Follow
Benedikt Gierlichs
Benedikt Gierlichs
Research Expert at KU Leuven/COSIC
Verified email at esat.kuleuven.be - Homepage
Title
Cited by
Cited by
Year
Mutual information analysis: A generic side-channel distinguisher
B Gierlichs, L Batina, P Tuyls, B Preneel
Cryptographic Hardware and Embedded Systems–CHES 2008: 10th International …, 2008
7822008
Machine learning in side-channel analysis: a first study
G Hospodar, B Gierlichs, E De Mulder, I Verbauwhede, J Vandewalle
Journal of Cryptographic Engineering 1 (4), 293, 2011
3072011
Mutual information analysis: a comprehensive study
L Batina, B Gierlichs, E Prouff, M Rivain, FX Standaert, ...
Journal of Cryptology 24 (2), 269-291, 2011
2972011
Templates vs. stochastic methods: A performance analysis for side channel cryptanalysis
B Gierlichs, K Lemke-Rust, C Paar
Cryptographic Hardware and Embedded Systems-CHES 2006: 8th International …, 2006
2722006
Consolidating masking schemes
O Reparaz, B Bilgin, S Nikova, B Gierlichs, I Verbauwhede
Advances in Cryptology--CRYPTO 2015: 35th Annual Cryptology Conference …, 2015
2212015
The world is not enough: Another look on second-order DPA
FX Standaert, N Veyrat-Charvillon, E Oswald, B Gierlichs, M Medwed, ...
Advances in Cryptology-ASIACRYPT 2010: 16th International Conference on the …, 2010
2082010
Higher-order threshold implementations
B Bilgin, B Gierlichs, S Nikova, V Nikov, V Rijmen
Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014
2052014
An In-depth and Black-box Characterization of the Effects of Clock Glitches on 8-bit MCUs
J Balasch, B Gierlichs, I Verbauwhede
2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, 105-114, 2011
1912011
On the cost of lazy engineering for masked software implementations
J Balasch, B Gierlichs, V Grosso, O Reparaz, FX Standaert
Smart Card Research and Advanced Applications: 13th International Conference …, 2015
1802015
Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected …
FX Standaert, B Gierlichs, I Verbauwhede
Information Security and Cryptology–ICISC 2008: 11th International …, 2009
1552009
A more efficient AES threshold implementation
B Bilgin, B Gierlichs, S Nikova, V Nikov, V Rijmen
Progress in Cryptology–AFRICACRYPT 2014: 7th International Conference on …, 2014
1532014
Revisiting higher-order DPA attacks: Multivariate mutual information analysis
B Gierlichs, L Batina, B Preneel, I Verbauwhede
CT-RSA 5985, 221-234, 2010
1172010
Trade-offs for threshold implementations illustrated on AES
B Bilgin, B Gierlichs, S Nikova, V Nikov, V Rijmen
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2015
932015
DPA, bitslicing and masking at 1 GHz
J Balasch, B Gierlichs, O Reparaz, I Verbauwhede
Cryptographic Hardware and Embedded Systems--CHES 2015: 17th International …, 2015
922015
Infective computation and dummy rounds: Fault protection for block ciphers without check-before-output
B Gierlichs, JM Schmidt, M Tunstall
Progress in Cryptology–LATINCRYPT 2012: 2nd International Conference on …, 2012
922012
Differential cluster analysis
L Batina, B Gierlichs, K Lemke-Rust
Cryptographic Hardware and Embedded Systems-CHES 2009: 11th International …, 2009
912009
Electromagnetic circuit fingerprints for hardware trojan detection
J Balasch, B Gierlichs, I Verbauwhede
2015 IEEE International Symposium on Electromagnetic Compatibility (EMC …, 2015
832015
Power analysis of Atmel CryptoMemory–recovering keys from secure EEPROMs
J Balasch, B Gierlichs, R Verdult, L Batina, I Verbauwhede
Topics in Cryptology–CT-RSA 2012: The Cryptographers’ Track at the RSA …, 2012
812012
Perfect matching disclosure attacks
C Troncoso, B Gierlichs, B Preneel, I Verbauwhede
Privacy Enhancing Technologies: 8th International Symposium, PETS 2008 …, 2008
802008
Power and fault analysis resistance in hardware through dynamic reconfiguration
N Mentens, B Gierlichs, I Verbauwhede
Cryptographic Hardware and Embedded Systems–CHES 2008: 10th International …, 2008
782008
The system can't perform the operation now. Try again later.
Articles 1–20