The following pages link to Ingrid Verbauwhede (Q421043):
Displayed 50 items.
- A practical attack on KeeLoq (Q421044) (← links)
- Transforming signal processing applications into parallel implementations (Q836254) (← links)
- Lightweight coprocessor for Koblitz curves: 283-bit ECC including scalar conversion with only 4300 gates (Q1695854) (← links)
- Modular hardware architecture for somewhat homomorphic function evaluation (Q1695862) (← links)
- Efficient ring-LWE encryption on 8-bit AVR processors (Q1695913) (← links)
- A masked ring-LWE implementation (Q1695914) (← links)
- Efficient fuzzy extraction of PUF-induced secrets: theory and applications (Q1695985) (← links)
- Hold your breath, PRIMATEs are lightweight (Q1698631) (← links)
- Domain specific tools and methods for application in Security processor design (Q1857134) (← links)
- Ring-LWE: applications to cryptography and their efficient realization (Q1989634) (← links)
- Decryption failure attacks on IND-CCA secure lattice-based schemes (Q2289446) (← links)
- The impact of error dependencies on Ring/Mod-LWE/LWR based schemes (Q2302128) (← links)
- HW/SW co-design for public-key cryptosystems on the 8051 micro-controller (Q2384544) (← links)
- Differential power and electromagnetic attacks on a FPGA implementation of elliptic curve cryptosystems (Q2384552) (← links)
- Efficient and secure fingerprint verification for embedded devices (Q2500923) (← links)
- Single-Cycle Implementations of Block Ciphers (Q2788823) (← links)
- A Note on the Use of Margins to Compare Distinguishers (Q2794561) (← links)
- Generic DPA Attacks: Curse or Blessing? (Q2794574) (← links)
- Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers (Q2798625) (← links)
- Additively Homomorphic Ring-LWE Masking (Q2802622) (← links)
- A Fast and Compact FPGA Implementation of Elliptic Curve Cryptography Using Lambda Coordinates (Q2814697) (← links)
- On the Implementation of Unified Arithmetic on Binary Huff Curves (Q2851424) (← links)
- A New Model for Error-Tolerant Side-Channel Cube Attacks (Q2851427) (← links)
- An Updated Survey on Secure ECC Implementations: Attacks, Countermeasures and Cost (Q2889769) (← links)
- Power Analysis of Atmel CryptoMemory – Recovering Keys from Secure EEPROMs (Q2889992) (← links)
- Hierarchical ECC-Based RFID Authentication Protocol (Q2902487) (← links)
- High Precision Discrete Gaussian Sampling on FPGAs (Q2949541) (← links)
- FPGA Implementation of Pairings Using Residue Number System and Lazy Reduction (Q3172983) (← links)
- Consolidating Masking Schemes (Q3457138) (← links)
- Modular Reduction in GF(2 n ) without Pre-computational Phase (Q3519553) (← links)
- Speeding Up Bipartite Modular Multiplication (Q3578472) (← links)
- Faster $\mathbb{F}_p$ -Arithmetic for Cryptographic Pairings on Barreto-Naehrig Curves (Q3642938) (← links)
- Programmable and Parallel ECC Coprocessor Architecture: Tradeoffs between Area, Speed and Security (Q3642945) (← links)
- HECC Goes Embedded: An Area-Efficient Implementation of HECC (Q3644216) (← links)
- (Q4026863) (← links)
- Constant-Time Discrete Gaussian Sampling (Q4559782) (← links)
- HEPCloud: An FPGA-based Multicore Processor for FV Somewhat Homomorphic Function Evaluation (Q4559790) (← links)
- Multicore Curve-Based Cryptoprocessor with Reconfigurable Modular Arithmetic Logic Units over GF(2^n) (Q4564207) (← links)
- Hardware-Based Trusted Computing Architectures for Isolation and Attestation (Q4567314) (← links)
- Selecting Time Samples for Multivariate DPA Attacks (Q4649774) (← links)
- (Q4797387) (← links)
- Performance and Security Evaluation of AES S-Box-Based Glitch PUFs on FPGAs (Q4910847) (← links)
- Theory and Practice of a Leakage Resilient Masking Scheme (Q4911619) (← links)
- Core Based Architecture to Speed Up Optimal Ate Pairing on FPGA Platform (Q4912493) (← links)
- Faster Pairing Coprocessor Architecture (Q4912494) (← links)
- Elliptic-Curve-Based Security Processor for RFID (Q4975071) (← links)
- Security Considerations in the Design and Implementation of a new DES chip (Q5000248) (← links)
- Fast Leakage Assessment (Q5114643) (← links)
- HEAWS: An Accelerator for Homomorphic Encryption on the Amazon AWS FPGA (Q5126027) (← links)
- Revisiting Higher-Order DPA Attacks: (Q5189452) (← links)