Ingrid Verbauwhede
Cited by
Cited by
A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation
K Tiri, I Verbauwhede
Proceedings Design, Automation and Test in Europe Conference and Exhibitioná…, 2004
A dynamic and differential CMOS logic with signal independent power consumption to withstand differential power analysis on smart cards
K Tiri, M Akmal, I Verbauwhede
Proceedings of the 28th European solid-state circuits conference, 403-406, 2002
Physically unclonable functions: A study on the state of the art and future research directions
R Maes, I Verbauwhede
Towards Hardware-Intrinsic Security: Foundations and Practice, 3-37, 2010
RECTANGLE: a bit-slice lightweight block cipher suitable for multiple platforms
W Zhang, Z Bao, D Lin, V Rijmen, B Yang, I Verbauwhede
Cryptology ePrint Archive, 2014
spongent: A Lightweight Hash Function
A Bogdanov, M Knežević, G Leander, D Toz, K Varıcı, I Verbauwhede
Cryptographic Hardware and Embedded Systems–CHES 2011: 13th Internationalá…, 2011
PUFKY: A fully functional PUF-based cryptographic key generator
R Maes, A Van Herrewege, I Verbauwhede
Cryptographic Hardware and Embedded Systems–CHES 2012: 14th Internationalá…, 2012
CANAuth-a simple, backward compatible broadcast authentication protocol for CAN bus
A Van Herrewege, D Singelee, I Verbauwhede
ECRYPT workshop on Lightweight Cryptography 2011, 20, 2011
A 21.54 Gbits/s fully pipelined AES processor on FPGA
A Hodjat, I Verbauwhede
12th Annual IEEE Symposium on Field-Programmable Custom Computing Machinesá…, 2004
Machine learning in side-channel analysis: a first study
G Hospodar, B Gierlichs, E De Mulder, I Verbauwhede, J Vandewalle
Journal of Cryptographic Engineering 1 (4), 293-302, 2011
PUFs: Myth, fact or busted? A security evaluation of physically unclonable functions (PUFs) cast in silicon
S Katzenbeisser, ▄ Kocabaş, V Rožić, AR Sadeghi, I Verbauwhede, ...
Cryptographic Hardware and Embedded Systems–CHES 2012: 14th Internationalá…, 2012
Public-key cryptography for RFID-tags
L Batina, J Guajardo, T Kerins, N Mentens, P Tuyls, I Verbauwhede
Fifth Annual IEEE International Conference on Pervasive Computing andá…, 2007
Intrinsic PUFs from flip-flops on reconfigurable devices
R Maes, P Tuyls, I Verbauwhede
3rd Benelux workshop on information and system security (WISSec 2008) 17, 2008, 2008
Compact ring-LWE cryptoprocessor
SS Roy, F Vercauteren, N Mentens, DD Chen, I Verbauwhede
Cryptographic Hardware and Embedded Systems–CHES 2014: 16th Internationalá…, 2014
Design and performance testing of a 2.29-GB/s Rijndael processor
I Verbauwhede, P Schaumont, H Kuo
IEEE Journal of Solid-State Circuits 38 (3), 569-572, 2003
Elliptic-curve-based security processor for RFID
YK Lee, K Sakiyama, L Batina, I Verbauwhede
IEEE Transactions on Computers 57 (11), 1514-1527, 2008
Sancus: Low-cost trustworthy extensible networked devices with a zero-software trusted computing base
J Noorman, P Agten, W Daniels, R Strackx, A Van Herrewege, C Huygens, ...
22nd USENIX Security Symposium (USENIX Security 13), 479-498, 2013
Practical mitigations for timing-based side-channel attacks on modern x86 processors
B Coppens, I Verbauwhede, K De Bosschere, B De Sutter
2009 30th IEEE symposium on security and privacy, 45-60, 2009
Helper data algorithms for PUF-based key generation: Overview and analysis
J Delvaux, D Gu, D Schellekens, I Verbauwhede
IEEE Transactions on Computer-Aided Design of Integrated Circuits andá…, 2014
A quick safari through the reconfiguration jungle
P Schaumont, I Verbauwhede, K Keutzer, M Sarrafzadeh
Proceedings of the 38th annual Design Automation Conference, 172-177, 2001
Securing encryption algorithms against DPA at the logic level: Next generation smart card technology
K Tiri, I Verbauwhede
Cryptographic Hardware and Embedded Systems-CHES 2003: 5th Internationalá…, 2003
The system can't perform the operation now. Try again later.
Articles 1–20