software
B Wyseur
NAGRA Kudelski Group, 2012
282012
Condensed white-box implementations
B Wyseur, B Preneel
Proceedings of the 26th Symposium on Information Theory in the Benelux, 296-301, 2005
112005
Software-Based Protection Is Moving to the Mainstream
YX GU, B WYSEUR, B PRENEEL
IEEE software 28 (2), 2011
9*2011
Lexical natural language steganography systems with human interaction
B Wyseur, K Wouters, B Preneel
Proceedings of the 6th European Conference on Information Warfare and …, 2008
92008
A reference architecture for software protection
B De Sutter, P Falcarin, B Wyseur, C Basile, M Ceccato, J DAnnoville, ...
2016 13th Working IEEE/IFIP Conference on Software Architecture (WICSA), 291-294, 2016
82016
Software security techniques
J Cappaert, B Wyseur, B Preneel
COSIC internal report, Katholieke Universiteit Leuven, 2004. 86, 130, 2004
72004
White-box cryptography
B Wyseur
Ascure Academy Event, Date: 2008/05/08-2008/05/08, Location: Brussels BE, 2008
52008
On the design of a secure multimedia archive
B Wyseur, K Wouters, M Deng, T Herlea, B Preneel
1st Benelux Workshop on Information and System Security (WISSec 2006), 14, 2006
52006
A survey of homomorphic encryption schemes
B Wyseur, M Deng, T Herlea
COSIC internal report, Katholieke Universiteit Leuven, 2007. 40, 0
5
Towards a Formal Model for Software Tamper Resistance
C Basile, S Di Carlo, T Herlea, J Nagra, B Wyseur
42009
Re-trust: Trustworthy execution of sw on remote untrusted platforms
B Wyseur
ISSE 2009 Securing Electronic Business Processes, 328-338, 2010
32010
Software Protection Decision Support and Evaluation Methodologies (Dagstuhl Seminar 19331)
B De Sutter, C Collberg, M Dalla Preda, B Wyseur
Dagstuhl Reports 9 (8), 2019
22019
Method to detect cloned software
JB Fischer, P Marcacci, C Schwarz, B Wyseur
US Patent 9,582,685, 2017
22017
The ASPIRE Framework for Software Protection
B De Sutter, C Basile, M Ceccato, P Falcarin, M Zunke, B Wyseur, ...
Proceedings of the 2016 ACM Workshop on Software PROtection, 91-92, 2016
22016
The system can't perform the operation now. Try again later.
Articles 1–20