What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Nele Mentens
Google Scholar
17
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tches
A5/3 make or break: A massively parallel FPGA architecture for exhaustive key search.
Konstantina Miteloudi
Lejla Batina
Nele Mentens
2025
conf/eurosp
SPARK: Secure Privacy-Preserving Anonymous Swarm Attestation for In-Vehicle Networks.
Wouter Hellemans
Nada El Kassem
Md Masoom Rabbani
Edlira Dushku
Liqun Chen
An Braeken
Bart Preneel
Nele Mentens
2024
conf/acns
Evaluation of Lightweight Machine Learning-Based NIDS Techniques for Industrial IoT.
Alex Baron
Laurens Le Jeune
Wouter Hellemans
Md Masoom Rabbani
Nele Mentens
2023
journals/istr
PROVE: Provable remote attestation for public verifiability.
Edlira Dushku
Md Masoom Rabbani
Jo Vliegen
An Braeken
Nele Mentens
2022
conf/sec
FOCUS: Frequency Based Detection of Covert Ultrasonic Signals.
Wouter Hellemans
Md Masoom Rabbani
Jo Vliegen
Nele Mentens
2021
conf/acns
Towards Real-Time Deep Learning-Based Network Intrusion Detection on FPGA.
Laurens Le Jeune
Toon Goedemé
Nele Mentens
2020
conf/acns
Evolvable Hardware Architectures on FPGA for Side-Channel Security.
Mansoureh Labafniya
Shahram Etemadi Borujeni
Nele Mentens
2019
journals/tches
Security on Plastics: Fake or Real?
Nele Mentens
Jan Genoe
Thomas Vandenabeele
Lynn Verschueren
Dirk Smets
Wim Dehaene
Kris Myny
2018
journals/tches
ES-TRNG: A High-throughput, Low-area True Random Number Generator based on Edge Sampling.
Bohan Yang
Vladimir Rozic
Milos Grujic
Nele Mentens
Ingrid Verbauwhede
2018
conf/ccs
200 Gbps Hardware Accelerated Encryption System for FPGA Network Cards.
Zdenek Martinasek
Jan Hajny
David Smekal
Lukas Malina
Denis Matousek
Michal Kekely
Nele Mentens
2016
conf/africacrypt
Extreme Pipelining Towards the Best Area-Performance Trade-Off in Hardware.
Stjepan Picek
Dominik Sisejkovic
Domagoj Jakobovic
Lejla Batina
Bohan Yang
Danilo Sijacic
Nele Mentens
2016
conf/africacrypt
A Fast and Compact FPGA Implementation of Elliptic Curve Cryptography Using Lambda Coordinates.
Burak Gövem
Kimmo Järvinen
Kris Aerts
Ingrid Verbauwhede
Nele Mentens
2016
conf/sacrypt
On the Construction of Hardware-Friendly 4\times 4 and 5\times 5 S-Boxes.
Stjepan Picek
Bohan Yang
Vladimir Rozic
Nele Mentens
2015
conf/cns
Study on impact of adding security in a 6LoWPAN based network.
Matthias Carlier
Kris Steenhaut
An Braeken
Ruben Smeets
Nele Mentens
Kris Aerts
2014
conf/ches
Compact Ring-LWE Cryptoprocessor.
Sujoy Sinha Roy
Frederik Vercauteren
Nele Mentens
Donald Donglong Chen
Ingrid Verbauwhede
2008
conf/ches
Power and Fault Analysis Resistance in Hardware through Dynamic Reconfiguration.
Nele Mentens
Benedikt Gierlichs
Ingrid Verbauwhede
2005
conf/ctrsa
A Systematic Evaluation of Compact Hardware Implementations for the Rijndael S-Box.
Nele Mentens
Lejla Batina
Bart Preneel
Ingrid Verbauwhede
Coauthors
Alex Baron
(1)
An Braeken
(3)
Bart Preneel
(2)
Benedikt Gierlichs
(1)
Bohan Yang
(3)
Burak Gövem
(1)
Danilo Sijacic
(1)
David Smekal
(1)
Denis Matousek
(1)
Dirk Smets
(1)
Domagoj Jakobovic
(1)
Dominik Sisejkovic
(1)
Donald Donglong Chen
(1)
Edlira Dushku
(2)
Frederik Vercauteren
(1)
Ingrid Verbauwhede
(5)
Jan Genoe
(1)
Jan Hajny
(1)
Jo Vliegen
(2)
Kimmo Järvinen
(1)
Konstantina Miteloudi
(1)
Kris Aerts
(2)
Kris Myny
(1)
Kris Steenhaut
(1)
Laurens Le Jeune
(2)
Lejla Batina
(3)
Liqun Chen
(1)
Lukas Malina
(1)
Lynn Verschueren
(1)
Mansoureh Labafniya
(1)
Matthias Carlier
(1)
Md Masoom Rabbani
(4)
Michal Kekely
(1)
Milos Grujic
(1)
Nada El Kassem
(1)
Nele Mentens
(17)
Ruben Smeets
(1)
Shahram Etemadi Borujeni
(1)
Stjepan Picek
(2)
Sujoy Sinha Roy
(1)
Thomas Vandenabeele
(1)
Toon Goedemé
(1)
Vladimir Rozic
(2)
Wim Dehaene
(1)
Wouter Hellemans
(3)
Zdenek Martinasek
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to