Benedikt Gierlichs
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
showing all ?? records
2010 – today
- 2018
- [e4]Junfeng Fan, Benedikt Gierlichs:
Constructive Side-Channel Analysis and Secure Design - 9th International Workshop, COSADE 2018, Singapore, April 23-24, 2018, Proceedings. Lecture Notes in Computer Science 10815, Springer 2018, ISBN 978-3-319-89640-3 [contents] - 2017
- [j4]Benedikt Gierlichs, Axel Y. Poschmann:
Introduction to the CHES 2016 special issue. J. Cryptographic Engineering 7(2): 97-98 (2017) - [c34]Josep Balasch, Sebastian Faust, Benedikt Gierlichs, Clara Paglialonga, François-Xavier Standaert:
Consolidating Inner Product Masking. ASIACRYPT (1) 2017: 724-754 - [c33]Oscar Reparaz, Benedikt Gierlichs:
A First-Order Chosen-Plaintext DPA Attack on the Third Round of DES. CARDIS 2017: 42-50 - [c32]Arthur Beckers, Benedikt Gierlichs, Ingrid Verbauwhede:
Fault Analysis of the ChaCha and Salsa Families of Stream Ciphers. CARDIS 2017: 196-212 - [c31]
- [c30]Thomas De Cnudde, Begül Bilgin, Benedikt Gierlichs, Ventzislav Nikov, Svetla Nikova, Vincent Rijmen:
Does Coupling Affect the Security of Masked Implementations? COSADE 2017: 1-18 - [i16]Oscar Reparaz, Benedikt Gierlichs, Ingrid Verbauwhede:
Fast Leakage Assessment. IACR Cryptology ePrint Archive 2017: 624 (2017) - [i15]Josep Balasch, Sebastian Faust, Benedikt Gierlichs, Clara Paglialonga, François-Xavier Standaert:
Consolidating Inner Product Masking. IACR Cryptology ePrint Archive 2017: 1047 (2017) - [i14]Oscar Reparaz, Benedikt Gierlichs:
A first-order chosen-plaintext DPA attack on the third round of DES. IACR Cryptology ePrint Archive 2017: 1257 (2017) - 2016
- [c29]Arthur Beckers, Josep Balasch, Benedikt Gierlichs, Ingrid Verbauwhede:
Design and Implementation of a Waveform-Matching Based Triggering System. COSADE 2016: 184-198 - [e3]Benedikt Gierlichs, Axel Y. Poschmann:
Cryptographic Hardware and Embedded Systems - CHES 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings. Lecture Notes in Computer Science 9813, Springer 2016, ISBN 978-3-662-53139-6 [contents] - [i13]Thomas De Cnudde, Begül Bilgin, Benedikt Gierlichs, Ventzislav Nikov, Svetla Nikova, Vincent Rijmen:
Does Coupling Affect the Security of Masked Implementations? IACR Cryptology ePrint Archive 2016: 1080 (2016) - 2015
- [j3]Begül Bilgin, Benedikt Gierlichs, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen:
Trade-Offs for Threshold Implementations Illustrated on AES. IEEE Trans. on CAD of Integrated Circuits and Systems 34(7): 1188-1200 (2015) - [c28]Josep Balasch, Benedikt Gierlichs, Oscar Reparaz, Ingrid Verbauwhede:
DPA, Bitslicing and Masking at 1 GHz. CHES 2015: 599-619 - [c27]Oscar Reparaz, Begül Bilgin, Svetla Nikova, Benedikt Gierlichs, Ingrid Verbauwhede:
Consolidating Masking Schemes. CRYPTO (1) 2015: 764-783 - [c26]Josep Balasch, Sebastian Faust, Benedikt Gierlichs:
Inner Product Masking Revisited. EUROCRYPT (1) 2015: 486-510 - [i12]Josep Balasch, Sebastian Faust, Benedikt Gierlichs:
Inner Product Masking Revisited. IACR Cryptology ePrint Archive 2015: 105 (2015) - [i11]Oscar Reparaz, Begül Bilgin, Svetla Nikova, Benedikt Gierlichs, Ingrid Verbauwhede:
Consolidating masking schemes. IACR Cryptology ePrint Archive 2015: 719 (2015) - [i10]Josep Balasch, Benedikt Gierlichs, Oscar Reparaz, Ingrid Verbauwhede:
DPA, Bitslicing and Masking at 1 GHz. IACR Cryptology ePrint Archive 2015: 727 (2015) - 2014
- [c25]Begül Bilgin, Benedikt Gierlichs, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen:
A More Efficient AES Threshold Implementation. AFRICACRYPT 2014: 267-284 - [c24]Begül Bilgin, Benedikt Gierlichs, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen:
Higher-Order Threshold Implementations. ASIACRYPT (2) 2014: 326-343 - [c23]Josep Balasch, Benedikt Gierlichs, Vincent Grosso, Oscar Reparaz, François-Xavier Standaert:
On the Cost of Lazy Engineering for Masked Software Implementations. CARDIS 2014: 64-81 - [c22]Oscar Reparaz, Benedikt Gierlichs, Ingrid Verbauwhede:
A Note on the Use of Margins to Compare Distinguishers. COSADE 2014: 1-8 - [c21]Oscar Reparaz, Benedikt Gierlichs, Ingrid Verbauwhede:
Generic DPA Attacks: Curse or Blessing? COSADE 2014: 98-111 - [i9]Josep Balasch, Benedikt Gierlichs, Vincent Grosso, Oscar Reparaz, François-Xavier Standaert:
On the Cost of Lazy Engineering for Masked Software Implementations. IACR Cryptology ePrint Archive 2014: 413 (2014) - [i8]Sébastien Tiran, Guillaume Reymond, Jean-Baptiste Rigaud, Driss Aboulkassimi, Benedikt Gierlichs, Mathieu Carbone, Gilles R. Ducharme, Philippe Maurine:
Analysis Of Variance and CPA in SCA. IACR Cryptology ePrint Archive 2014: 707 (2014) - [i7]Begül Bilgin, Benedikt Gierlichs, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen:
Higher-Order Threshold Implementations. IACR Cryptology ePrint Archive 2014: 751 (2014) - 2013
- [p2]Miroslav Knezevic, Lejla Batina, Elke De Mulder, Junfeng Fan, Benedikt Gierlichs, Yong Ki Lee, Roel Maes, Ingrid Verbauwhede:
Signal Processing for Cryptography and Security Applications. Handbook of Signal Processing Systems 2013: 223-241 - [e2]Benedikt Gierlichs, Sylvain Guilley, Debdeep Mukhopadhyay:
Security, Privacy, and Applied Cryptography Engineering - Third International Conference, SPACE 2013, Kharagpur, India, October 19-23, 2013. Proceedings. Lecture Notes in Computer Science 8204, Springer 2013, ISBN 978-3-642-41223-3 [contents] - [i6]Begül Bilgin, Benedikt Gierlichs, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen:
A More Efficient AES Threshold Implementation. IACR Cryptology ePrint Archive 2013: 697 (2013) - 2012
- [c20]Josep Balasch, Sebastian Faust, Benedikt Gierlichs, Ingrid Verbauwhede:
Theory and Practice of a Leakage Resilient Masking Scheme. ASIACRYPT 2012: 758-775 - [c19]Oscar Reparaz, Benedikt Gierlichs, Ingrid Verbauwhede:
Selecting Time Samples for Multivariate DPA Attacks. CHES 2012: 155-174 - [c18]Josep Balasch, Benedikt Gierlichs, Roel Verdult, Lejla Batina, Ingrid Verbauwhede:
Power Analysis of Atmel CryptoMemory - Recovering Keys from Secure EEPROMs. CT-RSA 2012: 19-34 - [c17]Benedikt Gierlichs, Jörn-Marc Schmidt, Michael Tunstall:
Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output. LATINCRYPT 2012: 305-321 - [e1]Guido Bertoni, Benedikt Gierlichs:
2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, Leuven, Belgium, September 9, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-2900-2 [contents] - [i5]Benedikt Gierlichs, Jörn-Marc Schmidt, Michael Tunstall:
Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output. IACR Cryptology ePrint Archive 2012: 678 (2012) - 2011
- [j2]Gabriel Hospodar, Benedikt Gierlichs, Elke De Mulder, Ingrid Verbauwhede, Joos Vandewalle:
Machine learning in side-channel analysis: a first study. J. Cryptographic Engineering 1(4): 293-302 (2011) - [j1]Lejla Batina, Benedikt Gierlichs, Emmanuel Prouff, Matthieu Rivain, François-Xavier Standaert, Nicolas Veyrat-Charvillon:
Mutual Information Analysis: a Comprehensive Study. J. Cryptology 24(2): 269-291 (2011) - [c16]Junfeng Fan, Benedikt Gierlichs, Frederik Vercauteren:
To Infinity and Beyond: Combined Attack on ECC Using Points of Low Order. CHES 2011: 143-159 - [c15]Josep Balasch, Benedikt Gierlichs, Ingrid Verbauwhede:
An In-depth and Black-box Characterization of the Effects of Clock Glitches on 8-bit MCUs. FDTC 2011: 105-114 - 2010
- [c14]François-Xavier Standaert, Nicolas Veyrat-Charvillon, Elisabeth Oswald, Benedikt Gierlichs, Marcel Medwed, Markus Kasper, Stefan Mangard:
The World Is Not Enough: Another Look on Second-Order DPA. ASIACRYPT 2010: 112-129 - [c13]Benedikt Gierlichs, Lejla Batina, Bart Preneel, Ingrid Verbauwhede:
Revisiting Higher-Order DPA Attacks: . CT-RSA 2010: 221-234 - [p1]Miroslav Knezevic, Lejla Batina, Elke De Mulder, Junfeng Fan, Benedikt Gierlichs, Yong Ki Lee, Roel Maes, Ingrid Verbauwhede:
Signal Processing for Cryptography and Security Applications. Handbook of Signal Processing Systems 2010: 161-177 - [i4]François-Xavier Standaert, Nicolas Veyrat-Charvillon, Elisabeth Oswald, Benedikt Gierlichs, Marcel Medwed, Markus Kasper, Stefan Mangard:
The World is Not Enough: Another Look on Second-Order DPA. IACR Cryptology ePrint Archive 2010: 180 (2010)
2000 – 2009
- 2009
- [c12]Lejla Batina, Benedikt Gierlichs, Kerstin Lemke-Rust:
Differential Cluster Analysis. CHES 2009: 112-127 - [c11]Michaël Sterckx, Benedikt Gierlichs, Bart Preneel, Ingrid Verbauwhede:
Efficient implementation of anonymous credentials on Java Card smart cards. WIFS 2009: 106-110 - [c10]Elke De Mulder, Benedikt Gierlichs, Bart Preneel, Ingrid Verbauwhede:
Practical DPA attacks on MDPL. WIFS 2009: 191-195 - [i3]Benedikt Gierlichs, Lejla Batina, Bart Preneel, Ingrid Verbauwhede:
Revisiting Higher-Order DPA Attacks: Multivariate Mutual Information Analysis. IACR Cryptology ePrint Archive 2009: 228 (2009) - [i2]Elke De Mulder, Benedikt Gierlichs, Bart Preneel, Ingrid Verbauwhede:
Practical DPA Attacks on MDPL. IACR Cryptology ePrint Archive 2009: 231 (2009) - 2008
- [c9]Nele Mentens, Benedikt Gierlichs, Ingrid Verbauwhede:
Power and Fault Analysis Resistance in Hardware through Dynamic Reconfiguration. CHES 2008: 346-362 - [c8]Benedikt Gierlichs, Lejla Batina, Pim Tuyls, Bart Preneel:
Mutual Information Analysis. CHES 2008: 426-442 - [c7]Christophe Clavier, Benedikt Gierlichs, Ingrid Verbauwhede:
Fault Analysis Study of IDEA. CT-RSA 2008: 274-287 - [c6]François-Xavier Standaert, Benedikt Gierlichs, Ingrid Verbauwhede:
Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices. ICISC 2008: 253-267 - [c5]Lejla Batina, Benedikt Gierlichs, Kerstin Lemke-Rust:
Comparative Evaluation of Rank Correlation Based DPA on an AES Prototype Chip. ISC 2008: 341-354 - [c4]Carmela Troncoso, Benedikt Gierlichs, Bart Preneel, Ingrid Verbauwhede:
Perfect Matching Disclosure Attacks. Privacy Enhancing Technologies 2008: 2-23 - [c3]Benedikt Gierlichs, Carmela Troncoso, Claudia Díaz, Bart Preneel, Ingrid Verbauwhede:
Revisiting a combinatorial approach toward measuring anonymity. WPES 2008: 111-116 - 2007
- [c2]
- [i1]Benedikt Gierlichs, Lejla Batina, Pim Tuyls:
Mutual Information Analysis - A Universal Differential Side-Channel Attack. IACR Cryptology ePrint Archive 2007: 198 (2007) - 2006
- [c1]Benedikt Gierlichs, Kerstin Lemke-Rust, Christof Paar:
Templates vs. Stochastic Methods. CHES 2006: 15-29
Coauthor Index
data released under the ODC-BY 1.0 license; see also our legal information page
last updated on 2018-04-19 20:42 CEST by the dblp team