Ingrid Verbauwhede
Ingrid Verbauwhede
Dirección de correo verificada de
Citado por
Citado por
A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation
K Tiri, I Verbauwhede
Proceedings Design, Automation and Test in Europe Conference and Exhibition …, 2004
A dynamic and differential CMOS logic with signal independent power consumption to withstand differential power analysis on smart cards
K Tiri, M Akmal, I Verbauwhede
Proceedings of the 28th European solid-state circuits conference, 403-406, 2002
Physically unclonable functions: A study on the state of the art and future research directions
R Maes, I Verbauwhede
Towards Hardware-Intrinsic Security, 3-37, 2010
A 21.54 Gbits/s fully pipelined AES processor on FPGA
A Hodjat, I Verbauwhede
12th Annual IEEE Symposium on Field-Programmable Custom Computing Machines …, 2004
Public-key cryptography for RFID-tags
L Batina, J Guajardo, T Kerins, N Mentens, P Tuyls, I Verbauwhede
Fifth Annual IEEE International Conference on Pervasive Computing and …, 2007
spongent: A Lightweight Hash Function
A Bogdanov, M Knežević, G Leander, D Toz, K Varıcı, I Verbauwhede
International workshop on cryptographic hardware and embedded systems, 312-325, 2011
Design and performance testing of a 2.29-GB/s Rijndael processor
I Verbauwhede, P Schaumont, H Kuo
IEEE Journal of Solid-State Circuits 38 (3), 569-572, 2003
PUFs: Myth, fact or busted? A security evaluation of physically unclonable functions (PUFs) cast in silicon
S Katzenbeisser, Ü Kocabaş, V Rožić, AR Sadeghi, I Verbauwhede, ...
International Workshop on Cryptographic Hardware and Embedded Systems, 283-301, 2012
Intrinsic PUFs from flip-flops on reconfigurable devices
R Maes, P Tuyls, I Verbauwhede
3rd Benelux workshop on information and system security (WISSec 2008) 17, 2008, 2008
Elliptic-curve-based security processor for RFID
YK Lee, K Sakiyama, L Batina, I Verbauwhede
IEEE Transactions on Computers 57 (11), 1514-1527, 2008
PUFKY: A fully functional PUF-based cryptographic key generator
R Maes, A Van Herrewege, I Verbauwhede
International Workshop on Cryptographic Hardware and Embedded Systems, 302-319, 2012
A quick safari through the reconfiguration jungle
P Schaumont, I Verbauwhede, K Keutzer, M Sarrafzadeh
Proceedings of the 38th Design Automation Conference (IEEE Cat. No …, 2001
RECTANGLE: a bit-slice lightweight block cipher suitable for multiple platforms
W Zhang, Z Bao, D Lin, V Rijmen, B Yang, I Verbauwhede
Science China Information Sciences 58 (12), 1-15, 2015
Automatic secure fingerprint verification system based on fuzzy vault scheme
S Yang, I Verbauwhede
Proceedings.(ICASSP'05). IEEE International Conference on Acoustics, Speech …, 2005
Securing encryption algorithms against DPA at the logic level: Next generation smart card technology
K Tiri, I Verbauwhede
International Workshop on Cryptographic Hardware and Embedded Systems, 125-136, 2003
Architectural optimization for a 1.82 Gbits/sec VLSI implementation of the AES Rijndael algorithm
H Kuo, I Verbauwhede
International Workshop on Cryptographic Hardware and Embedded Systems, 51-64, 2001
CANAuth-a simple, backward compatible broadcast authentication protocol for CAN bus
A Van Herrewege, D Singelee, I Verbauwhede
ECRYPT Workshop on Lightweight Cryptography 2011, 20, 2011
Low-overhead implementation of a soft decision helper data algorithm for SRAM PUFs
R Maes, P Tuyls, I Verbauwhede
International Workshop on Cryptographic Hardware and Embedded Systems, 332-347, 2009
Area-throughput trade-offs for fully pipelined 30 to 70 Gbits/s AES processors
A Hodjat, I Verbauwhede
IEEE Transactions on Computers 55 (4), 366-372, 2006
Practical mitigations for timing-based side-channel attacks on modern x86 processors
B Coppens, I Verbauwhede, K De Bosschere, B De Sutter
2009 30th IEEE Symposium on Security and Privacy, 45-60, 2009
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20