Follow
Lennert Wouters
Lennert Wouters
imec-COSIC, KU Leuven
Verified email at esat.kuleuven.be
Title
Cited by
Cited by
Year
Revisiting a Methodology for Efficient CNN Architectures in Profiling Attacks
L Wouters, V Arribas, B Gierlichs, B Preneel
IACR Transactions on Cryptographic Hardware and Embedded Systems 2020 (3 …, 2020
230*2020
Fast, furious and insecure: Passive keyless entry and start systems in modern supercars
L Wouters, E Marin, T Ashur, B Gierlichs, B Preneel
IACR Transactions on Cryptographic Hardware and Embedded Systems 2019 (3), 66-85, 2019
582019
Side-channel analysis of lattice-based post-quantum cryptography: Exploiting polynomial multiplication
C Mujdei, L Wouters, A Karmakar, A Beckers, JMB Mera, I Verbauwhede
ACM Transactions on Embedded Computing Systems, 2022
422022
Dismantling DST80-based Immobiliser Systems
L Wouters, J Van den Herrewegen, F D Garcia, D Oswald, B Gierlichs, ...
IACR Transactions on Cryptographic Hardware and Embedded Systems 2020 (2 …, 2020
332020
My other car is your car: compromising the Tesla Model X keyless entry system.
L Wouters, B Gierlichs, B Preneel
IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021 (4), 149-172, 2021
272021
Semi-Automatic Locating of Cryptographic Operations in Side-Channel Traces
J Trautmann, A Beckers, L Wouters, S Wildermann, I Verbauwhede, ...
IACR Transactions on Cryptographic Hardware and Embedded Systems, 345-366, 2022
142022
Provable Secure Software Masking in the Real-World
A Beckers, L Wouters, B Gierlichs, B Preneel, I Verbauwhede
International Workshop on Constructive Side-Channel Analysis and Secure …, 2022
132022
On the susceptibility of Texas Instruments SimpleLink platform microcontrollers to non-invasive physical attacks
L Wouters, B Gierlichs, B Preneel
International Workshop on Constructive Side-Channel Analysis and Secure …, 2022
42022
Glitched on Earth by Humans: A Black-Box Security Evaluation of the SpaceX Starlink User Terminal
L Wouters
Black Hat USA 2022, 2022
22022
Energy and side-channel security evaluation of near-threshold cryptographic circuits in 28nm FD-SOI technology
A Beckers, R Uytterhoeven, T Vandenabeele, J Vliegen, L Wouters, ...
Proceedings of the 19th ACM International Conference on Computing Frontiers …, 2022
12022
An In-Depth Security Evaluation of the Nintendo DSi Gaming Console
pcy Sluys, L Wouters, B Gierlichs, I Verbauwhede
International Conference on Smart Card Research and Advanced Applications, 23-42, 2023
2023
SPECTREM: Exploiting Electromagnetic Emanations During Transient Execution
J De Meulemeester, A Purnal, L Wouters, A Beckers, I Verbauwhede
32nd USENIX Security Symposium (USENIX Security 23), 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–12