Ingrid Verbauwhede - Publications

Affiliations: 
Electrical Engineering University of California, Los Angeles, Los Angeles, CA 
Area:
Embedded security, security of cyber physical systems, efficient and attack resistant implementations of cryptography, design methods

196 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any innacuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2016 Marin E, Singelée D, Yang B, Verbauwhede I, Preneel B. On the feasibility of cryptography for a wireless insulin pump system Codaspy 2016 - Proceedings of the 6th Acm Conference On Data and Application Security and Privacy. 113-120. DOI: 10.1145/2857705.2857746  1
2016 Bosmans J, Roy SS, Jarvinen K, Verbauwhede I. A Tiny Coprocessor for Elliptic Curve Cryptography over the 256-bit NIST Prime Field Proceedings of the Ieee International Conference On Vlsi Design. 2016: 523-528. DOI: 10.1109/VLSID.2016.82  1
2016 Gövem B, Järvinen K, Aerts K, Verbauwhede I, Mentens N. A fast and compact FPGA implementation of elliptic curve cryptography using lambda coordinates Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9646: 63-83. DOI: 10.1007/978-3-319-31517-1_4  1
2016 Reparaz O, de Clercq R, Roy SS, Vercauteren F, Verbauwhede I. Additively homomorphic ring-LWE masking Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9606: 233-244. DOI: 10.1007/978-3-319-29360-8_15  1
2016 Maene P, Verbauwhede I. Single-cycle implementations of block ciphers Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9542: 131-147. DOI: 10.1007/978-3-319-29078-2_8  1
2015 Delvaux J, Peeters R, Gu D, Verbauwhede I. A survey on lightweight entity authentication with strong pufs Acm Computing Surveys. 48. DOI: 10.1145/2818186  1
2015 Götzfried J, Müller T, De Clercq R, Maene P, Freiling F, Verbauwhede I. Soteria: Offline software protection within low-cost embedded devices Acm International Conference Proceeding Series. 7: 241-250. DOI: 10.1145/2818000.2856129  1
2015 Scheir M, Balasch J, Rial A, Preneel B, Verbauwhede I. Anonymous split E-cash-toward mobile anonymous payments Acm Transactions On Embedded Computing Systems. 14. DOI: 10.1145/2783439  1
2015 Rozic V, Yang B, Dehaene W, Verbauwhede I. Highly efficient entropy extraction for true random number generators on FPGAS Proceedings - Design Automation Conference. 2015. DOI: 10.1145/2744769.2744852  1
2015 Roy SS, Fan J, Verbauwhede I. Accelerating scalar conversion for Koblitz curve cryptoprocessors on hardware platforms Ieee Transactions On Very Large Scale Integration (Vlsi) Systems. 23: 810-818. DOI: 10.1109/TVLSI.2014.2321282  1
2015 Chen DD, Mentens N, Vercauteren F, Roy SS, Cheung RCC, Pao D, Verbauwhede I. High-speed polynomial multiplication architecture for ring-LWE and SHE cryptosystems Ieee Transactions On Circuits and Systems I: Regular Papers. 62: 157-166. DOI: 10.1109/TCSI.2014.2350431  1
2015 Delvaux J, Gu D, Schellekens D, Verbauwhede I. Helper data algorithms for puf-based key generation: Overview and analysis Ieee Transactions On Computer-Aided Design of Integrated Circuits and Systems. 34: 889-902. DOI: 10.1109/TCAD.2014.2370531  1
2015 Verbauwhede I, Balasch J, Roy SS, Van Herrewege A. Circuit challenges from cryptography Digest of Technical Papers - Ieee International Solid-State Circuits Conference. 58: 428-429. DOI: 10.1109/ISSCC.2015.7063109  1
2015 Balasch J, Gierlichs B, Verbauwhede I. Electromagnetic circuit fingerprints for Hardware Trojan detection Ieee International Symposium On Electromagnetic Compatibility. 2015: 246-251. DOI: 10.1109/ISEMC.2015.7256167  1
2015 Yang B, Rozic V, Mentens N, Verbauwhede I. On-the-fly tests for non-ideal true random number generators Proceedings - Ieee International Symposium On Circuits and Systems. 2015: 2017-2020. DOI: 10.1109/ISCAS.2015.7169072  1
2015 Vliegen J, Mentens N, Koch D, Schellekens D, Verbauwhede I. Practical feasibility evaluation and improvement of a pay-per-use licensing scheme for hardware IP cores in Xilinx FPGAs Journal of Cryptographic Engineering. 5: 113-122. DOI: 10.1007/s13389-014-0088-4  1
2015 Zhang W, Bao Z, Lin D, Rijmen V, Yang B, Verbauwhede I. RECTANGLE: a bit-slice lightweight block cipher suitable for multiple platforms Science China Information Sciences. 1-15. DOI: 10.1007/s11432-015-5459-7  1
2015 Roy SS, Järvinen K, Vercauteren F, Dimitrov V, Verbauwhede I. Modular hardware architecture for somewhat homomorphic function evaluation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9293: 164-184. DOI: 10.1007/978-3-662-48324-4_9  1
2015 Roy SS, Järvinen K, Verbauwhede I. Lightweight coprocessor for koblitz curves: 283-bit ecc including scalar conversion with only 4300 gates Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9293: 102-122. DOI: 10.1007/978-3-662-48324-4_6  1
2015 Reparaz O, Roy SS, Vercauteren F, Verbauwhede I. A masked ring-LWE implementation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9293: 683-702. DOI: 10.1007/978-3-662-48324-4_34  1
2015 Liu Z, Seo H, Roy SS, Großschädl J, Kim H, Verbauwhede I. Efficient ring-LWE encryption on 8-bit AVR processors Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9293: 663-682. DOI: 10.1007/978-3-662-48324-4_33  1
2015 Balasch J, Gierlichs B, Reparaz O, Verbauwhede I. DPA, bitslicing and masking at 1 GHZ Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9293: 599-619. DOI: 10.1007/978-3-662-48324-4_30  1
2015 Reparaz O, Bilgin B, Nikova S, Gierlichs B, Verbauwhede I. Consolidating masking schemes Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9215: 764-783. DOI: 10.1007/978-3-662-47989-6_37  1
2015 Järvinen K, Verbauwhede I. How to use koblitz curves on small devices? Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8968: 154-170. DOI: 10.1007/978-3-319-16763-3_10  1
2015 Yang B, Rozic V, Mentens N, Dehaene W, Verbauwhede I. Embedded HW/SW platform for on-the-fly testing of true random number generators Proceedings -Design, Automation and Test in Europe, Date. 2015: 345-350.  1
2015 De Clercq R, Roy SS, Vercauteren F, Verbauwhede I. Efficient software implementation of ring-LWE encryption Proceedings -Design, Automation and Test in Europe, Date. 2015: 339-344.  1
2014 Delvaux J, Verbauwhede I. Key-recovery attacks on various RO PUF constructions via helper data manipulation Proceedings -Design, Automation and Test in Europe, Date. DOI: 10.7873/DATE2014.085  1
2014 Vliegen J, Mentens N, Verbauwhede I. Secure, remote, dynamic reconfiguration of FPGAs Acm Transactions On Reconfigurable Technology and Systems. 7. DOI: 10.1145/2629423  1
2014 De Clercq R, Uhsadel L, Van Herrewege A, Verbauwhede I. Ultra low-power implementation of ecc on the arm cortex-MO Proceedings - Design Automation Conference. DOI: 10.1145/2593069.2593238  1
2014 Van Herrewege A, Verbauwhede I. Software only, extremely compact, keccak-based secure prng on ARM cortex-M Proceedings - Design Automation Conference. DOI: 10.1145/2593069.2593218  1
2014 Da Rolt J, Das A, Di Natale G, Flottes ML, Rouzeyre B, Verbauwhede I. Test versus security: Past and present Ieee Transactions On Emerging Topics in Computing. 2: 50-62. DOI: 10.1109/TETC.2014.2304492  1
2014 Delvaux J, Verbauwhede I. Fault injection modeling attacks on 65 nm arbiter and RO Sum PUFs via environmental changes Ieee Transactions On Circuits and Systems I: Regular Papers. 61: 1701-1713. DOI: 10.1109/TCSI.2013.2290845  1
2014 Yao GX, Fan J, Cheung RCC, Verbauwhede I. Novel RNS parameter selection for fast modular multiplication Ieee Transactions On Computers. 63: 2099-2105. DOI: 10.1109/TC.2013.92  1
2014 Ghosh S, Verbauwhede I. BLAKE-512-based 128-bit CCA2 secure timing attack resistant McEliece cryptoprocessor Ieee Transactions On Computers. 63: 1124-1133. DOI: 10.1109/TC.2012.271  1
2014 Balasch J, Gierlichs B, Jaurvinen K, Verbauwhede I. Hardware/software co-design flavors of elliptic curve scalar multiplication Ieee International Symposium On Electromagnetic Compatibility. 2014: 758-763. DOI: 10.1109/ISEMC.2014.6899070  1
2014 Mandel Yu MD, M'Raihi D, Verbauwhede I, Devadas S. A noise bifurcation architecture for linear additive physical functions Proceedings of the 2014 Ieee International Symposium On Hardware-Oriented Security and Trust, Host 2014. 124-129. DOI: 10.1109/HST.2014.6855582  1
2014 De Clercq R, Piessens F, Schellekens D, Verbauwhede I. Secure interrupts on low-end microcontrollers Proceedings of the International Conference On Application-Specific Systems, Architectures and Processors. 147-152. DOI: 10.1109/ASAP.2014.6868649  1
2014 Sinha Roy S, Vercauteren F, Verbauwhede I. High precision discrete Gaussian sampling on FPGAs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8282: 383-401. DOI: 10.1007/978-3-662-43414-7_19  1
2014 Mouha N, Mennink B, Van Herrewege A, Watanabe D, Preneel B, Verbauwhede I. Chaskey: An efficient MAC algorithm for 32-bit microcontrollers Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8781: 306-323. DOI: 10.1007/978-3-319-13051-4_19  1
2014 Reparaz O, Gierlichs B, Verbauwhede I. Generic DPA attacks: Curse or blessing? Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8622: 98-111. DOI: 10.1007/978-3-319-10175-0_8  1
2014 Reparaz O, Gierlichs B, Verbauwhede I. A note on the use of margins to compare distinguishers Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8622: 1-8. DOI: 10.1007/978-3-319-10175-0_1  1
2014 Delvaux J, Verbauwhede I. Attacking PUF-based pattern matching key generators via helper data manipulation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8366: 106-131. DOI: 10.1007/978-3-319-04852-9_6  1
2014 Roy SS, Vercauteren F, Mentens N, Donglong D, Verbauwhede I. Compact ring-LWE cryptoprocessor Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8731: 371-391.  1
2014 Delvaux J, Gu D, Schellekens D, Verbauwhede I. Secure lightweight entity authentication with strong PUFs: Mission impossible? Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8731: 451-475.  1
2013 Van Herrewege A, Van Der Leest V, Schaller A, Katzenbeisser S, Verbauwhede I. Secure PRNG seeding on commercial off-the-shelf microcontrollers Proceedings of the Acm Conference On Computer and Communications Security. 55-63. DOI: 10.1145/2517300.2517306  1
2013 Van Herrewege A, Schaller A, Katzenbeisser S, Verbauwhede I. Demo: Inherent PUFs and secure PRNGs on commercial off-the-shelf microcontrollers Proceedings of the Acm Conference On Computer and Communications Security. 1333-1335. DOI: 10.1145/2508859.2512493  1
2013 Fan J, Reparaz O, Rožić V, Verbauwhede I. Low-energy encryption for medical devices: Security adds an extra design dimension Proceedings - Design Automation Conference. DOI: 10.1145/2463209.2488752  1
2013 Karaklajic D, Schmidt JM, Verbauwhede I. Hardware designer's guide to fault attacks Ieee Transactions On Very Large Scale Integration (Vlsi) Systems. 21: 2295-2306. DOI: 10.1109/TVLSI.2012.2231707  1
2013 Uhsadel L, Ullrich M, Das A, Karaklajic D, Balasch J, Verbauwhede I, Dehaene W. Teaching HW/SW co-design with a public key cryptography application Ieee Transactions On Education. 56: 478-483. DOI: 10.1109/TE.2013.2257785  1
2013 Das A, Ege B, Ghosh S, Batina L, Verbauwhede I. Security analysis of industrial test compression schemes Ieee Transactions On Computer-Aided Design of Integrated Circuits and Systems. 32: 1966-1977. DOI: 10.1109/TCAD.2013.2274619  1
2013 Bogdanov A, Knežević M, Leander G, Toz D, Varici K, Verbauwhede I. SPONGENT: The design space of lightweight cryptographic hashing Ieee Transactions On Computers. 62: 2041-2053. DOI: 10.1109/TC.2012.196  1
2013 Vliegen J, Mentcns N, Verbauwhede I. A single-chip solution for the secure remote configuration of FPGAs using bitstream compression 2013 International Conference On Reconfigurable Computing and Fpgas, Reconfig 2013. DOI: 10.1109/ReConFig.2013.6732330  1
2013 Schaumont P, Verbauwhede I. The exponential impact of creativity in computer engineering education 2013 Ieee International Conference On Microelectronic Systems Education, Mse 2013. 17-20. DOI: 10.1109/MSE.2013.6566694  1
2013 Delvaux J, Verbauwhede I. Side channel modeling attacks on 65nm arbiter PUFs exploiting CMOS device noise Proceedings of the 2013 Ieee International Symposium On Hardware-Oriented Security and Trust, Host 2013. 137-142. DOI: 10.1109/HST.2013.6581579  1
2013 Das A, Da Rolt J, Ghosh S, Seys S, Dupuis S, Di Natale G, Flottes ML, Rouzeyre B, Verbauwhede I. Secure JTAG implementation using schnorr protocol Journal of Electronic Testing: Theory and Applications (Jetta). 29: 193-209. DOI: 10.1007/s10836-013-5369-9  1
2013 Li Z, Zhang B, Fan J, Verbauwhede I. A new model for error-tolerant side-channel cube attacks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8086: 453-470. DOI: 10.1007/978-3-642-40349-1-26  1
2013 Ghosh S, Kumar A, Das A, Verbauwhede I. On the implementation of unified arithmetic on binary huff curves Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8086: 349-364. DOI: 10.1007/978-3-642-40349-1-20  1
2013 Ghosh S, Verbauwhede I, Roychowdhury D. Core based architecture to speed up optimal ate pairing on FPGA platform Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7708: 141-159.  1
2013 Yao GX, Fan J, Cheung RCC, Verbauwhede I. Faster pairing coprocessor architecture Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7708: 160-176.  1
2012 Hospodar G, Maes R, Verbauwhede I. Machine learning attacks on 65nm Arbiter PUFs: Accurate modeling poses strict bounds on usability Wifs 2012 - Proceedings of the 2012 Ieee International Workshop On Information Forensics and Security. 37-42. DOI: 10.1109/WIFS.2012.6412622  1
2012 Knežević M, Kobayashi K, Ikegami J, Matsuo S, Satoh A, Kocabas U, Fan J, Katashita T, Sugawara T, Sakiyama K, Verbauwhede I, Ohta K, Homma N, Aoki T. Fair and consistent hardware evaluation of fourteen round two SHA-3 candidates Ieee Transactions On Very Large Scale Integration (Vlsi) Systems. 20: 827-840. DOI: 10.1109/TVLSI.2011.2128353  1
2012 Potkonjak M, Karri R, Verbauwhede I, Itoh K. Guest editorial integrated circuit and system security Ieee Transactions On Information Forensics and Security. 7: 1-2. DOI: 10.1109/TIFS.2011.2180833  1
2012 Maes R, Schellekens D, Verbauwhede I. A pay-per-use licensing scheme for hardware IP cores in recent SRAM-based FPGAs Ieee Transactions On Information Forensics and Security. 7: 98-108. DOI: 10.1109/TIFS.2011.2169667  1
2012 Fan J, Vercauteren F, Verbauwhede I. Efficient hardware implementation of IF p-arithmetic for pairing-friendly curves Ieee Transactions On Computers. 61: 676-685. DOI: 10.1109/TC.2011.78  1
2012 Van Herrewege A, Verbauwhede I. Tiny application-specific programmable processor for BCH decoding 2012 International Symposium On System On Chip, Soc 2012. DOI: 10.1109/ISSoC.2012.6376358  1
2012 Rožic V, Dehaene W, Verbauwhede I. Design solutions for securing SRAM cell against power analysis Proceedings of the 2012 Ieee International Symposium On Hardware-Oriented Security and Trust, Host 2012. 122-127. DOI: 10.1109/HST.2012.6224331  1
2012 Karaklajić D, Fan J, Verbauwhede I. A systematic M safe-error detection in hardware implementations of cryptographic algorithms Proceedings of the 2012 Ieee International Symposium On Hardware-Oriented Security and Trust, Host 2012. 96-101. DOI: 10.1109/HST.2012.6224327  1
2012 Maes R, Rožić V, Verbauwhede I, Koeberl P, Van Der Sluis E, Van Der Leest V. Experimental evaluation of Physically Unclonable Functions in 65 nm CMOS European Solid-State Circuits Conference. 486-489. DOI: 10.1109/ESSCIRC.2012.6341361  1
2012 Ege B, Das A, Gosh S, Verbauwhede I. Differential scan attack on AES with X-tolerant and X-masked test response compactor Proceedings - 15th Euromicro Conference On Digital System Design, Dsd 2012. 545-552. DOI: 10.1109/DSD.2012.44  1
2012 Da Rolt J, Das A, Di Natale G, Flottes ML, Rouzeyre B, Verbauwhede I. A scan-based attack on elliptic curve cryptosystems in presence of industrial design-for-testability structures Proceedings - Ieee International Symposium On Defect and Fault Tolerance in Vlsi Systems. 43-48. DOI: 10.1109/DFT.2012.6378197  1
2012 Ghosh S, Delvaux J, Uhsadel L, Verbauwhede I. A speed area optimized embedded co-processor for McEliece cryptosystem Proceedings of the International Conference On Application-Specific Systems, Architectures and Processors. 102-108. DOI: 10.1109/ASAP.2012.16  1
2012 Uhsadel L, Ullrich M, Verbauwhede I, Preneel B. Interface design for mapping a variety of RSA exponentiation algorithms on a HW/SW co-design platform Proceedings of the International Conference On Application-Specific Systems, Architectures and Processors. 109-116. DOI: 10.1109/ASAP.2012.11  1
2012 Da Rolt J, Das A, Ghosh S, Di Natale G, Flottes ML, Rouzeyre B, Verbauwhede I. Scan attacks on side-channel and fault attack resistant public-key implementations Journal of Cryptographic Engineering. 2: 207-219. DOI: 10.1007/s13389-012-0045-z  1
2012 Batina L, Lee YK, Seys S, Singelée D, Verbauwhede I. Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs Personal and Ubiquitous Computing. 16: 323-335. DOI: 10.1007/s00779-011-0392-2  1
2012 Aerts W, Biham E, De Moitié D, De Mulder E, Dunkelman O, Indesteege S, Keller N, Preneel B, Vandenbosch GAE, Verbauwhede I. A practical attack on KeeLoq Journal of Cryptology. 25: 136-157. DOI: 10.1007/s00145-010-9091-9  1
2012 Groza B, Murvay S, Van Herrewege A, Verbauwhede I. LiBrA-CAN: A lightweight broadcast authentication protocol for controller area networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7712: 185-200. DOI: 10.1007/978-3-642-35404-5_15  1
2012 Balasch J, Faust S, Gierlichs B, Verbauwhede I. Theory and practice of a leakage resilient masking scheme Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7658: 758-775. DOI: 10.1007/978-3-642-34961-4_45  1
2012 Yamamoto D, Hospodar G, Maes R, Verbauwhede I. Performance and security evaluation of AES S-box-based glitch PUFs on FPGAs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7644: 45-62. DOI: 10.1007/978-3-642-34416-9_4  1
2012 Maes R, Van Herrewege A, Verbauwhede I. PUFKY: A fully functional PUF-based cryptographic key generator Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7428: 302-319. DOI: 10.1007/978-3-642-33027-8_18  1
2012 Katzenbeisser S, Kocabaş U, Rožić V, Sadeghi AR, Verbauwhede I, Wachsmann C. PUFs: Myth, fact or busted? A security evaluation of Physically Unclonable Functions (PUFs) cast in silicon Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7428: 283-301. DOI: 10.1007/978-3-642-33027-8_17  1
2012 Reparaz O, Gierlichs B, Verbauwhede I. Selecting time samples for multivariate DPA attacks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7428: 155-174. DOI: 10.1007/978-3-642-33027-8_10  1
2012 Van Herrewege A, Katzenbeisser S, Maes R, Peeters R, Sadeghi AR, Verbauwhede I, Wachsmann C. Reverse fuzzy extractors: Enabling lightweight mutual authentication for PUF-enabled RFIDs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7397: 374-389. DOI: 10.1007/978-3-642-32946-3_27  1
2012 Da Rolt J, Das A, Di Natale G, Flottes ML, Rouzeyre B, Verbauwhede I. A new scan attack on RSA in presence of industrial countermeasures Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7275: 89-104. DOI: 10.1007/978-3-642-29912-4_8  1
2012 Fan J, Verbauwhede I. An updated survey on secure ECC implementations: Attacks, countermeasures and cost Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6805: 265-282. DOI: 10.1007/978-3-642-28368-0_18  1
2012 Balasch J, Gierlichs B, Verdult R, Batina L, Verbauwhede I. Power analysis of atmel CryptoMemory - Recovering keys from secure EEPROMs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7178: 19-34. DOI: 10.1007/978-3-642-27954-6_2  1
2012 Batina L, Seys S, Singelée D, Verbauwhede I. Hierarchical ECC-based RFID authentication protocol Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7055: 183-201. DOI: 10.1007/978-3-642-25286-0_12  1
2012 Das A, Kocabaş U, Sadeghi AR, Verbauwhede I. PUF-based secure test wrapper design for cryptographic SoC testing Proceedings -Design, Automation and Test in Europe, Date. 866-869.  1
2012 Veljković F, Rožić V, Verbauwhede I. Low-cost implementations of on-the-fly tests for random number generators Proceedings -Design, Automation and Test in Europe, Date. 959-964.  1
2011 Singelée D, Seys S, Batina L, Verbauwhede I. The communication and computation cost of wireless security - Extended abstract Wisec'11 - Proceedings of the 4th Acm Conference On Wireless Network Security. 1-3. DOI: 10.1145/1998412.1998414  1
2011 Verbauwhede I, Maes R. Physically unclonable functions: Manufacturing variability as an unclonable device identifier Proceedings of the Acm Great Lakes Symposium On Vlsi, Glsvlsi. 455-460. DOI: 10.1145/1973009.1973111  1
2011 Braeken A, Genoe J, Kubera S, Mentens N, Touhafi A, Verbauwhede I, Verbelen Y, Vliegen J, Wouters K. Secure remote reconfiguration of an FPGA-based embedded system 6th International Workshop On Reconfigurable Communication-Centric Systems-On-Chip, Recosoc 2011 - Proceedings. DOI: 10.1109/ReCoSoC.2011.5981501  1
2011 Karaklajíc D, Fan J, Verbauwhede I. Systematic security evaluation method against C safe-error attacks 2011 Ieee International Symposium On Hardware-Oriented Security and Trust, Host 2011. 63-66. DOI: 10.1109/HST.2011.5954997  1
2011 Balasch J, Gierlichs B, Verbauwhede I. An in-depth and black-box characterization of the effects of clock glitches on 8-bit MCUs Proceedings - 2011 Workshop On Fault Diagnosis and Tolerance in Cryptography, Fdtc 2011. 105-114. DOI: 10.1109/FDTC.2011.9  1
2011 Verbauwhede I, Karaklajić D, Schmidt JM. The fault attack jungle - A classification model to guide you Proceedings - 2011 Workshop On Fault Diagnosis and Tolerance in Cryptography, Fdtc 2011. 3-8. DOI: 10.1109/FDTC.2011.13  1
2011 Fan J, Batina L, Verbauwhede I. Design and design methods for unified multiplier and inverter and its application for HECC Integration, the Vlsi Journal. 44: 280-289. DOI: 10.1016/j.vlsi.2011.04.001  1
2011 Sakiyama K, Knežević M, Fan J, Preneel B, Verbauwhede I. Tripartite modular multiplication Integration, the Vlsi Journal. 44: 259-269. DOI: 10.1016/j.vlsi.2011.03.008  1
2011 Hospodar G, Gierlichs B, De Mulder E, Verbauwhede I, Vandewalle J. Machine learning in side-channel analysis: A first study Journal of Cryptographic Engineering. 1: 293-302. DOI: 10.1007/s13389-011-0023-x  1
2011 Cheung RCC, Duquesne S, Fan J, Guillermin N, Verbauwhede I, Yao GX. FPGA implementation of pairings using residue number system and lazy reduction Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6917: 421-441. DOI: 10.1007/978-3-642-23951-9_28  1
2011 Bogdanov A, Knežević M, Leander G, Toz D, Varici K, Verbauwhede I. Spongent: A lightweight hash function Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6917: 312-325. DOI: 10.1007/978-3-642-23951-9_21  1
2011 Devos H, Van Campenhout J, Verbauwhede I, Stroobandt D. Constructing application-specific memory hierarchies on FPGAs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6590: 201-216. DOI: 10.1007/978-3-642-19448-1_11  1
2011 Batina L, Lee YK, Seys S, Singelée D, Verbauwhede I. Privacy-preserving ECC-based grouping proofs for RFID Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6531: 159-165. DOI: 10.1007/978-3-642-18178-8-14  1
2011 Karaklajić D, Fan J, Schmidt JM, Verbauwhede I. Low-cost fault detection method for ECC using Montgomery powering ladder Proceedings -Design, Automation and Test in Europe, Date. 1016-1021.  1
2010 Lee YK, Batina L, Singelée D, Verbauwhede I. Low-cost untraceable authentication protocols for RFID Wisec'10 - Proceedings of the 3rd Acm Conference On Wireless Network Security. 55-64. DOI: 10.1145/1741866.1741877  1
2010 Knežević M, Vercauteren F, Verbauwhede I. Faster interleaved modular multiplication based on Barrett and Montgomery reduction methods Ieee Transactions On Computers. 59: 1715-1721. DOI: 10.1109/TC.2010.93  1
2010 Ansari B, Verbauwhede I. FO4-based models for area, delay and energy of polynomial multiplication over binary fields Ieee Workshop On Signal Processing Systems, Sips: Design and Implementation. 420-425. DOI: 10.1109/SIPS.2010.5624884  1
2010 Kobayashi K, Ikegami J, Kneževíc M, Guo EX, Matsuo S, Huang S, Nazhandali L, Kocabaş U, Fan J, Satoh A, Verbauwhede I, Sakiyama K, Ohta K. Prototyping platform for performance evaluation of SHA-3 candidates Proceedings of the 2010 Ieee International Symposium On Hardware-Oriented Security and Trust, Host 2010. 60-63. DOI: 10.1109/HST.2010.5513111  1
2010 Fan J, Guo X, De Mulder E, Schaumont P, Preneel B, Verbauwhede I. State-of-the-art of secure ECC implementations: A survey on known side-channel attacks and countermeasures Proceedings of the 2010 Ieee International Symposium On Hardware-Oriented Security and Trust, Host 2010. 76-87. DOI: 10.1109/HST.2010.5513110  1
2010 Fan J, Bailey DV, Batina L, Güneysu T, Paar C, Verbauwhede I. Breaking elliptic curve cryptosystems using reconfigurable hardware Proceedings - 2010 International Conference On Field Programmable Logic and Applications, Fpl 2010. 133-138. DOI: 10.1109/FPL.2010.34  1
2010 Joye M, Verbauwhede I, Breveglieri L, Koren I. Fault Diagnosis and Tolerance in Cryptography - Proceedings of the 7th International Workshop, FDTC 2010: Preface Fault Diagnosis and Tolerance in Cryptography - Proceedings of the 7th International Workshop, Fdtc 2010. vii. DOI: 10.1109/FDTC.2010.4  1
2010 Karaklajić D, Knežević M, Verbauwhede I. Low cost Built in self test for public key crypto cores Fault Diagnosis and Tolerance in Cryptography - Proceedings of the 7th International Workshop, Fdtc 2010. 97-103. DOI: 10.1109/FDTC.2010.12  1
2010 Ansari B, Verbauwhede I. A hybrid scheme for concurrent error detection of multiplication over finite fields Proceedings - Ieee International Symposium On Defect and Fault Tolerance in Vlsi Systems. 399-407. DOI: 10.1109/DFT.2010.54  1
2010 Kocabaş Ü, Fan J, Verbauwhede I. Implementation of Binary Edwards Curves for very-constrained devices Proceedings of the International Conference On Application-Specific Systems, Architectures and Processors. 185-191. DOI: 10.1109/ASAP.2010.5541003  1
2010 Vliegen J, Mentens N, Genoe J, Braeken A, Kubera S, Touhafi A, Verbauwhede I. A compact FPGA-based architecture for elliptic curve cryptography over prime fields Proceedings of the International Conference On Application-Specific Systems, Architectures and Processors. 313-316. DOI: 10.1109/ASAP.2010.5540977  1
2010 Lee YK, Batina L, Singelée D, Verbauwhede I. Wide-weak privacy-preserving RFID authentication protocols Lecture Notes of the Institute For Computer Sciences, Social-Informatics and Telecommunications Engineering. 45: 254-267. DOI: 10.1007/978-3-642-16644-0_23  1
2010 Knežević M, Vercauteren F, Verbauwhede I. Speeding up bipartite modular multiplication Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6087: 166-179. DOI: 10.1007/978-3-642-13797-6_12  1
2010 Gierlichs B, Batina L, Preneel B, Verbauwhede I. Revisiting higher-order DPA attacks: Multivariate mutual information analysis Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5985: 221-234. DOI: 10.1007/978-3-642-11925-5_16  1
2010 Balasch J, Verbauwhede I, Preneel B. An embedded platform for privacy-friendly road charging applications Proceedings -Design, Automation and Test in Europe, Date. 867-872.  1
2009 Kněeví M, Verbauwhede I. Hardware evaluation of the Luffa hash family Embedded Systems Week 2009, Esweek 2009 - 4th Workshop On Embedded Systems Security, Wess 2009. DOI: 10.1145/1631716.1631725  1
2009 Sterckx M, Gierlichs B, Preneel B, Verbauwhede I. Efficient implementation of anonymous credentials on java card smart cards Proceedings of the 2009 1st Ieee International Workshop On Information Forensics and Security, Wifs 2009. 106-110. DOI: 10.1109/WIFS.2009.5386474  1
2009 De Mulder E, Gierlichs B, Preneel B, Verbauwhede I. Practical DPA attacks on MDPL Proceedings of the 2009 1st Ieee International Workshop On Information Forensics and Security, Wifs 2009. 191-195. DOI: 10.1109/WIFS.2009.5386455  1
2009 Coppens B, Verbauwhede I, De Bosschere K, De Sutter B. Practical mitigations for timing-based side-channel attacks on modern x86 processors Proceedings - Ieee Symposium On Security and Privacy. 45-60. DOI: 10.1109/SP.2009.19  1
2009 Lee YK, Batina L, Verbauwhede I. Untraceable RFID authentication protocols: Revision of EC-RAC 2009 Ieee International Conference On Rfid, Rfid 2009. 178-185. DOI: 10.1109/RFID.2009.4911179  1
2009 Maes R, Tuyls P, Verbauwhede I. A soft decision helper data algorithm for SRAM PUFs Ieee International Symposium On Information Theory - Proceedings. 2101-2105. DOI: 10.1109/ISIT.2009.5205263  1
2009 Knežević M, Batina L, Verbauwhede I. Modular reduction without precomputational phase Proceedings - Ieee International Symposium On Circuits and Systems. 1389-1392. DOI: 10.1109/ISCAS.2009.5118024  1
2009 Fan J, Knežević M, Karaklajić D, Maes R, Rozić V, Batina L, Verbauwhede I. FPGA-based testing strategy for cryptographic chips: A case study on elliptic curve processor for RFID tags 2009 15th Ieee International On-Line Testing Symposium, Iolts 2009. 189-191. DOI: 10.1109/IOLTS.2009.5196009  1
2009 Maes R, Schellekens D, Tuyls P, Verbauwhede I. Analysis and design of active IC metering schemes 2009 Ieee International Workshop On Hardware-Oriented Security and Trust, Host 2009. 74-81. DOI: 10.1109/HST.2009.5224964  1
2009 Rožić V, Verbauwhede I. Random numbers generation: Investigation of narrowtransitions suppression on FPGA Fpl 09: 19th International Conference On Field Programmable Logic and Applications. 699-702. DOI: 10.1109/FPL.2009.5272359  1
2009 Gierlichs B, De Mulder E, Preneel B, Verbauwhede I. Empirical comparison of side channel analysis distinguishers on DES in hardware Ecctd 2009 - European Conference On Circuit Theory and Design Conference Program. 391-394. DOI: 10.1109/ECCTD.2009.5275003  1
2009 Aerts W, Preneel B, Verbauwhede I, Vandenbosch G, De Mulder E. Case study : A class E Power amplifier for ISO-14443A Proceedings of the 2009 Ieee Symposium On Design and Diagnostics of Electronic Circuits and Systems, Ddecs 2009. 20-23. DOI: 10.1109/DDECS.2009.5012091  1
2009 Maes R, Tuyls P, Verbauwhede I. Low-overhead implementation of a soft decision helper data algorithm for SRAM PUFs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5747: 332-347. DOI: 10.1007/978-3-642-04138-9_24  1
2009 Guo X, Fan J, Schaumont P, Verbauwhede I. Programmable and parallel ECC coprocessor architecture: Tradeoffs between area, speed and security Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5747: 289-303. DOI: 10.1007/978-3-642-04138-9_21  1
2009 Fan J, Vercauteren F, Verbauwhede I. Faster double-struck F p-arithmetic for cryptographic pairings on Barreto-Naehrig curves Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5747: 240-253. DOI: 10.1007/978-3-642-04138-9_18  1
2009 Standaert FX, Gierlichs B, Verbauwhede I. Partition vs.comparison side-channel distinguishers: An empirical evaluation of statistical tests for univariate side-channel attacks against two unprotected CMOS devices Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5461: 253-267. DOI: 10.1007/978-3-642-00730-9_16  1
2009 Fan J, Batina L, Verbauwhede I. Light-weight implementation options for curve-based cryptography: HECC is also ready for RFID International Conference For Internet Technology and Secured Transactions, Icitst 2009 1
2009 Aerts W, De Mulder E, Preneel B, Vandenbosch GAE, Verbauwhede I. Designing maximal resolution loop sensors for electromagnetic cryptographic analysis European Conference On Antennas and Propagation, Eucap 2009, Proceedings. 415-419.  1
2008 Chan H, Villa Casado AI, Basak J, Griot M, Weng WY, Wesel R, Jalali B, Yablonovitch E, Verbauwhede I. Demonstration of uncoordinated multiple access in optical communications Ieee Transactions On Circuits and Systems I: Regular Papers. 55: 3259-3269. DOI: 10.1109/TCSI.2008.925365  1
2008 Kim J, Lai BC, Verbauwhede I. A cost-effective latency-aware memory bus for symmetric multiprocessor systems Ieee Transactions On Computers. 57: 1714-1719. DOI: 10.1109/TC.2008.96  1
2008 Lee YK, Sakiyama K, Batina L, Verbauwhede I. Elliptic-curve-based security processor for RFID Ieee Transactions On Computers. 57: 1514-1527. DOI: 10.1109/TC.2008.148  1
2008 Aerts W, De Mulder E, Preneel B, Vandenbosch GAE, Verbauwhede I. Dependence of RFID reader antenna design on read out distance Ieee Transactions On Antennas and Propagation. 56: 3829-3837. DOI: 10.1109/TAP.2008.2007378  1
2008 Fan J, Verbauwhede I. A digit-serial architecture for inversion and multiplication in GF(2M) Ieee Workshop On Signal Processing Systems, Sips: Design and Implementation. 7-12. DOI: 10.1109/SIPS.2008.4671729  1
2008 Lee YK, Batina L, Verbauwhede I. EC-RAC (ECDLP based randomized access control): Provably secure RFID authentication protocol 2008 Ieee International Conference On Rfid (Frequency Identification), Ieee Rfid 2008. 97-104. DOI: 10.1109/RFID.2008.4519370  1
2008 Fan J, Verbauwhede I. Unified digit-serial multiplier/inverter in finite field GF(2m) 2008 Ieee International Workshop On Hardware-Oriented Security and Trust, Host. 72-75. DOI: 10.1109/HST.2008.4559055  1
2008 Uhsadel L, Georges A, Verbauwhede I. Exploiting hardware performance counters Fault Diagnosis and Tolerance in Cryptography - Proceedings of the 5th International Workshop, Fdtc 2008. 59-67. DOI: 10.1109/FDTC.2008.19  1
2008 Fan J, Batina L, Sakiyama K, Verbauwhede I. FPGA design for algebraic tori-based Public-Key Cryptography Proceedings -Design, Automation and Test in Europe, Date. 1292-1297. DOI: 10.1109/DATE.2008.4484857  1
2008 Knežević M, Sakiyama K, Lee YK, Verbauwhede I. On the high-throughput implementation of RIPEMD-160 hash algorithm Proceedings of the International Conference On Application-Specific Systems, Architectures and Processors. 85-90. DOI: 10.1109/ASAP.2008.4580159  1
2008 Atici AC, Fan J, Batina L, Verbauwhede I, Yalçin SBO. Low-cost Implementations of NTRU for pervasive security Proceedings of the International Conference On Application-Specific Systems, Architectures and Processors. 79-84. DOI: 10.1109/ASAP.2008.4580158  1
2008 Lee YK, Chan H, Verbauwhede I. Design methodology for throughput optimum architectures of hash algorithms of the MD4-class Journal of Signal Processing Systems. 53: 89-102. DOI: 10.1007/s11265-008-0168-8  1
2008 Fan J, Sakiyama K, Verbauwhede I. Elliptic curve cryptography on embedded multicore systems Design Automation For Embedded Systems. 12: 231-242. DOI: 10.1007/s10617-008-9021-3  1
2008 Fan J, Batina L, Verbauwhede I. HECC goes embedded: An area-efficient implementation of HECC Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5381: 387-400. DOI: 10.1007/978-3-642-04159-4_25  1
2008 Mentens N, Gierlichs B, Verbauwhede I. Power and fault analysis resistance in hardware through dynamic reconfiguration Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5154: 346-362. DOI: 10.1007/978-3-540-85053-3_22  1
2008 Clavier C, Gierlichs B, Verbauwhede I. Fault analysis study of IDEA Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4964: 274-287. DOI: 10.1007/978-3-540-79263-5_17  1
2008 Troncoso C, Gierlichs B, Preneel B, Verbauwhede I. Perfect matching disclosure attacks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5134: 2-23. DOI: 10.1007/978-3-540-70630-4_2  1
2008 Knežević M, Sakiyama K, Fan J, Verbauwhede I. Modular reduction in GF(2 n ) without pre-computational phase Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5130: 77-87. DOI: 10.1007/978-3-540-69499-1_7  1
2008 Knežević M, Velichkov V, Preneel B, Verbauwhede I. On the practical performance of rateless codes Winsys 2008 - International Conference On Wireless Information Networks and Systems, Proceedings. 173-176.  1
2007 Deprettre EF, Woods R, Verbauwhede I, De Kock E. Editorial: Transforming signal processing applications into parallel implementations Eurasip Journal On Advances in Signal Processing. 2007. DOI: 10.1155/2007/95760  1
2007 Mentens N, Sakiyama K, Preneel B, Verbauwhede I. Efficient pipelining for modular multiplication architectures in prime fields Proceedings of the Acm Great Lakes Symposium On Vlsi, Glsvlsi. 534-539. DOI: 10.1145/1228784.1228911  1
2007 Sakiyama K, De Mulder E, Preneel B, Verbauwhede I. Side-channel resistant system-level design flow for public-key cryptography Proceedings of the Acm Great Lakes Symposium On Vlsi, Glsvlsi. 144-147. DOI: 10.1145/1228784.1228822  1
2007 De Mulder E, Örs SB, Preneel B, Verbauwhede I. Differential electromagnetic attack on an fpga implementation of elliptic curve cryptosystems 2006 World Automation Congress, Wac'06. DOI: 10.1109/WAC.2006.375739  1
2007 Sakiyama K, Batina L, Preneel B, Verbauwhede I. HW/SW co-design for accelerating public-key cryptosystems over GF(p) on the 8051 μ-controller 2006 World Automation Congress, Wac'06. DOI: 10.1109/WAC.2006.375737  1
2007 Kim J, Verbauwhede I, Chang MCF. Design of an interconnect architecture and signaling technology for parallelism in communication Ieee Transactions On Very Large Scale Integration (Vlsi) Systems. 15: 881-893. DOI: 10.1109/TVLSI.2007.900739  1
2007 Sakiyama K, Batina L, Preneel B, Verbauwhede I. Multicore curve-based cryptoprocessor with reconfigurable modular arithmetic logic units over GF (2n) Ieee Transactions On Computers. 56: 1269-1282. DOI: 10.1109/TC.2007.1071  1
2007 Fan J, Sakiyama K, Verbauwhede I. Montgomery modular multiplication algorithm on multi-core systems Ieee Workshop On Signal Processing Systems, Sips: Design and Implementation. 261-266. DOI: 10.1109/SIPS.2007.4387555  1
2007 Batina L, Guajardo J, Kerins T, Mentens N, Tuyls P, Verbauwhede I. Public-key cryptography for RFID-tags Proceedings - Fifth Annual Ieee International Conference On Pervasive Computing and Communications Workshops, Percom Workshops 2007. 217-222. DOI: 10.1109/PERCOMW.2007.98  1
2007 Mentens N, Sakiyama K, Batina L, Preneel B, Verbauwhede I. A side-channel attack resistant programmable PKC coprocessor for embedded applications Proceedings - 2007 International Conference On Embedded Computer Systems: Architectures, Modeling and Simulation, Ic-Samos 2007. 194-200. DOI: 10.1109/ICSAMOS.2007.4285751  1
2007 Yang S, Verbauwhede I. Secure iris verification Icassp, Ieee International Conference On Acoustics, Speech and Signal Processing - Proceedings. 2: II133-II136. DOI: 10.1109/ICASSP.2007.366190  1
2007 Verbauwhede I, Schaumont P. Design methods for security and trust Proceedings -Design, Automation and Test in Europe, Date. 672-677. DOI: 10.1109/DATE.2007.364671  1
2007 Sakiyama K, Mentens N, Batina L, Preneel B, Verbauwhede I. Reconfigurable modular arithmetic logic unit supporting high-performance RSA and ECC over GF(p) International Journal of Electronics. 94: 501-514. DOI: 10.1080/00207210701293264  1
2007 Hodjat A, Batina L, Hwang D, Verbauwhede I. HW/SW co-design of a hyperelliptic curve cryptosystem using a microcode instruction set coprocessor Integration, the Vlsi Journal. 40: 45-51. DOI: 10.1016/j.vlsi.2005.12.011  1
2007 De Mulder E, Örs SB, Preneel B, Verbauwhede I. Differential power and electromagnetic attacks on a FPGA implementation of elliptic curve cryptosystems Computers and Electrical Engineering. 33: 367-382. DOI: 10.1016/j.compeleceng.2007.05.009  1
2007 Sakiyama K, Batina L, Preneel B, Verbauwhede I. HW/SW co-design for public-key cryptosystems on the 8051 micro-controller Computers and Electrical Engineering. 33: 324-332. DOI: 10.1016/j.compeleceng.2007.05.005  1
2007 Sakiyama K, Batina L, Preneel B, Verbauwhede I. High-performance public-key cryptoprocessor for wireless mobile applications Mobile Networks and Applications. 12: 245-258. DOI: 10.1007/s11036-007-0020-6  1
2007 Lee YK, Verbauwhede I. A compact architecture for montgomery elliptic curve scalar multiplication processor Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4867: 115-127.  1
2007 Lee YK, Chan H, Verbauwhede I. Iteration bound analysis and throughput optimum architecture of SHA-256 (384, 512) for hardware implementations Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4867: 102-114.  1
2007 Batina L, Mentens N, Sakiyama K, Preneel B, Verbauwhede I. Public-key cryptography on the top of a needle Proceedings - Ieee International Symposium On Circuits and Systems. 1831-1834.  1
2006 Yang S, Sakiyama K, Verbauwhede I. Efficient and secure fingerprint verification for embedded devices Eurasip Journal On Applied Signal Processing. 2006. DOI: 10.1155/ASP/2006/58263  1
2006 Badaroglu M, Tiri K, Van Der Plas G, Wambacq P, Verbauwhede I, Donnay S, Gielen GGE, De Man HJ. Clock-skew-optimization methodology for substrate-noise reduction with supply-current folding Ieee Transactions On Computer-Aided Design of Integrated Circuits and Systems. 25: 1146-1154. DOI: 10.1109/TCAD.2005.855952  1
2006 Tiri K, Verbauwhede I. A digital design flow for secure integrated circuits Ieee Transactions On Computer-Aided Design of Integrated Circuits and Systems. 25: 1197-1208. DOI: 10.1109/TCAD.2005.855939  1
2006 Schaumont P, Hwang D, Yang S, Verbauwhede I. Multilevel design validation in a secure embedded system Ieee Transactions On Computers. 55: 1380-1390. DOI: 10.1109/TC.2006.184  1
2006 Schaumont P, Verbauwhede I. A component-based design environment for ESL design Ieee Design and Test of Computers. 23: 338-346. DOI: 10.1109/MDT.2006.110  1
2006 Tiri K, Schaumont P, Verbauwhede I. Side-channel leakage tolerant architectures Proceedings - Third International Conference Oninformation Technology: New Generations, Itng 2006. 2006: 204-209. DOI: 10.1109/ITNG.2006.121  1
2006 Griot M, Vila Casado AI, Weng WY, Chan H, Basak J, Yablonovitch E, Verbauwhede I, Jalali B, Wesel RD. Trellis codes with low ones density for the or multiple access channel Ieee International Symposium On Information Theory - Proceedings. 1817-1821. DOI: 10.1109/ISIT.2006.261748  1
2006 Batina L, Hodjat A, Hwang D, Sakiyama K, Verbauwhede I. Reconfigurable architectures for curve-based cryptography on embedded micro-controllers Proceedings - 2006 International Conference On Field Programmable Logic and Applications, Fpl. 667-670. DOI: 10.1109/FPL.2006.311286  1
2006 Schellekens D, Preneel B, Verbauwhede I. FPGA vendor agnostic true random number generator Proceedings - 2006 International Conference On Field Programmable Logic and Applications, Fpl. 139-144. DOI: 10.1109/FPL.2006.311206  1
2006 Mentens N, Sakiyama K, Batina L, Verbauwhede I, Preneel B. FPGA-oriented secure data path design: Implementation of a public key coprocessor Proceedings - 2006 International Conference On Field Programmable Logic and Applications, Fpl. 133-138. DOI: 10.1109/FPL.2006.311205  1
2006 Lee YK, Chan H, Verbauwhede I. Throughput optimized SHA-1 architecture using unfolding transformation Proceedings of the International Conference On Application-Specific Systems, Architectures and Processors. 354-359. DOI: 10.1109/ASAP.2006.68  1
2006 Chan H, Griot M, Casado AV, Wesel R, Verbauwhede I. High speed channel coding architectures for the uncoordinated OR channel Proceedings of the International Conference On Application-Specific Systems, Architectures and Processors. 265-268. DOI: 10.1109/ASAP.2006.37  1
2006 Lai BCC, Schaumont P, Qin W, Verbauwhede I. Cross layer design to multi-thread a data-pipelining application on a multi-processor on chip Proceedings of the International Conference On Application-Specific Systems, Architectures and Processors. 15-18. DOI: 10.1109/ASAP.2006.24  1
2006 Batina L, Mentens N, Sakiyama K, Preneel B, Verbauwhede I. Low-cost Elliptic Curve Cryptography for wireless sensor networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4357: 6-17. DOI: 10.1007/11964254_3  1
2006 Sakiyama K, De Mulder E, Preneel B, Verbauwhede I. A parallel processing hardware architecture for Elliptic Curve Cryptosystems Icassp, Ieee International Conference On Acoustics, Speech and Signal Processing - Proceedings. 3: III904-III907.  1
2006 Sakiyama K, Preneel B, Verbauwhede I. A fast dual-field modular arithmetic logic unit and its hardware implementation Proceedings - Ieee International Symposium On Circuits and Systems. 787-790.  1
2006 Batina L, Mentens N, Preneel B, Verbauwhede I. Flexible hardware architectures for curve-based cryptography Proceedings - Ieee International Symposium On Circuits and Systems. 4839-4842.  1
2006 Verbauwhede I, Tiri K, Hwang D, Schaumont P. Circuits and design techniques for secure ICs resistant to side-channel attacks 2006 Ieee International Conference On Integrated Circuit Design and Technology, Icicdt'06 1
2006 Schaumont P, Shukla S, Verbauwhede I. Design with race-free hardware semantics Proceedings -Design, Automation and Test in Europe, Date. 1.  1
2006 Aerts W, De Mulder E, Preneel B, Vandenbosch GAE, Verbauwhede I. Matching shielded loops for cryptographic analysis European Space Agency, (Special Publication) Esa Sp. 626.  1
2006 De Mulder E, Buysschaert P, Örs SB, Delmotte P, Preneel B, Vandenbosch G, Verbauwhede I. Measuring the vulnerability of cryptographic algorithms Ieee Potentials. 25: 13-17.  1
2006 Schaumont P, Ching D, Verbauwhede I. An interactive codesign environment for domain-specific coprocessors Acm Transactions On Design Automation of Electronic Systems. 11: 70-87.  1
Show low-probability matches.