Skip to main content

Post-Snowden Circuits and Design Methods for Security

Searching for OpenAIRE data...

Publications

A Standalone FPGA-Based Miner for Lyra2REv2 Cryptocurrencies

Author(s): Jean-Francois Tetu, Louis-Charles Trudeau, Michiel Van Beirendonck, Alexios Balatsoukas-Stimming, Pascal Giard
Published in: IEEE Transactions on Circuits and Systems I: Regular Papers, Issue 67/4, 2020, Page(s) 1194-1206, ISSN 1549-8328
DOI: 10.1109/tcsi.2020.2970923

HEAWS: An Accelerator for Homomorphic Encryption on the Amazon AWS FPGA

Author(s): Furkan Turan, Sujoy Sinha Roy, Ingrid Verbauwhede
Published in: IEEE Transactions on Computers, 2020, Page(s) 1-1, ISSN 0018-9340
DOI: 10.1109/tc.2020.2988765

Revisiting a Methodology for Efficient CNN Architectures in Profiling Attacks

Author(s): Benedikt Gierlichs; Bart Preneel; Lennert Wouters; Victor Arribas
Published in: Transactions on Cryptographic Hardware and Embedded Systems, Vol 2020, Iss 3 (2020), Issue 5, 2020, ISSN 2569-2925
DOI: 10.13154/tches.v2020.i3.147-168

Towards efficient and automated side-channel evaluations at design time

Author(s): Danilo Šijačić, Josep Balasch, Bohan Yang, Santosh Ghosh, Ingrid Verbauwhede
Published in: Journal of Cryptographic Engineering, Issue 10/4, 2020, Page(s) 305-319, ISSN 2190-8508
DOI: 10.1007/s13389-020-00233-8

Dismantling DST80-based Immobiliser Systems

Author(s): Lennert Wouters, Jan Van den Herrewegen, Flavio D. Garcia, David Oswald, Benedikt Gierlichs, Bart Preneel
Published in: IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, Page(s) 99-127, ISSN 2569-2925
DOI: 10.46586/tches.v2020.i2.99-127

Time-memory trade-off in Toom-Cook multiplication: an application to module-lattice based cryptography

Author(s): Jose Maria Bermudo Mera; Angshuman Karmakar; Ingrid Verbauwhede
Published in: Transactions on Cryptographic Hardware and Embedded Systems, Vol 2020, Iss 2 (2020), Issue 11, 2020, ISSN 2569-2925
DOI: 10.13154/tches.v2020.i2.222-244

Lightweight Prediction-Based Tests for On-Line Min-Entropy Estimation

Author(s): Milos Grujic, Vladimir Rozic, Bohan Yang, Ingrid Verbauwhede
Published in: IEEE Embedded Systems Letters, Issue 9/2, 2017, Page(s) 45-48, ISSN 1943-0663
DOI: 10.1109/LES.2017.2687082

High-Performance Ideal Lattice-Based Cryptography on 8-Bit AVR Microcontrollers

Author(s): Zhe Liu, Thomas Pöppelmann, Tobias Oder, Hwajeong Seo, Sujoy Sinha Roy, Tim Güneysu, Johann Großschädl, Howon Kim, Ingrid Verbauwhede
Published in: ACM Transactions on Embedded Computing Systems, Issue 16/4, 2017, Page(s) 1-24, ISSN 1539-9087
DOI: 10.1145/3092951

A Cautionary Note When Looking for a Truly Reconfigurable Resistive RAM PUF.

Author(s): Kai-Hsin Chuang, Robin Degraeve, Andrea Fantini, Guido Groeseneken, Dimitri Linten, Ingrid Verbauwhede
Published in: IACR Transactions on Cryptographic Hardware and Embedded Systems, Issue Vol. 2018, No. 1, 2018, Page(s) 98–117, ISSN 2569-2925
DOI: 10.13154/tches.v2018.i1.98-117

Hardware Assisted Fully Homomorphic Function Evaluation and Encrypted Search

Author(s): Sujoy Sinha Roy, Frederik Vercauteren, Jo Vliegen, Ingrid Verbauwhede
Published in: IEEE Transactions on Computers, Issue 66/9, 2017, Page(s) 1562-1572, ISSN 0018-9340
DOI: 10.1109/TC.2017.2686385

Hardware-Based Trusted Computing Architectures for Isolation and Attestation

Author(s): Pieter Maene, Johannes Gotzfried, Ruan de Clercq, Tilo Muller, Felix Freiling, Ingrid Verbauwhede
Published in: IEEE Transactions on Computers, Issue 67/3, 2018, Page(s) 361-374, ISSN 0018-9340
DOI: 10.1109/TC.2017.2647955

SOFIA: Software and control flow integrity architecture

Author(s): Ruan de Clercq, Johannes Götzfried, David Übler, Pieter Maene, Ingrid Verbauwhede
Published in: Computers & Security, Issue 68, 2017, Page(s) 16-35, ISSN 0167-4048
DOI: 10.1016/j.cose.2017.03.013

Machine-Learning Attacks on PolyPUFs, OB-PUFs, RPUFs, LHS-PUFs, and PUF–FSMs

Author(s): Jeroen Delvaux
Published in: IEEE Transactions on Information Forensics and Security, 2019, Page(s) 1-1, ISSN 1556-6013
DOI: 10.1109/TIFS.2019.2891223

Atlas: Application Confidentiality in Compromised Embedded Systems

Author(s): Pieter Maene, Johannes Gotzfried, Tilo Muller, Ruan de Clercq, Felix Freiling, Ingrid Verbauwhede
Published in: IEEE Transactions on Dependable and Secure Computing, 2018, Page(s) 1-1, ISSN 1545-5971
DOI: 10.1109/tdsc.2018.2858257

EM Information Security Threats Against RO-Based TRNGs: The Frequency Injection Attack Based on IEMI and EM Information Leakage

Author(s): Saki Osuka, Daisuke Fujimoto, Yu-ichi Hayashi, Naofumi Homma, Arthur Beckers, Josep Balasch, Benedikt Gierlichs, Ingrid Verbauwhede
Published in: IEEE Transactions on Electromagnetic Compatibility, 2018, Page(s) 1-7, ISSN 0018-9375
DOI: 10.1109/temc.2018.2844027

Constant-Time Discrete Gaussian Sampling

Author(s): Angshuman Karmakar, Sujoy Sinha Roy, Oscar Reparaz, Frederik Vercauteren, Ingrid Verbauwhede
Published in: IEEE Transactions on Computers, Issue 67/11, 2018, Page(s) 1561-1571, ISSN 0018-9340
DOI: 10.1109/tc.2018.2814587

HEPCloud: An FPGA-based Multicore Processor for FV Somewhat Homomorphic Function Evaluation

Author(s): Sujoy Sinha Roy, Kimmo Jarvinen, Jo Vliegen, Frederik Vercauteren, Ingrid Verbauwhede
Published in: IEEE Transactions on Computers, 2018, Page(s) 1-1, ISSN 0018-9340
DOI: 10.1109/tc.2018.2816640

Hardware-Efficient Post-processing Architectures for True Random Number Generators

Author(s): Vladimir Rozic, Ingrid Verbauwhede
Published in: IEEE Transactions on Circuits and Systems II: Express Briefs, 2018, Page(s) 1-1, ISSN 1549-7747
DOI: 10.1109/tcsii.2018.2881559

X-Ray and Proton Radiation Effects on 40 nm CMOS Physically Unclonable Function Devices

Author(s): P. F. Wang, E. X. Zhang, K. H. Chuang, W. Liao, H. Gong, P. Wang, C. N. Arutt, K. Ni, M. W. Mccurdy, I. Verbauwhede, E. Bury, D. Linten, D. M. Fleetwood, R. D. Schrimpf, R. A. Reed
Published in: IEEE Transactions on Nuclear Science, Issue 65/8, 2018, Page(s) 1519-1524, ISSN 0018-9499
DOI: 10.1109/tns.2017.2789160

Decryption Failure Attacks on IND-CCA Secure Lattice-Based Schemes

Author(s): D’Anvers, JP ; Guo, Q ; Johansson, T ; Nilsson, A ; Vercauteren, F ; Verbauwhede, I
Published in: Lecture Notes in Computer Science, 2019, Page(s) 565 - 598, ISSN 0302-9743
DOI: 10.1007/978-3-030-17259-6_19

Compact and Flexible FPGA Implementation of Ed25519 and X25519

Author(s): Turan, Furkan ; Verbauwhede, Ingrid
Published in: Acm Transactions On Embedded Computing Systems, 2019, ISSN 1539-9087
DOI: 10.1145/3312742

A Physically Unclonable Function Using Soft Oxide Breakdown Featuring 0% Native BER and 51.8 fJ/bit in 40-nm CMOS

Author(s): Kai-Hsin Chuang, Erik Bury, Robin Degraeve, Ben Kaczer, Dimitri Linten, Ingrid Verbauwhede
Published in: IEEE Journal of Solid-State Circuits, Issue 54/10, 2019, Page(s) 2765-2776, ISSN 0018-9200
DOI: 10.1109/jssc.2019.2920714

Trust in FPGA-accelerated Cloud Computing

Author(s): Furkan Turan, Ingrid Verbauwhede
Published in: ACM Computing Surveys, Issue 53/6, 2021, Page(s) 1-28, ISSN 0360-0300
DOI: 10.1145/3419100

(One) Failure Is Not an Option: Bootstrapping the Search for Failures in Lattice-Based Encryption Schemes

Author(s): Jan-Pieter D’Anvers, Mélissa Rossi, Fernando Virdia
Published in: Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10–14, 2020, Proceedings, Part III, Issue 12107, 2020, Page(s) 3-33
DOI: 10.1007/978-3-030-45727-3_1

Single-Trace Side-Channel Attacks on Scalar Multiplications with Precomputations

Author(s): Kimmo Järvinen, Josep Balasch
Published in: Smart Card Research and Advanced Applications, Issue 10146, 2017, Page(s) 137-155
DOI: 10.1007/978-3-319-54669-8_9

Saber: Module-LWR Based Key Exchange, CPA-Secure Encryption and CCA-Secure KEM

Author(s): Jan-Pieter D’Anvers, Angshuman Karmakar, Sujoy Sinha Roy, Frederik Vercauteren
Published in: Progress in Cryptology – AFRICACRYPT 2018, Issue 10831, 2018, Page(s) 282-305
DOI: 10.1007/978-3-319-89339-6_16

Ring-LWE: Applications to Cryptography and Their Efficient Realization

Author(s): Sujoy Sinha Roy, Angshuman Karmakar, Ingrid Verbauwhede
Published in: Security, Privacy, and Applied Cryptography Engineering, Issue 10076, 2016, Page(s) 323-331
DOI: 10.1007/978-3-319-49445-6_18

The Impact of Error Dependencies on Ring/Mod-LWE/LWR Based Schemes

Author(s): Jan-Pieter D’Anvers, Frederik Vercauteren, Ingrid Verbauwhede
Published in: Post-Quantum Cryptography - 10th International Conference, PQCrypto 2019, Chongqing, China, May 8–10, 2019 Revised Selected Papers, Issue 11505, 2019, Page(s) 103-115
DOI: 10.1007/978-3-030-25510-7_6

Design Considerations for EM Pulse Fault Injection

Author(s): Arthur Beckers, Masahiro Kinugawa, Yuichi Hayashi, Daisuke Fujimoto, Josep Balasch, Benedikt Gierlichs, Ingrid Verbauwhede
Published in: Smart Card Research and Advanced Applications - 18th International Conference, CARDIS 2019, Prague, Czech Republic, November 11–13, 2019, Revised Selected Papers, Issue 11833, 2020, Page(s) 176-192
DOI: 10.1007/978-3-030-42068-0_11

Forkcipher: A New Primitive for Authenticated Encryption of Very Short Messages

Author(s): Elena Andreeva, Virginie Lallemand, Antoon Purnal, Reza Reyhanitabar, Arnab Roy, Damian Vizár
Published in: Advances in Cryptology – ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part II, Issue 11922, 2019, Page(s) 153-182
DOI: 10.1007/978-3-030-34621-8_6

Compact domain-specific co-processor for accelerating module lattice-based KEM

Author(s): Jose Maria Bermudo Mera, Furkan Turan, Angshuman Karmakar, Sujoy Sinha Roy, Ingrid Verbauwhede
Published in: 2020 57th ACM/IEEE Design Automation Conference (DAC), 2020, Page(s) 1-6
DOI: 10.1109/dac18072.2020.9218727

Security and reliability – friend or foe

Author(s): I. Verbauwhede, K.-H. Chuang
Published in: 2019 IEEE International Electron Devices Meeting (IEDM), 2019, Page(s) 13.4.1-13.4.4
DOI: 10.1109/iedm19573.2019.8993585

Propagating trusted execution through mutual attestation

Author(s): Furkan Turan, Ingrid Verbauwhede
Published in: Proceedings of the 4th Workshop on System Software for Trusted Execution - SysTEX '19, 2019, Page(s) 1-6
DOI: 10.1145/3342559.3365334

Attacking Hardware Random Number Generators in a Multi-Tenant Scenario

Author(s): Yrjo Koyen, Adriaan Peetermans, Vladimir Rozic, Ingrid Verbauwhede
Published in: 2020 Workshop on Fault Detection and Tolerance in Cryptography (FDTC), 2020, Page(s) 18-25
DOI: 10.1109/fdtc51366.2020.00010

Exploiting Decryption Failures in Mersenne Number Cryptosystems

Author(s): Marcel Tiepelt, Jan-Pieter D'Anvers
Published in: Proceedings of the 7th ACM Workshop on ASIA Public-Key Cryptography, 2020, Page(s) 45-54
DOI: 10.1145/3384940.3388957

SCM - Secure Code Memory Architecture

Author(s): Ruan de Clercq, Ronald de Keulenaer, Pieter Maena, Bart Preneel, Bjorn De Sutter, Ingrid Verbauwhede
Published in: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security - ASIA CCS '17, 2017, Page(s) 771-776
DOI: 10.1145/3052973.3053044

Fast Leakage Assessment

Author(s): Oscar Reparaz, Benedikt Gierlichs, Ingrid Verbauwhede
Published in: Cryptographic Hardware and Embedded Systems – CHES 2017, 2017, Page(s) 387-399
DOI: 10.1007/978-3-319-66787-4_19

Dude, is my code constant time?

Author(s): Oscar Reparaz, Josep Balasch, Ingrid Verbauwhede
Published in: Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017, 2017, Page(s) 1697-1702
DOI: 10.23919/DATE.2017.7927267

Fault Analysis of the ChaCha and Salsa Families of Stream Ciphers

Author(s): Arthur Beckers, Benedikt Gierlichs, Ingrid Verbauwhede
Published in: Smart Card Research and Advanced Applications. CARDIS 2017, 2017, Page(s) 196-212
DOI: 10.1007/978-3-319-75208-2_12

The Monte Carlo PUF

Author(s): Vladimir Rozic, Bohan Yang, Jo Vliegen, Nele Mentens, Ingrid Verbauwhede
Published in: 2017 27th International Conference on Field Programmable Logic and Applications (FPL), 2017, Page(s) 1-6
DOI: 10.23919/FPL.2017.8056780

A first-order chosen-plaintext DPA attack on the third round of DES

Author(s): O. Reparaz, and B. Gierlichs
Published in: 2017
DOI: 10.5281/zenodo.2643352

The impact of error dependencies on Ring/Mod-LWE/LWR based schemes

Author(s): D'Anvers, Jan-Pieter; Vercauteren, Frederik; Verbauwhede, Ingrid
Published in: Issue 1, 2019
DOI: 10.5281/zenodo.2641881

FPGA-Based High-Performance Parallel Architecture for Homomorphic Computing on Encrypted Data

Author(s): Sujoy Sinha Roy, Furkan Turan, Kimmo Jarvinen, Frederik Vercauteren, Ingrid Verbauwhede
Published in: 2019 IEEE International Symposium on High Performance Computer Architecture (HPCA), 2019, Page(s) 387-398
DOI: 10.1109/hpca.2019.00052

On the impact of decryption failures on the security of LWE/LWR based schemes

Author(s): D'Anvers, Jan-Pieter; Vercauteren, Frederik; Verbauwhede, Ingrid
Published in: Issue 1, 2019
DOI: 10.5281/zenodo.2641892

A Privacy-Preserving Device Tracking System Using a Low-Power Wide-Area Network

Author(s): Tomer Ashur, Jeroen Delvaux, Sanghan Lee, Pieter Maene, Eduard Marin, Svetla Nikova, Oscar Reparaz, Vladimir Rožić, Dave Singelée, Bohan Yang, Bart Preneel
Published in: Cryptology and Network Security - 16th International Conference, CANS 2017, Hong Kong, China, November 30—December 2, 2017, Revised Selected Papers, Issue 11261, 2018, Page(s) 347-369
DOI: 10.1007/978-3-030-02641-7_16

Comparison of two setups for contactless power measurements for side-channel analysis

Author(s): Arthur Beckers, Benedikt Gierlichs, Josep Balasch, Ingrid Verbauwhede
Published in: 2018 IEEE International Symposium on Electromagnetic Compatibility and 2018 IEEE Asia-Pacific Symposium on Electromagnetic Compatibility (EMC/APEMC), 2018, Page(s) 739-744
DOI: 10.1109/isemc.2018.8393879

Consolidating Inner Product Masking

Author(s): Josep Balasch, Sebastian Faust, Benedikt Gierlichs, Clara Paglialonga, François-Xavier Standaert
Published in: Advances in Cryptology – ASIACRYPT 2017, Issue 10624, 2017, Page(s) 724-754
DOI: 10.1007/978-3-319-70694-8_25

Design and validation of a platform for electromagnetic fault injection

Author(s): Josep Balasch, Daniel Arumi, Salvador Manich
Published in: 2017 32nd Conference on Design of Circuits and Integrated Systems (DCIS), 2017, Page(s) 1-6
DOI: 10.1109/dcis.2017.8311630

Fundamental study on non-invasive frequency injection attack against RO-based TRNG

Author(s): Saki Osuka, Daisuke Fujimoto, Yu-ichi Hayashi, Naofumi Homma, Arthur Beckers, Joseph Balasch, Benedikt Gierlichs, Ingrid Verbauwhede
Published in: 2018 IEEE International Symposium on Electromagnetic Compatibility and 2018 IEEE Asia-Pacific Symposium on Electromagnetic Compatibility (EMC/APEMC), 2018, Page(s) 8-8
DOI: 10.1109/isemc.2018.8394008

Physically unclonable function using CMOS breakdown position

Author(s): K.-H. Chuang, E. Bury, R. Degraeve, B. Kaczer, G. Groeseneken, I. Verbauwhede, D. Linten
Published in: 2017 IEEE International Reliability Physics Symposium (IRPS), 2017, Page(s) 4C-1.1-4C-1.7
DOI: 10.1109/irps.2017.7936312

The Impact of Pulsed Electromagnetic Fault Injection on True Random Number Generators

Author(s): Maxime Madau, Michel Agoyan, Josep Balasch, Milos Grujic, Patrick Haddad, Philippe Maurine, Vladimir Rozic, Dave Singelee, Bohan Yang, Ingrid Verbauwhede
Published in: 2018 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 2018, Page(s) 43-48
DOI: 10.1109/fdtc.2018.00015

Teaching HW/SW codesign with a Zynq ARM/FPGA SoC

Author(s): Josep Balasch, Arthur Beckers, Dusan Bozilov, Sujoy Sinha Roy, Furkan Turan, Ingrid Verbauwhede
Published in: 2018 12th European Workshop on Microelectronics Education (EWME), 2018, Page(s) 63-66
DOI: 10.1109/ewme.2018.8629481

ES-TRNG: A High-throughput, Low-area True Random Number Generator based on Edge Sampling

Author(s): Bohan Yang Vladimir Rožic Miloš Grujic Nele Mentens Ingrid Verbauwhede
Published in: IACR Transactions on Cryptographic Hardware and Embedded Systems, 2018
DOI: 10.13154/tches.v2018.i3.267-292

A Physically Unclonable Function with 0% BER Using Soft Oxide Breakdown in 40nm CMOS

Author(s): Kai-Hsin Chuang, Erik Bury, Robin Degraeve, Ben Kaczer, Dimitri Linien, Ingrid Verbauwhede
Published in: 2018 IEEE Asian Solid-State Circuits Conference (A-SSCC), 2018, Page(s) 157-160
DOI: 10.1109/asscc.2018.8579252

Upper bounds on the min-entropy of RO Sum, Arbiter, Feed-Forward Arbiter, and S-ArbRO PUFs

Author(s): Jeroen Delvaux, Dawu Gu, Ingrid Verbauwhede
Published in: 2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST), 2016, Page(s) 1-6
DOI: 10.1109/asianhost.2016.7835572

Towards Efficient and Automated Side Channel Evaluations at Design Time

Author(s): Danilo Šijačić, Josep Balasch, Bohan Yang, Santosh Ghosh, Ingrid Verbauwhede
Published in: Kalpa Publications in Computing volume 7, 2018, Page(s) 16--1
DOI: 10.29007/mbf3

Towards inter-vendor compatibility of true random number generators for FPGAs

Author(s): Milos Grujic, Bohan Yang, Vladimir Rozic, Ingrid Verbauwhede
Published in: 2018 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2018, Page(s) 1520-1523
DOI: 10.23919/date.2018.8342256

Saber on ARM CCA-secure module lattice-based key encapsulation on ARM

Author(s): Angshuman Karmakar Jose Maria Bermudo Mera Sujoy Sinha Roy Ingrid Verbauwhede
Published in: IACR Transactions on Cryptographic Hardware and Embedded System, 2018
DOI: 10.13154/tches.v2018.i3.243-266

A multi-bit/cell PUF using analog breakdown positions in CMOS

Author(s): K.-H. Chuang, E. Bury, R. Degraeve, B. Kaczer, T. Kallstenius, G. Groeseneken, D. Linten, I. Verbauwhede
Published in: 2018 IEEE International Reliability Physics Symposium (IRPS), 2018, Page(s) P-CR.2-1-P-CR.2-5
DOI: 10.1109/irps.2018.8353655

A Closer Look at the Delay-Chain based TRNG

Author(s): Milos Grujic, Vladimir Rozic, Bohan Yang, Ingrid Verbauwhede
Published in: 2018 IEEE International Symposium on Circuits and Systems (ISCAS), 2018, Page(s) 1-5
DOI: 10.1109/iscas.2018.8351222

On-chip jitter measurement for true random number generators

Author(s): Bohan Yang, Vladimir Rozic, Milos Grujic, Nele Mentens, Ingrid Verbauwhede
Published in: 2017 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), 2017, Page(s) 91-96
DOI: 10.1109/asianhost.2017.8354001

An In-depth and Black-Box Characterization of the Effects of Laser Pulses on ATmega328P

Author(s): Kumar, D.S.; Beckers, A; Balasch, J; Gierlichs, B; Verbauwhede, I
Published in: Lecture Notes in Computer Science LNCS, 2019
DOI: 10.5281/zenodo.2647324

Design Principles for True Random Number Generators for Security Applications

Author(s): M. Grujic, V. Rozic, D. Johnston, J. Kelsey, and I. Verbauwhede
Published in: Design Automation Conference (DAC 2019), 2019
DOI: 10.1145/3316781.3323482

Pushing the speed limit of constant-time discrete Gaussian sampling. A case study on the Falcon signature scheme.

Author(s): Karmakar, Angshuman ; Roy, Sujoy Sinha ; Vercauteren, Frederik ; Verbauwhede, Ingrid
Published in: Design Automation Conference (DAC 2019), 2019
DOI: 10.1145/3316781.3317887

A Self-Calibrating True Random Number Generator

Author(s): Adriaan Peetermans, Milos Grujic, Vladimir Rozic, Ingrid Verbauwhede
Published in: 2019 29th International Conference on Field Programmable Logic and Applications (FPL), 2019, Page(s) 428-428
DOI: 10.1109/fpl.2019.00080

A Highly-Portable True Random Number Generator Based on Coherent Sampling

Author(s): Adriaan Peetermans, Vladimir Rozic, Ingrid Verbauwhede
Published in: 2019 29th International Conference on Field Programmable Logic and Applications (FPL), 2019, Page(s) 218-224
DOI: 10.1109/fpl.2019.00041

Timing Attacks on Error Correcting Codes in Post-Quantum Schemes

Author(s): Jan-Pieter D'Anvers, Marcel Tiepelt, Frederik Vercauteren, Ingrid Verbauwhede
Published in: Proceedings of ACM Workshop on Theory of Implementation Security Workshop - TIS'19, 2019, Page(s) 2-9
DOI: 10.1145/3338467.3358948

Sweeping for Leakage in Masked Circuit Layouts

Author(s): Danilo Sijacic, Josep Balasch, Ingrid Verbauwhede
Published in: 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2020, Page(s) 915-920
DOI: 10.23919/date48585.2020.9116468

Characterization of EM faults on ATmega328p

Author(s): Arthur Beckers, Josep Balasch, Benedikt Gierlichs, Ingrid Verbauwhede, Saki Osuka, Masahiro Kinugawa, Daisuke Fujimoto, Yuichi Hayashi
Published in: 2019 Joint International Symposium on Electromagnetic Compatibility, Sapporo and Asia-Pacific International Symposium on Electromagnetic Compatibility (EMC Sapporo/APEMC), 2019, Page(s) 1-4
DOI: 10.23919/emcsapporo/apemc44270.2019.9320849

A survey of Hardware-based Control Flow Integrity (CFI)

Author(s): Ruan de Clercq, Ingrid Verbauwhede
Published in: ACM Computing Surveys (CSUR), Issue abs/1706.07257, 2017, Page(s) 1-27, ISSN 1557-7341

True Random Number Generators for FPGAs

Author(s): Bohan Yang
Published in: 2018