[go: up one dir, main page]

Follow
Benedikt Gierlichs
Benedikt Gierlichs
Research Expert at KU Leuven/COSIC
Verified email at esat.kuleuven.be - Homepage
Title
Cited by
Cited by
Year
Mutual information analysis: A generic side-channel distinguisher
B Gierlichs, L Batina, P Tuyls, B Preneel
International Workshop on Cryptographic Hardware and Embedded Systems, 426-442, 2008
9742008
Machine learning in side-channel analysis: a first study
G Hospodar, B Gierlichs, E De Mulder, I Verbauwhede, J Vandewalle
Journal of Cryptographic Engineering 1 (4), 293-302, 2011
4472011
Mutual information analysis: a comprehensive study
L Batina, B Gierlichs, E Prouff, M Rivain, FX Standaert, ...
Journal of Cryptology 24 (2), 269-291, 2011
4442011
Templates vs. stochastic methods: A performance analysis for side channel cryptanalysis
B Gierlichs, K Lemke-Rust, C Paar
International Workshop on Cryptographic Hardware and Embedded Systems, 15-29, 2006
3402006
Consolidating masking schemes
O Reparaz, B Bilgin, S Nikova, B Gierlichs, I Verbauwhede
Annual Cryptology Conference, 764-783, 2015
3352015
Higher-order threshold implementations
B Bilgin, B Gierlichs, S Nikova, V Nikov, V Rijmen
International Conference on the Theory and Application of Cryptology and …, 2014
2742014
On the cost of lazy engineering for masked software implementations
J Balasch, B Gierlichs, V Grosso, O Reparaz, FX Standaert
International Conference on Smart Card Research and Advanced Applications, 64-81, 2014
2642014
An in-depth and black-box characterization of the effects of clock glitches on 8-bit MCUs
J Balasch, B Gierlichs, I Verbauwhede
2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, 105-114, 2011
2492011
The world is not enough: Another look on second-order DPA
FX Standaert, N Veyrat-Charvillon, E Oswald, B Gierlichs, M Medwed, ...
International Conference on the Theory and Application of Cryptology and …, 2010
2332010
A more efficient AES threshold implementation
B Bilgin, B Gierlichs, S Nikova, V Nikov, V Rijmen
International Conference on Cryptology in Africa, 267-284, 2014
1822014
Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected …
FX Standaert, B Gierlichs, I Verbauwhede
International Conference on Information Security and Cryptology, 253-267, 2008
1782008
Revisiting a methodology for efficient CNN architectures in profiling attacks
L Wouters, V Arribas, B Gierlichs, B Preneel
IACR Transactions on Cryptographic Hardware and Embedded Systems, 147-168, 2020
1732020
Infective computation and dummy rounds: Fault protection for block ciphers without check-before-output
B Gierlichs, JM Schmidt, M Tunstall
International conference on cryptology and information security in Latin …, 2012
1302012
Trade-offs for threshold implementations illustrated on AES
B Bilgin, B Gierlichs, S Nikova, V Nikov, V Rijmen
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2015
1282015
Revisiting higher-order DPA attacks: Multivariate mutual information analysis
B Gierlichs, L Batina, B Preneel, I Verbauwhede
Cryptographers’ Track at the RSA Conference, 221-234, 2010
1272010
DPA, bitslicing and masking at 1 GHz
J Balasch, B Gierlichs, O Reparaz, I Verbauwhede
International Workshop on Cryptographic Hardware and Embedded Systems, 599-619, 2015
1202015
Does coupling affect the security of masked implementations?
T De Cnudde, B Bilgin, B Gierlichs, V Nikov, S Nikova, V Rijmen
International Workshop on Constructive Side-Channel Analysis and Secure …, 2017
1192017
Electromagnetic circuit fingerprints for hardware trojan detection
J Balasch, B Gierlichs, I Verbauwhede
2015 IEEE International Symposium on Electromagnetic Compatibility (EMC …, 2015
1112015
Power and fault analysis resistance in hardware through dynamic reconfiguration
N Mentens, B Gierlichs, I Verbauwhede
International Workshop on Cryptographic Hardware and Embedded Systems, 346-362, 2008
1042008
Differential cluster analysis
L Batina, B Gierlichs, K Lemke-Rust
International Workshop on Cryptographic Hardware and Embedded Systems, 112-127, 2009
1022009
The system can't perform the operation now. Try again later.
Articles 1–20