Ingrid Verbauwhede

Affiliations: 
Electrical Engineering University of California, Los Angeles, Los Angeles, CA 
Area:
Embedded security, security of cyber physical systems, efficient and attack resistant implementations of cryptography, design methods
Google:
"Ingrid Verbauwhede"

Children

Sign in to add trainee
Patrick R. Schaumont grad student 2004 UCLA
Alireza Hodjat grad student 2005 UCLA
Kris J. Tiri grad student 2005 UCLA
Bo-Cheng Lai grad student 2007 UCLA
Shenglin Yang grad student 2007 UCLA
Bijan Ansari grad student 2012 UCLA
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Komano Y, Ohta K, Sakiyama K, et al. (2019) Single-Round Pattern Matching Key Generation Using Physically Unclonable Function Security and Communication Networks. 2019: 1-13
Marin E, Singelée D, Yang B, et al. (2016) On the feasibility of cryptography for a wireless insulin pump system Codaspy 2016 - Proceedings of the 6th Acm Conference On Data and Application Security and Privacy. 113-120
Bosmans J, Roy SS, Jarvinen K, et al. (2016) A Tiny Coprocessor for Elliptic Curve Cryptography over the 256-bit NIST Prime Field Proceedings of the Ieee International Conference On Vlsi Design. 2016: 523-528
Gövem B, Järvinen K, Aerts K, et al. (2016) A fast and compact FPGA implementation of elliptic curve cryptography using lambda coordinates Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9646: 63-83
Reparaz O, de Clercq R, Roy SS, et al. (2016) Additively homomorphic ring-LWE masking Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9606: 233-244
Maene P, Verbauwhede I. (2016) Single-cycle implementations of block ciphers Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9542: 131-147
Delvaux J, Peeters R, Gu D, et al. (2015) A survey on lightweight entity authentication with strong pufs Acm Computing Surveys. 48
Götzfried J, Müller T, De Clercq R, et al. (2015) Soteria: Offline software protection within low-cost embedded devices Acm International Conference Proceeding Series. 7: 241-250
Scheir M, Balasch J, Rial A, et al. (2015) Anonymous split E-cash-toward mobile anonymous payments Acm Transactions On Embedded Computing Systems. 14
Rozic V, Yang B, Dehaene W, et al. (2015) Highly efficient entropy extraction for true random number generators on FPGAS Proceedings - Design Automation Conference. 2015
See more...