Seguir
Josep Balasch
Josep Balasch
Dirección de correo verificada de kuleuven.be - Página principal
Título
Citado por
Citado por
Año
An In-depth and Black-box Characterization of the Effects of Clock Glitches on 8-bit MCUs
J Balasch, B Gierlichs, I Verbauwhede
2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, 105-114, 2011
2152011
Pripayd: privacy friendly pay-as-you-drive insurance
C Troncoso, G Danezis, E Kosta, B Preneel
Proceedings of the 2007 ACM workshop on Privacy in electronic society, 99-107, 2007
2122007
On the cost of lazy engineering for masked software implementations
J Balasch, B Gierlichs, V Grosso, O Reparaz, FX Standaert
Smart Card Research and Advanced Applications: 13th International Conference …, 2015
2062015
PrETP: Privacy-preserving electronic toll pricing
J Balasch, A Rial, C Troncoso, B Preneel, I Verbauwhede, C Geuens, ...
19th USENIX Security Symposium, 63-78, 2010
1842010
Gone in 360 seconds: Hijacking with Hitag2
R Verdult, FD Garcia, J Balasch
21st USENIX Security Symposium (USENIX Security 12), 237-252, 2012
1552012
Dude, is my code constant time?
O Reparaz, J Balasch, I Verbauwhede
Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017 …, 2017
1212017
DPA, bitslicing and masking at 1 GHz
J Balasch, B Gierlichs, O Reparaz, I Verbauwhede
Cryptographic Hardware and Embedded Systems--CHES 2015: 17th International …, 2015
992015
A side-channel-resistant implementation of SABER
MV Beirendonck, JP D’anvers, A Karmakar, J Balasch, I Verbauwhede
ACM Journal on Emerging Technologies in Computing Systems (JETC) 17 (2), 1-26, 2021
922021
Electromagnetic circuit fingerprints for hardware trojan detection
J Balasch, B Gierlichs, I Verbauwhede
2015 IEEE International Symposium on Electromagnetic Compatibility (EMC …, 2015
922015
Power analysis of Atmel CryptoMemory–recovering keys from secure EEPROMs
J Balasch, B Gierlichs, R Verdult, L Batina, I Verbauwhede
Topics in Cryptology–CT-RSA 2012: The Cryptographers’ Track at the RSA …, 2012
842012
Compact implementation and performance evaluation of hash functions in attiny devices
J Balasch, B Ege, T Eisenbarth, B Gérard, Z Gong, T Güneysu, S Heyse, ...
Smart Card Research and Advanced Applications: 11th International Conference …, 2013
702013
Theory and practice of a leakage resilient masking scheme
J Balasch, S Faust, B Gierlichs, I Verbauwhede
Advances in Cryptology–ASIACRYPT 2012: 18th International Conference on the …, 2012
662012
Inner product masking revisited
J Balasch, S Faust, B Gierlichs
Advances in Cryptology--EUROCRYPT 2015: 34th Annual International Conference …, 2015
612015
A privacy-preserving buyer–seller watermarking protocol based on priced oblivious transfer
A Rial, J Balasch, B Preneel
IEEE Transactions on Information Forensics and Security 6 (1), 202-212, 2010
462010
Towards efficient and automated side channel evaluations at design time
D Sijacic, J Balasch, B Yang, S Ghosh, I Verbauwhede
Kalpa Publications in Computing 7, 16-31, 2018
45*2018
Consolidating inner product masking
J Balasch, S Faust, B Gierlichs, C Paglialonga, FX Standaert
Advances in Cryptology–ASIACRYPT 2017: 23rd International Conference on the …, 2017
442017
24.1 circuit challenges from cryptography
I Verbauwhede, J Balasch, SS Roy, A Van Herrewege
2015 IEEE International Solid-State Circuits Conference-(ISSCC) Digest of …, 2015
422015
An in-depth and black-box characterization of the effects of laser pulses on atmega328p
DSV Kumar, A Beckers, J Balasch, B Gierlichs, I Verbauwhede
Smart Card Research and Advanced Applications: 17th International Conference …, 2019
272019
Design and testing methodologies for true random number generators towards industry certification
J Balasch, F Bernard, V Fischer, M Grujić, M Laban, O Petura, V Rožić, ...
2018 IEEE 23rd European Test Symposium (ETS), 1-10, 2018
262018
Teaching HW/SW co-design with a public key cryptography application
L Uhsadel, M Ullrich, A Das, D Karaklajić, J Balasch, I Verbauwhede, ...
IEEE Transactions on education 56 (4), 478-483, 2013
252013
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20