Elke De Mulder

According to our database1, Elke De Mulder authored at least 17 papers between 2006 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Protecting RISC-V against Side-Channel Attacks.
Proceedings of the 56th Annual Design Automation Conference 2019, 2019

2018
Identifying and Eliminating Side-Channel Leaks in Programmable Systems.
IEEE Design & Test, 2018

2015
SoC it to EM: electromagnetic side-channel attacks on a complex system-on-chip.
IACR Cryptology ePrint Archive, 2015

SoC It to EM: ElectroMagnetic Side-Channel Attacks on a Complex System-on-Chip.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2015, 2015

2014
Using Bleichenbacher's solution to the hidden number problem to attack nonce leaks in 384-bit ECDSA: extended version.
J. Cryptographic Engineering, 2014

2013
Using Bleichenbacher's Solution to the Hidden Number Problem to Attack Nonce Leaks in 384-Bit ECDSA.
IACR Cryptology ePrint Archive, 2013

Using Bleichenbacher"s Solution to the Hidden Number Problem to Attack Nonce Leaks in 384-Bit ECDSA.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2013, 2013

2012
A Practical Attack on KeeLoq.
J. Cryptology, 2012

2011
Machine learning in side-channel analysis: a first study.
J. Cryptographic Engineering, 2011

2010
State-of-the-art of Secure ECC Implementations: A Survey on Known Side-channel Attacks and Countermeasures.
Proceedings of the HOST 2010, 2010

Signal Processing for Cryptography and Security Applications.
Proceedings of the Handbook of Signal Processing Systems, 2010

2009
Practical DPA Attacks on MDPL.
IACR Cryptology ePrint Archive, 2009

Practical DPA attacks on MDPL.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009

Case Study : A class E power amplifier for ISO-14443A.
Proceedings of the 2009 IEEE Symposium on Design and Diagnostics of Electronic Circuits and Systems, 2009

2007
Differential power and electromagnetic attacks on a FPGA implementation of elliptic curve cryptosystems.
Computers & Electrical Engineering, 2007

Side-channel resistant system-level design flow for public-key cryptography.
Proceedings of the 17th ACM Great Lakes Symposium on VLSI 2007, 2007

2006
A Parallel Processing Hardware Architecture for Elliptic Curve Cryptosystems.
Proceedings of the 2006 IEEE International Conference on Acoustics Speech and Signal Processing, 2006


  Loading...