Follow
Brecht Wyseur
Brecht Wyseur
Nagra Kudelski Group, COSIC-KULeuven
Verified email at nagra.com - Homepage
Title
Cited by
Cited by
Year
Cryptanalysis of white-box DES implementations with arbitrary external encodings
B Wyseur, W Michiels, P Gorissen, B Preneel
Selected Areas in Cryptography: 14th International Workshop, SAC 2007 …, 2007
1772007
Remote attestation on legacy operating systems with trusted platform modules
D Schellekens, B Wyseur, B Preneel
Science of Computer Programming 74 (1-2), 13-22, 2008
1752008
White-Box Cryptography.
B Wyseur
Encyclopedia of Cryptography and Security (2nd Ed.), 1386-1387, 2011
1302011
Cryptanalysis of a perturbated white-box AES implementation
Y De Mulder, B Wyseur, B Preneel
Progress in Cryptology-INDOCRYPT 2010: 11th International Conference on …, 2010
1302010
Towards security notions for white-box cryptography
A Saxena, B Wyseur, B Preneel
Information Security, 49-58, 2009
66*2009
Method for converting a conditional access content and receiver for the implementation for said method
C Schwarz, B Wyseur
US Patent 9,641,331, 2017
352017
White-box cryptography: hiding keys in software
W Brecht
NAGRA Kudelski Group, 2012
172012
Software protection decision support and evaluation methodologies (dagstuhl seminar 19331)
B De Sutter, C Collberg, M Dalla Preda, B Wyseur
Schloss-Dagstuhl-Leibniz Zentrum für Informatik, 2019
142019
Software-Based Protection Is Moving to the Mainstream
YX GU, B WYSEUR, B PRENEEL
IEEE software 28 (2), 2011
13*2011
Lexical natural language steganography systems with human interaction
B Wyseur, K Wouters, B Preneel
ECIW 2007: PROCEEDINGS OF THE 6TH EUROPEAN CONFERENCE ON INFORMATION WARFARE …, 2007
132007
Code renewability for native software protection
B Abrath, B Coppens, JVD Broeck, B Wyseur, A Cabutto, P Falcarin, ...
ACM Transactions on Privacy and Security (TOPS) 23 (4), 1-31, 2020
122020
A reference architecture for software protection
B De Sutter, P Falcarin, B Wyseur, C Basile, M Ceccato, J d'Annoville, ...
2016 13th Working IEEE/IFIP Conference on Software Architecture (WICSA), 291-294, 2016
122016
Condensed white-box implementations
B Wyseur, B Preneel
Proceedings of the 26th Symposium on Information Theory in the Benelux, 296-301, 2005
122005
Block cryptographic method for encrypting/decrypting messages and cryptographic devices for implementing this method
B Wyseur
US Patent 11,418,321, 2022
112022
Trusted Internet of Things (IoT) device network-layer onboarding and lifecycle management: Enhancing internet protocol-based IoT device and network security
M Fagan, J Marron, P Watrobski, M Souppaya, W Barker, C Deane, ...
National Institute of Standards and Technology, 2023
52023
Towards a Formal Model for Software Tamper Resistance
C Basile, S Di Carlo, T Herlea, J Nagra, B Wyseur
52009
White-box cryptography
B Preneel, B Wyseur
Dagstuhl workshop on security hardware in theory and practice—a marriage of …, 2008
52008
Software security techniques
J Cappaert, B Wyseur, B Preneel
Internal report, COSIC, Katholieke Universiteit Leuven, 2004
52004
The ASPIRE framework for software protection
B De Sutter, C Basile, M Ceccato, P Falcarin, M Zunke, B Wyseur, ...
Proceedings of the 2016 ACM Workshop on Software PROtection, 91-92, 2016
32016
Re-trust: Trustworthy execution of sw on remote untrusted platforms
B Wyseur
ISSE 2009 Securing Electronic Business Processes: Highlights of the …, 2010
32010
The system can't perform the operation now. Try again later.
Articles 1–20