Benedikt Gierlichs

From MaRDI portal
(Redirected from Person:656512)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Provable secure software masking in the real-world
Constructive Side-Channel Analysis and Secure Design
2023-12-12Paper
Fast Leakage Assessment
Lecture Notes in Computer Science
2020-06-24Paper
Consolidating inner product masking2018-04-06Paper
Generic DPA attacks: curse or blessing?
Constructive Side-Channel Analysis and Secure Design
2016-03-10Paper
A note on the use of margins to compare distinguishers
Constructive Side-Channel Analysis and Secure Design
2016-03-10Paper
Consolidating masking schemes
Lecture Notes in Computer Science
2015-12-10Paper
Inner product masking revisited
Advances in Cryptology -- EUROCRYPT 2015
2015-09-30Paper
Higher-Order Threshold Implementations
Lecture Notes in Computer Science
2015-01-06Paper
A more efficient AES threshold implementation
Progress in Cryptology – AFRICACRYPT 2014
2014-06-24Paper
Theory and practice of a leakage resilient masking scheme
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
Selecting time samples for multivariate DPA attacks
Cryptographic Hardware and Embedded Systems – CHES 2012
2012-11-13Paper
Infective computation and dummy rounds: fault protection for block ciphers without check-before-output
Progress in Cryptology – LATINCRYPT 2012
2012-09-21Paper
Power analysis of atmel cryptomemory -- recovering keys from secure eeproms
Lecture Notes in Computer Science
2012-06-08Paper
Mutual information analysis: a comprehensive study
Journal of Cryptology
2012-01-18Paper
To Infinity and Beyond: Combined Attack on ECC Using Points of Low Order
Cryptographic hardware and embedded systems -- CHES 2011. 13th international workshop, Nara, Japan, September 28--October 1, 2011. Proceedings
2011-10-07Paper
The world is not enough: another look on second-order DPA
Advances in Cryptology - ASIACRYPT 2010
2010-12-07Paper
Revisiting Higher-Order DPA Attacks:
Topics in Cryptology - CT-RSA 2010
2010-03-16Paper
Differential Cluster Analysis
Lecture Notes in Computer Science
2009-11-10Paper
Fault Analysis Study of IDEA
Topics in Cryptology – CT-RSA 2008
2008-04-24Paper


Research outcomes over time


This page was built for person: Benedikt Gierlichs