Benedikt Gierlichs

According to our database1, Benedikt Gierlichs authored at least 57 papers between 2006 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Fast, Furious and Insecure: Passive Keyless Entry and Start Systems in Modern Supercars.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

2018
An In-Depth and Black-Box Characterization of the Effects of Laser Pulses on ATmega328P.
Proceedings of the Smart Card Research and Advanced Applications, 2018

2017
Introduction to the CHES 2016 special issue.
J. Cryptographic Engineering, 2017

Fast Leakage Assessment.
IACR Cryptology ePrint Archive, 2017

A first-order chosen-plaintext DPA attack on the third round of DES.
IACR Cryptology ePrint Archive, 2017

Consolidating Inner Product Masking.
IACR Cryptology ePrint Archive, 2017

Does Coupling Affect the Security of Masked Implementations?
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2017

Fast Leakage Assessment.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017

A First-Order Chosen-Plaintext DPA Attack on the Third Round of DES.
Proceedings of the Smart Card Research and Advanced Applications, 2017

Fault Analysis of the ChaCha and Salsa Families of Stream Ciphers.
Proceedings of the Smart Card Research and Advanced Applications, 2017

Consolidating Inner Product Masking.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

2016
Does Coupling Affect the Security of Masked Implementations?
IACR Cryptology ePrint Archive, 2016

Design and Implementation of a Waveform-Matching Based Triggering System.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2016

2015
Trade-Offs for Threshold Implementations Illustrated on AES.
IEEE Trans. on CAD of Integrated Circuits and Systems, 2015

Consolidating masking schemes.
IACR Cryptology ePrint Archive, 2015

DPA, Bitslicing and Masking at 1 GHz.
IACR Cryptology ePrint Archive, 2015

Inner Product Masking Revisited.
IACR Cryptology ePrint Archive, 2015

Inner Product Masking Revisited.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

Consolidating Masking Schemes.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

DPA, Bitslicing and Masking at 1 GHz.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2015, 2015

2014
Analysis Of Variance and CPA in SCA.
IACR Cryptology ePrint Archive, 2014

Higher-Order Threshold Implementations.
IACR Cryptology ePrint Archive, 2014

On the Cost of Lazy Engineering for Masked Software Implementations.
IACR Cryptology ePrint Archive, 2014

Generic DPA Attacks: Curse or Blessing?
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2014

A Note on the Use of Margins to Compare Distinguishers.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2014

On the Cost of Lazy Engineering for Masked Software Implementations.
Proceedings of the Smart Card Research and Advanced Applications, 2014

Higher-Order Threshold Implementations.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

A More Efficient AES Threshold Implementation.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014

2013
A More Efficient AES Threshold Implementation.
IACR Cryptology ePrint Archive, 2013

2012
Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output.
IACR Cryptology ePrint Archive, 2012

Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output.
Proceedings of the Progress in Cryptology - LATINCRYPT 2012, 2012

Power Analysis of Atmel CryptoMemory - Recovering Keys from Secure EEPROMs.
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012

Selecting Time Samples for Multivariate DPA Attacks.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

Theory and Practice of a Leakage Resilient Masking Scheme.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

2011
Mutual Information Analysis: a Comprehensive Study.
J. Cryptology, 2011

Machine learning in side-channel analysis: a first study.
J. Cryptographic Engineering, 2011

An In-depth and Black-box Characterization of the Effects of Clock Glitches on 8-bit MCUs.
Proceedings of the 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2011

To Infinity and Beyond: Combined Attack on ECC Using Points of Low Order.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011

2010
The World is Not Enough: Another Look on Second-Order DPA.
IACR Cryptology ePrint Archive, 2010

Revisiting Higher-Order DPA Attacks: .
Proceedings of the Topics in Cryptology, 2010

The World Is Not Enough: Another Look on Second-Order DPA.
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010

Signal Processing for Cryptography and Security Applications.
Proceedings of the Handbook of Signal Processing Systems, 2010

2009
Practical DPA Attacks on MDPL.
IACR Cryptology ePrint Archive, 2009

Revisiting Higher-Order DPA Attacks: Multivariate Mutual Information Analysis.
IACR Cryptology ePrint Archive, 2009

Efficient implementation of anonymous credentials on Java Card smart cards.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009

Practical DPA attacks on MDPL.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009

Differential Cluster Analysis.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009

2008
Revisiting a combinatorial approach toward measuring anonymity.
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008

Perfect Matching Disclosure Attacks.
Proceedings of the Privacy Enhancing Technologies, 2008

Comparative Evaluation of Rank Correlation Based DPA on an AES Prototype Chip.
Proceedings of the Information Security, 11th International Conference, 2008

Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices.
Proceedings of the Information Security and Cryptology, 2008

Fault Analysis Study of IDEA.
Proceedings of the Topics in Cryptology, 2008

Power and Fault Analysis Resistance in Hardware through Dynamic Reconfiguration.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008

Mutual Information Analysis.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008

2007
Mutual Information Analysis - A Universal Differential Side-Channel Attack.
IACR Cryptology ePrint Archive, 2007

DPA-Resistance Without Routing Constraints?
Proceedings of the Cryptographic Hardware and Embedded Systems, 2007

2006
Templates vs. Stochastic Methods.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006


  Loading...