Siemen Dhooghe

Orcid: 0000-0003-0591-7355

According to our database1, Siemen Dhooghe authored at least 33 papers between 2017 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Higher-Order Time Sharing Masking.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2025

Constant-Cycle Hardware Private Circuits.
IACR Cryptol. ePrint Arch., 2025

Code-based Masking: From Fields to Bits Bitsliced Higher-Order Masked SKINNY.
IACR Cryptol. ePrint Arch., 2025

StaMAC: Fault Protection via Stable-MAC Tags.
IACR Cryptol. ePrint Arch., 2025

Fly Away: Lifting Fault Security through Canaries and the Uniform Random Fault Model.
IACR Commun. Cryptol., 2025

2024
Time Sharing - A Novel Approach to Low-Latency Masking.
IACR Cryptol. ePrint Arch., 2024

Bit t-SNI Secure Multiplication Gadget for Inner Product Masking.
IACR Cryptol. ePrint Arch., 2024

2023
Domain-oriented masked bit-parallel finite-field multiplier against side-channel attacks.
Inf. Process. Lett., August, 2023

Low-Latency and Low-Randomness Second-Order Masked Cubic Functions.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

StaTI: Protecting against Fault Attacks Using Stable Threshold Implementations.
IACR Cryptol. ePrint Arch., 2023

Threshold Implementations with Non-uniform Inputs.
Proceedings of the Selected Areas in Cryptography - SAC 2023, 2023

The Random Fault Model.
Proceedings of the Selected Areas in Cryptography - SAC 2023, 2023

2022
An Optimal Universal Construction for the Threshold Implementation of Bijective S-boxes.
IACR Cryptol. ePrint Arch., 2022

Threshold Implementations in Software: Micro-architectural Leakages in Algorithms.
IACR Cryptol. ePrint Arch., 2022

The Random Fault Model.
IACR Cryptol. ePrint Arch., 2022

An overview of the Eight International Olympiad in Cryptography "Non-Stop University CRYPTO".
CoRR, 2022

Second-Order Low-Randomness d + 1 Hardware Sharing of the AES.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Guarding the First Order: The Rise of AES Maskings.
Proceedings of the Smart Card Research and Advanced Applications, 2022

2021
First-Order Hardware Sharings of the AES.
IACR Cryptol. ePrint Arch., 2021

Resilient Uniformity: Applying Resiliency in Masking.
IACR Cryptol. ePrint Arch., 2021

Cryptanalysis of Efficient Masked Ciphers: Applications to Low Latency.
IACR Cryptol. ePrint Arch., 2021

A Low-Randomness Second-Order Masked AES.
Proceedings of the Selected Areas in Cryptography - 28th International Conference, 2021

Analyzing Masked Ciphers Against Transition and Coupling Effects.
Proceedings of the Progress in Cryptology - INDOCRYPT 2021, 2021

2020
Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols.
IACR Trans. Symmetric Cryptol., 2020

Rescue-Prime: a Standard Specification (SoK).
IACR Cryptol. ePrint Arch., 2020

Prelude to Marvellous (With the Designers' Commentary, Two Bonus Tracks, and a Foretold Prophecy).
IACR Cryptol. ePrint Arch., 2020

My Gadget Just Cares for Me - How NINA Can Prove Security Against Combined Attacks.
Proceedings of the Topics in Cryptology - CT-RSA 2020, 2020

Let's Tessellate: Tiling for Security Against Advanced Probe and Fault Adversaries.
Proceedings of the Smart Card Research and Advanced Applications, 2020

Cryptanalysis of Masked Ciphers: A Not So Random Idea.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
Efficient Symmetric Primitives for Advanced Cryptographic Protocols (A Marvellous Contribution).
IACR Cryptol. ePrint Arch., 2019

Threshold Implementations in the Robust Probing Model.
Proceedings of ACM Workshop on Theory of Implementation Security, 2019

2018
MARVELlous: a STARK-Friendly Family of Cryptographic Primitives.
IACR Cryptol. ePrint Arch., 2018

2017
SePCAR: A Secure and Privacy-Enhancing Protocol for Car Access Provision.
Proceedings of the Computer Security - ESORICS 2017, 2017


  Loading...