BibTeX records: Benedikt Gierlichs

download as .bib file

@inproceedings{DBLP:conf/cardis/SluysWGV23,
  author       = {pcy Sluys and
                  Lennert Wouters and
                  Benedikt Gierlichs and
                  Ingrid Verbauwhede},
  editor       = {Shivam Bhasin and
                  Thomas Roche},
  title        = {An In-Depth Security Evaluation of the Nintendo DSi Gaming Console},
  booktitle    = {Smart Card Research and Advanced Applications - 22nd International
                  Conference, {CARDIS} 2023, Amsterdam, The Netherlands, November 14-16,
                  2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14530},
  pages        = {23--42},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-54409-5\_2},
  doi          = {10.1007/978-3-031-54409-5\_2},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cardis/SluysWGV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/KumarBGV23,
  author       = {Dilip S. V. Kumar and
                  Josep Balasch and
                  Benedikt Gierlichs and
                  Ingrid Verbauwhede},
  title        = {Low-Cost First-Order Secure Boolean Masking in Glitchy Hardware},
  booktitle    = {Design, Automation {\&} Test in Europe Conference {\&} Exhibition,
                  {DATE} 2023, Antwerp, Belgium, April 17-19, 2023},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.23919/DATE56975.2023.10136920},
  doi          = {10.23919/DATE56975.2023.10136920},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/date/KumarBGV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cf/BeckersUVVWDDGM22,
  author       = {Arthur Beckers and
                  Roel Uytterhoeven and
                  Thomas Vandenabeele and
                  Jo Vliegen and
                  Lennert Wouters and
                  Joan Daemen and
                  Wim Dehaene and
                  Benedikt Gierlichs and
                  Nele Mentens},
  editor       = {Luca Sterpone and
                  Andrea Bartolini and
                  Anastasiia Butko},
  title        = {Energy and side-channel security evaluation of near-threshold cryptographic
                  circuits in 28nm {FD-SOI} technology},
  booktitle    = {{CF} '22: 19th {ACM} International Conference on Computing Frontiers,
                  Turin, Italy, May 17 - 22, 2022},
  pages        = {258--262},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3528416.3530992},
  doi          = {10.1145/3528416.3530992},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cf/BeckersUVVWDDGM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/WoutersGP22,
  author       = {Lennert Wouters and
                  Benedikt Gierlichs and
                  Bart Preneel},
  editor       = {Josep Balasch and
                  Colin O'Flynn},
  title        = {On the Susceptibility of Texas Instruments SimpleLink Platform Microcontrollers
                  to Non-invasive Physical Attacks},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 13th International
                  Workshop, {COSADE} 2022, Leuven, Belgium, April 11-12, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13211},
  pages        = {143--163},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-99766-3\_7},
  doi          = {10.1007/978-3-030-99766-3\_7},
  timestamp    = {Fri, 01 Apr 2022 15:49:26 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/WoutersGP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/BeckersWGPV22,
  author       = {Arthur Beckers and
                  Lennert Wouters and
                  Benedikt Gierlichs and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  editor       = {Josep Balasch and
                  Colin O'Flynn},
  title        = {Provable Secure Software Masking in the Real-World},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 13th International
                  Workshop, {COSADE} 2022, Leuven, Belgium, April 11-12, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13211},
  pages        = {215--235},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-99766-3\_10},
  doi          = {10.1007/978-3-030-99766-3\_10},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/BeckersWGPV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeckersWGPV22,
  author       = {Arthur Beckers and
                  Lennert Wouters and
                  Benedikt Gierlichs and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  title        = {Provable Secure Software Masking in the Real-World},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {327},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/327},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeckersWGPV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WoutersGP22,
  author       = {Lennert Wouters and
                  Benedikt Gierlichs and
                  Bart Preneel},
  title        = {On the susceptibility of Texas Instruments SimpleLink platform microcontrollers
                  to non-invasive physical attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {328},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/328},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WoutersGP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/WoutersGP21,
  author       = {Lennert Wouters and
                  Benedikt Gierlichs and
                  Bart Preneel},
  title        = {My other car is your car: compromising the Tesla Model {X} keyless
                  entry system},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {4},
  pages        = {149--172},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i4.149-172},
  doi          = {10.46586/TCHES.V2021.I4.149-172},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/WoutersGP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/WoutersHGOGP20,
  author       = {Lennert Wouters and
                  Jan Van den Herrewegen and
                  Flavio D. Garcia and
                  David F. Oswald and
                  Benedikt Gierlichs and
                  Bart Preneel},
  title        = {Dismantling DST80-based Immobiliser Systems},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {2},
  pages        = {99--127},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i2.99-127},
  doi          = {10.13154/TCHES.V2020.I2.99-127},
  timestamp    = {Thu, 07 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/WoutersHGOGP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/WoutersAGP20,
  author       = {Lennert Wouters and
                  Victor Arribas and
                  Benedikt Gierlichs and
                  Bart Preneel},
  title        = {Revisiting a Methodology for Efficient {CNN} Architectures in Profiling
                  Attacks},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {3},
  pages        = {147--168},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i3.147-168},
  doi          = {10.13154/TCHES.V2020.I3.147-168},
  timestamp    = {Thu, 02 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/WoutersAGP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/WoutersMAGP19,
  author       = {Lennert Wouters and
                  Eduard Marin and
                  Tomer Ashur and
                  Benedikt Gierlichs and
                  Bart Preneel},
  title        = {Fast, Furious and Insecure: Passive Keyless Entry and Start Systems
                  in Modern Supercars},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {3},
  pages        = {66--85},
  year         = {2019},
  url          = {https://doi.org/10.13154/tches.v2019.i3.66-85},
  doi          = {10.13154/TCHES.V2019.I3.66-85},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/WoutersMAGP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/BeckersKHFBGV19,
  author       = {Arthur Beckers and
                  Masahiro Kinugawa and
                  Yu{-}ichi Hayashi and
                  Daisuke Fujimoto and
                  Josep Balasch and
                  Benedikt Gierlichs and
                  Ingrid Verbauwhede},
  editor       = {Sonia Bela{\"{\i}}d and
                  Tim G{\"{u}}neysu},
  title        = {Design Considerations for {EM} Pulse Fault Injection},
  booktitle    = {Smart Card Research and Advanced Applications - 18th International
                  Conference, {CARDIS} 2019, Prague, Czech Republic, November 11-13,
                  2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11833},
  pages        = {176--192},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-42068-0\_11},
  doi          = {10.1007/978-3-030-42068-0\_11},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/BeckersKHFBGV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/KumarBBGV18,
  author       = {Dilip S. V. Kumar and
                  Arthur Beckers and
                  Josep Balasch and
                  Benedikt Gierlichs and
                  Ingrid Verbauwhede},
  editor       = {Beg{\"{u}}l Bilgin and
                  Jean{-}Bernard Fischer},
  title        = {An In-Depth and Black-Box Characterization of the Effects of Laser
                  Pulses on ATmega328P},
  booktitle    = {Smart Card Research and Advanced Applications, 17th International
                  Conference, {CARDIS} 2018, Montpellier, France, November 12-14, 2018,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11389},
  pages        = {156--170},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-15462-2\_11},
  doi          = {10.1007/978-3-030-15462-2\_11},
  timestamp    = {Sat, 30 Sep 2023 09:35:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/KumarBBGV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cosade/2018,
  editor       = {Junfeng Fan and
                  Benedikt Gierlichs},
  title        = {Constructive Side-Channel Analysis and Secure Design - 9th International
                  Workshop, {COSADE} 2018, Singapore, April 23-24, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10815},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-89641-0},
  doi          = {10.1007/978-3-319-89641-0},
  isbn         = {978-3-319-89640-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/GierlichsP17,
  author       = {Benedikt Gierlichs and
                  Axel Y. Poschmann},
  title        = {Introduction to the {CHES} 2016 special issue},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {2},
  pages        = {97--98},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-017-0158-5},
  doi          = {10.1007/S13389-017-0158-5},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/GierlichsP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BalaschFGPS17,
  author       = {Josep Balasch and
                  Sebastian Faust and
                  Benedikt Gierlichs and
                  Clara Paglialonga and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Tsuyoshi Takagi and
                  Thomas Peyrin},
  title        = {Consolidating Inner Product Masking},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Hong Kong, China, December 3-7, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10624},
  pages        = {724--754},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70694-8\_25},
  doi          = {10.1007/978-3-319-70694-8\_25},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BalaschFGPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/ReparazG17,
  author       = {Oscar Reparaz and
                  Benedikt Gierlichs},
  editor       = {Thomas Eisenbarth and
                  Yannick Teglia},
  title        = {A First-Order Chosen-Plaintext {DPA} Attack on the Third Round of
                  {DES}},
  booktitle    = {Smart Card Research and Advanced Applications - 16th International
                  Conference, {CARDIS} 2017, Lugano, Switzerland, November 13-15, 2017,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10728},
  pages        = {42--50},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-75208-2\_3},
  doi          = {10.1007/978-3-319-75208-2\_3},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/ReparazG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/BeckersGV17,
  author       = {Arthur Beckers and
                  Benedikt Gierlichs and
                  Ingrid Verbauwhede},
  editor       = {Thomas Eisenbarth and
                  Yannick Teglia},
  title        = {Fault Analysis of the ChaCha and Salsa Families of Stream Ciphers},
  booktitle    = {Smart Card Research and Advanced Applications - 16th International
                  Conference, {CARDIS} 2017, Lugano, Switzerland, November 13-15, 2017,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10728},
  pages        = {196--212},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-75208-2\_12},
  doi          = {10.1007/978-3-319-75208-2\_12},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/BeckersGV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/ReparazGV17,
  author       = {Oscar Reparaz and
                  Benedikt Gierlichs and
                  Ingrid Verbauwhede},
  editor       = {Wieland Fischer and
                  Naofumi Homma},
  title        = {Fast Leakage Assessment},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International
                  Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10529},
  pages        = {387--399},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66787-4\_19},
  doi          = {10.1007/978-3-319-66787-4\_19},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/ReparazGV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/CnuddeBGNNR17,
  author       = {Thomas De Cnudde and
                  Beg{\"{u}}l Bilgin and
                  Benedikt Gierlichs and
                  Ventzislav Nikov and
                  Svetla Nikova and
                  Vincent Rijmen},
  editor       = {Sylvain Guilley},
  title        = {Does Coupling Affect the Security of Masked Implementations?},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 8th International
                  Workshop, {COSADE} 2017, Paris, France, April 13-14, 2017, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10348},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64647-3\_1},
  doi          = {10.1007/978-3-319-64647-3\_1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/CnuddeBGNNR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ReparazGV17,
  author       = {Oscar Reparaz and
                  Benedikt Gierlichs and
                  Ingrid Verbauwhede},
  title        = {Fast Leakage Assessment},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {624},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/624},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ReparazGV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BalaschFGPS17,
  author       = {Josep Balasch and
                  Sebastian Faust and
                  Benedikt Gierlichs and
                  Clara Paglialonga and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Consolidating Inner Product Masking},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1047},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1047},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BalaschFGPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ReparazG17,
  author       = {Oscar Reparaz and
                  Benedikt Gierlichs},
  title        = {A first-order chosen-plaintext {DPA} attack on the third round of
                  {DES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1257},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1257},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ReparazG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/BeckersBGV16,
  author       = {Arthur Beckers and
                  Josep Balasch and
                  Benedikt Gierlichs and
                  Ingrid Verbauwhede},
  editor       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Elisabeth Oswald},
  title        = {Design and Implementation of a Waveform-Matching Based Triggering
                  System},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 7th International
                  Workshop, {COSADE} 2016, Graz, Austria, April 14-15, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9689},
  pages        = {184--198},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-43283-0\_11},
  doi          = {10.1007/978-3-319-43283-0\_11},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/BeckersBGV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2016,
  editor       = {Benedikt Gierlichs and
                  Axel Y. Poschmann},
  title        = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International
                  Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9813},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53140-2},
  doi          = {10.1007/978-3-662-53140-2},
  isbn         = {978-3-662-53139-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CnuddeBGNNR16,
  author       = {Thomas De Cnudde and
                  Beg{\"{u}}l Bilgin and
                  Benedikt Gierlichs and
                  Ventzislav Nikov and
                  Svetla Nikova and
                  Vincent Rijmen},
  title        = {Does Coupling Affect the Security of Masked Implementations?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1080},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1080},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CnuddeBGNNR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcad/BilginGNNR15,
  author       = {Beg{\"{u}}l Bilgin and
                  Benedikt Gierlichs and
                  Svetla Nikova and
                  Ventzislav Nikov and
                  Vincent Rijmen},
  title        = {Trade-Offs for Threshold Implementations Illustrated on {AES}},
  journal      = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.},
  volume       = {34},
  number       = {7},
  pages        = {1188--1200},
  year         = {2015},
  url          = {https://doi.org/10.1109/TCAD.2015.2419623},
  doi          = {10.1109/TCAD.2015.2419623},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcad/BilginGNNR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BalaschGRV15,
  author       = {Josep Balasch and
                  Benedikt Gierlichs and
                  Oscar Reparaz and
                  Ingrid Verbauwhede},
  editor       = {Tim G{\"{u}}neysu and
                  Helena Handschuh},
  title        = {DPA, Bitslicing and Masking at 1 GHz},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International
                  Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9293},
  pages        = {599--619},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48324-4\_30},
  doi          = {10.1007/978-3-662-48324-4\_30},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/BalaschGRV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ReparazBNGV15,
  author       = {Oscar Reparaz and
                  Beg{\"{u}}l Bilgin and
                  Svetla Nikova and
                  Benedikt Gierlichs and
                  Ingrid Verbauwhede},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Consolidating Masking Schemes},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {764--783},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_37},
  doi          = {10.1007/978-3-662-47989-6\_37},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ReparazBNGV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BalaschFG15,
  author       = {Josep Balasch and
                  Sebastian Faust and
                  Benedikt Gierlichs},
  editor       = {Elisabeth Oswald and
                  Marc Fischlin},
  title        = {Inner Product Masking Revisited},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9056},
  pages        = {486--510},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46800-5\_19},
  doi          = {10.1007/978-3-662-46800-5\_19},
  timestamp    = {Thu, 14 Oct 2021 09:58:16 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BalaschFG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BalaschFG15,
  author       = {Josep Balasch and
                  Sebastian Faust and
                  Benedikt Gierlichs},
  title        = {Inner Product Masking Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {105},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/105},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BalaschFG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ReparazBNGV15,
  author       = {Oscar Reparaz and
                  Beg{\"{u}}l Bilgin and
                  Svetla Nikova and
                  Benedikt Gierlichs and
                  Ingrid Verbauwhede},
  title        = {Consolidating masking schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {719},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/719},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ReparazBNGV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BalaschGRV15,
  author       = {Josep Balasch and
                  Benedikt Gierlichs and
                  Oscar Reparaz and
                  Ingrid Verbauwhede},
  title        = {DPA, Bitslicing and Masking at 1 GHz},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {727},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/727},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BalaschGRV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/BilginGNNR14,
  author       = {Beg{\"{u}}l Bilgin and
                  Benedikt Gierlichs and
                  Svetla Nikova and
                  Ventzislav Nikov and
                  Vincent Rijmen},
  editor       = {David Pointcheval and
                  Damien Vergnaud},
  title        = {A More Efficient {AES} Threshold Implementation},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2014 - 7th International Conference
                  on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8469},
  pages        = {267--284},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06734-6\_17},
  doi          = {10.1007/978-3-319-06734-6\_17},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/BilginGNNR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BilginGNNR14,
  author       = {Beg{\"{u}}l Bilgin and
                  Benedikt Gierlichs and
                  Svetla Nikova and
                  Ventzislav Nikov and
                  Vincent Rijmen},
  editor       = {Palash Sarkar and
                  Tetsu Iwata},
  title        = {Higher-Order Threshold Implementations},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8874},
  pages        = {326--343},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45608-8\_18},
  doi          = {10.1007/978-3-662-45608-8\_18},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BilginGNNR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/BalaschGGRS14,
  author       = {Josep Balasch and
                  Benedikt Gierlichs and
                  Vincent Grosso and
                  Oscar Reparaz and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Marc Joye and
                  Amir Moradi},
  title        = {On the Cost of Lazy Engineering for Masked Software Implementations},
  booktitle    = {Smart Card Research and Advanced Applications - 13th International
                  Conference, {CARDIS} 2014, Paris, France, November 5-7, 2014. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8968},
  pages        = {64--81},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-16763-3\_5},
  doi          = {10.1007/978-3-319-16763-3\_5},
  timestamp    = {Thu, 14 Oct 2021 10:29:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/BalaschGGRS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/ReparazGV14,
  author       = {Oscar Reparaz and
                  Benedikt Gierlichs and
                  Ingrid Verbauwhede},
  editor       = {Emmanuel Prouff},
  title        = {A Note on the Use of Margins to Compare Distinguishers},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 5th International
                  Workshop, {COSADE} 2014, Paris, France, April 13-15, 2014. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8622},
  pages        = {1--8},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10175-0\_1},
  doi          = {10.1007/978-3-319-10175-0\_1},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/ReparazGV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/ReparazGV14a,
  author       = {Oscar Reparaz and
                  Benedikt Gierlichs and
                  Ingrid Verbauwhede},
  editor       = {Emmanuel Prouff},
  title        = {Generic {DPA} Attacks: Curse or Blessing?},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 5th International
                  Workshop, {COSADE} 2014, Paris, France, April 13-15, 2014. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8622},
  pages        = {98--111},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10175-0\_8},
  doi          = {10.1007/978-3-319-10175-0\_8},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/ReparazGV14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BalaschGGRS14,
  author       = {Josep Balasch and
                  Benedikt Gierlichs and
                  Vincent Grosso and
                  Oscar Reparaz and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {On the Cost of Lazy Engineering for Masked Software Implementations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {413},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/413},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BalaschGGRS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TiranRRAGCDM14a,
  author       = {S{\'{e}}bastien Tiran and
                  Guillaume Reymond and
                  Jean{-}Baptiste Rigaud and
                  Driss Aboulkassimi and
                  Benedikt Gierlichs and
                  Mathieu Carbone and
                  Gilles R. Ducharme and
                  Philippe Maurine},
  title        = {Analysis Of Variance and {CPA} in {SCA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {707},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/707},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TiranRRAGCDM14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BilginGNNR14,
  author       = {Beg{\"{u}}l Bilgin and
                  Benedikt Gierlichs and
                  Svetla Nikova and
                  Ventzislav Nikov and
                  Vincent Rijmen},
  title        = {Higher-Order Threshold Implementations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {751},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/751},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BilginGNNR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/sps/KnezevicBMFGLMV13,
  author       = {Miroslav Knezevic and
                  Lejla Batina and
                  Elke De Mulder and
                  Junfeng Fan and
                  Benedikt Gierlichs and
                  Yong Ki Lee and
                  Roel Maes and
                  Ingrid Verbauwhede},
  editor       = {Shuvra S. Bhattacharyya and
                  Ed F. Deprettere and
                  Rainer Leupers and
                  Jarmo Takala},
  title        = {Signal Processing for Cryptography and Security Applications},
  booktitle    = {Handbook of Signal Processing Systems},
  pages        = {223--241},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-1-4614-6859-2\_7},
  doi          = {10.1007/978-1-4614-6859-2\_7},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/reference/sps/KnezevicBMFGLMV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/space/2013,
  editor       = {Benedikt Gierlichs and
                  Sylvain Guilley and
                  Debdeep Mukhopadhyay},
  title        = {Security, Privacy, and Applied Cryptography Engineering - Third International
                  Conference, {SPACE} 2013, Kharagpur, India, October 19-23, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8204},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41224-0},
  doi          = {10.1007/978-3-642-41224-0},
  isbn         = {978-3-642-41223-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/space/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BilginGNNR13,
  author       = {Beg{\"{u}}l Bilgin and
                  Benedikt Gierlichs and
                  Svetla Nikova and
                  Ventzislav Nikov and
                  Vincent Rijmen},
  title        = {A More Efficient {AES} Threshold Implementation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {697},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/697},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BilginGNNR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BalaschFGV12,
  author       = {Josep Balasch and
                  Sebastian Faust and
                  Benedikt Gierlichs and
                  Ingrid Verbauwhede},
  editor       = {Xiaoyun Wang and
                  Kazue Sako},
  title        = {Theory and Practice of a Leakage Resilient Masking Scheme},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Beijing, China, December 2-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7658},
  pages        = {758--775},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34961-4\_45},
  doi          = {10.1007/978-3-642-34961-4\_45},
  timestamp    = {Mon, 25 Nov 2019 15:32:14 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BalaschFGV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/ReparazGV12,
  author       = {Oscar Reparaz and
                  Benedikt Gierlichs and
                  Ingrid Verbauwhede},
  editor       = {Emmanuel Prouff and
                  Patrick Schaumont},
  title        = {Selecting Time Samples for Multivariate {DPA} Attacks},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
                  Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7428},
  pages        = {155--174},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33027-8\_10},
  doi          = {10.1007/978-3-642-33027-8\_10},
  timestamp    = {Mon, 15 Jun 2020 17:09:16 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/ReparazGV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/BalaschGVBV12,
  author       = {Josep Balasch and
                  Benedikt Gierlichs and
                  Roel Verdult and
                  Lejla Batina and
                  Ingrid Verbauwhede},
  editor       = {Orr Dunkelman},
  title        = {Power Analysis of Atmel CryptoMemory - Recovering Keys from Secure
                  EEPROMs},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2012 - The Cryptographers' Track at
                  the {RSA} Conference 2012, San Francisco, CA, USA, February 27 - March
                  2, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7178},
  pages        = {19--34},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-27954-6\_2},
  doi          = {10.1007/978-3-642-27954-6\_2},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/BalaschGVBV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincrypt/GierlichsST12,
  author       = {Benedikt Gierlichs and
                  J{\"{o}}rn{-}Marc Schmidt and
                  Michael Tunstall},
  editor       = {Alejandro Hevia and
                  Gregory Neven},
  title        = {Infective Computation and Dummy Rounds: Fault Protection for Block
                  Ciphers without Check-before-Output},
  booktitle    = {Progress in Cryptology - {LATINCRYPT} 2012 - 2nd International Conference
                  on Cryptology and Information Security in Latin America, Santiago,
                  Chile, October 7-10, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7533},
  pages        = {305--321},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33481-8\_17},
  doi          = {10.1007/978-3-642-33481-8\_17},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/latincrypt/GierlichsST12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fdtc/2012,
  editor       = {Guido Bertoni and
                  Benedikt Gierlichs},
  title        = {2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, Leuven,
                  Belgium, September 9, 2012},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6305022/proceeding},
  isbn         = {978-1-4673-2900-2},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fdtc/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GierlichsST12,
  author       = {Benedikt Gierlichs and
                  J{\"{o}}rn{-}Marc Schmidt and
                  Michael Tunstall},
  title        = {Infective Computation and Dummy Rounds: Fault Protection for Block
                  Ciphers without Check-before-Output},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {678},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/678},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GierlichsST12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/HospodarGMVV11,
  author       = {Gabriel Hospodar and
                  Benedikt Gierlichs and
                  Elke De Mulder and
                  Ingrid Verbauwhede and
                  Joos Vandewalle},
  title        = {Machine learning in side-channel analysis: a first study},
  journal      = {J. Cryptogr. Eng.},
  volume       = {1},
  number       = {4},
  pages        = {293--302},
  year         = {2011},
  url          = {https://doi.org/10.1007/s13389-011-0023-x},
  doi          = {10.1007/S13389-011-0023-X},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/HospodarGMVV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BatinaGPRSV11,
  author       = {Lejla Batina and
                  Benedikt Gierlichs and
                  Emmanuel Prouff and
                  Matthieu Rivain and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Nicolas Veyrat{-}Charvillon},
  title        = {Mutual Information Analysis: a Comprehensive Study},
  journal      = {J. Cryptol.},
  volume       = {24},
  number       = {2},
  pages        = {269--291},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00145-010-9084-8},
  doi          = {10.1007/S00145-010-9084-8},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BatinaGPRSV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/FanGV11,
  author       = {Junfeng Fan and
                  Benedikt Gierlichs and
                  Frederik Vercauteren},
  editor       = {Bart Preneel and
                  Tsuyoshi Takagi},
  title        = {To Infinity and Beyond: Combined Attack on {ECC} Using Points of Low
                  Order},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International
                  Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6917},
  pages        = {143--159},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23951-9\_10},
  doi          = {10.1007/978-3-642-23951-9\_10},
  timestamp    = {Sat, 19 Oct 2019 20:26:25 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/FanGV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/BalaschGV11,
  author       = {Josep Balasch and
                  Benedikt Gierlichs and
                  Ingrid Verbauwhede},
  editor       = {Luca Breveglieri and
                  Sylvain Guilley and
                  Israel Koren and
                  David Naccache and
                  Junko Takahashi},
  title        = {An In-depth and Black-box Characterization of the Effects of Clock
                  Glitches on 8-bit MCUs},
  booktitle    = {2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC}
                  2011, Tokyo, Japan, September 29, 2011},
  pages        = {105--114},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/FDTC.2011.9},
  doi          = {10.1109/FDTC.2011.9},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fdtc/BalaschGV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/StandaertVOGMKM10,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Nicolas Veyrat{-}Charvillon and
                  Elisabeth Oswald and
                  Benedikt Gierlichs and
                  Marcel Medwed and
                  Markus Kasper and
                  Stefan Mangard},
  editor       = {Masayuki Abe},
  title        = {The World Is Not Enough: Another Look on Second-Order {DPA}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 5-9, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6477},
  pages        = {112--129},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17373-8\_7},
  doi          = {10.1007/978-3-642-17373-8\_7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/StandaertVOGMKM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/GierlichsBPV10,
  author       = {Benedikt Gierlichs and
                  Lejla Batina and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  editor       = {Josef Pieprzyk},
  title        = {Revisiting Higher-Order {DPA} Attacks:},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2010, The Cryptographers' Track at
                  the {RSA} Conference 2010, San Francisco, CA, USA, March 1-5, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5985},
  pages        = {221--234},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11925-5\_16},
  doi          = {10.1007/978-3-642-11925-5\_16},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/GierlichsBPV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/daglib/p/KnezevicBMFGLMV10,
  author       = {Miroslav Knezevic and
                  Lejla Batina and
                  Elke De Mulder and
                  Junfeng Fan and
                  Benedikt Gierlichs and
                  Yong Ki Lee and
                  Roel Maes and
                  Ingrid Verbauwhede},
  editor       = {Shuvra S. Bhattacharyya and
                  Ed F. Deprettere and
                  Rainer Leupers and
                  Jarmo Takala},
  title        = {Signal Processing for Cryptography and Security Applications},
  booktitle    = {Handbook of Signal Processing Systems},
  pages        = {161--177},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-6345-1\_7},
  doi          = {10.1007/978-1-4419-6345-1\_7},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/daglib/p/KnezevicBMFGLMV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StandaertVOGMKM10,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Nicolas Veyrat{-}Charvillon and
                  Elisabeth Oswald and
                  Benedikt Gierlichs and
                  Marcel Medwed and
                  Markus Kasper and
                  Stefan Mangard},
  title        = {The World is Not Enough: Another Look on Second-Order {DPA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {180},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/180},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/StandaertVOGMKM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BatinaGL09,
  author       = {Lejla Batina and
                  Benedikt Gierlichs and
                  Kerstin Lemke{-}Rust},
  editor       = {Christophe Clavier and
                  Kris Gaj},
  title        = {Differential Cluster Analysis},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International
                  Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5747},
  pages        = {112--127},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04138-9\_9},
  doi          = {10.1007/978-3-642-04138-9\_9},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BatinaGL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecctd/GierlichsMPV09,
  author       = {Benedikt Gierlichs and
                  Elke De Mulder and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  title        = {Empirical comparison of side channel analysis distinguishers on {DES}
                  in hardware},
  booktitle    = {19th European Conference on Circuit Theory and Design, {ECCTD} 2009,
                  Antalya, Turkey, August 23-27, 2009},
  pages        = {391--394},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ECCTD.2009.5275003},
  doi          = {10.1109/ECCTD.2009.5275003},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecctd/GierlichsMPV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/SterckxGPV09,
  author       = {Micha{\"{e}}l Sterckx and
                  Benedikt Gierlichs and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  title        = {Efficient implementation of anonymous credentials on Java Card smart
                  cards},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {106--110},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386474},
  doi          = {10.1109/WIFS.2009.5386474},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/SterckxGPV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/MulderGPV09,
  author       = {Elke De Mulder and
                  Benedikt Gierlichs and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  title        = {Practical {DPA} attacks on {MDPL}},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {191--195},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386455},
  doi          = {10.1109/WIFS.2009.5386455},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/MulderGPV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GierlichsBPV09,
  author       = {Benedikt Gierlichs and
                  Lejla Batina and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  title        = {Revisiting Higher-Order {DPA} Attacks: Multivariate Mutual Information
                  Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {228},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/228},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GierlichsBPV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MulderGPV09,
  author       = {Elke De Mulder and
                  Benedikt Gierlichs and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  title        = {Practical {DPA} Attacks on {MDPL}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {231},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/231},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MulderGPV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/MentensGV08,
  author       = {Nele Mentens and
                  Benedikt Gierlichs and
                  Ingrid Verbauwhede},
  editor       = {Elisabeth Oswald and
                  Pankaj Rohatgi},
  title        = {Power and Fault Analysis Resistance in Hardware through Dynamic Reconfiguration},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International
                  Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5154},
  pages        = {346--362},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85053-3\_22},
  doi          = {10.1007/978-3-540-85053-3\_22},
  timestamp    = {Thu, 14 Oct 2021 10:28:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/MentensGV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GierlichsBTP08,
  author       = {Benedikt Gierlichs and
                  Lejla Batina and
                  Pim Tuyls and
                  Bart Preneel},
  editor       = {Elisabeth Oswald and
                  Pankaj Rohatgi},
  title        = {Mutual Information Analysis},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International
                  Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5154},
  pages        = {426--442},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85053-3\_27},
  doi          = {10.1007/978-3-540-85053-3\_27},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GierlichsBTP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/ClavierGV08,
  author       = {Christophe Clavier and
                  Benedikt Gierlichs and
                  Ingrid Verbauwhede},
  editor       = {Tal Malkin},
  title        = {Fault Analysis Study of {IDEA}},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2008, The Cryptographers' Track at
                  the {RSA} Conference 2008, San Francisco, CA, USA, April 8-11, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4964},
  pages        = {274--287},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79263-5\_17},
  doi          = {10.1007/978-3-540-79263-5\_17},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/ClavierGV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/StandaertGV08,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Benedikt Gierlichs and
                  Ingrid Verbauwhede},
  editor       = {Pil Joong Lee and
                  Jung Hee Cheon},
  title        = {Partition vs. Comparison Side-Channel Distinguishers: An Empirical
                  Evaluation of Statistical Tests for Univariate Side-Channel Attacks
                  against Two Unprotected {CMOS} Devices},
  booktitle    = {Information Security and Cryptology - {ICISC} 2008, 11th International
                  Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5461},
  pages        = {253--267},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-00730-9\_16},
  doi          = {10.1007/978-3-642-00730-9\_16},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/StandaertGV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/BatinaGL08,
  author       = {Lejla Batina and
                  Benedikt Gierlichs and
                  Kerstin Lemke{-}Rust},
  editor       = {Tzong{-}Chen Wu and
                  Chin{-}Laung Lei and
                  Vincent Rijmen and
                  Der{-}Tsai Lee},
  title        = {Comparative Evaluation of Rank Correlation Based {DPA} on an {AES}
                  Prototype Chip},
  booktitle    = {Information Security, 11th International Conference, {ISC} 2008, Taipei,
                  Taiwan, September 15-18, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5222},
  pages        = {341--354},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85886-7\_24},
  doi          = {10.1007/978-3-540-85886-7\_24},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/BatinaGL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/TroncosoGPV08,
  author       = {Carmela Troncoso and
                  Benedikt Gierlichs and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  editor       = {Nikita Borisov and
                  Ian Goldberg},
  title        = {Perfect Matching Disclosure Attacks},
  booktitle    = {Privacy Enhancing Technologies, 8th International Symposium, {PETS}
                  2008, Leuven, Belgium, July 23-25, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5134},
  pages        = {2--23},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70630-4\_2},
  doi          = {10.1007/978-3-540-70630-4\_2},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/TroncosoGPV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/GierlichsTDPV08,
  author       = {Benedikt Gierlichs and
                  Carmela Troncoso and
                  Claudia D{\'{\i}}az and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  editor       = {Vijay Atluri and
                  Marianne Winslett},
  title        = {Revisiting a combinatorial approach toward measuring anonymity},
  booktitle    = {Proceedings of the 2008 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2008, Alexandria, VA, USA, October 27, 2008},
  pages        = {111--116},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456403.1456422},
  doi          = {10.1145/1456403.1456422},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wpes/GierlichsTDPV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Gierlichs07,
  author       = {Benedikt Gierlichs},
  editor       = {Pascal Paillier and
                  Ingrid Verbauwhede},
  title        = {DPA-Resistance Without Routing Constraints?},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International
                  Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4727},
  pages        = {107--120},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74735-2\_8},
  doi          = {10.1007/978-3-540-74735-2\_8},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Gierlichs07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GierlichsBT07,
  author       = {Benedikt Gierlichs and
                  Lejla Batina and
                  Pim Tuyls},
  title        = {Mutual Information Analysis - {A} Universal Differential Side-Channel
                  Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {198},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/198},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GierlichsBT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GierlichsLP06,
  author       = {Benedikt Gierlichs and
                  Kerstin Lemke{-}Rust and
                  Christof Paar},
  editor       = {Louis Goubin and
                  Mitsuru Matsui},
  title        = {Templates vs. Stochastic Methods},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
                  Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4249},
  pages        = {15--29},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11894063\_2},
  doi          = {10.1007/11894063\_2},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GierlichsLP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics