Benedikt Gierlichs
Benedikt Gierlichs
Research Expert at KU Leuven/COSIC
Verified email at esat.kuleuven.be - Homepage
TitleCited byYear
Mutual information analysis
B Gierlichs, L Batina, P Tuyls, B Preneel
International Workshop on Cryptographic Hardware and Embedded Systems, 426-442, 2008
5302008
Mutual information analysis: a comprehensive study
L Batina, B Gierlichs, E Prouff, M Rivain, FX Standaert, ...
Journal of Cryptology 24 (2), 269-291, 2011
1982011
Templates vs. stochastic methods
B Gierlichs, K Lemke-Rust, C Paar
International Workshop on Cryptographic Hardware and Embedded Systems, 15-29, 2006
1862006
The world is not enough: Another look on second-order DPA
FX Standaert, N Veyrat-Charvillon, E Oswald, B Gierlichs, M Medwed, ...
International Conference on the Theory and Application of Cryptology and …, 2010
1582010
Higher-order threshold implementations
B Bilgin, B Gierlichs, S Nikova, V Nikov, V Rijmen
International Conference on the Theory and Application of Cryptology and …, 2014
1322014
Partition vs. comparison side-channel distinguishers: An empirical evaluation of statistical tests for univariate side-channel attacks against two unprotected cmos devices
FX Standaert, B Gierlichs, I Verbauwhede
International Conference on Information Security and Cryptology, 253-267, 2008
1252008
Machine learning in side-channel analysis: a first study
G Hospodar, B Gierlichs, E De Mulder, I Verbauwhede, J Vandewalle
Journal of Cryptographic Engineering 1 (4), 293, 2011
1242011
Consolidating masking schemes
O Reparaz, B Bilgin, S Nikova, B Gierlichs, I Verbauwhede
Annual Cryptology Conference, 764-783, 2015
1132015
An In-depth and Black-box Characterization of the Effects of Clock Glitches on 8-bit MCUs
J Balasch, B Gierlichs, I Verbauwhede
2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, 105-114, 2011
1062011
A more efficient AES threshold implementation
B Bilgin, B Gierlichs, S Nikova, V Nikov, V Rijmen
International Conference on Cryptology in Africa, 267-284, 2014
962014
Revisiting higher-order DPA attacks
B Gierlichs, L Batina, B Preneel, I Verbauwhede
Cryptographers’ Track at the RSA Conference, 221-234, 2010
892010
On the cost of lazy engineering for masked software implementations
J Balasch, B Gierlichs, V Grosso, O Reparaz, FX Standaert
International Conference on Smart Card Research and Advanced Applications, 64-81, 2014
862014
Differential cluster analysis
L Batina, B Gierlichs, K Lemke-Rust
International Workshop on Cryptographic Hardware and Embedded Systems, 112-127, 2009
802009
Perfect matching disclosure attacks
C Troncoso, B Gierlichs, B Preneel, I Verbauwhede
International Symposium on Privacy Enhancing Technologies Symposium, 2-23, 2008
672008
Power analysis of Atmel CryptoMemory–recovering keys from secure EEPROMs
J Balasch, B Gierlichs, R Verdult, L Batina, I Verbauwhede
Cryptographers’ Track at the RSA Conference, 19-34, 2012
632012
Revisiting a combinatorial approach toward measuring anonymity
B Gierlichs, C Troncoso, C Diaz, B Preneel, I Verbauwhede
Proceedings of the 7th ACM workshop on Privacy in the electronic society …, 2008
602008
Comparative evaluation of rank correlation based DPA on an AES prototype chip
L Batina, B Gierlichs, K Lemke-Rust
International Conference on Information Security, 341-354, 2008
572008
DPA, bitslicing and masking at 1 GHz
J Balasch, B Gierlichs, O Reparaz, I Verbauwhede
International Workshop on Cryptographic Hardware and Embedded Systems, 599-619, 2015
542015
Efficient implementation of anonymous credentials on Java Card smart cards
M Sterckx, B Gierlichs, B Preneel, I Verbauwhede
2009 First IEEE International Workshop on Information Forensics and Security …, 2009
532009
To infinity and beyond: combined attack on ECC using points of low order
J Fan, B Gierlichs, F Vercauteren
International Workshop on Cryptographic Hardware and Embedded Systems, 143-159, 2011
522011
The system can't perform the operation now. Try again later.
Articles 1–20