Follow
Siemen Dhooghe
Siemen Dhooghe
Postdoc at KU Leuven
Verified email at esat.kuleuven.be - Homepage
Title
Cited by
Cited by
Year
Design of symmetric-key primitives for advanced cryptographic protocols
A Aly, T Ashur, E Ben-Sasson, S Dhooghe, A Szepieniec
IACR Transactions on Symmetric Cryptology, 1-45, 2020
1862020
MARVELlous: a STARK-friendly family of cryptographic primitives
T Ashur, S Dhooghe
Cryptology ePrint Archive, 2018
692018
Sepcar: A secure and privacy-enhancing protocol for car access provision
I Symeonidis, A Aly, MA Mustafa, B Mennink, S Dhooghe, B Preneel
Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017
442017
Rescue-prime: a standard specification (SoK)
A Szepieniec, T Ashur, S Dhooghe
Cryptology ePrint Archive, 2020
342020
My gadget just cares for me-how NINA can prove security against combined attacks
S Dhooghe, S Nikova
Topics in Cryptology–CT-RSA 2020: The Cryptographers’ Track at the RSA …, 2020
242020
Threshold implementations in the robust probing model
S Dhooghe, S Nikova, V Rijmen
Proceedings of ACM Workshop on Theory of Implementation Security Workshop, 30-37, 2019
232019
Cryptanalysis of masked ciphers: A not so random idea
T Beyne, S Dhooghe, Z Zhang
Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the …, 2020
172020
Cryptanalysis of efficient masked ciphers: applications to low latency
T Beyne, S Dhooghe, A Moradi, AR Shahmirzadi
IACR Transactions on Cryptographic Hardware and Embedded Systems, 679-721, 2022
152022
Efficient Symmetric Primitives for Advanced Cryptographic Protocols (A Marvellous Contribution).
A Aly, T Ashur, E Ben-Sasson, S Dhooghe, A Szepieniec
132019
A low-randomness second-order masked AES
T Beyne, S Dhooghe, A Ranea, D Šijačić
International Conference on Selected Areas in Cryptography, 87-110, 2021
102021
Threshold implementations in software: Micro-architectural leakages in algorithms
J Gaspoz, S Dhooghe
IACR Transactions on Cryptographic Hardware and Embedded Systems, 155-179, 2023
82023
Second-order low-randomness d+ 1 hardware sharing of the AES
S Dhooghe, AR Shahmirzadi, A Moradi
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
72022
An overview of the eight international olympiad in cryptography" Non-Stop University Crypto"
A Gorodilova, N Tokareva, S Agievich, I Beterov, T Beyne, L Budaghyan, ...
arXiv preprint arXiv:2204.11502, 2022
52022
Let’s tessellate: tiling for security against advanced probe and fault adversaries
S Dhooghe, S Nikova
Smart Card Research and Advanced Applications: 19th International Conference …, 2021
42021
An optimal universal construction for the threshold implementation of bijective S-boxes
E Piccione, S Andreoli, L Budaghyan, C Carlet, S Dhooghe, S Nikova, ...
IEEE Transactions on Information Theory 69 (10), 6700-6710, 2023
32023
Low-latency and low-randomness second-order masked cubic functions
A Shahmirzadi, S Dhooghe, A Moradi
IACR Transactions on Cryptographic Hardware and Embedded Systems 2023 (1 …, 2023
32023
Guarding the first order: The rise of AES maskings
A Askeland, S Dhooghe, S Nikova, V Rijmen, Z Zhang
International Conference on Smart Card Research and Advanced Applications …, 2022
32022
Resilient uniformity: applying resiliency in masking
S Dhooghe, S Nikova
Cryptography and Communications, 1-18, 2022
32022
Stati: Protecting against fault attacks using stable threshold implementations
S Dhooghe, A Ovchinnikov, D Toprakhisar
Cryptology ePrint Archive, 2023
22023
First-Order Hardware Sharings of the AES.
S Dhooghe, S Nikova, V Rijmen
IACR Cryptol. ePrint Arch. 2021, 734, 2021
22021
The system can't perform the operation now. Try again later.
Articles 1–20