Victor Arribas Abril
Victor Arribas Abril
Rambus Inc
Verified email at
Cited by
Cited by
Revisiting a Methodology for Efficient CNN Architectures in Profiling Attacks
BP L Wouters, V Arribas, B Gierlichs
IACR Transactions on Cryptographic Hardware and Embedded Systems 2020 (3), 2020
CAPA: the spirit of beaver against physical attacks
O Reparaz, LD Meyer, B Bilgin, V Arribas, S Nikova, V Nikov, N Smart
Annual International Cryptology Conference, 121-151, 2018
M&M: Masks and macs against physical attacks
L De Meyer, V Arribas Abril, S Nikova, V Nikov, V Rijmen
IACR Transactions on Cryptographic Hardware and Embedded Systems 2019 (1), 25-50, 2018
Rhythmic Keccak: SCA security and low latency in HW
V Arribas, B Bilgin, G Petrides, S Nikova, V Rijmen
IACR Transactions on Cryptographic Hardware and Embedded Systems, 269-290, 2018
VerMI: Verification tool for masked implementations
V Arribas, S Nikova, V Rijmen
2018 25th IEEE International Conference on Electronics, Circuits and Systems …, 2018
Cryptographic fault diagnosis using VerFI
V Arribas, F Wegener, A Moradi, S Nikova
2020 IEEE International Symposium on Hardware Oriented Security and Trust …, 2020
Glitch-resistant masking schemes as countermeasure against fault sensitivity Analysis
V Arribas, T De Cnudde, D Šijačić
2018 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 27-34, 2018
Beyond the limits: SHA-3 in just 49 slices
V Arribas
2019 29th International Conference on Field Programmable Logic and …, 2019
Design and Verification of Side-Channel and Fault Attacks Countermeasures
V Arribas, S Nikova, V Rijmen
Katholieke Universiteit Leuven, 248, 2020
Trade-offs in Protecting Keccak Against Combined Side-Channel and Fault Attacks
A Purnal, V Arribas, L De Meyer
International Workshop on Constructive Side-Channel Analysis and Secure …, 2019
Guards in Action: First-Order SCA Secure Implementations of Ketje Without Additional Randomness
V Arribas, S Nikova, V Rijmen
2018 21st Euromicro Conference on Digital System Design (DSD), pp. 492-499, 2018
LLTI: Low-Latency Threshold Implementations
V Arribas, Z Zhang, S Nikova
IEEE Transactions on Information Forensics and Security 16, 5108-5123, 2021
The system can't perform the operation now. Try again later.
Articles 1–12