Benedikt Gierlichs

Orcid: 0000-0002-5866-1990

According to our database1, Benedikt Gierlichs authored at least 57 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Time Sharing - A Novel Approach to Low-Latency Masking.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024

SCALLER: Standard Cell Assembled and Local Layout Effect-based Ring Oscillators.
CoRR, 2024

2023
Low-Cost First-Order Secure Boolean Masking in Glitchy Hardware.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2023

An In-Depth Security Evaluation of the Nintendo DSi Gaming Console.
Proceedings of the Smart Card Research and Advanced Applications, 2023

2022
On the susceptibility of Texas Instruments SimpleLink platform microcontrollers to non-invasive physical attacks.
IACR Cryptol. ePrint Arch., 2022

Provable Secure Software Masking in the Real-World.
IACR Cryptol. ePrint Arch., 2022

Energy and side-channel security evaluation of near-threshold cryptographic circuits in 28nm FD-SOI technology.
Proceedings of the CF '22: 19th ACM International Conference on Computing Frontiers, Turin, Italy, May 17, 2022

2021
My other car is your car: compromising the Tesla Model X keyless entry system.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

2020
Dismantling DST80-based Immobiliser Systems.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

Revisiting a Methodology for Efficient CNN Architectures in Profiling Attacks.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

2019
Fast, Furious and Insecure: Passive Keyless Entry and Start Systems in Modern Supercars.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

Design Considerations for EM Pulse Fault Injection.
Proceedings of the Smart Card Research and Advanced Applications, 2019

2018
An In-Depth and Black-Box Characterization of the Effects of Laser Pulses on ATmega328P.
Proceedings of the Smart Card Research and Advanced Applications, 2018

2017
Introduction to the CHES 2016 special issue.
J. Cryptogr. Eng., 2017

Fast Leakage Assessment.
IACR Cryptol. ePrint Arch., 2017

A first-order chosen-plaintext DPA attack on the third round of DES.
IACR Cryptol. ePrint Arch., 2017

Consolidating Inner Product Masking.
IACR Cryptol. ePrint Arch., 2017

Fault Analysis of the ChaCha and Salsa Families of Stream Ciphers.
Proceedings of the Smart Card Research and Advanced Applications, 2017

2016
Does Coupling Affect the Security of Masked Implementations?
IACR Cryptol. ePrint Arch., 2016

Design and Implementation of a Waveform-Matching Based Triggering System.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2016

2015
Trade-Offs for Threshold Implementations Illustrated on AES.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2015

Consolidating masking schemes.
IACR Cryptol. ePrint Arch., 2015

DPA, Bitslicing and Masking at 1 GHz.
IACR Cryptol. ePrint Arch., 2015

Inner Product Masking Revisited.
IACR Cryptol. ePrint Arch., 2015

2014
Analysis Of Variance and CPA in SCA.
IACR Cryptol. ePrint Arch., 2014

Higher-Order Threshold Implementations.
IACR Cryptol. ePrint Arch., 2014

On the Cost of Lazy Engineering for Masked Software Implementations.
IACR Cryptol. ePrint Arch., 2014

Generic DPA Attacks: Curse or Blessing?
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2014

A Note on the Use of Margins to Compare Distinguishers.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2014

2013
Signal Processing for Cryptography and Security Applications.
Proceedings of the Handbook of Signal Processing Systems, 2013

A More Efficient AES Threshold Implementation.
IACR Cryptol. ePrint Arch., 2013

2012
Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output.
IACR Cryptol. ePrint Arch., 2012

Power Analysis of Atmel CryptoMemory - Recovering Keys from Secure EEPROMs.
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012

Selecting Time Samples for Multivariate DPA Attacks.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

Theory and Practice of a Leakage Resilient Masking Scheme.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

2011
Mutual Information Analysis: a Comprehensive Study.
J. Cryptol., 2011

Machine learning in side-channel analysis: a first study.
J. Cryptogr. Eng., 2011

An In-depth and Black-box Characterization of the Effects of Clock Glitches on 8-bit MCUs.
Proceedings of the 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2011

To Infinity and Beyond: Combined Attack on ECC Using Points of Low Order.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011

2010
The World is Not Enough: Another Look on Second-Order DPA.
IACR Cryptol. ePrint Arch., 2010

Revisiting Higher-Order DPA Attacks: .
Proceedings of the Topics in Cryptology, 2010

Signal Processing for Cryptography and Security Applications.
Proceedings of the Handbook of Signal Processing Systems, 2010

2009
Practical DPA Attacks on MDPL.
IACR Cryptol. ePrint Arch., 2009

Revisiting Higher-Order DPA Attacks: Multivariate Mutual Information Analysis.
IACR Cryptol. ePrint Arch., 2009

Efficient implementation of anonymous credentials on Java Card smart cards.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009

Empirical comparison of side channel analysis distinguishers on DES in hardware.
Proceedings of the 19th European Conference on Circuit Theory and Design, 2009

Differential Cluster Analysis.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009

2008
Revisiting a combinatorial approach toward measuring anonymity.
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008

Perfect Matching Disclosure Attacks.
Proceedings of the Privacy Enhancing Technologies, 2008

Comparative Evaluation of Rank Correlation Based DPA on an AES Prototype Chip.
Proceedings of the Information Security, 11th International Conference, 2008

Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices.
Proceedings of the Information Security and Cryptology, 2008

Fault Analysis Study of IDEA.
Proceedings of the Topics in Cryptology, 2008

Power and Fault Analysis Resistance in Hardware through Dynamic Reconfiguration.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008

Mutual Information Analysis.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008

2007
Mutual Information Analysis - A Universal Differential Side-Channel Attack.
IACR Cryptol. ePrint Arch., 2007

DPA-Resistance Without Routing Constraints?
Proceedings of the Cryptographic Hardware and Embedded Systems, 2007

2006
Templates vs. Stochastic Methods.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006


  Loading...