Ikuti
Lauren De Meyer
Lauren De Meyer
Rambus Cryptography Research
Email yang diverifikasi di esat.kuleuven.be - Beranda
Judul
Dikutip oleh
Dikutip oleh
Tahun
BBQ: Using AES in picnic signatures
CD de Saint Guilhem, L De Meyer, E Orsini, NP Smart
International Conference on Selected Areas in Cryptography, 669-692, 2019
612019
CAPA: The Spirit of Beaver against Physical Attacks
O Reparaz, L De Meyer, B Bilgin, V Arribas, S Nikova, V Nikov, N Smart
https://eprint.iacr.org/2017/1195.pdf, 2017
612017
Multiplicative masking for AES in hardware
L De Meyer, O Reparaz, B Bilgin
IACR Transactions on Cryptographic Hardware and Embedded Systems, 431-468, 2018
542018
M&M: Masks and macs against physical attacks
L De Meyer, V Arribas, S Nikova, V Nikov, V Rijmen
IACR Transactions on Cryptographic Hardware and Embedded Systems, 25-50, 2019
512019
Low AND depth and efficient inverses: a guide on s-boxes for low-latency masking
B Bilgin, L De Meyer, S Duval, I Levi, FX Standaert
IACR Transactions on Symmetric Cryptology 2020 (1), 144-184, 2020
422020
Consolidating security notions in hardware masking
L De Meyer, B Bilgin, O Reparaz
IACR Transactions on Cryptographic Hardware and Embedded Systems, 119-147, 2019
322019
Spin me right round rotational symmetry for FPGA-specific AES: Extended version
F Wegener, L De Meyer, A Moradi
Journal of Cryptology 33, 1114-1155, 2020
282020
On the effect of the (micro) architecture on the development of side-channel resistant software
L De Meyer, E De Mulder, M Tunstall
Cryptology ePrint Archive, 2020
272020
First-order masking with only two random bits
H Gross, K Stoffelen, L De Meyer, M Krenn, S Mangard
Proceedings of ACM Workshop on Theory of Implementation Security Workshop, 10-23, 2019
222019
Spin me right round: Rotational symmetry for FPGA-specific AES
F Wegener, L De Meyer, A Moradi
Cryptology ePrint Archive, 2019
202019
DES S-box generator
L De Meyer, S Vaudenay
Cryptologia 41 (2), 153-171, 2017
132017
Classification of balanced quadratic functions
L De Meyer, B Bilgin
IACR Transactions on Symmetric Cryptology, 169-192, 2019
122019
Recovering the CTR_DRBG state in 256 traces
L De Meyer
IACR Transactions on Cryptographic Hardware and Embedded Systems, 37-65, 2020
112020
Trade-offs in Protecting Keccak Against Combined Side-Channel and Fault Attacks
A Purnal, V Arribas, L De Meyer
Constructive Side-Channel Analysis and Secure Design: 10th International …, 2019
82019
Cryptography in the presence of physical attacks: Design, implementation and analysis
L De Meyer
62020
Multiplicative masking for AES in hardware. IACR TCHES 2018 (3), 431–468 (2018)
L De Meyer, O Reparaz, B Bilgin
5
Looking at the NIST lightweight candidates from a masking point-of-view
L De Meyer
Cryptology ePrint Archive, 2020
42020
Extended Analysis of DES S-boxes
L De Meyer, B Bilgin, B Preneel
34th WIC Symposium on Information Theory in the Benelux 2013, 140-146, 2013
42013
A note on masking generic Boolean functions
L De Meyer, F Wegener, A Moradi
Cryptology ePrint Archive, 2019
22019
More Constructions for strong 8-bit S-boxes with efficient masking in hardware
L De Meyer, K Varici, E IMEC-COSIC
2017 Symposium on Information Theory and Signal Processing in the Benelux, 49, 2017
22017
Sistem tidak dapat melakukan operasi ini. Coba lagi nanti.
Artikel 1–20