What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Ingrid Verbauwhede
Google Scholar
ORCID:
0000-0002-0879-076X
111
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tches
OPTIMSM: FPGA hardware accelerator for Zero-Knowledge MSM.
Xander Pottier
Thomas de Ruijter
Jonas Bertels
Wouter Legiest
Michiel Van Beirendonck
Ingrid Verbauwhede
2025
journals/tches
FINAL bootstrap acceleration on FPGA using DSP-free constant-multiplier NTTs.
Jonas Bertels
Hilder V. L. Pereira
Ingrid Verbauwhede
2025
journals/tches
Higher-Order Time Sharing Masking.
Dilip Kumar S. V.
Siemen Dhooghe
Josep Balasch
Benedikt Gierlichs
Ingrid Verbauwhede
2025
journals/tches
Rudraksh: A compact and lightweight post-quantum key-encapsulation mechanism.
Suparna Kundu
Archisman Ghosh
Angshuman Karmakar
Shreyas Sen
Ingrid Verbauwhede
2025
journals/tifs
Low-Cost First-Order Secure Boolean Masking in Glitchy Hardware.
S. V. Dilip Kumar
Josep Balasch
Benedikt Gierlichs
Ingrid Verbauwhede
2025
conf/sp
BadRAM: Practical Memory Aliasing Attacks on Trusted Execution Environments.
Jesse De Meulemeester
Luca Wilke
David F. Oswald
Thomas Eisenbarth
Ingrid Verbauwhede
Jo Van Bulck
2025
conf/ctrsa
Masking Gaussian Elimination at Arbitrary Order with Application to Multivariate-and Code-Based PQC.
Quinten Norga
Suparna Kundu
Uttam Kumar Ojha
Anindya Ganguly
Angshuman Karmakar
Ingrid Verbauwhede
2025
journals/tches
Entropy extractor based high-throughput post-processings for True Random Number Generators.
Yifan Dang
Milos Grujic
Bohan Yang
Wenping Zhu
Hanning Wang
Min Zhu
Ingrid Verbauwhede
Leibo Liu
2025
conf/uss
Leuvenshtein: Efficient FHE-based Edit Distance Computation with Single Bootstrap per Cell.
Wouter Legiest
Jan-Pieter D'Anvers
Bojan Spasic
Nam-Luc Tran
Ingrid Verbauwhede
2024
journals/tches
Time Sharing - A Novel Approach to Low-Latency Masking.
Dilip Kumar S. V.
Siemen Dhooghe
Josep Balasch
Benedikt Gierlichs
Ingrid Verbauwhede
2024
journals/tches
Carry Your Fault: A Fault Propagation Attack on Side-Channel Protected LWE-based KEM.
Suparna Kundu
Siddhartha Chowdhury
Sayandeep Saha
Angshuman Karmakar
Debdeep Mukhopadhyay
Ingrid Verbauwhede
2024
journals/tches
TRNG Entropy Model in the Presence of Flicker FM Noise.
Adriaan Peetermans
Ingrid Verbauwhede
2024
journals/tifs
Optimizing Linear Correctors: A Tight Output Min-Entropy Bound and Selection Technique.
Milos Grujic
Ingrid Verbauwhede
2024
conf/acns
A Practical Key-Recovery Attack on LWE-Based Key-Encapsulation Mechanism Schemes Using Rowhammer.
Puja Mondal
Suparna Kundu
Sarani Bhattacharya
Angshuman Karmakar
Ingrid Verbauwhede
2023
journals/tches
BASALISC: Programmable Hardware Accelerator for BGV Fully Homomorphic Encryption.
Robin Geelen
Michiel Van Beirendonck
Hilder V. L. Pereira
Brian Huffman
Tynan McAuley
Ben Selfridge
Daniel Wagner
Georgios D. Dimou
Ingrid Verbauwhede
Frederik Vercauteren
David W. Archer
2023
conf/ccs
FPT: A Fixed-Point Accelerator for Torus Fully Homomorphic Encryption.
Michiel Van Beirendonck
Jan-Pieter D'Anvers
Furkan Turan
Ingrid Verbauwhede
2023
conf/uss
SpectrEM: Exploiting Electromagnetic Emanations During Transient Execution.
Jesse De Meulemeester
Antoon Purnal
Lennert Wouters
Arthur Beckers
Ingrid Verbauwhede
2023
conf/asiaccs
ShowTime: Amplifying Arbitrary CPU Timing Side Channels.
Antoon Purnal
Marton Bognar
Frank Piessens
Ingrid Verbauwhede
2022
journals/tches
Masked Accelerators and Instruction Set Extensions for Post-Quantum Cryptography.
Tim Fritzmann
Michiel Van Beirendonck
Debapriya Basu Roy
Patrick Karl
Thomas Schamberger
Ingrid Verbauwhede
Georg Sigl
2022
journals/tches
Polynomial multiplication on embedded vector architectures.
Hanno Becker
Jose Maria Bermudo Mera
Angshuman Karmakar
Joseph Yiu
Ingrid Verbauwhede
2022
journals/tches
An energy and area efficient, all digital entropy source compatible with modern standards based on jitter pipelining.
Adriaan Peetermans
Ingrid Verbauwhede
2022
journals/tches
Semi-Automatic Locating of Cryptographic Operations in Side-Channel Traces.
Jens Trautmann
Arthur Beckers
Lennert Wouters
Stefan Wildermann
Ingrid Verbauwhede
Jürgen Teich
2022
journals/tches
Higher-Order Masked Ciphertext Comparison for Lattice-Based Cryptography.
Jan-Pieter D'Anvers
Daniel Heinz
Peter Pessl
Michiel Van Beirendonck
Ingrid Verbauwhede
2022
conf/uss
Double Trouble: Combined Heterogeneous Attacks on Non-Inclusive Cache Hierarchies.
Antoon Purnal
Furkan Turan
Ingrid Verbauwhede
2021
journals/tches
Scabbard: a suite of efficient learning with rounding key-encapsulation mechanisms.
Jose Maria Bermudo Mera
Angshuman Karmakar
Suparna Kundu
Ingrid Verbauwhede
2021
journals/tches
Analysis and Comparison of Table-based Arithmetic to Boolean Masking.
Michiel Van Beirendonck
Jan-Pieter D'Anvers
Ingrid Verbauwhede
2021
conf/ccs
Prime+Scope: Overcoming the Observer Effect for High-Precision Cache Contention Attacks.
Antoon Purnal
Furkan Turan
Ingrid Verbauwhede
2021
conf/sp
Systematic Analysis of Randomization-based Protected Cache Architectures.
Antoon Purnal
Lukas Giner
Daniel Gruss
Ingrid Verbauwhede
2020
journals/tches
Time-memory trade-off in Toom-Cook multiplication: an application to module-lattice based cryptography.
Jose Maria Bermudo Mera
Angshuman Karmakar
Ingrid Verbauwhede
2020
conf/fdtc
Attacking Hardware Random Number Generators in a Multi-Tenant Scenario.
Yrjo Koyen
Adriaan Peetermans
Vladimir Rozic
Ingrid Verbauwhede
2019
conf/ccs
Timing Attacks on Error Correcting Codes in Post-Quantum Schemes.
Jan-Pieter D'Anvers
Marcel Tiepelt
Frederik Vercauteren
Ingrid Verbauwhede
2019
conf/pkc
Decryption Failure Attacks on IND-CCA Secure Lattice-Based Schemes.
Jan-Pieter D'Anvers
Qian Guo
Thomas Johansson
Alexander Nilsson
Frederik Vercauteren
Ingrid Verbauwhede
2018
journals/tches
ES-TRNG: A High-throughput, Low-area True Random Number Generator based on Edge Sampling.
Bohan Yang
Vladimir Rozic
Milos Grujic
Nele Mentens
Ingrid Verbauwhede
2018
journals/tches
A Cautionary Note When Looking for a Truly Reconfigurable Resistive RAM PUF.
Kai-Hsin Chuang
Robin Degraeve
Andrea Fantini
Guido Groeseneken
Dimitri Linten
Ingrid Verbauwhede
2018
journals/tches
Saber on ARM CCA-secure module lattice-based key encapsulation on ARM.
Angshuman Karmakar
Jose Maria Bermudo Mera
Sujoy Sinha Roy
Ingrid Verbauwhede
2018
journals/tifs
Private Mobile Pay-TV From Priced Oblivious Transfer.
Wouter Biesmans
Josep Balasch
Alfredo Rial
Bart Preneel
Ingrid Verbauwhede
2018
conf/ches
Towards Efficient and Automated Side Channel Evaluations at Design Time.
Danilo Sijacic
Josep Balasch
Bohan Yang
Santosh Ghosh
Ingrid Verbauwhede
2018
conf/fdtc
The Impact of Pulsed Electromagnetic Fault Injection on True Random Number Generators.
Maxime Madau
Michel Agoyan
Josep Balasch
Milos Grujic
Patrick Haddad
Philippe Maurine
Vladimir Rozic
Dave Singelée
Bohan Yang
Ingrid Verbauwhede
2017
journals/compsec
SOFIA: Software and control flow integrity architecture.
Ruan de Clercq
Johannes Götzfried
David Übler
Pieter Maene
Ingrid Verbauwhede
2017
conf/ccs
SCM: Secure Code Memory Architecture.
Ruan de Clercq
Ronald De Keulenaer
Pieter Maene
Bart Preneel
Bjorn De Sutter
Ingrid Verbauwhede
2017
conf/ches
Fast Leakage Assessment.
Oscar Reparaz
Benedikt Gierlichs
Ingrid Verbauwhede
2016
conf/ches
Efficient Fuzzy Extraction of PUF-Induced Secrets: Theory and Applications.
Jeroen Delvaux
Dawu Gu
Ingrid Verbauwhede
Matthias Hiller
Meng-Day (Mandel) Yu
2016
conf/host
Iterating Von Neumann's post-processing under hardware constraints.
Vladimir Rozic
Bohan Yang
Wim Dehaene
Ingrid Verbauwhede
2016
conf/host
Upper bounds on the min-entropy of RO Sum, Arbiter, Feed-Forward Arbiter, and S-ArbRO PUFs.
Jeroen Delvaux
Dawu Gu
Ingrid Verbauwhede
2016
conf/africacrypt
A Fast and Compact FPGA Implementation of Elliptic Curve Cryptography Using Lambda Coordinates.
Burak Gövem
Kimmo Järvinen
Kris Aerts
Ingrid Verbauwhede
Nele Mentens
2016
conf/sacrypt
Hold Your Breath, PRIMATEs Are Lightweight.
Danilo Sijacic
Andreas B. Kidmose
Bohan Yang
Subhadeep Banik
Begül Bilgin
Andrey Bogdanov
Ingrid Verbauwhede
2015
conf/crypto
Consolidating Masking Schemes.
Oscar Reparaz
Begül Bilgin
Svetla Nikova
Benedikt Gierlichs
Ingrid Verbauwhede
2015
conf/lightsec
Single-Cycle Implementations of Block Ciphers.
Pieter Maene
Ingrid Verbauwhede
2015
conf/ches
Lightweight Coprocessor for Koblitz Curves: 283-Bit ECC Including Scalar Conversion with only 4300 Gates.
Sujoy Sinha Roy
Kimmo Järvinen
Ingrid Verbauwhede
2015
conf/ches
Modular Hardware Architecture for Somewhat Homomorphic Function Evaluation.
Sujoy Sinha Roy
Kimmo Järvinen
Frederik Vercauteren
Vassil S. Dimitrov
Ingrid Verbauwhede
2015
conf/ches
DPA, Bitslicing and Masking at 1 GHz.
Josep Balasch
Benedikt Gierlichs
Oscar Reparaz
Ingrid Verbauwhede
2015
conf/ches
Efficient Ring-LWE Encryption on 8-Bit AVR Processors.
Zhe Liu
Hwajeong Seo
Sujoy Sinha Roy
Johann Großschädl
Howon Kim
Ingrid Verbauwhede
2015
conf/ches
A Masked Ring-LWE Implementation.
Oscar Reparaz
Sujoy Sinha Roy
Frederik Vercauteren
Ingrid Verbauwhede
2015
conf/acsac
Soteria: Offline Software Protection within Low-cost Embedded Devices.
Johannes Götzfried
Tilo Müller
Ruan de Clercq
Pieter Maene
Felix C. Freiling
Ingrid Verbauwhede
2014
conf/ches
Compact Ring-LWE Cryptoprocessor.
Sujoy Sinha Roy
Frederik Vercauteren
Nele Mentens
Donald Donglong Chen
Ingrid Verbauwhede
2014
conf/ches
Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible?
Jeroen Delvaux
Dawu Gu
Dries Schellekens
Ingrid Verbauwhede
2014
conf/host
A noise bifurcation architecture for linear additive physical functions.
Meng-Day (Mandel) Yu
David M'Raïhi
Ingrid Verbauwhede
Srinivas Devadas
2014
conf/ctrsa
Attacking PUF-Based Pattern Matching Key Generators via Helper Data Manipulation.
Jeroen Delvaux
Ingrid Verbauwhede
2014
conf/sacrypt
Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers.
Nicky Mouha
Bart Mennink
Anthony Van Herrewege
Dai Watanabe
Bart Preneel
Ingrid Verbauwhede
2013
conf/ccs
Secure PRNG seeding on commercial off-the-shelf microcontrollers.
Anthony Van Herrewege
Vincent van der Leest
André Schaller
Stefan Katzenbeisser
Ingrid Verbauwhede
2013
conf/ccs
Inherent PUFs and secure PRNGs on commercial off-the-shelf microcontrollers.
Anthony Van Herrewege
André Schaller
Stefan Katzenbeisser
Ingrid Verbauwhede
2013
conf/uss
Sancus: Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base.
Job Noorman
Pieter Agten
Wilfried Daniels
Raoul Strackx
Anthony Van Herrewege
Christophe Huygens
Bart Preneel
Ingrid Verbauwhede
Frank Piessens
2013
conf/ches
On the Implementation of Unified Arithmetic on Binary Huff Curves.
Santosh Ghosh
Amit Kumar
Amitabh Das
Ingrid Verbauwhede
2013
conf/ches
A New Model for Error-Tolerant Side-Channel Cube Attacks.
Zhenqi Li
Bin Zhang
Junfeng Fan
Ingrid Verbauwhede
2013
conf/host
Side channel modeling attacks on 65nm arbiter PUFs exploiting CMOS device noise.
Jeroen Delvaux
Ingrid Verbauwhede
2013
conf/sacrypt
High Precision Discrete Gaussian Sampling on FPGAs.
Sujoy Sinha Roy
Frederik Vercauteren
Ingrid Verbauwhede
2012
journals/tifs
A Pay-per-Use Licensing Scheme for Hardware IP Cores in Recent SRAM-Based FPGAs.
Roel Maes
Dries Schellekens
Ingrid Verbauwhede
2012
journals/tifs
Guest Editorial Integrated Circuit and System Security.
Miodrag Potkonjak
Ramesh Karri
Ingrid Verbauwhede
Kouichi Itoh
2012
journals/joc
A Practical Attack on KeeLoq.
Wim Aerts
Eli Biham
Dieter De Moitie
Elke De Mulder
Orr Dunkelman
Sebastiaan Indesteege
Nathan Keller
Bart Preneel
Guy A. E. Vandenbosch
Ingrid Verbauwhede
2012
conf/fc
Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-Enabled RFIDs.
Anthony Van Herrewege
Stefan Katzenbeisser
Roel Maes
Roel Peeters
Ahmad-Reza Sadeghi
Ingrid Verbauwhede
Christian Wachsmann
2012
conf/ches
Selecting Time Samples for Multivariate DPA Attacks.
Oscar Reparaz
Benedikt Gierlichs
Ingrid Verbauwhede
2012
conf/ches
PUFKY: A Fully Functional PUF-Based Cryptographic Key Generator.
Roel Maes
Anthony Van Herrewege
Ingrid Verbauwhede
2012
conf/ches
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon.
Stefan Katzenbeisser
Ünal Koçabas
Vladimir Rozic
Ahmad-Reza Sadeghi
Ingrid Verbauwhede
Christian Wachsmann
2012
conf/host
Design solutions for securing SRAM cell against power analysis.
Vladimir Rozic
Wim Dehaene
Ingrid Verbauwhede
2012
conf/host
A systematic M safe-error detection in hardware implementations of cryptographic algorithms.
Dusko Karaklajic
Junfeng Fan
Ingrid Verbauwhede
2012
conf/wisa
Three Phase Dynamic Current Mode Logic: A More Secure DyCML to Achieve a More Balanced Power Consumption.
Hyunmin Kim
Vladimir Rozic
Ingrid Verbauwhede
2012
conf/ctrsa
Power Analysis of Atmel CryptoMemory - Recovering Keys from Secure EEPROMs.
Josep Balasch
Benedikt Gierlichs
Roel Verdult
Lejla Batina
Ingrid Verbauwhede
2012
conf/asiacrypt
Theory and Practice of a Leakage Resilient Masking Scheme.
Josep Balasch
Sebastian Faust
Benedikt Gierlichs
Ingrid Verbauwhede
2012
conf/cans
LiBrA-CAN: A Lightweight Broadcast Authentication Protocol for Controller Area Networks.
Bogdan Groza
Pal-Stefan Murvay
Anthony Van Herrewege
Ingrid Verbauwhede
2011
conf/ches
FPGA Implementation of Pairings Using Residue Number System and Lazy Reduction.
Ray C. C. Cheung
Sylvain Duquesne
Junfeng Fan
Nicolas Guillermin
Ingrid Verbauwhede
Gavin Xiaoxu Yao
2011
conf/ches
spongent: A Lightweight Hash Function.
Andrey Bogdanov
Miroslav Knezevic
Gregor Leander
Deniz Toz
Kerem Varici
Ingrid Verbauwhede
2011
conf/host
Systematic security evaluation method against C safe-error attacks.
Dusko Karaklajic
Junfeng Fan
Ingrid Verbauwhede
2011
conf/fdtc
An In-depth and Black-box Characterization of the Effects of Clock Glitches on 8-bit MCUs.
Josep Balasch
Benedikt Gierlichs
Ingrid Verbauwhede
2011
conf/fdtc
The Fault Attack Jungle - A Classification Model to Guide You.
Ingrid Verbauwhede
Dusko Karaklajic
Jörn-Marc Schmidt
2011
conf/wisec
The communication and computation cost of wireless security: extended abstract.
Dave Singelée
Stefaan Seys
Lejla Batina
Ingrid Verbauwhede
2010
conf/uss
PrETP: Privacy-Preserving Electronic Toll Pricing.
Josep Balasch
Alfredo Rial
Carmela Troncoso
Bart Preneel
Ingrid Verbauwhede
Christophe Geuens
2010
conf/host
Prototyping Platform for Performance Evaluation of SHA-3 Candidates.
Kazuyuki Kobayashi
Jun Ikegami
Kazuo Sakiyama
Kazuo Ohta
Miroslav Knezevic
Ünal Koçabas
Junfeng Fan
Ingrid Verbauwhede
Eric Xu Guo
Shin'ichiro Matsuo
Sinan Huang
Leyla Nazhandali
Akashi Satoh
2010
conf/host
State-of-the-art of Secure ECC Implementations: A Survey on Known Side-channel Attacks and Countermeasures.
Junfeng Fan
Xu Guo
Elke De Mulder
Patrick Schaumont
Bart Preneel
Ingrid Verbauwhede
2010
conf/ctrsa
Revisiting Higher-Order DPA Attacks: .
Benedikt Gierlichs
Lejla Batina
Bart Preneel
Ingrid Verbauwhede
2010
conf/fdtc
Low Cost Built in Self Test for Public Key Crypto Cores.
Dusko Karaklajic
Miroslav Knezevic
Ingrid Verbauwhede
2010
conf/wisec
Low-cost untraceable authentication protocols for RFID.
Yong Ki Lee
Lejla Batina
Dave Singelée
Ingrid Verbauwhede
2009
conf/sp
Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors.
Bart Coppens
Ingrid Verbauwhede
Koen De Bosschere
Bjorn De Sutter
2009
conf/ches
Programmable and Parallel ECC Coprocessor Architecture: Tradeoffs between Area, Speed and Security.
Xu Guo
Junfeng Fan
Patrick Schaumont
Ingrid Verbauwhede
2009
conf/ches
Low-Overhead Implementation of a Soft Decision Helper Data Algorithm for SRAM PUFs.
Roel Maes
Pim Tuyls
Ingrid Verbauwhede
2009
conf/ches
Faster -Arithmetic for Cryptographic Pairings on Barreto-Naehrig Curves.
Junfeng Fan
Frederik Vercauteren
Ingrid Verbauwhede
2009
conf/host
Analysis and Design of Active IC Metering Schemes.
Roel Maes
Dries Schellekens
Pim Tuyls
Ingrid Verbauwhede
2008
conf/icisc
Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices.
François-Xavier Standaert
Benedikt Gierlichs
Ingrid Verbauwhede
2008
conf/ches
Power and Fault Analysis Resistance in Hardware through Dynamic Reconfiguration.
Nele Mentens
Benedikt Gierlichs
Ingrid Verbauwhede
2008
conf/host
Unified Digit-Serial Multiplier and Inverter in Finite Field GF(2<sup>m</sup>).
Junfeng Fan
Ingrid Verbauwhede
2008
conf/ctrsa
Fault Analysis Study of IDEA.
Christophe Clavier
Benedikt Gierlichs
Ingrid Verbauwhede
2008
conf/fdtc
Exploiting Hardware Performance Counters.
Leif Uhsadel
Andy Georges
Ingrid Verbauwhede
2008
conf/sacrypt
HECC Goes Embedded: An Area-Efficient Implementation of HECC.
Junfeng Fan
Lejla Batina
Ingrid Verbauwhede
2007
conf/wisa
A Compact Architecture for Montgomery Elliptic Curve Scalar Multiplication Processor.
Yong Ki Lee
Ingrid Verbauwhede
2007
conf/wisa
Iteration Bound Analysis and Throughput Optimum Architecture of SHA-256 (384, 512) for Hardware Implementations.
Yong Ki Lee
Herwin Chan
Ingrid Verbauwhede
2006
conf/ches
Superscalar Coprocessor for High-Speed Curve-Based Cryptography.
Kazuo Sakiyama
Lejla Batina
Bart Preneel
Ingrid Verbauwhede
2005
conf/ches
Prototype IC with WDDL and Differential Routing - DPA Resistance Assessment.
Kris Tiri
David D. Hwang
Alireza Hodjat
Bo-Cheng Lai
Shenglin Yang
Patrick Schaumont
Ingrid Verbauwhede
2005
conf/ches
Hardware/Software Co-design for Hyperelliptic Curve Cryptography (HECC) on the 8051µP.
Lejla Batina
David Hwang
Alireza Hodjat
Bart Preneel
Ingrid Verbauwhede
2005
conf/ctrsa
A Systematic Evaluation of Compact Hardware Implementations for the Rijndael S-Box.
Nele Mentens
Lejla Batina
Bart Preneel
Ingrid Verbauwhede
2003
conf/ches
Securing Encryption Algorithms against DPA at the Logic Level: Next Generation Smart Card Technology.
Kris Tiri
Ingrid Verbauwhede
2001
conf/ches
Architectural Optimization for a 1.82Gbits/sec VLSI Implementation of the AES Rijndael Algorithm.
Henry Kuo
Ingrid Verbauwhede
1987
conf/eurocrypt
Security Considerations in the Design and Implementation of a new DES chip.
Ingrid Verbauwhede
Frank Hoornaert
Joos Vandewalle
Hugo De Man
Coauthors
Adriaan Peetermans
(3)
Ahmad-Reza Sadeghi
(2)
Akashi Satoh
(1)
Alexander Nilsson
(1)
Alfredo Rial
(2)
Alireza Hodjat
(2)
Amit Kumar
(1)
Amitabh Das
(1)
André Schaller
(2)
Andrea Fantini
(1)
Andreas B. Kidmose
(1)
Andrey Bogdanov
(2)
Andy Georges
(1)
Angshuman Karmakar
(8)
Anindya Ganguly
(1)
Anthony Van Herrewege
(7)
Antoon Purnal
(5)
Archisman Ghosh
(1)
Arthur Beckers
(2)
Bart Coppens
(1)
Bart Mennink
(1)
Bart Preneel
(11)
Begül Bilgin
(2)
Ben Selfridge
(1)
Benedikt Gierlichs
(14)
Bin Zhang
(1)
Bjorn De Sutter
(2)
Bo-Cheng Lai
(1)
Bogdan Groza
(1)
Bohan Yang
(6)
Bojan Spasic
(1)
Brian Huffman
(1)
Burak Gövem
(1)
Carmela Troncoso
(1)
Christian Wachsmann
(2)
Christophe Clavier
(1)
Christophe Geuens
(1)
Christophe Huygens
(1)
Dai Watanabe
(1)
Daniel Gruss
(1)
Daniel Heinz
(1)
Daniel Wagner
(1)
Danilo Sijacic
(2)
Dave Singelée
(3)
David D. Hwang
(1)
David F. Oswald
(1)
David Hwang
(1)
David M'Raïhi
(1)
David Übler
(1)
David W. Archer
(1)
Dawu Gu
(3)
Debapriya Basu Roy
(1)
Debdeep Mukhopadhyay
(1)
Deniz Toz
(1)
Dieter De Moitie
(1)
Dilip Kumar S. V.
(2)
Dimitri Linten
(1)
Donald Donglong Chen
(1)
Dries Schellekens
(3)
Dusko Karaklajic
(4)
Eli Biham
(1)
Elke De Mulder
(2)
Eric Xu Guo
(1)
Felix C. Freiling
(1)
François-Xavier Standaert
(1)
Frank Hoornaert
(1)
Frank Piessens
(2)
Frederik Vercauteren
(8)
Furkan Turan
(3)
Gavin Xiaoxu Yao
(1)
Georg Sigl
(1)
Georgios D. Dimou
(1)
Gregor Leander
(1)
Guido Groeseneken
(1)
Guy A. E. Vandenbosch
(1)
Hanning Wang
(1)
Hanno Becker
(1)
Henry Kuo
(1)
Herwin Chan
(1)
Hilder V. L. Pereira
(2)
Howon Kim
(1)
Hugo De Man
(1)
Hwajeong Seo
(1)
Hyunmin Kim
(1)
Ingrid Verbauwhede
(111)
Jan-Pieter D'Anvers
(6)
Jens Trautmann
(1)
Jeroen Delvaux
(5)
Jesse De Meulemeester
(2)
Jo Van Bulck
(1)
Job Noorman
(1)
Johann Großschädl
(1)
Johannes Götzfried
(2)
Jonas Bertels
(2)
Joos Vandewalle
(1)
Jörn-Marc Schmidt
(1)
Jose Maria Bermudo Mera
(4)
Josep Balasch
(11)
Joseph Yiu
(1)
Jun Ikegami
(1)
Junfeng Fan
(10)
Jürgen Teich
(1)
Kai-Hsin Chuang
(1)
Kazuo Ohta
(1)
Kazuo Sakiyama
(2)
Kazuyuki Kobayashi
(1)
Kerem Varici
(1)
Kimmo Järvinen
(3)
Koen De Bosschere
(1)
Kouichi Itoh
(1)
Kris Aerts
(1)
Kris Tiri
(2)
Leibo Liu
(1)
Leif Uhsadel
(1)
Lejla Batina
(8)
Lennert Wouters
(2)
Leyla Nazhandali
(1)
Luca Wilke
(1)
Lukas Giner
(1)
Marcel Tiepelt
(1)
Marton Bognar
(1)
Matthias Hiller
(1)
Maxime Madau
(1)
Meng-Day (Mandel) Yu
(2)
Michel Agoyan
(1)
Michiel Van Beirendonck
(6)
Milos Grujic
(4)
Min Zhu
(1)
Miodrag Potkonjak
(1)
Miroslav Knezevic
(3)
Nam-Luc Tran
(1)
Nathan Keller
(1)
Nele Mentens
(5)
Nicky Mouha
(1)
Nicolas Guillermin
(1)
Orr Dunkelman
(1)
Oscar Reparaz
(5)
Pal-Stefan Murvay
(1)
Patrick Haddad
(1)
Patrick Karl
(1)
Patrick Schaumont
(3)
Peter Pessl
(1)
Philippe Maurine
(1)
Pieter Agten
(1)
Pieter Maene
(4)
Pim Tuyls
(2)
Puja Mondal
(1)
Qian Guo
(1)
Quinten Norga
(1)
Ramesh Karri
(1)
Raoul Strackx
(1)
Ray C. C. Cheung
(1)
Robin Degraeve
(1)
Robin Geelen
(1)
Roel Maes
(5)
Roel Peeters
(1)
Roel Verdult
(1)
Ronald De Keulenaer
(1)
Ruan de Clercq
(3)
S. V. Dilip Kumar
(1)
Santosh Ghosh
(2)
Sarani Bhattacharya
(1)
Sayandeep Saha
(1)
Sebastiaan Indesteege
(1)
Sebastian Faust
(1)
Shenglin Yang
(1)
Shin'ichiro Matsuo
(1)
Shreyas Sen
(1)
Siddhartha Chowdhury
(1)
Siemen Dhooghe
(2)
Sinan Huang
(1)
Srinivas Devadas
(1)
Stefaan Seys
(1)
Stefan Katzenbeisser
(4)
Stefan Wildermann
(1)
Subhadeep Banik
(1)
Sujoy Sinha Roy
(7)
Suparna Kundu
(5)
Svetla Nikova
(1)
Sylvain Duquesne
(1)
Thomas de Ruijter
(1)
Thomas Eisenbarth
(1)
Thomas Johansson
(1)
Thomas Schamberger
(1)
Tilo Müller
(1)
Tim Fritzmann
(1)
Tynan McAuley
(1)
Ünal Koçabas
(2)
Uttam Kumar Ojha
(1)
Vassil S. Dimitrov
(1)
Vincent van der Leest
(1)
Vladimir Rozic
(7)
Wenping Zhu
(1)
Wilfried Daniels
(1)
Wim Aerts
(1)
Wim Dehaene
(2)
Wouter Biesmans
(1)
Wouter Legiest
(2)
Xander Pottier
(1)
Xu Guo
(2)
Yifan Dang
(1)
Yong Ki Lee
(3)
Yrjo Koyen
(1)
Zhe Liu
(1)
Zhenqi Li
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to