Siemen Dhooghe
Siemen Dhooghe
PhD student at KU Leuven
Geverifieerd e-mailadres voor esat.kuleuven.be
Titel
Geciteerd door
Geciteerd door
Jaar
Design of symmetric-key primitives for advanced cryptographic protocols
A Aly, T Ashur, E Ben-Sasson, S Dhooghe, A Szepieniec
IACR Transactions on Symmetric Cryptology, 1-45, 2020
472020
MARVELlous: a STARK-Friendly Family of Cryptographic Primitives.
T Ashur, S Dhooghe
IACR Cryptol. ePrint Arch. 2018, 1098, 2018
322018
Sepcar: A secure and privacy-enhancing protocol for car access provision
I Symeonidis, A Aly, MA Mustafa, B Mennink, S Dhooghe, B Preneel
European Symposium on Research in Computer Security, 475-493, 2017
282017
Efficient Symmetric Primitives for Advanced Cryptographic Protocols (A Marvellous Contribution).
A Aly, T Ashur, E Ben-Sasson, S Dhooghe, A Szepieniec
IACR Cryptol. ePrint Arch. 2019, 426, 2019
112019
Threshold implementations in the robust probing model
S Dhooghe, S Nikova, V Rijmen
Proceedings of ACM Workshop on Theory of Implementation Security Workshop, 30-37, 2019
102019
My gadget just cares for me-how NINA can prove security against combined attacks
S Dhooghe, S Nikova
Cryptographers’ Track at the RSA Conference, 35-55, 2020
92020
Cryptanalysis of Masked Ciphers: A Not So Random Idea
T Beyne, S Dhooghe, Z Zhang
International Conference on the Theory and Application of Cryptology and …, 2020
42020
Rescue-Prime: a Standard Specification (SoK).
A Szepieniec, T Ashur, S Dhooghe
IACR Cryptol. ePrint Arch. 2020, 1143, 2020
22020
Let’s Tessellate: Tiling for Security Against Advanced Probe and Fault Adversaries
S Dhooghe, S Nikova
International Conference on Smart Card Research and Advanced Applications …, 2020
12020
Prelude to Marvellous (With the Designers' Commentary, Two Bonus Tracks, and a Foretold Prophecy)
T Ashur, S Dhooghe
Cryptology ePrint Archive, 2020
12020
Efficient symmetric primitives for advanced cryptographic protocols
A Aly, T Ashur, E Ben-Sasson, S Dhooghe, A Szepieniec
IACR Cryptology ePrint Archive, Report 2019/426, 2019
12019
Applying Multiparty Computation to Car Access Provision
S Dhooghe
KU Leuven, 2017
12017
Resilient uniformity: applying resiliency in masking
S Dhooghe, S Nikova
Cryptography and Communications, 1-18, 2021
2021
Cryptanalysis of Efficient Masked Ciphers: Applications to Low Latency
T Beyne, S Dhooghe, A Moradi, AR Shahmirzadi
Cryptology ePrint Archive, 2021
2021
A Low-Randomness Second-Order Masked AES
T Beyne, S Dhooghe, A Ranea, D Šijač
Cryptology ePrint Archive, 2021
2021
Analyzing Masked Ciphers Against Transition and Coupling Effects
S Dhooghe
Cryptology ePrint Archive, 2021
2021
First-Order Hardware Sharings of the AES
S Dhooghe, S Nikova, V Rijmen
Cryptology ePrint Archive, 2021
2021
Prelude to Marvellous With the Designers' Commentary, Two Bonus Tracks, and a Foretold Prophecy
S Dhooghe, T Ashur
The Conference for Failed Approaches and Insightful Losses in Cryptology 2020, 2020
2020
Cryptanalysis of Masked Ciphers
T Beyne, S Dhooghe
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–19