Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Benedikt Gierlichs
@inproceedings{DBLP:conf/cardis/SluysWGV23, author = {pcy Sluys and Lennert Wouters and Benedikt Gierlichs and Ingrid Verbauwhede}, editor = {Shivam Bhasin and Thomas Roche}, title = {An In-Depth Security Evaluation of the Nintendo DSi Gaming Console}, booktitle = {Smart Card Research and Advanced Applications - 22nd International Conference, {CARDIS} 2023, Amsterdam, The Netherlands, November 14-16, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14530}, pages = {23--42}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-54409-5\_2}, doi = {10.1007/978-3-031-54409-5\_2}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cardis/SluysWGV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/KumarBGV23, author = {Dilip S. V. Kumar and Josep Balasch and Benedikt Gierlichs and Ingrid Verbauwhede}, title = {Low-Cost First-Order Secure Boolean Masking in Glitchy Hardware}, booktitle = {Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2023, Antwerp, Belgium, April 17-19, 2023}, pages = {1--2}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.23919/DATE56975.2023.10136920}, doi = {10.23919/DATE56975.2023.10136920}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/date/KumarBGV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cf/BeckersUVVWDDGM22, author = {Arthur Beckers and Roel Uytterhoeven and Thomas Vandenabeele and Jo Vliegen and Lennert Wouters and Joan Daemen and Wim Dehaene and Benedikt Gierlichs and Nele Mentens}, editor = {Luca Sterpone and Andrea Bartolini and Anastasiia Butko}, title = {Energy and side-channel security evaluation of near-threshold cryptographic circuits in 28nm {FD-SOI} technology}, booktitle = {{CF} '22: 19th {ACM} International Conference on Computing Frontiers, Turin, Italy, May 17 - 22, 2022}, pages = {258--262}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3528416.3530992}, doi = {10.1145/3528416.3530992}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cf/BeckersUVVWDDGM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/WoutersGP22, author = {Lennert Wouters and Benedikt Gierlichs and Bart Preneel}, editor = {Josep Balasch and Colin O'Flynn}, title = {On the Susceptibility of Texas Instruments SimpleLink Platform Microcontrollers to Non-invasive Physical Attacks}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 13th International Workshop, {COSADE} 2022, Leuven, Belgium, April 11-12, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13211}, pages = {143--163}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-99766-3\_7}, doi = {10.1007/978-3-030-99766-3\_7}, timestamp = {Fri, 01 Apr 2022 15:49:26 +0200}, biburl = {https://dblp.org/rec/conf/cosade/WoutersGP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/BeckersWGPV22, author = {Arthur Beckers and Lennert Wouters and Benedikt Gierlichs and Bart Preneel and Ingrid Verbauwhede}, editor = {Josep Balasch and Colin O'Flynn}, title = {Provable Secure Software Masking in the Real-World}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 13th International Workshop, {COSADE} 2022, Leuven, Belgium, April 11-12, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13211}, pages = {215--235}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-99766-3\_10}, doi = {10.1007/978-3-030-99766-3\_10}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cosade/BeckersWGPV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeckersWGPV22, author = {Arthur Beckers and Lennert Wouters and Benedikt Gierlichs and Bart Preneel and Ingrid Verbauwhede}, title = {Provable Secure Software Masking in the Real-World}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {327}, year = {2022}, url = {https://eprint.iacr.org/2022/327}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeckersWGPV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WoutersGP22, author = {Lennert Wouters and Benedikt Gierlichs and Bart Preneel}, title = {On the susceptibility of Texas Instruments SimpleLink platform microcontrollers to non-invasive physical attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {328}, year = {2022}, url = {https://eprint.iacr.org/2022/328}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WoutersGP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/WoutersGP21, author = {Lennert Wouters and Benedikt Gierlichs and Bart Preneel}, title = {My other car is your car: compromising the Tesla Model {X} keyless entry system}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {4}, pages = {149--172}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i4.149-172}, doi = {10.46586/TCHES.V2021.I4.149-172}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/WoutersGP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/WoutersHGOGP20, author = {Lennert Wouters and Jan Van den Herrewegen and Flavio D. Garcia and David F. Oswald and Benedikt Gierlichs and Bart Preneel}, title = {Dismantling DST80-based Immobiliser Systems}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {2}, pages = {99--127}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i2.99-127}, doi = {10.13154/TCHES.V2020.I2.99-127}, timestamp = {Thu, 07 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/WoutersHGOGP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/WoutersAGP20, author = {Lennert Wouters and Victor Arribas and Benedikt Gierlichs and Bart Preneel}, title = {Revisiting a Methodology for Efficient {CNN} Architectures in Profiling Attacks}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {3}, pages = {147--168}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i3.147-168}, doi = {10.13154/TCHES.V2020.I3.147-168}, timestamp = {Thu, 02 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/WoutersAGP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/WoutersMAGP19, author = {Lennert Wouters and Eduard Marin and Tomer Ashur and Benedikt Gierlichs and Bart Preneel}, title = {Fast, Furious and Insecure: Passive Keyless Entry and Start Systems in Modern Supercars}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {3}, pages = {66--85}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i3.66-85}, doi = {10.13154/TCHES.V2019.I3.66-85}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/WoutersMAGP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/BeckersKHFBGV19, author = {Arthur Beckers and Masahiro Kinugawa and Yu{-}ichi Hayashi and Daisuke Fujimoto and Josep Balasch and Benedikt Gierlichs and Ingrid Verbauwhede}, editor = {Sonia Bela{\"{\i}}d and Tim G{\"{u}}neysu}, title = {Design Considerations for {EM} Pulse Fault Injection}, booktitle = {Smart Card Research and Advanced Applications - 18th International Conference, {CARDIS} 2019, Prague, Czech Republic, November 11-13, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11833}, pages = {176--192}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-42068-0\_11}, doi = {10.1007/978-3-030-42068-0\_11}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/BeckersKHFBGV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/KumarBBGV18, author = {Dilip S. V. Kumar and Arthur Beckers and Josep Balasch and Benedikt Gierlichs and Ingrid Verbauwhede}, editor = {Beg{\"{u}}l Bilgin and Jean{-}Bernard Fischer}, title = {An In-Depth and Black-Box Characterization of the Effects of Laser Pulses on ATmega328P}, booktitle = {Smart Card Research and Advanced Applications, 17th International Conference, {CARDIS} 2018, Montpellier, France, November 12-14, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11389}, pages = {156--170}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-15462-2\_11}, doi = {10.1007/978-3-030-15462-2\_11}, timestamp = {Sat, 30 Sep 2023 09:35:52 +0200}, biburl = {https://dblp.org/rec/conf/cardis/KumarBBGV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cosade/2018, editor = {Junfeng Fan and Benedikt Gierlichs}, title = {Constructive Side-Channel Analysis and Secure Design - 9th International Workshop, {COSADE} 2018, Singapore, April 23-24, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10815}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-89641-0}, doi = {10.1007/978-3-319-89641-0}, isbn = {978-3-319-89640-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cosade/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/GierlichsP17, author = {Benedikt Gierlichs and Axel Y. Poschmann}, title = {Introduction to the {CHES} 2016 special issue}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {2}, pages = {97--98}, year = {2017}, url = {https://doi.org/10.1007/s13389-017-0158-5}, doi = {10.1007/S13389-017-0158-5}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/GierlichsP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BalaschFGPS17, author = {Josep Balasch and Sebastian Faust and Benedikt Gierlichs and Clara Paglialonga and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Tsuyoshi Takagi and Thomas Peyrin}, title = {Consolidating Inner Product Masking}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10624}, pages = {724--754}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70694-8\_25}, doi = {10.1007/978-3-319-70694-8\_25}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BalaschFGPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/ReparazG17, author = {Oscar Reparaz and Benedikt Gierlichs}, editor = {Thomas Eisenbarth and Yannick Teglia}, title = {A First-Order Chosen-Plaintext {DPA} Attack on the Third Round of {DES}}, booktitle = {Smart Card Research and Advanced Applications - 16th International Conference, {CARDIS} 2017, Lugano, Switzerland, November 13-15, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10728}, pages = {42--50}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-75208-2\_3}, doi = {10.1007/978-3-319-75208-2\_3}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cardis/ReparazG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/BeckersGV17, author = {Arthur Beckers and Benedikt Gierlichs and Ingrid Verbauwhede}, editor = {Thomas Eisenbarth and Yannick Teglia}, title = {Fault Analysis of the ChaCha and Salsa Families of Stream Ciphers}, booktitle = {Smart Card Research and Advanced Applications - 16th International Conference, {CARDIS} 2017, Lugano, Switzerland, November 13-15, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10728}, pages = {196--212}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-75208-2\_12}, doi = {10.1007/978-3-319-75208-2\_12}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/BeckersGV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/ReparazGV17, author = {Oscar Reparaz and Benedikt Gierlichs and Ingrid Verbauwhede}, editor = {Wieland Fischer and Naofumi Homma}, title = {Fast Leakage Assessment}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10529}, pages = {387--399}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66787-4\_19}, doi = {10.1007/978-3-319-66787-4\_19}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/ReparazGV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/CnuddeBGNNR17, author = {Thomas De Cnudde and Beg{\"{u}}l Bilgin and Benedikt Gierlichs and Ventzislav Nikov and Svetla Nikova and Vincent Rijmen}, editor = {Sylvain Guilley}, title = {Does Coupling Affect the Security of Masked Implementations?}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 8th International Workshop, {COSADE} 2017, Paris, France, April 13-14, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10348}, pages = {1--18}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64647-3\_1}, doi = {10.1007/978-3-319-64647-3\_1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cosade/CnuddeBGNNR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ReparazGV17, author = {Oscar Reparaz and Benedikt Gierlichs and Ingrid Verbauwhede}, title = {Fast Leakage Assessment}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {624}, year = {2017}, url = {http://eprint.iacr.org/2017/624}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ReparazGV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BalaschFGPS17, author = {Josep Balasch and Sebastian Faust and Benedikt Gierlichs and Clara Paglialonga and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Consolidating Inner Product Masking}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1047}, year = {2017}, url = {http://eprint.iacr.org/2017/1047}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BalaschFGPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ReparazG17, author = {Oscar Reparaz and Benedikt Gierlichs}, title = {A first-order chosen-plaintext {DPA} attack on the third round of {DES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1257}, year = {2017}, url = {http://eprint.iacr.org/2017/1257}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ReparazG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/BeckersBGV16, author = {Arthur Beckers and Josep Balasch and Benedikt Gierlichs and Ingrid Verbauwhede}, editor = {Fran{\c{c}}ois{-}Xavier Standaert and Elisabeth Oswald}, title = {Design and Implementation of a Waveform-Matching Based Triggering System}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 7th International Workshop, {COSADE} 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9689}, pages = {184--198}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-43283-0\_11}, doi = {10.1007/978-3-319-43283-0\_11}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cosade/BeckersBGV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ches/2016, editor = {Benedikt Gierlichs and Axel Y. Poschmann}, title = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9813}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53140-2}, doi = {10.1007/978-3-662-53140-2}, isbn = {978-3-662-53139-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CnuddeBGNNR16, author = {Thomas De Cnudde and Beg{\"{u}}l Bilgin and Benedikt Gierlichs and Ventzislav Nikov and Svetla Nikova and Vincent Rijmen}, title = {Does Coupling Affect the Security of Masked Implementations?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1080}, year = {2016}, url = {http://eprint.iacr.org/2016/1080}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CnuddeBGNNR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcad/BilginGNNR15, author = {Beg{\"{u}}l Bilgin and Benedikt Gierlichs and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen}, title = {Trade-Offs for Threshold Implementations Illustrated on {AES}}, journal = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.}, volume = {34}, number = {7}, pages = {1188--1200}, year = {2015}, url = {https://doi.org/10.1109/TCAD.2015.2419623}, doi = {10.1109/TCAD.2015.2419623}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcad/BilginGNNR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BalaschGRV15, author = {Josep Balasch and Benedikt Gierlichs and Oscar Reparaz and Ingrid Verbauwhede}, editor = {Tim G{\"{u}}neysu and Helena Handschuh}, title = {DPA, Bitslicing and Masking at 1 GHz}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9293}, pages = {599--619}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48324-4\_30}, doi = {10.1007/978-3-662-48324-4\_30}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/BalaschGRV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ReparazBNGV15, author = {Oscar Reparaz and Beg{\"{u}}l Bilgin and Svetla Nikova and Benedikt Gierlichs and Ingrid Verbauwhede}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Consolidating Masking Schemes}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {764--783}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_37}, doi = {10.1007/978-3-662-47989-6\_37}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ReparazBNGV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BalaschFG15, author = {Josep Balasch and Sebastian Faust and Benedikt Gierlichs}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Inner Product Masking Revisited}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9056}, pages = {486--510}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46800-5\_19}, doi = {10.1007/978-3-662-46800-5\_19}, timestamp = {Thu, 14 Oct 2021 09:58:16 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BalaschFG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BalaschFG15, author = {Josep Balasch and Sebastian Faust and Benedikt Gierlichs}, title = {Inner Product Masking Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {105}, year = {2015}, url = {http://eprint.iacr.org/2015/105}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BalaschFG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ReparazBNGV15, author = {Oscar Reparaz and Beg{\"{u}}l Bilgin and Svetla Nikova and Benedikt Gierlichs and Ingrid Verbauwhede}, title = {Consolidating masking schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {719}, year = {2015}, url = {http://eprint.iacr.org/2015/719}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ReparazBNGV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BalaschGRV15, author = {Josep Balasch and Benedikt Gierlichs and Oscar Reparaz and Ingrid Verbauwhede}, title = {DPA, Bitslicing and Masking at 1 GHz}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {727}, year = {2015}, url = {http://eprint.iacr.org/2015/727}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BalaschGRV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/BilginGNNR14, author = {Beg{\"{u}}l Bilgin and Benedikt Gierlichs and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen}, editor = {David Pointcheval and Damien Vergnaud}, title = {A More Efficient {AES} Threshold Implementation}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2014 - 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8469}, pages = {267--284}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06734-6\_17}, doi = {10.1007/978-3-319-06734-6\_17}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/BilginGNNR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BilginGNNR14, author = {Beg{\"{u}}l Bilgin and Benedikt Gierlichs and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen}, editor = {Palash Sarkar and Tetsu Iwata}, title = {Higher-Order Threshold Implementations}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8874}, pages = {326--343}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45608-8\_18}, doi = {10.1007/978-3-662-45608-8\_18}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BilginGNNR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/BalaschGGRS14, author = {Josep Balasch and Benedikt Gierlichs and Vincent Grosso and Oscar Reparaz and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Marc Joye and Amir Moradi}, title = {On the Cost of Lazy Engineering for Masked Software Implementations}, booktitle = {Smart Card Research and Advanced Applications - 13th International Conference, {CARDIS} 2014, Paris, France, November 5-7, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8968}, pages = {64--81}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-16763-3\_5}, doi = {10.1007/978-3-319-16763-3\_5}, timestamp = {Thu, 14 Oct 2021 10:29:55 +0200}, biburl = {https://dblp.org/rec/conf/cardis/BalaschGGRS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/ReparazGV14, author = {Oscar Reparaz and Benedikt Gierlichs and Ingrid Verbauwhede}, editor = {Emmanuel Prouff}, title = {A Note on the Use of Margins to Compare Distinguishers}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 5th International Workshop, {COSADE} 2014, Paris, France, April 13-15, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8622}, pages = {1--8}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10175-0\_1}, doi = {10.1007/978-3-319-10175-0\_1}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cosade/ReparazGV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/ReparazGV14a, author = {Oscar Reparaz and Benedikt Gierlichs and Ingrid Verbauwhede}, editor = {Emmanuel Prouff}, title = {Generic {DPA} Attacks: Curse or Blessing?}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 5th International Workshop, {COSADE} 2014, Paris, France, April 13-15, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8622}, pages = {98--111}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10175-0\_8}, doi = {10.1007/978-3-319-10175-0\_8}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cosade/ReparazGV14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BalaschGGRS14, author = {Josep Balasch and Benedikt Gierlichs and Vincent Grosso and Oscar Reparaz and Fran{\c{c}}ois{-}Xavier Standaert}, title = {On the Cost of Lazy Engineering for Masked Software Implementations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {413}, year = {2014}, url = {http://eprint.iacr.org/2014/413}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BalaschGGRS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TiranRRAGCDM14a, author = {S{\'{e}}bastien Tiran and Guillaume Reymond and Jean{-}Baptiste Rigaud and Driss Aboulkassimi and Benedikt Gierlichs and Mathieu Carbone and Gilles R. Ducharme and Philippe Maurine}, title = {Analysis Of Variance and {CPA} in {SCA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {707}, year = {2014}, url = {http://eprint.iacr.org/2014/707}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TiranRRAGCDM14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BilginGNNR14, author = {Beg{\"{u}}l Bilgin and Benedikt Gierlichs and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen}, title = {Higher-Order Threshold Implementations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {751}, year = {2014}, url = {http://eprint.iacr.org/2014/751}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BilginGNNR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/sps/KnezevicBMFGLMV13, author = {Miroslav Knezevic and Lejla Batina and Elke De Mulder and Junfeng Fan and Benedikt Gierlichs and Yong Ki Lee and Roel Maes and Ingrid Verbauwhede}, editor = {Shuvra S. Bhattacharyya and Ed F. Deprettere and Rainer Leupers and Jarmo Takala}, title = {Signal Processing for Cryptography and Security Applications}, booktitle = {Handbook of Signal Processing Systems}, pages = {223--241}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-1-4614-6859-2\_7}, doi = {10.1007/978-1-4614-6859-2\_7}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/reference/sps/KnezevicBMFGLMV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/space/2013, editor = {Benedikt Gierlichs and Sylvain Guilley and Debdeep Mukhopadhyay}, title = {Security, Privacy, and Applied Cryptography Engineering - Third International Conference, {SPACE} 2013, Kharagpur, India, October 19-23, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8204}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41224-0}, doi = {10.1007/978-3-642-41224-0}, isbn = {978-3-642-41223-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/space/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BilginGNNR13, author = {Beg{\"{u}}l Bilgin and Benedikt Gierlichs and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen}, title = {A More Efficient {AES} Threshold Implementation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {697}, year = {2013}, url = {http://eprint.iacr.org/2013/697}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BilginGNNR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BalaschFGV12, author = {Josep Balasch and Sebastian Faust and Benedikt Gierlichs and Ingrid Verbauwhede}, editor = {Xiaoyun Wang and Kazue Sako}, title = {Theory and Practice of a Leakage Resilient Masking Scheme}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7658}, pages = {758--775}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34961-4\_45}, doi = {10.1007/978-3-642-34961-4\_45}, timestamp = {Mon, 25 Nov 2019 15:32:14 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/BalaschFGV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/ReparazGV12, author = {Oscar Reparaz and Benedikt Gierlichs and Ingrid Verbauwhede}, editor = {Emmanuel Prouff and Patrick Schaumont}, title = {Selecting Time Samples for Multivariate {DPA} Attacks}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7428}, pages = {155--174}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33027-8\_10}, doi = {10.1007/978-3-642-33027-8\_10}, timestamp = {Mon, 15 Jun 2020 17:09:16 +0200}, biburl = {https://dblp.org/rec/conf/ches/ReparazGV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/BalaschGVBV12, author = {Josep Balasch and Benedikt Gierlichs and Roel Verdult and Lejla Batina and Ingrid Verbauwhede}, editor = {Orr Dunkelman}, title = {Power Analysis of Atmel CryptoMemory - Recovering Keys from Secure EEPROMs}, booktitle = {Topics in Cryptology - {CT-RSA} 2012 - The Cryptographers' Track at the {RSA} Conference 2012, San Francisco, CA, USA, February 27 - March 2, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7178}, pages = {19--34}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-27954-6\_2}, doi = {10.1007/978-3-642-27954-6\_2}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/BalaschGVBV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latincrypt/GierlichsST12, author = {Benedikt Gierlichs and J{\"{o}}rn{-}Marc Schmidt and Michael Tunstall}, editor = {Alejandro Hevia and Gregory Neven}, title = {Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output}, booktitle = {Progress in Cryptology - {LATINCRYPT} 2012 - 2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7533}, pages = {305--321}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33481-8\_17}, doi = {10.1007/978-3-642-33481-8\_17}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/latincrypt/GierlichsST12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fdtc/2012, editor = {Guido Bertoni and Benedikt Gierlichs}, title = {2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, Leuven, Belgium, September 9, 2012}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://ieeexplore.ieee.org/xpl/conhome/6305022/proceeding}, isbn = {978-1-4673-2900-2}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fdtc/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GierlichsST12, author = {Benedikt Gierlichs and J{\"{o}}rn{-}Marc Schmidt and Michael Tunstall}, title = {Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {678}, year = {2012}, url = {http://eprint.iacr.org/2012/678}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GierlichsST12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/HospodarGMVV11, author = {Gabriel Hospodar and Benedikt Gierlichs and Elke De Mulder and Ingrid Verbauwhede and Joos Vandewalle}, title = {Machine learning in side-channel analysis: a first study}, journal = {J. Cryptogr. Eng.}, volume = {1}, number = {4}, pages = {293--302}, year = {2011}, url = {https://doi.org/10.1007/s13389-011-0023-x}, doi = {10.1007/S13389-011-0023-X}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/HospodarGMVV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BatinaGPRSV11, author = {Lejla Batina and Benedikt Gierlichs and Emmanuel Prouff and Matthieu Rivain and Fran{\c{c}}ois{-}Xavier Standaert and Nicolas Veyrat{-}Charvillon}, title = {Mutual Information Analysis: a Comprehensive Study}, journal = {J. Cryptol.}, volume = {24}, number = {2}, pages = {269--291}, year = {2011}, url = {https://doi.org/10.1007/s00145-010-9084-8}, doi = {10.1007/S00145-010-9084-8}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BatinaGPRSV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/FanGV11, author = {Junfeng Fan and Benedikt Gierlichs and Frederik Vercauteren}, editor = {Bart Preneel and Tsuyoshi Takagi}, title = {To Infinity and Beyond: Combined Attack on {ECC} Using Points of Low Order}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6917}, pages = {143--159}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23951-9\_10}, doi = {10.1007/978-3-642-23951-9\_10}, timestamp = {Sat, 19 Oct 2019 20:26:25 +0200}, biburl = {https://dblp.org/rec/conf/ches/FanGV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/BalaschGV11, author = {Josep Balasch and Benedikt Gierlichs and Ingrid Verbauwhede}, editor = {Luca Breveglieri and Sylvain Guilley and Israel Koren and David Naccache and Junko Takahashi}, title = {An In-depth and Black-box Characterization of the Effects of Clock Glitches on 8-bit MCUs}, booktitle = {2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC} 2011, Tokyo, Japan, September 29, 2011}, pages = {105--114}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/FDTC.2011.9}, doi = {10.1109/FDTC.2011.9}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fdtc/BalaschGV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/StandaertVOGMKM10, author = {Fran{\c{c}}ois{-}Xavier Standaert and Nicolas Veyrat{-}Charvillon and Elisabeth Oswald and Benedikt Gierlichs and Marcel Medwed and Markus Kasper and Stefan Mangard}, editor = {Masayuki Abe}, title = {The World Is Not Enough: Another Look on Second-Order {DPA}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6477}, pages = {112--129}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17373-8\_7}, doi = {10.1007/978-3-642-17373-8\_7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/StandaertVOGMKM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/GierlichsBPV10, author = {Benedikt Gierlichs and Lejla Batina and Bart Preneel and Ingrid Verbauwhede}, editor = {Josef Pieprzyk}, title = {Revisiting Higher-Order {DPA} Attacks:}, booktitle = {Topics in Cryptology - {CT-RSA} 2010, The Cryptographers' Track at the {RSA} Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5985}, pages = {221--234}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11925-5\_16}, doi = {10.1007/978-3-642-11925-5\_16}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/GierlichsBPV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/daglib/p/KnezevicBMFGLMV10, author = {Miroslav Knezevic and Lejla Batina and Elke De Mulder and Junfeng Fan and Benedikt Gierlichs and Yong Ki Lee and Roel Maes and Ingrid Verbauwhede}, editor = {Shuvra S. Bhattacharyya and Ed F. Deprettere and Rainer Leupers and Jarmo Takala}, title = {Signal Processing for Cryptography and Security Applications}, booktitle = {Handbook of Signal Processing Systems}, pages = {161--177}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-6345-1\_7}, doi = {10.1007/978-1-4419-6345-1\_7}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/daglib/p/KnezevicBMFGLMV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/StandaertVOGMKM10, author = {Fran{\c{c}}ois{-}Xavier Standaert and Nicolas Veyrat{-}Charvillon and Elisabeth Oswald and Benedikt Gierlichs and Marcel Medwed and Markus Kasper and Stefan Mangard}, title = {The World is Not Enough: Another Look on Second-Order {DPA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {180}, year = {2010}, url = {http://eprint.iacr.org/2010/180}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/StandaertVOGMKM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BatinaGL09, author = {Lejla Batina and Benedikt Gierlichs and Kerstin Lemke{-}Rust}, editor = {Christophe Clavier and Kris Gaj}, title = {Differential Cluster Analysis}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5747}, pages = {112--127}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04138-9\_9}, doi = {10.1007/978-3-642-04138-9\_9}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/BatinaGL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecctd/GierlichsMPV09, author = {Benedikt Gierlichs and Elke De Mulder and Bart Preneel and Ingrid Verbauwhede}, title = {Empirical comparison of side channel analysis distinguishers on {DES} in hardware}, booktitle = {19th European Conference on Circuit Theory and Design, {ECCTD} 2009, Antalya, Turkey, August 23-27, 2009}, pages = {391--394}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ECCTD.2009.5275003}, doi = {10.1109/ECCTD.2009.5275003}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecctd/GierlichsMPV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/SterckxGPV09, author = {Micha{\"{e}}l Sterckx and Benedikt Gierlichs and Bart Preneel and Ingrid Verbauwhede}, title = {Efficient implementation of anonymous credentials on Java Card smart cards}, booktitle = {First {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2009, London, UK, December 6-9, 2009}, pages = {106--110}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/WIFS.2009.5386474}, doi = {10.1109/WIFS.2009.5386474}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/SterckxGPV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/MulderGPV09, author = {Elke De Mulder and Benedikt Gierlichs and Bart Preneel and Ingrid Verbauwhede}, title = {Practical {DPA} attacks on {MDPL}}, booktitle = {First {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2009, London, UK, December 6-9, 2009}, pages = {191--195}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/WIFS.2009.5386455}, doi = {10.1109/WIFS.2009.5386455}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/MulderGPV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GierlichsBPV09, author = {Benedikt Gierlichs and Lejla Batina and Bart Preneel and Ingrid Verbauwhede}, title = {Revisiting Higher-Order {DPA} Attacks: Multivariate Mutual Information Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {228}, year = {2009}, url = {http://eprint.iacr.org/2009/228}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GierlichsBPV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MulderGPV09, author = {Elke De Mulder and Benedikt Gierlichs and Bart Preneel and Ingrid Verbauwhede}, title = {Practical {DPA} Attacks on {MDPL}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {231}, year = {2009}, url = {http://eprint.iacr.org/2009/231}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MulderGPV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/MentensGV08, author = {Nele Mentens and Benedikt Gierlichs and Ingrid Verbauwhede}, editor = {Elisabeth Oswald and Pankaj Rohatgi}, title = {Power and Fault Analysis Resistance in Hardware through Dynamic Reconfiguration}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5154}, pages = {346--362}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85053-3\_22}, doi = {10.1007/978-3-540-85053-3\_22}, timestamp = {Thu, 14 Oct 2021 10:28:51 +0200}, biburl = {https://dblp.org/rec/conf/ches/MentensGV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GierlichsBTP08, author = {Benedikt Gierlichs and Lejla Batina and Pim Tuyls and Bart Preneel}, editor = {Elisabeth Oswald and Pankaj Rohatgi}, title = {Mutual Information Analysis}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5154}, pages = {426--442}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85053-3\_27}, doi = {10.1007/978-3-540-85053-3\_27}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/GierlichsBTP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/ClavierGV08, author = {Christophe Clavier and Benedikt Gierlichs and Ingrid Verbauwhede}, editor = {Tal Malkin}, title = {Fault Analysis Study of {IDEA}}, booktitle = {Topics in Cryptology - {CT-RSA} 2008, The Cryptographers' Track at the {RSA} Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4964}, pages = {274--287}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79263-5\_17}, doi = {10.1007/978-3-540-79263-5\_17}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/ClavierGV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/StandaertGV08, author = {Fran{\c{c}}ois{-}Xavier Standaert and Benedikt Gierlichs and Ingrid Verbauwhede}, editor = {Pil Joong Lee and Jung Hee Cheon}, title = {Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected {CMOS} Devices}, booktitle = {Information Security and Cryptology - {ICISC} 2008, 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5461}, pages = {253--267}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-00730-9\_16}, doi = {10.1007/978-3-642-00730-9\_16}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/StandaertGV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/BatinaGL08, author = {Lejla Batina and Benedikt Gierlichs and Kerstin Lemke{-}Rust}, editor = {Tzong{-}Chen Wu and Chin{-}Laung Lei and Vincent Rijmen and Der{-}Tsai Lee}, title = {Comparative Evaluation of Rank Correlation Based {DPA} on an {AES} Prototype Chip}, booktitle = {Information Security, 11th International Conference, {ISC} 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5222}, pages = {341--354}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85886-7\_24}, doi = {10.1007/978-3-540-85886-7\_24}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/BatinaGL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/TroncosoGPV08, author = {Carmela Troncoso and Benedikt Gierlichs and Bart Preneel and Ingrid Verbauwhede}, editor = {Nikita Borisov and Ian Goldberg}, title = {Perfect Matching Disclosure Attacks}, booktitle = {Privacy Enhancing Technologies, 8th International Symposium, {PETS} 2008, Leuven, Belgium, July 23-25, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5134}, pages = {2--23}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70630-4\_2}, doi = {10.1007/978-3-540-70630-4\_2}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/pet/TroncosoGPV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/GierlichsTDPV08, author = {Benedikt Gierlichs and Carmela Troncoso and Claudia D{\'{\i}}az and Bart Preneel and Ingrid Verbauwhede}, editor = {Vijay Atluri and Marianne Winslett}, title = {Revisiting a combinatorial approach toward measuring anonymity}, booktitle = {Proceedings of the 2008 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2008, Alexandria, VA, USA, October 27, 2008}, pages = {111--116}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456403.1456422}, doi = {10.1145/1456403.1456422}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wpes/GierlichsTDPV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Gierlichs07, author = {Benedikt Gierlichs}, editor = {Pascal Paillier and Ingrid Verbauwhede}, title = {DPA-Resistance Without Routing Constraints?}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4727}, pages = {107--120}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74735-2\_8}, doi = {10.1007/978-3-540-74735-2\_8}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/Gierlichs07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GierlichsBT07, author = {Benedikt Gierlichs and Lejla Batina and Pim Tuyls}, title = {Mutual Information Analysis - {A} Universal Differential Side-Channel Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {198}, year = {2007}, url = {http://eprint.iacr.org/2007/198}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GierlichsBT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GierlichsLP06, author = {Benedikt Gierlichs and Kerstin Lemke{-}Rust and Christof Paar}, editor = {Louis Goubin and Mitsuru Matsui}, title = {Templates vs. Stochastic Methods}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4249}, pages = {15--29}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11894063\_2}, doi = {10.1007/11894063\_2}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/GierlichsLP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.