Skip to main content
Go to the home page of the European Commission (opens in new window)
English English
CORDIS - EU research results
CORDIS

Hardware Acceleration for Computing on Encrypted Data

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Publications

Higher-Order Masked Saber (opens in new window)

Author(s): Kundu, Suparna; D’Anvers, Jan-Pieter; Van Beirendonck, Michiel; Karmakar, Angshuman; Verbauwhede, Ingrid
Published in: Security and Cryptography for Networks, SCN 2022, Issue 13th International Conference, 2022, Page(s) 93–116, ISSN 1611-3349
Publisher: Springer
DOI: 10.1007/978-3-031-14791-3_5

FPT: A Fixed-Point Accelerator for Torus Fully Homomorphic Encryption (opens in new window)

Author(s): Michiel Van Beirendonck, Jan-Pieter D'Anvers, Furkan Turan, Ingrid Verbauwhede
Published in: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, Issue 15, 2024, Page(s) 741-755
Publisher: ACM
DOI: 10.1145/3576915.3623159

Hardware Acceleration of the Prime-Factor and Rader NTT for BGV Fully Homomorphic Encryption (opens in new window)

Author(s): David Du Pont, Jonas Bertels, Furkan Turan, Michiel Van Beirendonck, Ingrid Verbauwhede
Published in: 2024 IEEE 31st Symposium on Computer Arithmetic (ARITH), 2024, Page(s) 1-8
Publisher: IEEE
DOI: 10.1109/arith61463.2024.00011

A practical key-recovery attack on LWE-based key-encapsulation mechanism schemes using Rowhammer (opens in new window)

Author(s): Mondal, Puja; Kundu, Suparna; Bhattacharya, Sarani; Karmakar, Angshuman; Verbauwhede, Ingrid
Published in: Applied Cryptography and Network Security: 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part III, Issue 1, 2024, Page(s) Proceedings, Part III
Publisher: Proceedings, Part III
DOI: 10.48550/arxiv.2311.08027

Energy and side-channel security evaluation of near-threshold cryptographic circuits in 28nm FD-SOI technology (opens in new window)

Author(s): Arthur Beckers, Roel Uytterhoeven, Thomas Vandenabeele, Jo Vliegen, Lennert Wouters, Joan Daemen, Wim Dehaene, Benedikt Gierlichs, Nele Mentens
Published in: Proceedings of the 19th ACM International Conference on Computing Frontiers, Issue 19th ACM International Conference on Computing Frontiers, 2023, Page(s) 258-262
Publisher: ACM
DOI: 10.1145/3528416.3530992

Low-Cost First-Order Secure Boolean Masking in Glitchy Hardware (opens in new window)

Author(s): Kumar, S V Dilip; Balasch, Josep; Gierlichs, Benedikt; Verbauwhede, Ingrid
Published in: 2023 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2023, Page(s) pp. 1-2, ISBN 979-8-3503-9624-9
Publisher: IEEE
DOI: 10.23919/date56975.2023.10136920

Provable Secure Software Masking in the Real-World (opens in new window)

Author(s): Beckers, Arthur; Wouters, Lennert; Gierlichs, Benedikt; Preneel, Bart; Verbauwhede, Ingrid
Published in: Constructive Side-Channel Analysis and Secure Design. COSADE 2022, Issue 13th International Workshop, 2022, Page(s) 215–235, ISSN 1611-3349
Publisher: Springer, Lecture Notes in Computer Science
DOI: 10.1007/978-3-030-99766-3_10

Hardware Acceleration of FHEW (opens in new window)

Author(s): Bertels, Jonas; Van Beirendonck, Michiel; Turan, Furkan; Verbauwhede, Ingrid
Published in: 2023 26th International Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS), 2023, Page(s) 57-60, ISBN 979-8-3503-3277-3
Publisher: IEEE
DOI: 10.1109/ddecs57882.2023.10139347

Neural Network Quantisation for Faster Homomorphic Encryption (opens in new window)

Author(s): Legiest, Wouter; Turan, Furkan; Van Beirendonck, Michiel; D'Anvers, Jan-Pieter; Verbauwhede, Ingrid
Published in: 2023 IEEE 29th International Symposium on On-Line Testing and Robust System Design (IOLTS), Issue 1, 2023, ISBN 979-8-3503-4135-5
Publisher: IEEE
DOI: 10.1109/iolts59296.2023.10224890

A Better Kyber Butterfly for FPGAs (opens in new window)

Author(s): Jonas Bertels, Quinten Norga, Ingrid Verbauwhede
Published in: 2024 34th International Conference on Field-Programmable Logic and Applications (FPL), Issue 34th International Conference on Field-Programmable Logic and Applications (FPL), 2024, Page(s) 171-177
Publisher: IEEE
DOI: 10.1109/fpl64840.2024.00032

ShowTime: Amplifying Arbitrary CPU Timing Side Channels (opens in new window)

Author(s): Antoon Purnal, Marton Bognar, Frank Piessens, Ingrid Verbauwhede
Published in: Proceedings of the ACM Asia Conference on Computer and Communications Security, Issue 18th ACM Asia Conference on Computer and Communications Security, 2023, Page(s) 205-217
Publisher: ACM
DOI: 10.1145/3579856.3590332

SNOW-SCA: ML-Assisted Side-Channel Attack on SNOW-V (opens in new window)

Author(s): Harshit Saurabh, Anupam Golder, Samarth Shivakumar Titti, Suparna Kundu, Chaoyun Li, Angshuman Karmakar, Debayan Das
Published in: 2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), Issue 14th IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2024, Page(s) 139-149
Publisher: IEEE
DOI: 10.1109/host55342.2024.10545384

One-Hot Conversion: Towards Faster Table-Based A2B Conversion (opens in new window)

Author(s): D’Anvers, Jan-Pieter
Published in: Advances in Cryptology – EUROCRYPT 2023, Issue Part IV, 2023, Page(s) 628–657, ISBN 978-3-031-30633-4
Publisher: Springer-Verlag
DOI: 10.1007/978-3-031-30634-1_21

On Polynomial Functions Modulo $$p^e$$ and Faster Bootstrapping for Homomorphic Encryption (opens in new window)

Author(s): Geelen, Robin; Iliashenko, Ilia; Kang, Jiayi; Vercauteren, Frederik
Published in: Annual International Conference on the Theory and Applications of Cryptographic Techniques EUROCRYPT 2023, Issue 1, 2023, ISSN 1611-3349
Publisher: Springer, Lecture Notes in Computer Science
DOI: 10.1007/978-3-031-30620-4_9

Optimizing Linear Correctors: A Tight Output Min-Entropy Bound and Selection Technique (opens in new window)

Author(s): Miloš Grujić, Ingrid Verbauwhede
Published in: IEEE Transactions on Information Forensics and Security, Issue 19, 2024, Page(s) 586-600, ISSN 1556-6013
Publisher: Institute of Electrical and Electronics Engineers
DOI: 10.1109/tifs.2023.3326986

Side-channel Analysis of Lattice-based Post-quantum Cryptography: Exploiting Polynomial Multiplication (opens in new window)

Author(s): Catinca Mujdei, Lennert Wouters, Angshuman Karmakar, Arthur Beckers, Jose Maria Bermudo Mera, Ingrid Verbauwhede
Published in: ACM Transactions on Embedded Computing Systems, Issue 23, 2024, Page(s) 1-23, ISSN 1539-9087
Publisher: Association for Computing Machinary, Inc.
DOI: 10.1145/3569420

An energy and area efficient, all digital entropy source compatible with modern standards based on jitter pipelining (opens in new window)

Author(s): Adriaan Peetermans, Ingrid Verbauwhede
Published in: IACR Transactions on Cryptographic Hardware and Embedded Systems, Issue Vol. 2022 No. 4, 2022, Page(s) 88-109, ISSN 2569-2925
Publisher: Ruhr-Universität Bochum
DOI: 10.46586/tches.v2022.i4.88-109

Carry Your Fault: A Fault Propagation Attack on Side-Channel Protected LWE-based KEM (opens in new window)

Author(s): Suparna Kundu, Siddhartha Chowdhury, Sayandeep Saha, Angshuman Karmakar, Debdeep Mukhopadhyay, Ingrid Verbauwhede
Published in: IACR Transactions on Cryptographic Hardware and Embedded Systems, Issue 2024, 2024, Page(s) 844-869, ISSN 2569-2925
Publisher: ACM
DOI: 10.46586/tches.v2024.i2.844-869

Time Sharing - A Novel Approach to Low-Latency Masking (opens in new window)

Author(s): Dilip Kumar S. V., Siemen Dhooghe, Josep Balasch, Benedikt Gierlichs, Ingrid Verbauwhede
Published in: IACR Transactions on Cryptographic Hardware and Embedded Systems, Issue 2024, 2024, Page(s) 249-272, ISSN 2569-2925
Publisher: RUB
DOI: 10.46586/tches.v2024.i3.249-272

Scabbard: An Exploratory Study on Hardware Aware Design Choices of Learning with Rounding-based Key Encapsulation Mechanisms (opens in new window)

Author(s): Suparna Kundu, Quinten Norga, Angshuman Karmakar, Shreya Gangopadhyay, Jose Maria Bermudo Mera, Ingrid Verbauwhede
Published in: ACM Transactions on Embedded Computing Systems, Issue 24, 2024, Page(s) 1-40, ISSN 1539-9087
Publisher: Association for Computing Machinary, Inc.
DOI: 10.1145/3696208

Circuits for Security and Secure Circuits: Implementation of cryptographic algorithms (opens in new window)

Author(s): Verbauwhede, Ingrid
Published in: IEEE Solid-State Circuits Magazine, Issue Volume: 15, Issue: 1, winter 2023, 2023, Page(s) 20-24, ISSN 1943-0590
Publisher: IEEE
DOI: 10.1109/mssc.2022.3227226

Higher-Order Masked Ciphertext Comparison for Lattice-Based Cryptography (opens in new window)

Author(s): D’Anvers, Jan-Pieter; Heinz, Daniel; Pessl, Peter; Van Beirendonck, Michiel; Verbauwhede, Ingrid
Published in: IACR Transactions on Cryptographic Hardware and Embedded Systems, Issue 2022 (2), 2022, Page(s) 115-139, ISSN 2569-2925
Publisher: IACR
DOI: 10.46586/tches.v2022.i2.115-139

DATE 2022: Aiming for an Online/ Onsite Format and Finally Moving to Online Only (opens in new window)

Author(s): Cristiana Bolchini, Ingrid Verbauwhede
Published in: IEEE Design & Test, Issue 39, 2022, Page(s) 90-93, ISSN 2168-2356
Publisher: IEEE Computer Society
DOI: 10.1109/mdat.2022.3173251

Cryptanalysis of Strong Physically Unclonable Functions (opens in new window)

Author(s): Liliya Kraleva, Mohammad Mahzoun, Raluca Posteuca, Dilara Toprakhisar, Tomer Ashur, Ingrid Verbauwhede
Published in: IEEE Open Journal of the Solid-State Circuits Society, Issue 3, 2024, Page(s) 32-40, ISSN 2644-1349
Publisher: IEEE
DOI: 10.1109/ojsscs.2022.3227009

Pushing the Limits of Generic Side-Channel Attacks on LWE-based KEMs - Parallel PC Oracle Attacks on Kyber KEM and Beyond (opens in new window)

Author(s): Gokulnath Rajendran, Prasanna Ravi, Jan-Pieter D’Anvers, Shivam Bhasin, Anupam Chattopadhyay
Published in: IACR Transactions on Cryptographic Hardware and Embedded Systems, Issue Volume 2023, Issue 2, 2023, Page(s) 418-446, ISSN 2569-2925
Publisher: Ruhr University Bochum
DOI: 10.46586/tches.v2023.i2.418-446

Defeating Low-Cost Countermeasures against Side-Channel Attacks in Lattice-based Encryption (opens in new window)

Author(s): Prasanna Ravi, Thales Paiva, Dirmanto Jap, Jan-Pieter D’Anvers, Shivam Bhasin
Published in: IACR Transactions on Cryptographic Hardware and Embedded Systems, Issue 2024, 2024, Page(s) 795-818, ISSN 2569-2925
Publisher: Ruhr-University of Bochum
DOI: 10.46586/tches.v2024.i2.795-818

TRNG Entropy Model in the Presence of Flicker FM Noise (opens in new window)

Author(s): Adriaan Peetermans, Ingrid Verbauwhede
Published in: IACR Transactions on Cryptographic Hardware and Embedded Systems, Issue 2024, 2024, Page(s) 285-306, ISSN 2569-2925
Publisher: RUB
DOI: 10.46586/tches.v2024.i4.285-306

Revisiting Higher-Order Masked Comparison for Lattice-Based Cryptography: Algorithms and Bit-Sliced Implementations (opens in new window)

Author(s): D'Anvers, Jan-Pieter; Van Beirendonck, Michiel; Verbauwhede, Ingrid
Published in: IEEE Transactions on Computers, Issue 72 (2), 2023, Page(s) pp. 321-332, ISSN 1557-9956
Publisher: IEEE
DOI: 10.1109/tc.2022.3197074

On the Masking-Friendly Designs for Post-quantum Cryptography (opens in new window)

Author(s): Suparna Kundu, Angshuman Karmakar, Ingrid Verbauwhede
Published in: Lecture Notes in Computer Science, Security, Privacy, and Applied Cryptography Engineering, Issue vol 14412, 2024, Page(s) 162-184, ISBN 978-3-031-51582-8
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-51583-5_10

A Practical Key-Recovery Attack on LWE-Based Key-Encapsulation Mechanism Schemes Using Rowhammer (opens in new window)

Author(s): Puja Mondal, Suparna Kundu, Sarani Bhattacharya, Angshuman Karmakar, Ingrid Verbauwhede
Published in: Lecture Notes in Computer Science, Applied Cryptography and Network Security, 2024, Page(s) 271-300
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-54776-8_11

Intellectual Property Rights

METHOD AND CIRCUIT FOR SECURELY MAPPING A MASKED VARIABLE

Application/Publication number: 20 23064712
Date: 2023-06-01
Applicant(s): KATHOLIEKE UNIVERSITEIT LEUVEN

METHOD FOR DESIGNING A DEVICE FOR A CRYPTOGRAPHIC APPLICATION

Application/Publication number: 20 23073098
Date: 2023-08-23
Applicant(s): KATHOLIEKE UNIVERSITEIT LEUVEN

METHOD FOR PERFORMING AN OPERATION IN A CRYPTOGRAPHIC APPLICATION

Application/Publication number: 20 23073111
Date: 2023-08-23
Applicant(s): KATHOLIEKE UNIVERSITEIT LEUVEN

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available

My booklet 0 0