List of research outcomes
This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!
| Publication | Date of Publication | Type |
|---|---|---|
| Provable secure software masking in the real-world Constructive Side-Channel Analysis and Secure Design | 2023-12-12 | Paper |
| Fast Leakage Assessment Lecture Notes in Computer Science | 2020-06-24 | Paper |
| Consolidating inner product masking | 2018-04-06 | Paper |
| Generic DPA attacks: curse or blessing? Constructive Side-Channel Analysis and Secure Design | 2016-03-10 | Paper |
| A note on the use of margins to compare distinguishers Constructive Side-Channel Analysis and Secure Design | 2016-03-10 | Paper |
| Consolidating masking schemes Lecture Notes in Computer Science | 2015-12-10 | Paper |
| Inner product masking revisited Advances in Cryptology -- EUROCRYPT 2015 | 2015-09-30 | Paper |
| Higher-Order Threshold Implementations Lecture Notes in Computer Science | 2015-01-06 | Paper |
| A more efficient AES threshold implementation Progress in Cryptology – AFRICACRYPT 2014 | 2014-06-24 | Paper |
| Theory and practice of a leakage resilient masking scheme Advances in Cryptology – ASIACRYPT 2012 | 2013-03-19 | Paper |
| Selecting time samples for multivariate DPA attacks Cryptographic Hardware and Embedded Systems – CHES 2012 | 2012-11-13 | Paper |
| Infective computation and dummy rounds: fault protection for block ciphers without check-before-output Progress in Cryptology – LATINCRYPT 2012 | 2012-09-21 | Paper |
| Power analysis of atmel cryptomemory -- recovering keys from secure eeproms Lecture Notes in Computer Science | 2012-06-08 | Paper |
| Mutual information analysis: a comprehensive study Journal of Cryptology | 2012-01-18 | Paper |
| To Infinity and Beyond: Combined Attack on ECC Using Points of Low Order Cryptographic hardware and embedded systems -- CHES 2011. 13th international workshop, Nara, Japan, September 28--October 1, 2011. Proceedings | 2011-10-07 | Paper |
| The world is not enough: another look on second-order DPA Advances in Cryptology - ASIACRYPT 2010 | 2010-12-07 | Paper |
| Revisiting Higher-Order DPA Attacks: Topics in Cryptology - CT-RSA 2010 | 2010-03-16 | Paper |
| Differential Cluster Analysis Lecture Notes in Computer Science | 2009-11-10 | Paper |
| Fault Analysis Study of IDEA Topics in Cryptology – CT-RSA 2008 | 2008-04-24 | Paper |
Research outcomes over time
This page was built for person: Benedikt Gierlichs