Volgen
Lauren De Meyer
Lauren De Meyer
Rambus Cryptography Research
Geverifieerd e-mailadres voor esat.kuleuven.be - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
CAPA: The Spirit of Beaver against Physical Attacks
O Reparaz, L De Meyer, B Bilgin, V Arribas, S Nikova, V Nikov, N Smart
https://eprint.iacr.org/2017/1195.pdf, 2017
362017
M&M: Masks and macs against physical attacks
L De Meyer, V Arribas Abril, S Nikova, V Nikov, V Rijmen
IACR Transactions on Cryptographic Hardware and Embedded Systems 2019 (1), 25-50, 2018
322018
BBQ: Using AES in picnic signatures
CD Saint Guilhem, LD Meyer, E Orsini, NP Smart
International Conference on Selected Areas in Cryptography, 669-692, 2019
302019
Multiplicative masking for AES in hardware
L De Meyer, O Reparaz, B Bilgin
IACR Transactions on Cryptographic Hardware and Embedded Systems, 431-468, 2018
282018
Low AND depth and efficient inverses: a guide on s-boxes for low-latency masking
B Bilgin, L De Meyer, S Duval, I Levi, FX Standaert
IACR Transactions on Symmetric Cryptology 2020 (1), 144-184, 2020
222020
Consolidating security notions in hardware masking
L De Meyer, B Bilgin, O Reparaz
IACR Transactions on Cryptographic Hardware and Embedded Systems, 119-147, 2019
192019
Spin me right round rotational symmetry for FPGA-specific AES: Extended version
F Wegener, L De Meyer, A Moradi
Journal of Cryptology 33 (3), 1114-1155, 2020
182020
Spin me right round: Rotational symmetry for FPGA-specific AES
F Wegener, L De Meyer, A Moradi
Cryptology ePrint Archive, 2019
142019
On the effect of the (micro) architecture on the development of side-channel resistant software
L De Meyer, E De Mulder, M Tunstall
Cryptology ePrint Archive, 2020
122020
First-order masking with only two random bits
H Gross, K Stoffelen, L De Meyer, M Krenn, S Mangard
Proceedings of ACM Workshop on Theory of Implementation Security Workshop, 10-23, 2019
112019
DES S-box generator
L De Meyer, S Vaudenay
Cryptologia 41 (2), 153-171, 2017
92017
Classification of balanced quadratic functions
L De Meyer, B Bilgin
Cryptology ePrint Archive, 2018
62018
Trade-offs in Protecting Keccak Against Combined Side-Channel and Fault Attacks
A Purnal, V Arribas, L De Meyer
International Workshop on Constructive Side-Channel Analysis and Secure …, 2019
42019
Recovering the CTR_DRBG state in 256 traces
L De Meyer
IACR Transactions on Cryptographic Hardware and Embedded Systems 2020 (1), 37-65, 2019
42019
Extended Analysis of DES S-boxes
L De Meyer, B Bilgin, B Preneel
Proceedings of the 34rd Symposium on Information Theory in the Benelux, 30-31, 2013
42013
More Constructions for strong 8-bit S-boxes with efficient masking in hardware
L De Meyer, K Varici, E IMEC-COSIC
38th Symposium on Information Theory in the Benelux, 2017
32017
Looking at the NIST lightweight candidates from a masking point-of-view
L De Meyer
Cryptology ePrint Archive, 2020
22020
Cryptography in the presence of physical attacks: Design, implementation and analysis
L De Meyer
22020
Revisiting the Generation of DES-Like S-boxes
L De Meyer, B Bilgin, B Preneel
Proceedings of the 34th Symposium on Information Theory in the Benelux …, 2013
22013
A note on masking generic Boolean functions
L De Meyer, F Wegener, A Moradi
Cryptology ePrint Archive, 2019
12019
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20