Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Yoni De Mulder is active.

Publication


Featured researches published by Yoni De Mulder.


workshop on privacy in the electronic society | 2008

Identification via location-profiling in GSM networks

Yoni De Mulder; George Danezis; Lejla Batina; Bart Preneel

As devices move within a cellular network, they register their new location with cell base stations to allow for the correct forwarding of data. We show it is possible to identify a mobile user from these records and a pre-existing location profile, based on previous movement. Two different identification processes are studied, and their performances are evaluated on real cell location traces. The best of those allows for the identification of around 80% of users. We also study the misidentified users and characterise them using hierarchical clustering techniques. Our findings highlight the difficulty of anonymizing location data, and firmly establish they are personally identifiable.


international conference on selected areas in cryptography | 2012

Cryptanalysis of the Xiao – Lai White-Box AES Implementation

Yoni De Mulder; Peter Roelse; Bart Preneel

In the white-box attack context, i.e., the setting where an implementation of a cryptographic algorithm is executed on an untrusted platform, the adversary has full access to the implementation and its execution environment. In 2002, Chow et al. presented a white-box AES implementation which aims at preventing key-extraction in the white-box attack context. However, in 2004, Billet et al. presented an efficient practical attack on Chow et al.’s white-box AES implementation. In response, in 2009, Xiao and Lai proposed a new white-box AES implementation which is claimed to be resistant against Billet et al.’s attack. This paper presents a practical cryptanalysis of the white-box AES implementation proposed by Xiao et al. The linear equivalence algorithm presented by Biryukov et al. is used as a building block. The cryptanalysis efficiently extracts the AES key from Xiao et al.’s white-box AES implementation with a work factor of about 232.


international conference on cryptology in india | 2010

Cryptanalysis of a Perturbated White-Box AES Implementation

Yoni De Mulder; Brecht Wyseur; Bart Preneel

In response to various cryptanalysis results on white-box cryptography, Bringer et al. presented a novel white-box strategy. They propose to extend the round computations of a block cipher with a set of random equations and perturbations, and complicate the analysis by implementing each such round as one system that is obfuscated with annihilating linear input and output encodings. The improved version presented by Bringer et al. implements the AEw/oS, which is an AES version with key-dependent S-boxes (the S-boxes are in fact the secret key). In this paper we present an algebraic analysis to recover equivalent keys from the implementation. We show how the perturbations and system of random equations can be distinguished from the implementation, and how the linear input and output encodings can be eliminated. The result is that we have decomposed the white-box implementation into a much more simple, functionally equivalent implementation and retrieved a set of keys that are equivalent to the original key. Our cryptanalysis has a worst time complexity of 217 and a negligible space complexity.


selected areas in cryptography | 2013

Two Attacks on a White-Box AES Implementation

Tancrède Lepoint; Matthieu Rivain; Yoni De Mulder; Peter Roelse; Bart Preneel

White-box cryptography aims to protect the secret key of a cipher in an environment in which an adversary has full access to the implementation of the cipher and its execution environment. In 2002, Chow, Eisen, Johnson and van Oorschot proposed a white-box implementation of AES. In 2004, Billet, Gilbert and Ech-Chatbi presented an efficient attack referred to as the BGE attack on this implementation, extracts extracting its embedded AES key with a work factor of


conference on current trends in theory and practice of informatics | 2011

A privacy-preserving ID-based group key agreement scheme applied in VPAN

Yoni De Mulder; Karel Wouters; Bart Preneel


IACR Cryptology ePrint Archive | 2013

Revisiting the BGE Attack on a White-Box AES Implementation.

Yoni De Mulder; Peter Roelse; Bart Preneel

2^{30}


Archive | 2012

UPDATING KEY INFORMATION

Peter Roelse; Yoni De Mulder


Lecture Notes in Computer Science | 2012

Cryptanalysis of the Xiao - Lai White-Box AES Implementation

Yoni De Mulder; Peter Roelse; Bart Preneel

. In 2012, Tolhuizen presented an improvement of the most time-consuming phase of the BGE attack. The present paper includes three contributions. First we describe several improvements of the BGE attack. We show that the overall work factor of the BGE attack is reduced to


Lecture Notes in Computer Science | 2011

A Privacy-preserving ID-based Group Key Agreement Scheme applied in VPAN

Yoni De Mulder; Karel Wouters; Bart Preneel


Lecture Notes in Computer Science | 2010

Cryptanalysis of a Perturbated White-box AES Implementation

Yoni De Mulder; Brecht Wyseur; Bart Preneel

2^{22}

Collaboration


Dive into the Yoni De Mulder's collaboration.

Top Co-Authors

Avatar

Bart Preneel

Katholieke Universiteit Leuven

View shared research outputs
Top Co-Authors

Avatar

Peter Roelse

Katholieke Universiteit Leuven

View shared research outputs
Top Co-Authors

Avatar

Brecht Wyseur

Katholieke Universiteit Leuven

View shared research outputs
Top Co-Authors

Avatar

Karel Wouters

Katholieke Universiteit Leuven

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

George Danezis

University College London

View shared research outputs
Top Co-Authors

Avatar

Lejla Batina

Radboud University Nijmegen

View shared research outputs
Researchain Logo
Decentralizing Knowledge