Benedikt Gierlichs
Benedikt Gierlichs
Research Expert at KU Leuven/COSIC
Adresse e-mail validée de esat.kuleuven.be - Page d'accueil
Titre
Citée par
Citée par
Année
Mutual information analysis
B Gierlichs, L Batina, P Tuyls, B Preneel
International Workshop on Cryptographic Hardware and Embedded Systems, 426-442, 2008
6272008
Mutual information analysis: a comprehensive study
L Batina, B Gierlichs, E Prouff, M Rivain, FX Standaert, ...
Journal of Cryptology 24 (2), 269-291, 2011
2362011
Templates vs. stochastic methods
B Gierlichs, K Lemke-Rust, C Paar
International Workshop on Cryptographic Hardware and Embedded Systems, 15-29, 2006
2242006
Machine learning in side-channel analysis: a first study
G Hospodar, B Gierlichs, E De Mulder, I Verbauwhede, J Vandewalle
Journal of Cryptographic Engineering 1 (4), 293, 2011
2092011
The world is not enough: Another look on second-order DPA
FX Standaert, N Veyrat-Charvillon, E Oswald, B Gierlichs, M Medwed, ...
International Conference on the Theory and Application of Cryptology and …, 2010
1772010
Consolidating masking schemes
O Reparaz, B Bilgin, S Nikova, B Gierlichs, I Verbauwhede
Annual Cryptology Conference, 764-783, 2015
1582015
Higher-order threshold implementations
B Bilgin, B Gierlichs, S Nikova, V Nikov, V Rijmen
International Conference on the Theory and Application of Cryptology and …, 2014
1572014
An In-depth and Black-box Characterization of the Effects of Clock Glitches on 8-bit MCUs
J Balasch, B Gierlichs, I Verbauwhede
2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, 105-114, 2011
1472011
Partition vs. comparison side-channel distinguishers: An empirical evaluation of statistical tests for univariate side-channel attacks against two unprotected cmos devices
FX Standaert, B Gierlichs, I Verbauwhede
International Conference on Information Security and Cryptology, 253-267, 2008
1392008
On the cost of lazy engineering for masked software implementations
J Balasch, B Gierlichs, V Grosso, O Reparaz, FX Standaert
International Conference on Smart Card Research and Advanced Applications, 64-81, 2014
1272014
A more efficient AES threshold implementation
B Bilgin, B Gierlichs, S Nikova, V Nikov, V Rijmen
International Conference on Cryptology in Africa, 267-284, 2014
1242014
Revisiting higher-order DPA attacks
B Gierlichs, L Batina, B Preneel, I Verbauwhede
Cryptographers’ Track at the RSA Conference, 221-234, 2010
962010
Differential cluster analysis
L Batina, B Gierlichs, K Lemke-Rust
International Workshop on Cryptographic Hardware and Embedded Systems, 112-127, 2009
882009
Power analysis of Atmel CryptoMemory–recovering keys from secure EEPROMs
J Balasch, B Gierlichs, R Verdult, L Batina, I Verbauwhede
Cryptographers’ Track at the RSA Conference, 19-34, 2012
752012
Perfect matching disclosure attacks
C Troncoso, B Gierlichs, B Preneel, I Verbauwhede
International Symposium on Privacy Enhancing Technologies Symposium, 2-23, 2008
752008
Trade-offs for threshold implementations illustrated on AES
B Bilgin, B Gierlichs, S Nikova, V Nikov, V Rijmen
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2015
732015
Infective computation and dummy rounds: Fault protection for block ciphers without check-before-output
B Gierlichs, JM Schmidt, M Tunstall
International conference on cryptology and information security in Latin …, 2012
732012
DPA, bitslicing and masking at 1 GHz
J Balasch, B Gierlichs, O Reparaz, I Verbauwhede
International Workshop on Cryptographic Hardware and Embedded Systems, 599-619, 2015
722015
Electromagnetic circuit fingerprints for hardware trojan detection
J Balasch, B Gierlichs, I Verbauwhede
2015 IEEE International Symposium on Electromagnetic Compatibility (EMC …, 2015
642015
Revisiting a combinatorial approach toward measuring anonymity
B Gierlichs, C Troncoso, C Diaz, B Preneel, I Verbauwhede
Proceedings of the 7th ACM Workshop on Privacy in the Electronic Society …, 2008
632008
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20