Siemen Dhooghe
Siemen Dhooghe
Postdoc at KU Leuven
Bestätigte E-Mail-Adresse bei
Zitiert von
Zitiert von
Design of symmetric-key primitives for advanced cryptographic protocols
A Aly, T Ashur, E Ben-Sasson, S Dhooghe, A Szepieniec
IACR Transactions on Symmetric Cryptology, 1-45, 2020
MARVELlous: a STARK-friendly family of cryptographic primitives
T Ashur, S Dhooghe
Cryptology ePrint Archive, 2018
Sepcar: A secure and privacy-enhancing protocol for car access provision
I Symeonidis, A Aly, MA Mustafa, B Mennink, S Dhooghe, B Preneel
Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017
My gadget just cares for me-how NINA can prove security against combined attacks
S Dhooghe, S Nikova
Topics in Cryptology–CT-RSA 2020: The Cryptographers’ Track at the RSA …, 2020
Threshold implementations in the robust probing model
S Dhooghe, S Nikova, V Rijmen
Proceedings of ACM Workshop on Theory of Implementation Security Workshop, 30-37, 2019
Rescue-prime: a standard specification (sok)
A Szepieniec, T Ashur, S Dhooghe
Cryptology ePrint Archive, 2020
Efficient Symmetric Primitives for Advanced Cryptographic Protocols (A Marvellous Contribution).
A Aly, T Ashur, E Ben-Sasson, S Dhooghe, A Szepieniec
Cryptanalysis of efficient masked ciphers: Applications to low latency
T Beyne, S Dhooghe, A Moradi, AR Shahmirzadi
IACR Transactions on Cryptographic Hardware and Embedded Systems, 679-721, 2022
Cryptanalysis of masked ciphers: A not so random idea
T Beyne, S Dhooghe, Z Zhang
Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the …, 2020
A Low-Randomness Second-Order Masked AES
T Beyne, S Dhooghe, A Ranea, D Šijačić
Selected Areas in Cryptography: 28th International Conference, Virtual Event …, 2022
Resilient uniformity: applying resiliency in masking
S Dhooghe, S Nikova
Cryptography and Communications, 1-18, 2022
Prelude to Marvellous (With the Designers' Commentary, Two Bonus Tracks, and a Foretold Prophecy)
T Ashur, S Dhooghe
Cryptology ePrint Archive, 2020
Let’s Tessellate: Tiling for Security Against Advanced Probe and Fault Adversaries
S Dhooghe, S Nikova
Smart Card Research and Advanced Applications: 19th International Conference …, 2021
Applying Multiparty Computation to Car Access Provision
S Dhooghe
KU Leuven, 2017
Second-order low-randomness d+ 1 hardware sharing of the aes
S Dhooghe, AR Shahmirzadi, A Moradi
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
An overview of the Eight International Olympiad in Cryptography" Non-Stop University CRYPTO"
A Gorodilova, N Tokareva, S Agievich, I Beterov, T Beyne, L Budaghyan, ...
arXiv preprint arXiv:2204.11502, 2022
Analyzing Masked Ciphers Against Transition and Coupling Effects
S Dhooghe
Progress in Cryptology–INDOCRYPT 2021: 22nd International Conference on …, 2021
First-Order Hardware Sharings of the AES.
S Dhooghe, S Nikova, V Rijmen
IACR Cryptol. ePrint Arch. 2021, 734, 2021
Efficient symmetric primitives for advanced cryptographic protocols
A Aly, T Ashur, E Ben-Sasson, S Dhooghe, A Szepieniec
IACR Cryptology ePrint Archive, Report 2019/426, 2019
Domain-oriented masked bit-parallel finite-field multiplier against side-channel attacks
JL Imaña, S Dhooghe
Information Processing Letters 182, 106395, 2023
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20