Pripayd: privacy friendly pay-as-you-drive insurance C Troncoso, G Danezis, E Kosta, B Preneel Proceedings of the 2007 ACM workshop on Privacy in electronic society, 99-107, 2007 | 209 | 2007 |
An In-depth and Black-box Characterization of the Effects of Clock Glitches on 8-bit MCUs J Balasch, B Gierlichs, I Verbauwhede 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, 105-114, 2011 | 208 | 2011 |
On the cost of lazy engineering for masked software implementations J Balasch, B Gierlichs, V Grosso, O Reparaz, FX Standaert Smart Card Research and Advanced Applications: 13th International Conference …, 2015 | 206 | 2015 |
PrETP: Privacy-preserving electronic toll pricing J Balasch, A Rial, C Troncoso, B Preneel, I Verbauwhede, C Geuens, ... 19th USENIX Security Symposium, 63-78, 2010 | 184 | 2010 |
Gone in 360 seconds: Hijacking with Hitag2 R Verdult, FD Garcia, J Balasch 21st USENIX Security Symposium (USENIX Security 12), 237-252, 2012 | 156 | 2012 |
Dude, is my code constant time? O Reparaz, J Balasch, I Verbauwhede Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017 …, 2017 | 121 | 2017 |
DPA, bitslicing and masking at 1 GHz J Balasch, B Gierlichs, O Reparaz, I Verbauwhede Cryptographic Hardware and Embedded Systems--CHES 2015: 17th International …, 2015 | 96 | 2015 |
A side-channel-resistant implementation of SABER MV Beirendonck, JP D’anvers, A Karmakar, J Balasch, I Verbauwhede ACM Journal on Emerging Technologies in Computing Systems (JETC) 17 (2), 1-26, 2021 | 89 | 2021 |
Electromagnetic circuit fingerprints for hardware trojan detection J Balasch, B Gierlichs, I Verbauwhede 2015 IEEE International Symposium on Electromagnetic Compatibility (EMC …, 2015 | 88 | 2015 |
Power analysis of Atmel CryptoMemory–recovering keys from secure EEPROMs J Balasch, B Gierlichs, R Verdult, L Batina, I Verbauwhede Topics in Cryptology–CT-RSA 2012: The Cryptographers’ Track at the RSA …, 2012 | 83 | 2012 |
Compact implementation and performance evaluation of hash functions in attiny devices J Balasch, B Ege, T Eisenbarth, B Gérard, Z Gong, T Güneysu, S Heyse, ... Smart Card Research and Advanced Applications: 11th International Conference …, 2013 | 71 | 2013 |
Theory and practice of a leakage resilient masking scheme J Balasch, S Faust, B Gierlichs, I Verbauwhede Advances in Cryptology–ASIACRYPT 2012: 18th International Conference on the …, 2012 | 64 | 2012 |
Inner product masking revisited J Balasch, S Faust, B Gierlichs Advances in Cryptology--EUROCRYPT 2015: 34th Annual International Conference …, 2015 | 61 | 2015 |
Consolidating inner product masking J Balasch, S Faust, B Gierlichs, C Paglialonga, FX Standaert Advances in Cryptology–ASIACRYPT 2017: 23rd International Conference on the …, 2017 | 45 | 2017 |
A privacy-preserving buyer–seller watermarking protocol based on priced oblivious transfer A Rial, J Balasch, B Preneel IEEE Transactions on Information Forensics and Security 6 (1), 202-212, 2010 | 45 | 2010 |
Towards efficient and automated side channel evaluations at design time D Sijacic, J Balasch, B Yang, S Ghosh, I Verbauwhede Kalpa Publications in Computing 7, 16-31, 2018 | 44* | 2018 |
24.1 circuit challenges from cryptography I Verbauwhede, J Balasch, SS Roy, A Van Herrewege 2015 IEEE International Solid-State Circuits Conference-(ISSCC) Digest of …, 2015 | 41 | 2015 |
An in-depth and black-box characterization of the effects of laser pulses on atmega328p DSV Kumar, A Beckers, J Balasch, B Gierlichs, I Verbauwhede Smart Card Research and Advanced Applications: 17th International Conference …, 2019 | 25 | 2019 |
Teaching HW/SW co-design with a public key cryptography application L Uhsadel, M Ullrich, A Das, D Karaklajić, J Balasch, I Verbauwhede, ... IEEE Transactions on education 56 (4), 478-483, 2013 | 25 | 2013 |
Smart Card Implementation of Anonymous Credentials J Balasch KATHOLIEKE UNIVERSITEIT LEUVEN, 2008 | 25 | 2008 |