2010 |
2. |
F. Standaert, N. Veyrat-Charvillon, E. Oswald, B. Gierlichs, M. Medwed, M. Kasper, and S. Mangard, "The World is Not Enough: Another Look on Second-Order DPA," In Advances in Cryptology - ASIACRYPT 2010, Lecture Notes in Computer Science 6477, M. Abe (ed.), Springer-Verlag, pp. 112-129, 2010. bibtex [acceptance rate 16.2%, 35 of 216] |
|
1. |
B. Gierlichs, L. Batina, B. Preneel, and I. Verbauwhede, "Revisiting Higher-Order DPA Attacks: Multivariate Mutual Information Analysis", In Topics in Cryptology - CT-RSA 2010, The Cryptographers' Track at the RSA Conference, Lecture Notes in Computer Science 5985, J. Pieprzyk (ed.), Springer-Verlag, pp. 221-234, 2010. bibtex [acceptance rate 26.6%, 25 of 94] |
2009 |
4. |
L. Batina, B. Gierlichs, and K. Lemke-Rust, "Differential Cluster Analysis", In Cryptographic Hardware and Embedded Systems - CHES 2009, Lecture Notes in Computer Science 5747, C. Clavier, and K. Gaj (eds.), Springer-Verlag, pp. 112-127, 2009. bibtex [acceptance rate 19.6%, 29 of 148] |
|
3. |
E. De Mulder, B. Gierlichs, B. Preneel, and I. Verbauwhede, "Practical DPA Attacks on MDPL," In 1st IEEE International Workshop on Information Forensics and Security (WIFS 2009), IEEE, pp. 191 - 195, 2009. bibtex [acceptance rate 31.5%, 39 of 124] |
|
2. |
M. Sterckx, B. Gierlichs, B. Preneel, and I. Verbauwhede, "Efficient Implementation of Anonymous Credentials on Java Card Smart
Cards," In 1st IEEE International Workshop on Information Forensics and Security (WIFS 2009), IEEE, pages 106 - 110, 2009. bibtex [acceptance rate 31.5%, 39 of 124] |
|
1. |
B. Gierlichs, E. De Mulder, B. Preneel, and I. Verbauwhede, "Empirical Comparison of Side Channel Analysis Distinguishers on DES in Hardware," In Proc. European Conference on Circuit Theory and Design (ECCTD 2009), pp. 391-394, 2009. bibtex [acceptance rate xx%, xx of xx] |
2008 |
7. |
F. Standaert, B. Gierlichs, and I. Verbauwhede, "Partition vs. Comparison Side-Channel Distinguishers," In Information Security and Cryptology - ICISC 2008: 11th International Conference, Lecture Notes in Computer Science 5461, Springer-Verlag, pp. 253-267, 2008. bibtex [acceptance rate 19.8%, 26 of 131] |
|
6. |
B. Gierlichs, C. Troncoso, C. Diaz, B. Preneel, and I. Verbauwhede, "Revisiting A Combinatorial Approach Toward Measuring Anonymity," In Workshop on Privacy in the Electronic Society 2008 ACM, ACM, 5 pages, 2008. bibtex [acceptance rate 35%, 15 of 42] |
|
5. |
L. Batina, B. Gierlichs, and K. Lemke-Rust, "Comparative Evaluation of Rank Correlation based DPA on an AES prototype chip," In Proceedings of the 11th Information Security Conference (ISC 2008), Lecture Notes in Computer Science 5222, C. Lei, V. Rijmen, and T. Wu (eds.), Springer-Verlag, pp. 341-354, 2008. bibtex [acceptance rate 25%, 33 of 134] |
|
4. |
B. Gierlichs, L. Batina, P. Tuyls, and B. Preneel, "Mutual Information Analysis - A Generic Side-Channel Distinguisher," In Cryptographic Hardware and Embedded Systems - CHES 2008, Lecture Notes in Computer Science 5154, E. Oswald, and P. Rohatgi (eds.), Springer-Verlag, pp. 426-442, 2008. bibtex [acceptance rate 25%, 27 of 107] |
|
3. |
N. Mentens, B. Gierlichs, and I. Verbauwhede, "Power and Fault Analysis Resistance in Hardware through Dynamic Reconfiguration," In Cryptographic Hardware and Embedded Systems - CHES 2008, Lecture Notes in Computer Science 5154, E. Oswald, and P. Rohatgi (eds.), Springer-Verlag, pp. 346-362, 2008. bibtex [acceptance rate 25%, 27 of 107] |
|
2. |
C. Troncoso, B. Gierlichs, B. Preneel, and I. Verbauwhede, "Perfect Matching Disclosure Attacks," In Privacy Enhancing Technologies Symposium, Lecture Notes in Computer Science 5134, N. Borisov, and I. Goldberg (eds.), Springer-Verlag, pp. 2-23, 2008. bibtex [acceptance rate 26%, 13 of 49] |
|
1. |
C. Clavier, B. Gierlichs, and I. Verbauwhede, "Fault Analysis Study of IDEA," In Topics in Cryptology - CT-RSA 2008, The Cryptographers' Track at the RSA Conference, Lecture Notes in Computer Science 4964, T. Malkin (ed.), Springer-Verlag, pp. 274-287, 2008. bibtex [acceptance rate 27%] |
2009 |
3. |
L. Batina, B. Gierlichs, E. Prouff, M. Rivain, F. Standaert, and N. Veyrat-Charvillon, "Mutual Information Analysis: a Comprehensive Study," COSIC internal report, 22 pages, 2009. |
|
2. |
E. De Mulder, B. Gierlichs, B. Preneel, and I. Verbauwhede, "Practical DPA Attacks on MDPL", IACR ePrint Archive, 2009/231. |
|
1. |
B. Gierlichs, L. Batina, B. Preneel, and I. Verbauwhede, "Revisiting Higher-Order DPA Attacks: Multivariate Mutual Information Analysis", IACR ePrint Archive, 2009/228. |
2008 |
2. |
A. Atici, L. Batina, B. Gierlichs, and I. Verbauwhede, "Power analysis on NTRU implementations for RFIDs: First results", In RFIDsec 2008 |
|
1. |
B. Gierlichs, L. Batina, C. Clavier, T. Eisenbarth, A. Gouget, H. Handschuh, T. Kasper, K. Lemke-Rust, S. Mangard, A. Moradi, and E. Oswald, "Susceptibility of eSTREAM Candidates towards Side Channel Analysis", In ECRYPT Workshop, SASC - The State of the Art of Stream Ciphers, C. De Cannière, and O. Dunkelman (eds.), 28 pages, 2008, bibtex |