Publications
[Homepage]

Journal papers:

2011
1. G. Hospodar, B. Gierlichs, E. De Mulder, J. Vandewalle, and I. Verbauwhede, "Machine Learning in Side-Channel Analysis: A First Study," Journal of Cryptographic Engineering 1(4), 11 pages, 2011.



2010
1. L. Batina, B. Gierlichs, E. Prouff, M. Rivain, F. Standaert, and N. Veyrat-Charvillon, "Mutual Information Analysis: a Comprehensive Study," Journal of Cryptology - special issue on hardware and security, accepted for publication, 24 pages, 2010. bibtex [impact factor 2.297 in 2009]






Book chapters:

2010
1. M. Knezevic, L. Batina, E. De Mulder, J. Fan, B. Gierlichs, Y. K. Lee, R. Maes, and I. Verbauwhede, "Signal Processing for Cryptography and Security Applications," In Handbook of Signal Processing Systems, S. S. Bhattacharyya, E. F. Deprettere, R. Leupers, and J. Takala (eds.), Springer-Verlag, pp. 161-177, 2010. bibtex






Conference papers:

2011
1. J. Balasch, B. Gierlichs, and I. Verbauwhede, "An In-depth and Black-box Characterization of the Effects of Clock Glitches on 8-bit MCUs," In International Workshop on Fault Diagnosis and Tolerance in Cryptography, IEEE, pp. 105-114, 2011. bibtex [acceptance rate ?%, ? of ?]
 
2. J. Fan, B. Gierlichs, and F. Vercauteren, "To Infinity and Beyond: Combined Attack on ECC using Points of Low Order," In Cryptographic Hardware and Embedded Systems - CHES 2011, Lecture Notes in Computer Science, B. Preneel, and T. Takagi (eds.), Springer-Verlag, pp. 143-159, 2011. bibtex [acceptance rate 26.9%, 32 of 119]



2010
2. F. Standaert, N. Veyrat-Charvillon, E. Oswald, B. Gierlichs, M. Medwed, M. Kasper, and S. Mangard, "The World is Not Enough: Another Look on Second-Order DPA," In Advances in Cryptology - ASIACRYPT 2010, Lecture Notes in Computer Science 6477, M. Abe (ed.), Springer-Verlag, pp. 112-129, 2010. bibtex [acceptance rate 16.2%, 35 of 216]
 
1. B. Gierlichs, L. Batina, B. Preneel, and I. Verbauwhede, "Revisiting Higher-Order DPA Attacks: Multivariate Mutual Information Analysis", In Topics in Cryptology - CT-RSA 2010, The Cryptographers' Track at the RSA Conference, Lecture Notes in Computer Science 5985, J. Pieprzyk (ed.), Springer-Verlag, pp. 221-234, 2010. bibtex [acceptance rate 26.6%, 25 of 94]



2009
4. L. Batina, B. Gierlichs, and K. Lemke-Rust, "Differential Cluster Analysis", In Cryptographic Hardware and Embedded Systems - CHES 2009, Lecture Notes in Computer Science 5747, C. Clavier, and K. Gaj (eds.), Springer-Verlag, pp. 112-127, 2009. bibtex [acceptance rate 19.6%, 29 of 148]
 
3. E. De Mulder, B. Gierlichs, B. Preneel, and I. Verbauwhede, "Practical DPA Attacks on MDPL," In 1st IEEE International Workshop on Information Forensics and Security (WIFS 2009), IEEE, pp. 191 - 195, 2009. bibtex [acceptance rate 31.5%, 39 of 124]
 
2. M. Sterckx, B. Gierlichs, B. Preneel, and I. Verbauwhede, "Efficient Implementation of Anonymous Credentials on Java Card Smart Cards," In 1st IEEE International Workshop on Information Forensics and Security (WIFS 2009), IEEE, pages 106 - 110, 2009. bibtex [acceptance rate 31.5%, 39 of 124]
 
1. B. Gierlichs, E. De Mulder, B. Preneel, and I. Verbauwhede, "Empirical Comparison of Side Channel Analysis Distinguishers on DES in Hardware," In Proc. European Conference on Circuit Theory and Design (ECCTD 2009), pp. 391-394, 2009. bibtex [acceptance rate xx%, xx of xx]



2008
7. F. Standaert, B. Gierlichs, and I. Verbauwhede, "Partition vs. Comparison Side-Channel Distinguishers," In Information Security and Cryptology - ICISC 2008: 11th International Conference, Lecture Notes in Computer Science 5461, Springer-Verlag, pp. 253-267, 2008. bibtex [acceptance rate 19.8%, 26 of 131]
 
6. B. Gierlichs, C. Troncoso, C. Diaz, B. Preneel, and I. Verbauwhede, "Revisiting A Combinatorial Approach Toward Measuring Anonymity," In Workshop on Privacy in the Electronic Society 2008 ACM, ACM, 5 pages, 2008. bibtex [acceptance rate 35%, 15 of 42]
 
5. L. Batina, B. Gierlichs, and K. Lemke-Rust, "Comparative Evaluation of Rank Correlation based DPA on an AES prototype chip," In Proceedings of the 11th Information Security Conference (ISC 2008), Lecture Notes in Computer Science 5222, C. Lei, V. Rijmen, and T. Wu (eds.), Springer-Verlag, pp. 341-354, 2008. bibtex [acceptance rate 25%, 33 of 134]
 
4. B. Gierlichs, L. Batina, P. Tuyls, and B. Preneel, "Mutual Information Analysis - A Generic Side-Channel Distinguisher," In Cryptographic Hardware and Embedded Systems - CHES 2008, Lecture Notes in Computer Science 5154, E. Oswald, and P. Rohatgi (eds.), Springer-Verlag, pp. 426-442, 2008. bibtex [acceptance rate 25%, 27 of 107]
 
3. N. Mentens, B. Gierlichs, and I. Verbauwhede, "Power and Fault Analysis Resistance in Hardware through Dynamic Reconfiguration," In Cryptographic Hardware and Embedded Systems - CHES 2008, Lecture Notes in Computer Science 5154, E. Oswald, and P. Rohatgi (eds.), Springer-Verlag, pp. 346-362, 2008. bibtex [acceptance rate 25%, 27 of 107]
 
2. C. Troncoso, B. Gierlichs, B. Preneel, and I. Verbauwhede, "Perfect Matching Disclosure Attacks," In Privacy Enhancing Technologies Symposium, Lecture Notes in Computer Science 5134, N. Borisov, and I. Goldberg (eds.), Springer-Verlag, pp. 2-23, 2008. bibtex [acceptance rate 26%, 13 of 49]
 
1. C. Clavier, B. Gierlichs, and I. Verbauwhede, "Fault Analysis Study of IDEA," In Topics in Cryptology - CT-RSA 2008, The Cryptographers' Track at the RSA Conference, Lecture Notes in Computer Science 4964, T. Malkin (ed.), Springer-Verlag, pp. 274-287, 2008. bibtex [acceptance rate 27%]



2007
1. B. Gierlichs, "DPA-Resistance Without Routing Constraints?," In Cryptographic Hardware and Embedded Systems - CHES 2007, Lecture Notes in Computer Science 4727, P. Paillier, and I. Verbauwhede (eds.), Springer-Verlag, pp. 107-120, 2007. bibtex [acceptance rate 31%, 31 of 99]



2006
1. B. Gierlichs, K. Lemke-Rust, and C. Paar, "Templates vs. Stochastic Methods," In Cryptographic Hardware and Embedded Systems - CHES 2006, Lecture Notes in Computer Science 4249, L. Goubin, and M. Matsui (eds.), Springer-Verlag, pp. 15-29, 2006. bibtex [acceptance rate 26%, 32 of 112]






Preprints / Workshop records / Technical reports:

2011
1. G. Hospodar, E. De Mulder, B. Gierlichs, J. Vandewalle, and I. Verbauwhede, "Least Squares Support Vector Machines for Side-Channel Analysis," In 2nd Workshop on Constructive Side-Channel Analysis and Secure Design, 6 pages, 2011. 



2009
3. L. Batina, B. Gierlichs, E. Prouff, M. Rivain, F. Standaert, and N. Veyrat-Charvillon, "Mutual Information Analysis: a Comprehensive Study," COSIC internal report, 22 pages, 2009.
 
2. E. De Mulder, B. Gierlichs, B. Preneel, and I. Verbauwhede, "Practical DPA Attacks on MDPL", IACR ePrint Archive, 2009/231.
 
1. B. Gierlichs, L. Batina, B. Preneel, and I. Verbauwhede, "Revisiting Higher-Order DPA Attacks: Multivariate Mutual Information Analysis", IACR ePrint Archive, 2009/228.



2008
2. A. Atici, L. Batina, B. Gierlichs, and I. Verbauwhede, "Power analysis on NTRU implementations for RFIDs: First results", In RFIDsec 2008
 
1. B. Gierlichs, L. Batina, C. Clavier, T. Eisenbarth, A. Gouget, H. Handschuh, T. Kasper, K. Lemke-Rust, S. Mangard, A. Moradi, and E. Oswald, "Susceptibility of eSTREAM Candidates towards Side Channel Analysis", In ECRYPT Workshop, SASC - The State of the Art of Stream Ciphers, C. De Cannière, and O. Dunkelman (eds.), 28 pages, 2008, bibtex



2007
2. B. Gierlichs, L. Batina, and P. Tuyls, "Mutual Information Analysis -- A Universal Differential Side-Channel Attack", IACR ePrint Archive, 2007/198. bibtex
 
1. P. Karsmakers, B. Gierlichs, K. Pelckmans, K. De Cock, J. Suykens, B. Preneel, B. De Moor, "Side channel attacks on cryptographic devices as a classification problem", technical report 07/36



2006
1. B. Gierlichs, Signal Theoretical Methods in Differential Side Channel Analysis, Master Thesis at University Bochum, Germany