这是indexloc提供的服务,不要输入任何密码

BibTeX records: Wil Michiels

download as .bib file

@inproceedings{DBLP:conf/icce-berlin/AartsMR23,
  author       = {Arne Aarts and
                  Wil Michiels and
                  Peter Roelse},
  title        = {Cloning Object Detectors with Limited Access to In-Distribution Samples},
  booktitle    = {13th {IEEE} International Conference on Consumer Electronics - Berlin,
                  ICCE-Berlin 2023, Berlin, Germany, September 3-5, 2023},
  pages        = {62--67},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICCE-Berlin58801.2023.10375681},
  doi          = {10.1109/ICCE-BERLIN58801.2023.10375681},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icce-berlin/AartsMR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icce-berlin/AartsMR22,
  author       = {Arne Aarts and
                  Wil Michiels and
                  Peter Roelse},
  title        = {Cloning Object Detectors},
  booktitle    = {12th {IEEE} International Conference on Consumer Electronics, ICCE-Berlin
                  2022, Berlin, Germany, September 2-6, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICCE-Berlin56473.2022.9937123},
  doi          = {10.1109/ICCE-BERLIN56473.2022.9937123},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icce-berlin/AartsMR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudnet/AartsMR21,
  author       = {Arne Aarts and
                  Wil Michiels and
                  Peter Roelse},
  title        = {Leveraging Partial Model Extractions using Uncertainty Quantification},
  booktitle    = {10th {IEEE} International Conference on Cloud Networking, CloudNet
                  2021, Cookeville, TN, USA, November 8-10, 2021},
  pages        = {19--25},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CloudNet53349.2021.9657130},
  doi          = {10.1109/CLOUDNET53349.2021.9657130},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cloudnet/AartsMR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BockABM20,
  author       = {Estuardo Alpirez Bock and
                  Alessandro Amadori and
                  Chris Brzuska and
                  Wil Michiels},
  title        = {On the Security Goals of White-Box Cryptography},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {2},
  pages        = {327--357},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i2.327-357},
  doi          = {10.13154/TCHES.V2020.I2.327-357},
  timestamp    = {Mon, 30 Mar 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BockABM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BockBFJM20,
  author       = {Estuardo Alpirez Bock and
                  Chris Brzuska and
                  Marc Fischlin and
                  Christian Janson and
                  Wil Michiels},
  editor       = {Shiho Moriai and
                  Huaxiong Wang},
  title        = {Security Reductions for White-Box Key-Storage in Mobile Payments},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12491},
  pages        = {221--252},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64837-4\_8},
  doi          = {10.1007/978-3-030-64837-4\_8},
  timestamp    = {Thu, 10 Dec 2020 09:57:08 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BockBFJM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icce-berlin/AmadoriMR20,
  author       = {Alessandro Amadori and
                  Wil Michiels and
                  Peter Roelse},
  title        = {Automating the {BGE} Attack on White-Box Implementations of {AES}
                  with External Encodings},
  booktitle    = {10th {IEEE} International Conference on Consumer Electronics, ICCE-Berlin
                  2020, Berlin, Germany, November 9-11, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICCE-Berlin50680.2020.9352195},
  doi          = {10.1109/ICCE-BERLIN50680.2020.9352195},
  timestamp    = {Thu, 25 Feb 2021 14:40:09 +0100},
  biburl       = {https://dblp.org/rec/conf/icce-berlin/AmadoriMR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2004-04457,
  author       = {Boris Skoric and
                  Wil Michiels},
  title        = {The Blob: provable incompressibility and traceability in the whitebox
                  model},
  journal      = {CoRR},
  volume       = {abs/2004.04457},
  year         = {2020},
  url          = {https://arxiv.org/abs/2004.04457},
  eprinttype    = {arXiv},
  eprint       = {2004.04457},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2004-04457.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BockABM20,
  author       = {Estuardo Alpirez Bock and
                  Alessandro Amadori and
                  Chris Brzuska and
                  Wil Michiels},
  title        = {On the Security Goals of White-Box Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {104},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/104},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BockABM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BockBBHMMGTT19,
  author       = {Estuardo Alpirez Bock and
                  Joppe W. Bos and
                  Chris Brzuska and
                  Charles Hubain and
                  Wil Michiels and
                  Cristofaro Mune and
                  Eloi Sanfelix Gonzalez and
                  Philippe Teuwen and
                  Alexander Treff},
  title        = {White-Box Cryptography: Don't Forget About Grey-Box Attacks},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {4},
  pages        = {1095--1143},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-019-09315-1},
  doi          = {10.1007/S00145-019-09315-1},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/BockBBHMMGTT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/BockABBM19,
  author       = {Estuardo Alpirez Bock and
                  Alessandro Amadori and
                  Joppe W. Bos and
                  Chris Brzuska and
                  Wil Michiels},
  editor       = {Mitsuru Matsui},
  title        = {Doubly Half-Injective PRGs for Incompressible White-Box Cryptography},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2019 - The Cryptographers' Track at
                  the {RSA} Conference 2019, San Francisco, CA, USA, March 4-8, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11405},
  pages        = {189--209},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-12612-4\_10},
  doi          = {10.1007/978-3-030-12612-4\_10},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/BockABBM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/AmadoriMR19,
  author       = {Alessandro Amadori and
                  Wil Michiels and
                  Peter Roelse},
  editor       = {Kenneth G. Paterson and
                  Douglas Stebila},
  title        = {A {DFA} Attack on White-Box Implementations of {AES} with External
                  Encodings},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2019 - 26th International Conference,
                  Waterloo, ON, Canada, August 12-16, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11959},
  pages        = {591--617},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-38471-5\_24},
  doi          = {10.1007/978-3-030-38471-5\_24},
  timestamp    = {Tue, 07 May 2024 20:12:23 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/AmadoriMR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BockABBM19,
  author       = {Estuardo Alpirez Bock and
                  Alessandro Amadori and
                  Joppe W. Bos and
                  Chris Brzuska and
                  Wil Michiels},
  title        = {Doubly half-injective PRGs for incompressible white-box cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {329},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/329},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BockABBM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BockBFJM19,
  author       = {Estuardo Alpirez Bock and
                  Chris Brzuska and
                  Marc Fischlin and
                  Christian Janson and
                  Wil Michiels},
  title        = {Security Reductions for White-Box Key-Storage in Mobile Payments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1014},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1014},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BockBFJM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BockBMT18,
  author       = {Estuardo Alpirez Bock and
                  Chris Brzuska and
                  Wil Michiels and
                  Alexander Treff},
  editor       = {Bart Preneel and
                  Frederik Vercauteren},
  title        = {On the Ineffectiveness of Internal Encodings - Revisiting the {DCA}
                  Attack on White-Box Cryptography},
  booktitle    = {Applied Cryptography and Network Security - 16th International Conference,
                  {ACNS} 2018, Leuven, Belgium, July 2-4, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10892},
  pages        = {103--120},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93387-0\_6},
  doi          = {10.1007/978-3-319-93387-0\_6},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/BockBMT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/sp/MichielsAK18,
  author       = {Wil Michiels and
                  Emile H. L. Aarts and
                  Jan H. M. Korst},
  editor       = {Rafael Mart{\'{\i}} and
                  Panos M. Pardalos and
                  Mauricio G. C. Resende},
  title        = {Theory of Local Search},
  booktitle    = {Handbook of Heuristics},
  pages        = {299--339},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-07124-4\_6},
  doi          = {10.1007/978-3-319-07124-4\_6},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/reference/sp/MichielsAK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BockBMT18,
  author       = {Estuardo Alpirez Bock and
                  Chris Brzuska and
                  Wil Michiels and
                  Alexander Treff},
  title        = {On the Ineffectiveness of Internal Encodings - Revisiting the {DCA}
                  Attack on White-Box Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {301},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/301},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BockBMT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosHMMGT17,
  author       = {Joppe W. Bos and
                  Charles Hubain and
                  Wil Michiels and
                  Cristofaro Mune and
                  Eloi Sanfelix Gonzalez and
                  Philippe Teuwen},
  title        = {White-Box Cryptography: Don't Forget About Grey Box Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {355},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/355},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosHMMGT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BosHMT16,
  author       = {Joppe W. Bos and
                  Charles Hubain and
                  Wil Michiels and
                  Philippe Teuwen},
  editor       = {Benedikt Gierlichs and
                  Axel Y. Poschmann},
  title        = {Differential Computation Analysis: Hiding Your White-Box Designs is
                  Not Enough},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International
                  Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9813},
  pages        = {215--236},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53140-2\_11},
  doi          = {10.1007/978-3-662-53140-2\_11},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BosHMT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ercim/BosM16,
  author       = {Joppe W. Bos and
                  Wil Michiels},
  title        = {Security Assessment of Software Security: {A} Closer Look at White-Box
                  Cryptographic Implementations},
  journal      = {{ERCIM} News},
  volume       = {2016},
  number       = {106},
  year         = {2016},
  url          = {http://ercim-news.ercim.eu/en106/special/security-assessment-of-software-security-a-closer-look-at-white-box-cryptographic-implementations},
  timestamp    = {Wed, 22 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ercim/BosM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosHMT15,
  author       = {Joppe W. Bos and
                  Charles Hubain and
                  Wil Michiels and
                  Philippe Teuwen},
  title        = {Differential Computation Analysis: Hiding your White-Box Designs is
                  Not Enough},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {753},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/753},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosHMT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/disopt/MichielsAKLS12,
  author       = {Wil Michiels and
                  Emile H. L. Aarts and
                  Jan H. M. Korst and
                  Jan van Leeuwen and
                  Frits C. R. Spieksma},
  title        = {Computer-assisted proof of performance ratios for the Differencing
                  Method},
  journal      = {Discret. Optim.},
  volume       = {9},
  number       = {1},
  pages        = {1--16},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.disopt.2011.10.001},
  doi          = {10.1016/J.DISOPT.2011.10.001},
  timestamp    = {Sat, 31 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/disopt/MichielsAKLS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cccg/JovanovicKAMLA12,
  author       = {Natasa Jovanovic and
                  Jan H. M. Korst and
                  Zharko Aleksovski and
                  Wil Michiels and
                  Johan Lukkien and
                  Emile H. L. Aarts},
  title        = {Finding Shadows among Disks},
  booktitle    = {Proceedings of the 24th Canadian Conference on Computational Geometry,
                  {CCCG} 2012, Charlottetown, Prince Edward Island, Canada, August 8-10,
                  2012},
  pages        = {89--94},
  year         = {2012},
  url          = {http://2012.cccg.ca/papers/paper33.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cccg/JovanovicKAMLA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Michiels10,
  author       = {Wil Michiels},
  title        = {Opportunities in White-Box Cryptography},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {8},
  number       = {1},
  pages        = {64--67},
  year         = {2010},
  url          = {https://doi.org/10.1109/MSP.2010.44},
  doi          = {10.1109/MSP.2010.44},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Michiels10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/MichielsGH08,
  author       = {Wil Michiels and
                  Paul Gorissen and
                  Henk D. L. Hollmann},
  editor       = {Roberto Maria Avanzi and
                  Liam Keliher and
                  Francesco Sica},
  title        = {Cryptanalysis of a Generic Class of White-Box Implementations},
  booktitle    = {Selected Areas in Cryptography, 15th International Workshop, {SAC}
                  2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5381},
  pages        = {414--428},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04159-4\_27},
  doi          = {10.1007/978-3-642-04159-4\_27},
  timestamp    = {Thu, 07 Sep 2023 13:44:11 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/MichielsGH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MichielsGH08,
  author       = {Wil Michiels and
                  Paul Gorissen and
                  Henk D. L. Hollmann},
  title        = {Cryptanalysis of White-Box Implementations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {105},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/105},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MichielsGH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0017492,
  author       = {Wil Michiels and
                  Emile H. L. Aarts and
                  Jan H. M. Korst},
  title        = {Theoretical aspects of local search},
  series       = {Monographs in Theoretical Computer Science. An {EATCS} Series},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-35854-1},
  doi          = {10.1007/978-3-540-35854-1},
  isbn         = {978-3-540-35853-4},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/0017492.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jco/MichielsKAL07,
  author       = {Wil Michiels and
                  Jan H. M. Korst and
                  Emile H. L. Aarts and
                  Jan van Leeuwen},
  title        = {Performance ratios of the Karmarkar-Karp differencing method},
  journal      = {J. Comb. Optim.},
  volume       = {13},
  number       = {1},
  pages        = {19--32},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10878-006-9010-z},
  doi          = {10.1007/S10878-006-9010-Z},
  timestamp    = {Sat, 31 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jco/MichielsKAL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/MichielsG07,
  author       = {Wil Michiels and
                  Paul Gorissen},
  editor       = {Moti Yung and
                  Aggelos Kiayias and
                  Ahmad{-}Reza Sadeghi},
  title        = {Mechanism for software tamper resistance: an application of white-box
                  cryptography},
  booktitle    = {Proceedings of the Seventh {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, October 29, 2007},
  pages        = {82--89},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1314276.1314291},
  doi          = {10.1145/1314276.1314291},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/MichielsG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/WyseurMGP07,
  author       = {Brecht Wyseur and
                  Wil Michiels and
                  Paul Gorissen and
                  Bart Preneel},
  editor       = {Carlisle M. Adams and
                  Ali Miri and
                  Michael J. Wiener},
  title        = {Cryptanalysis of White-Box {DES} Implementations with Arbitrary External
                  Encodings},
  booktitle    = {Selected Areas in Cryptography, 14th International Workshop, {SAC}
                  2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4876},
  pages        = {264--277},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77360-3\_17},
  doi          = {10.1007/978-3-540-77360-3\_17},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/WyseurMGP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crc/KorstAM07,
  author       = {Jan H. M. Korst and
                  Emile H. L. Aarts and
                  Wil Michiels},
  editor       = {Teofilo F. Gonzalez},
  title        = {Simulated Annealing},
  booktitle    = {Handbook of Approximation Algorithms and Metaheuristics},
  publisher    = {Chapman and Hall/CRC},
  year         = {2007},
  url          = {https://doi.org/10.1201/9781420010749.ch25},
  doi          = {10.1201/9781420010749.CH25},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crc/KorstAM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WyseurMGP07,
  author       = {Brecht Wyseur and
                  Wil Michiels and
                  Paul Gorissen and
                  Bart Preneel},
  title        = {Cryptanalysis of White-Box {DES} Implementations with Arbitrary External
                  Encodings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {104},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/104},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WyseurMGP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/endm/MichielsKAL03,
  author       = {Wil Michiels and
                  Jan H. M. Korst and
                  Emile H. L. Aarts and
                  Jan van Leeuwen},
  title        = {Performance Ratios for the Karmarkar-Karp Differencing Method},
  journal      = {Electron. Notes Discret. Math.},
  volume       = {13},
  pages        = {71--75},
  year         = {2003},
  url          = {https://doi.org/10.1016/S1571-0653(04)00442-1},
  doi          = {10.1016/S1571-0653(04)00442-1},
  timestamp    = {Sat, 31 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/endm/MichielsKAL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/MichielsK03,
  author       = {Wil Michiels and
                  Jan H. M. Korst},
  title        = {Complexity of min-max subsequence problems},
  journal      = {Inf. Process. Lett.},
  volume       = {87},
  number       = {4},
  pages        = {213--217},
  year         = {2003},
  url          = {https://doi.org/10.1016/S0020-0190(03)00272-2},
  doi          = {10.1016/S0020-0190(03)00272-2},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/MichielsK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/MichielsKA03,
  author       = {Wil Michiels and
                  Jan H. M. Korst and
                  Joep Aerts},
  title        = {On the Guaranteed Throughput of Multizone Disks},
  journal      = {{IEEE} Trans. Computers},
  volume       = {52},
  number       = {11},
  pages        = {1407--1420},
  year         = {2003},
  url          = {https://doi.org/10.1109/TC.2003.1244939},
  doi          = {10.1109/TC.2003.1244939},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/MichielsKA03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stacs/MichielsKAL03,
  author       = {Wil Michiels and
                  Jan H. M. Korst and
                  Emile H. L. Aarts and
                  Jan van Leeuwen},
  editor       = {Helmut Alt and
                  Michel Habib},
  title        = {Performance Ratios for the Differencing Method Applied to the Balanced
                  Number Partitioning Problem},
  booktitle    = {{STACS} 2003, 20th Annual Symposium on Theoretical Aspects of Computer
                  Science, Berlin, Germany, February 27 - March 1, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2607},
  pages        = {583--595},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36494-3\_51},
  doi          = {10.1007/3-540-36494-3\_51},
  timestamp    = {Sat, 31 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stacs/MichielsKAL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}