Wouter Bokslag

According to our database1, Wouter Bokslag authored at least 9 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
All cops are broadcasting: TETRA under scrutiny.
Proceedings of the 32nd USENIX Security Symposium, 2023

2018
Hitag 2 Hell - Brutally Optimizing Guess-and-Determine Attacks.
Proceedings of the 12th USENIX Workshop on Offensive Technologies, 2018

2017
\mu Shield - Configurable Code-Reuse Attacks Mitigation For Embedded Systems.
Proceedings of the Network and System Security - 11th International Conference, 2017

2016
Simple SIMON: FPGA implementations of the SIMON 64/128 Block Cipher.
IACR Cryptol. ePrint Arch., 2016

Sponges and Engines: An introduction to Keccak and Keyak.
IACR Cryptol. ePrint Arch., 2016

Evaluating e-voting: theory and practice.
CoRR, 2016

The problem of popular primes: Logjam.
CoRR, 2016

2015
Reverse Engineering of RFID devices.
CoRR, 2015

2014
On Emulation-Based Network Intrusion Detection Systems.
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014


  Loading...