Siemen Dhooghe

Orcid: 0000-0003-0591-7355

According to our database1, Siemen Dhooghe authored at least 26 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
StaTI: Protecting against Fault Attacks Using Stable Threshold Implementations.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024

2023
An Optimal Universal Construction for the Threshold Implementation of Bijective S-Boxes.
IEEE Trans. Inf. Theory, October, 2023

Domain-oriented masked bit-parallel finite-field multiplier against side-channel attacks.
Inf. Process. Lett., August, 2023

Low-Latency and Low-Randomness Second-Order Masked Cubic Functions.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

Threshold Implementations in Software: Micro-architectural Leakages in Algorithms.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

Threshold Implementations with Non-Uniform Inputs.
IACR Cryptol. ePrint Arch., 2023

The Random Fault Model.
Proceedings of the Selected Areas in Cryptography - SAC 2023, 2023

2022
Cryptanalysis of Efficient Masked Ciphers: Applications to Low Latency.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

Second-Order Low-Randomness d+1 Hardware Sharing of the AES.
IACR Cryptol. ePrint Arch., 2022

The Random Fault Model.
IACR Cryptol. ePrint Arch., 2022

An overview of the Eight International Olympiad in Cryptography "Non-Stop University CRYPTO".
CoRR, 2022

Resilient uniformity: applying resiliency in masking.
Cryptogr. Commun., 2022

Guarding the First Order: The Rise of AES Maskings.
Proceedings of the Smart Card Research and Advanced Applications, 2022

2021
First-Order Hardware Sharings of the AES.
IACR Cryptol. ePrint Arch., 2021

Analyzing Masked Ciphers Against Transition and Coupling Effects.
IACR Cryptol. ePrint Arch., 2021

A Low-Randomness Second-Order Masked AES.
IACR Cryptol. ePrint Arch., 2021

2020
Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols.
IACR Trans. Symmetric Cryptol., 2020

Rescue-Prime: a Standard Specification (SoK).
IACR Cryptol. ePrint Arch., 2020

Let's Tessellate: Tiling for Security Against Advanced Probe and Fault Adversaries.
IACR Cryptol. ePrint Arch., 2020

Cryptanalysis of Masked Ciphers: A not so Random Idea.
IACR Cryptol. ePrint Arch., 2020

Prelude to Marvellous (With the Designers' Commentary, Two Bonus Tracks, and a Foretold Prophecy).
IACR Cryptol. ePrint Arch., 2020

2019
Threshold Implementations in the Robust Probing Model.
IACR Cryptol. ePrint Arch., 2019

My Gadget Just Cares For Me - How NINA Can Prove Security Against Combined Attacks.
IACR Cryptol. ePrint Arch., 2019

Efficient Symmetric Primitives for Advanced Cryptographic Protocols (A Marvellous Contribution).
IACR Cryptol. ePrint Arch., 2019

2018
MARVELlous: a STARK-Friendly Family of Cryptographic Primitives.
IACR Cryptol. ePrint Arch., 2018

2017
SePCAR: A Secure and Privacy-Enhancing Protocol for Car Access Provision.
Proceedings of the Computer Security - ESORICS 2017, 2017


  Loading...