Ingrid Verbauwhede

From MaRDI portal
(Redirected from Person:421043)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Provable secure software masking in the real-world
Constructive Side-Channel Analysis and Secure Design
2023-12-12Paper
Higher-order masked Saber
Lecture Notes in Computer Science
2023-07-25Paper
Security considerations in the design and implementation of a new DES chip
Advances in cryptology -- EUROCRYPT '87. Workshop on the theory and application of cryptographic techniques, Amsterdam, Netherlands, April 13--15, 1987. Proceedings
2021-07-10Paper
HEAWS: An Accelerator for Homomorphic Encryption on the Amazon AWS FPGA
IEEE Transactions on Computers
2020-10-02Paper
Fast Leakage Assessment
Lecture Notes in Computer Science
2020-06-24Paper
The impact of error dependencies on Ring/Mod-LWE/LWR based schemes2020-02-25Paper
Decryption failure attacks on IND-CCA secure lattice-based schemes2020-01-28Paper
Lattice-based public-key cryptography in hardware
Computer Architecture and Design Methodologies
2019-11-14Paper
Constant-Time Discrete Gaussian Sampling
IEEE Transactions on Computers
2018-12-04Paper
HEPCloud: An FPGA-based Multicore Processor for FV Somewhat Homomorphic Function Evaluation
IEEE Transactions on Computers
2018-12-04Paper
Ring-LWE: applications to cryptography and their efficient realization2018-10-26Paper
Hardware-Based Trusted Computing Architectures for Isolation and Attestation
IEEE Transactions on Computers
2018-06-27Paper
Multicore Curve-Based Cryptoprocessor with Reconfigurable Modular Arithmetic Logic Units over GF(2^n)
IEEE Transactions on Computers
2018-06-12Paper
Hold your breath, PRIMATEs are lightweight2018-02-16Paper
Lightweight coprocessor for Koblitz curves: 283-bit ECC including scalar conversion with only 4300 gates2018-02-14Paper
Modular hardware architecture for somewhat homomorphic function evaluation2018-02-14Paper
Efficient ring-LWE encryption on 8-bit AVR processors2018-02-14Paper
A masked ring-LWE implementation2018-02-14Paper
Efficient fuzzy extraction of PUF-induced secrets: theory and applications2018-02-14Paper
Elliptic Curve Cryptography with Efficiently Computable Endomorphisms and Its Hardware Implementations for the Internet of Things
IEEE Transactions on Computers
2017-08-25Paper
Elliptic-Curve-Based Security Processor for RFID
IEEE Transactions on Computers
2017-08-08Paper
Faster Interleaved Modular Multiplication Based on Barrett and Montgomery Reduction Methods
IEEE Transactions on Computers
2017-07-27Paper
SPONGENT: The Design Space of Lightweight Cryptographic Hashing
IEEE Transactions on Computers
2017-07-12Paper
Efficient Hardware Implementation of Fp-Arithmetic for Pairing-Friendly Curves
IEEE Transactions on Computers
2017-07-12Paper
Novel RNS Parameter Selection for Fast Modular Multiplication
IEEE Transactions on Computers
2017-06-20Paper
BLAKE-512-Based 128-Bit CCA2 Secure Timing Attack Resistant McEliece Cryptoprocessor
IEEE Transactions on Computers
2017-06-20Paper
Efficient finite field multiplication for isogeny based post quantum cryptography
Arithmetic of Finite Fields
2017-06-13Paper
A Fast and Compact FPGA Implementation of Elliptic Curve Cryptography Using Lambda Coordinates
Progress in Cryptology – AFRICACRYPT 2016
2016-06-22Paper
Additively homomorphic ring-LWE masking
Post-Quantum Cryptography
2016-04-26Paper
Chaskey: an efficient MAC algorithm for 32-bit microcontrollers
Selected Areas in Cryptography -- SAC 2014
2016-04-13Paper
Generic DPA attacks: curse or blessing?
Constructive Side-Channel Analysis and Secure Design
2016-03-10Paper
A note on the use of margins to compare distinguishers
Constructive Side-Channel Analysis and Secure Design
2016-03-10Paper
Single-cycle implementations of block ciphers
Lecture Notes in Computer Science
2016-02-22Paper
Consolidating masking schemes
Lecture Notes in Computer Science
2015-12-10Paper
High precision discrete Gaussian sampling on FPGAs
Selected Areas in Cryptography -- SAC 2013
2015-10-01Paper
Compact ring-LWE cryptoprocessor
Advanced Information Systems Engineering
2015-07-21Paper
Secure lightweight entity authentication with strong PUFs: Mission impossible?
Advanced Information Systems Engineering
2015-07-21Paper
Attacking PUF-based pattern matching key generators via helper data manipulation
Topics in Cryptology – CT-RSA 2014
2014-03-28Paper
On the implementation of unified arithmetic on binary Huff curves
Cryptographic Hardware and Embedded Systems - CHES 2013
2013-10-10Paper
A new model for error-tolerant side-channel cube attacks
Cryptographic Hardware and Embedded Systems - CHES 2013
2013-10-10Paper
Faster pairing coprocessor architecture
Pairing-Based Cryptography – Pairing 2012
2013-04-04Paper
Core Based Architecture to Speed Up Optimal Ate Pairing on FPGA Platform
Pairing-Based Cryptography – Pairing 2012
2013-04-04Paper
Theory and practice of a leakage resilient masking scheme
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
Performance and Security Evaluation of AES S-Box-Based Glitch PUFs on FPGAs
Security, Privacy, and Applied Cryptography Engineering
2013-03-13Paper
Selecting time samples for multivariate DPA attacks
Cryptographic Hardware and Embedded Systems – CHES 2012
2012-11-13Paper
Hierarchical ECC-based RFID authentication protocol
RFID. Security and Privacy
2012-08-20Paper
An updated survey on secure ECC implementations: attacks, countermeasures and cost
Cryptography and Security: From Theory to Applications
2012-06-08Paper
Power analysis of atmel cryptomemory -- recovering keys from secure eeproms
Lecture Notes in Computer Science
2012-06-08Paper
A practical attack on KeeLoq
Journal of Cryptology
2012-05-23Paper
FPGA implementation of pairings using residue number system and lazy reduction
Cryptographic hardware and embedded systems -- CHES 2011. 13th international workshop, Nara, Japan, September 28--October 1, 2011. Proceedings
2011-10-07Paper
Speeding up bipartite modular multiplication
Arithmetic of Finite Fields
2010-07-20Paper
Revisiting Higher-Order DPA Attacks:
Topics in Cryptology - CT-RSA 2010
2010-03-16Paper
Faster $\mathbb{F}_p$ -Arithmetic for Cryptographic Pairings on Barreto-Naehrig Curves
Lecture Notes in Computer Science
2009-11-10Paper
Programmable and Parallel ECC Coprocessor Architecture: Tradeoffs between Area, Speed and Security
Lecture Notes in Computer Science
2009-11-10Paper
HECC Goes Embedded: An Area-Efficient Implementation of HECC
Selected Areas in Cryptography
2009-11-03Paper
Transforming signal processing applications into parallel implementations
EURASIP Journal on Advances in Signal Processing
2009-09-01Paper
Modular Reduction in GF(2 n ) without Pre-computational Phase
Arithmetic of Finite Fields
2008-08-19Paper
Fault Analysis Study of IDEA
Topics in Cryptology – CT-RSA 2008
2008-04-24Paper
HW/SW co-design for public-key cryptosystems on the 8051 micro-controller
Computers and Electrical Engineering
2007-10-10Paper
Differential power and electromagnetic attacks on a FPGA implementation of elliptic curve cryptosystems
Computers and Electrical Engineering
2007-10-10Paper
Efficient and secure fingerprint verification for embedded devices
EURASIP Journal on Applied Signal Processing
2006-08-28Paper
Topics in Cryptology – CT-RSA 2005
Lecture Notes in Computer Science
2005-12-08Paper
scientific article; zbMATH DE number 1882019 (Why is no real title available?)2003-04-03Paper
Domain specific tools and methods for application in Security processor design
Design Automation for Embedded Systems
2003-02-17Paper
scientific article; zbMATH DE number 125182 (Why is no real title available?)1993-02-21Paper


Research outcomes over time


This page was built for person: Ingrid Verbauwhede