Talks
- What can be learned form leakage assessment? And what not? ECRYPT CSA workshop hardware benchmarking, Bochum (Germany), 2017, slides
- Embedded security IACR School on Design and Security of Cryptographic Algorithms and Devices, Sardinia (Italy), 2015, slides
- Recent research summer course on Physical Attacks aNd Design Attestation (PANDA), Shenzhen, Guandong (China), 2015, course website
- Introduction to (higher-order) differential power analysis and template attacks (7 hours course with hands-on) summer course on Physical Attacks aNd Design Attestation (PANDA), Jinan, Shandong (China), 2014, course website
- Embedded Security (invited) BalkanCryptSec 2014, Istanbul, Turkey, website slides
- Threshold Implementations (invited) Crypto-IC 2014, Beijing, China, website slides
- Power analysis, an overview Summer School Design and security of Cryptographic Algorithms and Devices for real-world Applications, Sibenik (Croatia), 2014, slides
- Side-Channel Attacks (invited tutorial) SPACE 2013, Kharagpur, India, website
- Introduction to side-channel attacks and power analysis (4 hours course with hands-on) summer course on Physical Attacks aNd Design Attestation (PANDA), Chengdu, Sichuan (China), 2013, course website
- Introduction to Power Analysis Summer School Design and Security of Cryptographic Algorithms and Devices, Albena (Bulgaria), 2013, slides
- Practical leakage resilience, ECRYPT II workshop on physical attacks 2012, slides
- Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output, Latincrypt 2012
- Introduction to side-channel attacks (1.5 days tutorial with hands-on) at CHEW 2012
- To Infinity and Beyond: To Infinity and Beyond: Combined Attack on ECC using Points of Low Order, CHES 2011, slides
- To Infinity and Beyond: To Infinity and Beyond: Combined Attack on ECC using Points of Low Order, InfoSecHiComNet 2011, slides (invited)
- Introduction to Power Analysis Summer School Design and Security of Cryptographic Algorithms and Devices, Albena (Bulgaria), 2011, slides
- Multivariate Mutual Information Analysis, CT-RSA 2010
- Practical DPA Attacks on MDPL, IEEE WIFS 2009
- Differential Cluster Analysis, CHES 2009, slides
- Empirical Comparison of Side Channel Distinguishers on DES in Hardware, ECCTD 2009
- How (not) to compare Side-Channel Distinguishers II, Crypto'Puces 2009
- Embedded security Computer security course, Vigo (Spain)
- Mutual Information Analysis - A Generic Side-Channel Distinguisher and MIA Applications, Crypto'Puces 2009
- How (not) to compare Side-Channel Distinguishers, PASTIS workshop 2008, slides
- Revisiting A Combinatorial Approach Toward Measuring Anonymity, WPES 2008, slides
- Comparative Evaluation of Rank Correlation based DPA on an AES prototype chip, ISC 2008, slides
- Mutual Information Analysis - A Generic Side-Channel Distinguisher, CHES 2008, slides
- Power and Fault Analysis Resistance in Hardware through Dynamic Reconfiguration, CryptArchi, June 2008, slides (invited)
- Physical Security of Embedded Cryptographic Devices, BCRYPT PhD Day, April 2008 , slides
- Fault Analysis Study of IDEA, CT-RSA 2008, slides
- Power Analysis on Curve-based Cryptography, BCRYPT workshop on Elliptic Curve Cryptography 2008, slides
- Susceptibility of eSTREAM Candidates towards Side Channel Analysis, SASC 2008, slides
- Mutual Information Analysis -- A Universal Differential Side-Channel Attack, Wissec 2007
- DPA-Resistance without routing constraints?, CHES 2007, slides
- Templates on masking: An interpretation, WEWoRC 2007
- DPA-Resistance without routing constraints?: A cautionary note about MDPL security, USE IT 2007
- Templates vs. Stochastic Methods, CHES 2006, slides
Program chair
Program committees
I have (sub-)reviewed articles for
- CT-RSA 2007, 2008, 2009
- FSE 2007, 2009, 2010, 2012
- CHES 2007, 2008, 2009, 2010
- IEEE Transactions on Information Forensics and Security
- IEEE Transactions on Dependable and Secure Computing
- IEEE Design & Test of Computers
- IEEE Transactions on Computers
- WISA 2007 (International Workshop on Information Security Applications)
- ACM CCS 2007, 2011 (Association for Computing Machinery Computer and Communications Security)
- ISCAS 2008, 2012
- SASC 2008
- ASAP 2008
- Designs, Codes and Cryptography
- Esorics 2008, 2010
- SAC 2008
- ACM Transactions on Reconfigurable Technology and Systems
- Workshop on Embedded Systems Security (WESS'2008, IEEE/ACM)
- IEEE Transactions on Industrial Informatics
- Indocrypt 2008, 2011
- Wissec 2008, 2009
- ICISC 2008
- Inscrypt 2008
- DATE 2009, 2010, 2011
- ISCAS 2009
- AfricaCrypt 2009
- ACNS 2009, 2011
- IEEE Transactions on Signal Processing
- IEEE Transactions on Information Forensics and Security
- Crypto 2009, 2011, 2012
- RFIDsec 2009
- HOST 2009, 2010, 2011
- Asiacrypt 2009
- Workshop on Embedded Systems Security (WESS'2009, IEEE/ACM)
- Intrust 2009
- IEEE Transactions on Computers
- Cosade 2010, 2011, 2012
- Journal of Cryptology
- IEEE Workshop on Signal Processing Systems
- SAC 2010
- IWSEC 2010
- WISA 2010
- ICISC 2010
- IEEE Transactions on Information Forensics and Security
- International Journal of Applied Cryptography
- Eurocrypt 2012
Awards
- My PhD thesis was awarded "summa cum laude with the congratulations of the board of examiners".
- Student travel stipend for the Workshop on Cryptographic Hardware and Embedded Systems (CHES) 2008, Washington DC, USA
- Student travel stipend for the Workshop on Cryptographic Hardware and Embedded Systems (CHES) 2006, Yokohama, Japan
- Awarded Hacker Attack (Ausgezeichneter Hacker Angriff), press release in German
- Contest organised by the Cryptology and IT-Security group, University Bochum
- The aim of the contest was to reveal the secret key (COMP128) of a simulated GSM SIM card
Conferences/Workshops/Symposia/Courses attended
- I do no longer update this list.
- Workshop on Cryptographic Hardware and Embedded Systems (CHES'13), Santa Barbara (USA), August 20-23, 2013
- Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC'13), Santa Barbara (USA), August 20, 2013
- Summer School Design and Security of Cryptographic Algorithms and Devices, Albena (Bulgaria), June 30 - June 5, 2013
- Cosade, Paris (France), March 7-8, 2013
- Asiacrypt, Beijing (China), December 2-6, 2012
- Second International Conference on Cryptology and Information Security in Latin America (Latincrypt'12), Santiago (Chile), October 7-10, 2012
- Workshop on Cryptographic Hardware and Embedded Systems (CHES'12), Leuven (Belgium), September 9-12, 2012
- Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC'12), Leuven (Belgium), September 9, 2012
- The Cryptographers' Track at the RSA Conference (CT-RSA 2012), San Francisco (USA), February 27 - March 2, 2012
- Workshop on Cryptographic Hardware and Embedded Systems (CHES'11), Nara (Japan), September 28 - October 1, 2011
- Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC'11), Nara (Japan), September 28, 2011
- Non-Invasive Attack Testing Workshop (NIAT 2011), Nara (Japan), September 25-27, 2011
- Summer School Design and Security of Cryptographic Algorithms and Devices, Albena (Bulgaria), Mai 29 - June 3, 2011
- Workshop on Cryptographic Hardware and Embedded Systems (CHES'10), Santa Barbara (USA), August 17-20, 2010
- The Cryptographers' Track at the RSA Conference (CT-RSA 2010), San Francisco (USA), March 1-5, 2010
- First IEEE International Workshop on Information Forensics and Security, London (UK), December 6-9 2009
- Workshop on Cryptographic Hardware and Embedded Systems (CHES'09), Lausanne (Switzerland), September 6-9, 2009
- 19th European Conference on Circuit Theory and Design, Antalya (Turkey), August 23-27 2009
- Crypto'Puces,Île de Porquerolles (France), June 2-6 2009
- BCRYPT course on Embedded Security, Leuven and Louvain-la-Neuve (Belgium), May and June 2009
- PASTIS 2008, Gardanne (France), December 2-3 2008
- ACM Computer and Communications Security Conference (ACM CCS 2008), Alexandria (VA, USA), October 28-30, 2008
- Workshop on Privacy in the Electronic Society (WPES 2008), Alexandria (VA, USA), October 27, 2008
- Information Security Conference (ISC 2008), Taipei (Taiwan), September 15-18, 2008
- Workshop on Cryptographic Hardware and Embedded Systems (CHES'08), Washington DC (USA), August 10-13, 2008
- Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC'08), Washington DC (USA), August 10, 2008
- CryptArchi, Trégastel (France), June 1-4, 2008
- BCRYPT PhD Day, Louvain-la-Neuve (Belgium), April 30, 2008
- Applied Statistics: Mixed Models, Leuven (Belgium), April 16-17, 2008
- The Cryptographers' Track at the RSA Conference (CT-RSA 2008), San Francisco (USA), April 7-11, 2008
- BCRYPT workshop on Elliptic Curve Cryptography, Leuven (Belgium), March 20, 2008
- The State of the Art of Stream Ciphers (SASC 2008), Lausanne (Switzerland), February 13-14, 2008
- 2nd Benelux Workshop on Information and System Security (Wissec'07), Luxembourg, September 20-21, 2007
- Workshop on Cryptographic Hardware and Embedded Systems (CHES'07), Vienna (Austria), September 10-13, 2007
- Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC'07), Vienna (Austria), September 10, 2007
- WEWoRC 2007, Bochum (Germany), July 4-6 2007
- USE IT 2007, Toulouse (France), July 3-4, 2007
- Crypto'Puces 2007, Island of Porquerolles (France), April 15-18, 2007
- Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC'06), Yokohama (Japan), October 10, 2006
- Workshop on Cryptographic Hardware and Embedded Systems (CHES'06), Yokohama (Japan), October 10-13, 2006
- Intensive Program on Information and Communication Security (IPICS'06) Heverlee (Belgium), July 17-28, 2006
PhD students
- Josep Balasch graduated on March 11, 2014 at KU Leuven and RU Nijmegen (member of the examination committee)
- Begül Bilgin graduated on May 13, 2015 at KU Leuven and UTwente (daily supervisor)
- Oscar Reparaz graduated on June 17, 2016 at KU Leuven (co-promotor)
- Jeroen Delvaux graduated on July 4th, 2017. Joint degree between KU Leuven and Shanghai Jiao Tong university. (member of the PhD jury)
- Yuanyuan (Ryan) Zhou at UC Louvain-la-Neuve (member of the advisory committee)
- Kai-Hsin Chuang at KU Leuven and IMEC (member of the advisory committee)
- Arthur Beckers at KU Leuven (co-promotor)
- Lennert Wouters at KU Leuven (co-promotor)
- Alberto Battistello at Universite de Versailles (member of the jury)
- Hyunmin Kim at KU Leuven (member of the examination committee)
- Daniel Dinu at University of Luxembourg (member of the examination committee)
Master thesis (undergrad), daily supervisor and/or assessor
- I was assessor for the thesis "block ciphers for low energy" by Saad Javed Ghangro, August 2016 - June 2017.
- Together with Oscar Reparaz I supervised Lennert Wouters (KU Leuven), August 2015 - September 2016.
- Together with Begül Bilgin and Josep Balasch I supervised Joeri De Maesschalck (KU Leuven), August 2015 - September 2016.
- Together with Josep Balasch I supervised Joos Wesemael (KU Leuven), July 2013 - June 2015.
- Together with Josep Balasch I supervised Arthur Beckers (KU Leuven), August 2014 - June 2015.
- Together with Josep Balasch I supervised Bart Opsomer (KU Leuven), August 2014 - June 2015.
- Together with Josep Balasch I supervised Victor Förster (KU Leuven), July 2013 - September 2014.
- Together with Josep Balasch I supervised Matthias Carpentier (KU Leuven), July 2013 - June 2014. He worked on power measurements of contactless cryptographic smartcards.
- Together with Josep Balasch I supervised Anthony Coyette (UCL) at the KU Leuven, July 2011 - June 2012. He worked on hardware-software co-design for ECC implementations and tradeoffs regarding area, time and security.
- Together with Nele Mentens I supervised Roald Goossens at the Katholieke Hogeschool Limburg, July 2008 - June 2009. He worked on remote and secure configuration of FPGAs.
- Together with Elke De Mulder I supervised Michaël Sterckx (K.U. Leuven), September 2008 - June 2009. Michael implemented the Direct Anonymous Attestation protocol on JavaCard platforms and analyzed the security of his implementation with respect to side channel attacks.
- Together with Elke De Mulder I supervised
Jan-Pieter Jacobs (K.U. Leuven), September 2008 - June 2009. Jan-Pieter implemented a bidirectional ISO 7816 interface that allows more flexible control of ISO 7816 compliant devices, e.g. smart cards.
- Together with Elke De Mulder I supervised Klaas De Craemer (K.U. Leuven), September 2008 - June 2009. Klaas investigated ways to measure the instantaneous power consumption of smart cards and the electrical properties of measurement setups.
- Together with Elke De Mulder I supervised Shiqi Li and Hongxu Zhao (K.U. Leuven), September 2008 - June 2009. Shiqi and Hongxu implemented an interface for the eSCARGOT chip (glue logic) and performed Differential Power Analysis attacks on a hardware implementation of the stream cipher Mickey.
- Together with Carmela Troncoso I supervised Mariano Monteverde (an Erasmus from Escola Politecnica Superior de Castelldefels (EPSC), Spain), February 2008 - September 2008. Mariano worked on a software implementation of NTRU for smartcards.
- Together with Nele Mentens I supervised Frederik Gommé at the Katholieke Hogeschool Limburg, July 2007 - June 2008. He worked on partial dynamic reconfiguration of FPGAs.