Benne de Weger

From MaRDI portal
(Redirected from Person:740472)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
The irreducible vectors of a lattice: some theory and applications
Designs, Codes and Cryptography
2023-04-21Paper
A lot of fudge around A + B = C2023-01-08Paper
Sieve, Enumerate, Slice, and Lift:
Progress in Cryptology - AFRICACRYPT 2020
2022-11-09Paper
Finding closest lattice vectors using approximate Voronoi cells2020-02-25Paper
Binomial collisions and near collisions2019-06-21Paper
Binomial collisions and near collisions
(available as arXiv preprint)
2019-06-21Paper
Dynamic Tardos Traitor Tracing Schemes
IEEE Transactions on Information Theory
2017-06-08Paper
Faster sieving for shortest lattice vectors using spherical locality-sensitive hashing
Progress in Cryptology -- LATINCRYPT 2015
2015-09-17Paper
The Collatz conjecture and de Bruijn graphs
Indagationes Mathematicae. New Series
2014-09-03Paper
The \(3n+1\)-conjecture
Nieuw Archief voor Wiskunde. Vijfde Serie
2014-08-28Paper
A generalized Ramanujan-Nagell equation related to certain strongly regular graphs2014-08-04Paper
Optimal symmetric Tardos traitor tracing schemes
Designs, Codes and Cryptography
2014-03-17Paper
Chosen-prefix collisions for MD5 and applications
International Journal of Applied Cryptography
2012-11-16Paper
Some Diophantine equations from finite group theory: \(\Phi_m(x)=2p^n-1\)
Publicationes Mathematicae Debrecen
2011-12-19Paper
\(\sigma_k(F_m)=F_n\)2011-09-12Paper
scientific article; zbMATH DE number 5722977 (Why is no real title available?)2010-06-17Paper
Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate
Advances in Cryptology - CRYPTO 2009
2009-10-20Paper
A Partial Key Exposure Attack on RSA Using a 2-Dimensional Lattice
Lecture Notes in Computer Science
2008-06-17Paper
Partial Key Exposure Attacks on RSA up to Full Size Exponents
Lecture Notes in Computer Science
2008-05-06Paper
Chosen-Prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities
Advances in Cryptology - EUROCRYPT 2007
2007-11-29Paper
Information Security and Privacy
Lecture Notes in Computer Science
2006-06-22Paper
Theoretical and computational bounds for m-cycles of the 3n+1-problem
Acta Arithmetica
2005-05-20Paper
Cryptanalysis of RSA with small prime difference
Applicable Algebra in Engineering, Communication and Computing
2002-05-29Paper


Research outcomes over time


This page was built for person: Benne de Weger