Nele Mentens
Orcid: 0000-0001-8753-7895Affiliations:
- Leiden University, The Netherlands
- KU Leuven, Leuven, Belgium (former)
According to our database1,
Nele Mentens
authored at least 139 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Introduction to the Special Issue on FPGA-based Embedded Systems for Industrial and IoT Applications.
ACM Trans. Reconfigurable Technol. Syst., December, 2024
SPArch: A Hardware-oriented Sketch-based Architecture for High-speed Network Flow Measurements.
ACM Trans. Priv. Secur., November, 2024
J. Cryptogr. Eng., September, 2024
IEEE Trans. Emerg. Top. Comput., 2024
IEEE Secur. Priv., 2024
A Genetic Programming approach for hardware-oriented hash functions for network security applications.
Appl. Soft Comput., 2024
Proceedings of the 2024 IEEE Nordic Circuits and Systems Conference (NorCAS), 2024
A Systematic Exploration of Evolutionary Computation for the Design of Hardware-oriented Non-cryptographic Hash Functions.
Proceedings of the Genetic and Evolutionary Computation Conference, 2024
Proceedings of the 27th International Symposium on Design & Diagnostics of Electronic Circuits & Systems, 2024
Proceedings of the 21st ACM International Conference on Computing Frontiers, 2024
Proceedings of the Applied Reconfigurable Computing. Architectures, Tools, and Applications, 2024
PROACT - Physical Attack Resistance of Cryptographic Algorithms and Circuits with Reduced Time to Market.
Proceedings of the Applied Reconfigurable Computing. Architectures, Tools, and Applications, 2024
Proceedings of the Applied Cryptography and Network Security Workshops, 2024
2023
J. Inf. Secur. Appl., June, 2023
Optimized algorithms and architectures for fast non-cryptographic hash functions in hardware.
Microprocess. Microsystems, April, 2023
Proceedings of the 42nd International Symposium on Reliable Distributed Systems, 2023
Proceedings of the 21st IEEE Interregional NEWCAS Conference, 2023
Application-specific FPGAs: cryptographic agility through customized reconfigurable architectures.
Proceedings of the IEEE International Parallel and Distributed Processing Symposium, 2023
Proceedings of the 33rd International Conference on Field-Programmable Logic and Applications, 2023
Evolving Non-cryptographic Hash Functions Using Genetic Programming for High-speed Lookups in Network Security Applications.
Proceedings of the Applications of Evolutionary Computation - 26th European Conference, 2023
A Survey of Recent Developments in Testability, Safety and Security of RISC-V Processors.
Proceedings of the IEEE European Test Symposium, 2023
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2023
Yes we CAN!: Towards bringing security to legacy-restricted Controller Area Networks. A review.
Proceedings of the 20th ACM International Conference on Computing Frontiers, 2023
Proceedings of the 34th IEEE International Conference on Application-specific Systems, 2023
2022
Intelligent Security: Is "AI for Cybersecurity" a Blessing or a Curse (Dagstuhl Seminar 22412).
Dagstuhl Reports, October, 2022
Hardware-oriented optimization of Bloom filter algorithms and architectures for ultra-high-speed lookups in network applications.
Microprocess. Microsystems, September, 2022
ACM Trans. Reconfigurable Technol. Syst., 2022
In-depth energy analysis of security algorithms and protocols for the Internet of Things.
J. Cryptogr. Eng., 2022
Maximizing the Potential of Custom RISC-V Vector Extensions for Speeding up SHA-3 Hash Functions.
IACR Cryptol. ePrint Arch., 2022
An Analysis of the Hardware-Friendliness of AMQ Data Structures for Network Security.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2022
Proceedings of the ICT Systems Security and Privacy Protection, 2022
Feature dimensionality in CNN acceleration for high-throughput network intrusion detection.
Proceedings of the 32nd International Conference on Field-Programmable Logic and Applications, 2022
Energy and side-channel security evaluation of near-threshold cryptographic circuits in 28nm FD-SOI technology.
Proceedings of the CF '22: 19th ACM International Conference on Computing Frontiers, Turin, Italy, May 17, 2022
2021
A Scalable SIMD RISC-V based Processor with Customized Vector Extensions for CRYSTALS-Kyber.
IACR Cryptol. ePrint Arch., 2021
Communication and Security Trade-Offs for Battery-Powered Devices: A Case Study on Wearable Medical Sensor Systems.
IEEE Access, 2021
Machine Learning for Misuse-Based Network Intrusion Detection: Overview, Unified Evaluation and Feature Choice Comparison Framework.
IEEE Access, 2021
Proceedings of the 29th IFIP/IEEE International Conference on Very Large Scale Integration, 2021
Low-Rate Overuse Flow Tracer (LOFT): An Efficient and Scalable Algorithm for Detecting Overuse Flows.
Proceedings of the 40th International Symposium on Reliable Distributed Systems, 2021
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2021
Proceedings of the SenSys '21: The 19th ACM Conference on Embedded Networked Sensor Systems, Coimbra, Portugal, November 15, 2021
Proceedings of the Embedded Computer Systems: Architectures, Modeling, and Simulation, 2021
Proceedings of the 31st International Conference on Field-Programmable Logic and Applications, 2021
Proceedings of the 31st International Conference on Field-Programmable Logic and Applications, 2021
Proceedings of the 29th IEEE Annual International Symposium on Field-Programmable Custom Computing Machines, 2021
Novel Non-cryptographic Hash Functions for Networking and Security Applications on FPGA.
Proceedings of the 24th Euromicro Conference on Digital System Design, 2021
Invited: Security Beyond Bulk Silicon: Opportunities and Challenges of Emerging Devices.
Proceedings of the 58th ACM/IEEE Design Automation Conference, 2021
Proceedings of the Applied Cryptography and Network Security Workshops, 2021
2020
Side-channel countermeasures utilizing dynamic logic reconfiguration: Protecting AES/Rijndael and Serpent encryption in hardware.
Microprocess. Microsystems, 2020
On the feasibility of using evolvable hardware for hardware Trojan detection and prevention.
Appl. Soft Comput., 2020
Proceedings of the IEEE International Symposium on Circuits and Systems, 2020
Novel Bloom filter algorithms and architectures for ultra-high-speed network security applications.
Proceedings of the 23rd Euromicro Conference on Digital System Design, 2020
Breaking a fully Balanced ASIC Coprocessor Implementing Complete Addition Formulas on Weierstrass Elliptic Curves.
Proceedings of the 23rd Euromicro Conference on Digital System Design, 2020
Proceedings of the 57th ACM/IEEE Design Automation Conference, 2020
Proceedings of the 2020 International Conference on Omni-layer Intelligent Systems, 2020
Proceedings of the Applied Cryptography and Network Security Workshops, 2020
2019
Microprocess. Microsystems, 2019
A Novel FPGA Architecture and Protocol for the Self-attestation of Configurable Hardware.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Communication and security trade-offs for wearable medical sensor systems in hospitals: work-in-progress.
Proceedings of the International Conference on Embedded Software Companion, 2019
Proceedings of the 22nd Euromicro Conference on Digital System Design, 2019
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2019
Proceedings of the 56th Annual Design Automation Conference 2019, 2019
2018
ES-TRNG: A High-throughput, Low-area True Random Number Generator based on Edge Sampling.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018
IACR Cryptol. ePrint Arch., 2018
Rethinking Secure FPGAs: Towards a Cryptography-friendly Configurable Cell Architecture and its Automated Design Flow.
IACR Cryptol. ePrint Arch., 2018
Finding short and implementation-friendly addition chains with evolutionary algorithms.
J. Heuristics, 2018
Proceedings of the 28th International Symposium on Power and Timing Modeling, 2018
Proceedings of the 12th European Workshop on Microelectronics Education, 2018
Design of a Fully Balanced ASIC Coprocessor Implementing Complete Addition Formulas on Weierstrass Elliptic Curves.
Proceedings of the 21st Euromicro Conference on Digital System Design, 2018
Proceedings of the 2018 4th International Conference on Cloud Computing Technologies and Applications, 2018
Digital signatures and signcryption schemes on embedded devices: a trade-off between computation and storage.
Proceedings of the 15th ACM International Conference on Computing Frontiers, 2018
Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, 2018
HeComm: End-to-end secured communication in a heterogeneous IoT environment via fog computing.
Proceedings of the 15th IEEE Annual Consumer Communications & Networking Conference, 2018
2017
IACR Cryptol. ePrint Arch., 2017
Hiding side-channel leakage through hardware randomization: A comprehensive overview.
Proceedings of the 2017 International Conference on Embedded Computer Systems: Architectures, 2017
Proceedings of the IEEE 2nd International Verification and Security Workshop, 2017
Proceedings of the 2017 International Joint Conference on Neural Networks, 2017
Proceedings of the 27th International Conference on Field Programmable Logic and Applications, 2017
Proceedings of the 27th International Conference on Field Programmable Logic and Applications, 2017
Proceedings of the Computing Frontiers Conference, 2017
Proceedings of the Computing Frontiers Conference, 2017
Proceedings of the 2017 Asian Hardware Oriented Security and Trust Symposium, 2017
2016
Canary Numbers: Design for Light-weight Online Testability of True Random Number Generators.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Arithmetic of Finite Fields - 6th International Workshop, 2016
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016
Proceedings of the Parallel Problem Solving from Nature - PPSN XIV, 2016
Exploring the use of shift register lookup tables for Keccak implementations on Xilinx FPGAs.
Proceedings of the 26th International Conference on Field Programmable Logic and Applications, 2016
Proceedings of the Evolutionary Computation in Combinatorial Optimization, 2016
Proceedings of the 2016 Design, Automation & Test in Europe Conference & Exhibition, 2016
Proceedings of the Smart Card Research and Advanced Applications, 2016
Proceedings of the Progress in Cryptology - AFRICACRYPT 2016, 2016
A Fast and Compact FPGA Implementation of Elliptic Curve Cryptography Using Lambda Coordinates.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2016, 2016
2015
ACM Trans. Reconfigurable Technol. Syst., 2015
High-Speed Polynomial Multiplication Architecture for Ring-LWE and SHE Cryptosystems.
IEEE Trans. Circuits Syst. I Regul. Pap., 2015
Practical feasibility evaluation and improvement of a pay-per-use licensing scheme for hardware IP cores in Xilinx FPGAs.
J. Cryptogr. Eng., 2015
Proceedings of the 2015 IEEE International Symposium on Circuits and Systems, 2015
Proceedings of the 2015 IEEE International Symposium on Circuits and Systems, 2015
Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
Proceedings of the Applied Reconfigurable Computing - 11th International Symposium, 2015
2014
S-box pipelining using genetic algorithms for high-throughput AES implementations: How fast can we go?
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014
An Elliptic Curve Cryptographic Processor Using Edwards Curves and the Number Theoretic Transform.
Proceedings of the Cryptography and Information Security in the Balkans, 2014
2013
IACR Cryptol. ePrint Arch., 2013
Dietary Recommendations for Lightweight Block Ciphers: Power, Energy and Area Analysis of Recently Developed Architectures.
IACR Cryptol. ePrint Arch., 2013
A single-chip solution for the secure remote configuration of FPGAs using bitstream compression.
Proceedings of the 2012 International Conference on Reconfigurable Computing and FPGAs, 2013
Proceedings of the 23rd International Conference on Field programmable Logic and Applications, 2013
2012
Design space exploration for automatically generated cryptographic hardware using functional languages.
Proceedings of the 22nd International Conference on Field Programmable Logic and Applications (FPL), 2012
2011
Proceedings of the 6th International Workshop on Reconfigurable Communication-centric Systems-on-Chip, 2011
2010
Proceedings of the 17th IEEE International Conference on Electronics, 2010
Proceedings of the Dynamically Reconfigurable Architectures, 11.07. - 16.07.2010, 2010
Proceedings of the 21st IEEE International Conference on Application-specific Systems Architectures and Processors, 2010
2009
Proceedings of the 19th International Conference on Field Programmable Logic and Applications, 2009
2008
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008
2007
A Side-channel Attack Resistant Programmable PKC Coprocessor for Embedded Applications.
Proceedings of the 2007 International Conference on Embedded Computer Systems: Architectures, 2007
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2007), 2007
Proceedings of the 17th ACM Great Lakes Symposium on VLSI 2007, 2007
2006
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2006), 2006
Proceedings of the 2006 International Conference on Field Programmable Logic and Applications (FPL), 2006
Proceedings of the Security and Privacy in Ad-Hoc and Sensor Networks, 2006
Reconfigurable Modular Arithmetic Logic Unit for High-Performance Public-Key Cryptosystems.
Proceedings of the Reconfigurable Computing: Architectures and Applications, 2006
Proceedings of the Reconfigurable Computing: Architectures and Applications, 2006
2005
Proceedings of the 11th IEEE International On-Line Testing Symposium (IOLTS 2005), 2005
Proceedings of the Topics in Cryptology, 2005
Side-channel aware design: Algorithms and Architectures for Elliptic Curve Cryptography over GF(2<sup>n</sup>).
Proceedings of the 16th IEEE International Conference on Application-Specific Systems, 2005
2004
Comput. Artif. Intell., 2004
Proceedings of the 14th ACM Great Lakes Symposium on VLSI 2004, 2004