Peter Roelse

According to our database1, Peter Roelse authored at least 18 papers between 1998 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Cloning Object Detectors with Limited Access to In-Distribution Samples.
Proceedings of the 13th IEEE International Conference on Consumer Electronics - Berlin, 2023

2022
Cloning Object Detectors.
Proceedings of the 12th IEEE International Conference on Consumer Electronics, 2022

2021
Leveraging Partial Model Extractions using Uncertainty Quantification.
Proceedings of the 10th IEEE International Conference on Cloud Networking, CloudNet 2021, 2021

2020
Voice Conversion Attacks on Speaker De-Identification Schemes.
Proceedings of the 2020 IEEE International Conference on Consumer Electronics (ICCE), 2020

Automating the BGE Attack on White-Box Implementations of AES with External Encodings.
Proceedings of the 10th IEEE International Conference on Consumer Electronics, 2020

2019
A DFA Attack on White-Box Implementations of AES with External Encodings.
Proceedings of the Selected Areas in Cryptography - SAC 2019, 2019

2018
A New Key Establishment Protocol and its Application in Pay-TV Systems.
Proceedings of the 8th IEEE International Conference on Consumer Electronics - Berlin, 2018

2013
Dynamic Tardos Traitor Tracing Schemes.
IEEE Trans. Inf. Theory, 2013

Revisiting the BGE Attack on a White-Box AES Implementation.
IACR Cryptol. ePrint Arch., 2013

Two Attacks on a White-Box AES Implementation.
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013

2012
Cryptanalysis of the Xiao - Lai White-Box AES Implementation.
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012

2011
Erratum to: Dynamic subtree tracing and its application in pay-TV systems.
Int. J. Inf. Sec., 2011

Dynamic subtree tracing and its application in pay-TV systems.
Int. J. Inf. Sec., 2011

2007
The design of composite permutations with applications to DES-like S-boxes.
Des. Codes Cryptogr., 2007

A security architecture for pay-per-view business models in conditional access systems.
Proceedings of the Seventh ACM Workshop on Digital Rights Management, 2007

2003
The black-box Niederreiter algorithm and its implementation over the binary field.
Math. Comput., 2003

1999
Factoring high-degree polynomials over F<sub>2</sub> with Niederreiter's algorithm on the IBM SP2.
Math. Comput., 1999

1998
Efficient Multiplier Architectures for Galois Fields GF(2 <sup>4n</sup>).
IEEE Trans. Computers, 1998


  Loading...