Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Bmm Benne de Weger is active.

Publication


Featured researches published by Bmm Benne de Weger.


international cryptology conference | 2007

Chosen-Prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities

Mmj Marc Stevens; A Arjen Lenstra; Bmm Benne de Weger

We present a novel, automated way to find differential paths for MD5. As an application we have shown how, at an approximate expected cost of 250calls to the MD5 compression function, for any two chosen message prefixes Pand P?, suffixes Sand S? can be constructed such that the concatenated values P||Sand P?||S? collide under MD5. Although the practical attack potential of this construction of chosen-prefix collisionsis limited, it is of greater concern than random collisions for MD5. To illustrate the practicality of our method, we constructed two MD5 based X.509 certificates with identical signatures but different public keys anddifferent Distinguished Name fields, whereas our previous construction of colliding X.509 certificates required identical name fields. We speculate on other possibilities for abusing chosen-prefix collisions. More details than can be included here can be found on www.win.tue.nl/hashclash/ChosenPrefixCollisions/ .


Designs, Codes and Cryptography | 2014

Optimal symmetric Tardos traitor tracing schemes

Tmm Thijs Laarhoven; Bmm Benne de Weger

For the Tardos traitor tracing scheme, we show that by combining the symbol-symmetric accusation function of Škorić etxa0al. with the improved analysis of Blayer and Tassa we get further improvements. Our construction gives codes that are up to four times shorter than Blayer and Tassa’s, and up to two times shorter than the codes from Škorić etxa0al. Asymptotically, we achieve the theoretical optimal codelength for Tardos’ distribution function and the symmetric score function. For large coalitions, our codelengths are asymptotically about 4.93% of Tardos’ original codelengths, which also improves upon results from Nuida etxa0al.


International Journal of Applied Cryptography | 2012

Chosen-prefix collisions for MD5 and applications

Mmj Marc Stevens; A Arjen Lenstra; Bmm Benne de Weger

We present a novel, automated way to find differential paths for MD5. Its main application is in the construction of chosen-prefix collisions. We have shown how, at an approximate expected cost of 2


international conference on progress in cryptology | 2015

Faster Sieving for Shortest Lattice Vectors Using Spherical Locality-Sensitive Hashing

Tmm Thijs Laarhoven; Bmm Benne de Weger

Recently, it was shown that angular locality-sensitive hashing LSH can be used to significantly speed up lattice sieving, leading to a heuristic time complexity for solving the shortest vector problem SVP of


information hiding | 2013

Discrete distributions in the tardos scheme, revisited

Tmm Thijs Laarhoven; Bmm Benne de Weger


formal aspects in security and trust | 2010

Modeling identity-related properties and their privacy strength

Meilof Veeningen; Bmm Benne de Weger; Nicola Zannone

2^{0.337n + on}


international conference on information security | 2006

A partial key exposure attack on RSA using a 2-dimensional lattice

Ellen Jochemsz; Bmm Benne de Weger


international workshop on security | 2012

Formal Modelling of (De)Pseudonymisation: A Case Study in Health Care Privacy

Meilof Veeningen; Bmm Benne de Weger; Nicola Zannone

20.337n+on and space complexity


International Journal of Information Security | 2014

Data minimisation in communication protocols: a formal analysis framework and application to identity management

Meilof Veeningen; Bmm Benne de Weger; Nicola Zannone


Indagationes Mathematicae | 2013

The Collatz conjecture and De Bruijn graphs

Tmm Thijs Laarhoven; Bmm Benne de Weger

2^{0.208n + on}

Collaboration


Dive into the Bmm Benne de Weger's collaboration.

Top Co-Authors

Avatar

Tmm Thijs Laarhoven

Eindhoven University of Technology

View shared research outputs
Top Co-Authors

Avatar

Meilof Veeningen

Eindhoven University of Technology

View shared research outputs
Top Co-Authors

Avatar

Nicola Zannone

Eindhoven University of Technology

View shared research outputs
Top Co-Authors

Avatar

Mmj Marc Stevens

Eindhoven University of Technology

View shared research outputs
Top Co-Authors

Avatar

Ellen Jochemsz

Eindhoven University of Technology

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge