Josep Balasch
Josep Balasch
KU Leuven, ESAT/COSIC
Verified email at esat.kuleuven.be - Homepage
Title
Cited by
Cited by
Year
Pripayd: Privacy-friendly pay-as-you-drive insurance
C Troncoso, G Danezis, E Kosta, J Balasch, B Preneel
IEEE Transactions on Dependable and Secure Computing 8 (5), 742-755, 2010
1652010
PrETP: Privacy-preserving electronic toll pricing
J Balasch, A Rial, C Troncoso, B Preneel, I Verbauwhede, C Geuens, ...
19th USENIX Security Symposium, 63-78, 2010
1452010
An In-depth and Black-box Characterization of the Effects of Clock Glitches on 8-bit MCUs
J Balasch, B Gierlichs, I Verbauwhede
2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, 105-114, 2011
1172011
Gone in 360 seconds: Hijacking with Hitag2
R Verdult, FD Garcia, J Balasch
Presented as part of the 21st {USENIX} Security Symposium ({USENIX} Security …, 2012
1162012
On the cost of lazy engineering for masked software implementations
J Balasch, B Gierlichs, V Grosso, O Reparaz, FX Standaert
International Conference on Smart Card Research and Advanced Applications, 64-81, 2014
972014
Power analysis of Atmel CryptoMemory–recovering keys from secure EEPROMs
J Balasch, B Gierlichs, R Verdult, L Batina, I Verbauwhede
Cryptographers’ Track at the RSA Conference, 19-34, 2012
672012
DPA, bitslicing and masking at 1 GHz
J Balasch, B Gierlichs, O Reparaz, I Verbauwhede
International Workshop on Cryptographic Hardware and Embedded Systems, 599-619, 2015
652015
Compact implementation and performance evaluation of hash functions in attiny devices
J Balasch, B Ege, T Eisenbarth, B Gérard, Z Gong, T Güneysu, S Heyse, ...
International Conference on Smart Card Research and Advanced Applications …, 2012
452012
Electromagnetic circuit fingerprints for hardware trojan detection
J Balasch, B Gierlichs, I Verbauwhede
2015 IEEE International Symposium on Electromagnetic Compatibility (EMC …, 2015
432015
Dude, is my code constant time?
O Reparaz, J Balasch, I Verbauwhede
Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017 …, 2017
412017
Theory and practice of a leakage resilient masking scheme
J Balasch, S Faust, B Gierlichs, I Verbauwhede
International Conference on the Theory and Application of Cryptology and …, 2012
352012
A privacy-preserving buyer–seller watermarking protocol based on priced oblivious transfer
A Rial, J Balasch, B Preneel
IEEE Transactions on Information Forensics and Security 6 (1), 202-212, 2010
332010
Inner product masking revisited
J Balasch, S Faust, B Gierlichs
Annual International Conference on the Theory and Applications of …, 2015
322015
Smart Card Implementation of Anonymous Credentials
J Balasch
KATHOLIEKE UNIVERSITEIT LEUVEN, 2008
192008
Teaching HW/SW co-design with a public key cryptography application
L Uhsadel, M Ullrich, A Das, D Karaklajić, J Balasch, I Verbauwhede, ...
IEEE Transactions on education 56 (4), 478-483, 2013
162013
24.1 Circuit challenges from cryptography
I Verbauwhede, J Balasch, SS Roy, A Van Herrewege
2015 IEEE International Solid-State Circuits Conference-(ISSCC) Digest of …, 2015
132015
Consolidating inner product masking
J Balasch, S Faust, B Gierlichs, C Paglialonga, FX Standaert
International Conference on the Theory and Application of Cryptology and …, 2017
122017
An embedded platform for privacy-friendly road charging applications
J Balasch, I Verbauwhede, B Preneel
2010 Design, Automation & Test in Europe Conference & Exhibition (DATE 2010 …, 2010
112010
Single-trace side-channel attacks on scalar multiplications with precomputations
K Järvinen, J Balasch
International Conference on Smart Card Research and Advanced Applications …, 2016
92016
Design and implementation of a waveform-matching based triggering system
A Beckers, J Balasch, B Gierlichs, I Verbauwhede
International Workshop on Constructive Side-Channel Analysis and Secure …, 2016
72016
The system can't perform the operation now. Try again later.
Articles 1–20