BBQ: using AES in picnic signatures CD de Saint Guilhem, L De Meyer, E Orsini, NP Smart International Conference on Selected Areas in Cryptography, 669-692, 2019 | 56 | 2019 |
CAPA: The Spirit of Beaver against Physical Attacks O Reparaz, L De Meyer, B Bilgin, V Arribas, S Nikova, V Nikov, N Smart https://eprint.iacr.org/2017/1195.pdf, 2017 | 56 | 2017 |
M&M: Masks and macs against physical attacks L De Meyer, V Arribas Abril, S Nikova, V Nikov, V Rijmen IACR Transactions on Cryptographic Hardware and Embedded Systems 2019 (1), 25-50, 2018 | 47 | 2018 |
Multiplicative masking for AES in hardware L De Meyer, O Reparaz, B Bilgin IACR Transactions on Cryptographic Hardware and Embedded Systems, 431-468, 2018 | 47 | 2018 |
Low AND depth and efficient inverses: a guide on s-boxes for low-latency masking B Bilgin, L De Meyer, S Duval, I Levi, FX Standaert IACR Transactions on Symmetric Cryptology 2020 (1), 144-184, 2020 | 37 | 2020 |
Spin me right round rotational symmetry for FPGA-specific AES: Extended version F Wegener, L De Meyer, A Moradi Journal of Cryptology 33, 1114-1155, 2020 | 26 | 2020 |
Consolidating security notions in hardware masking L De Meyer, B Bilgin, O Reparaz IACR Transactions on Cryptographic Hardware and Embedded Systems, 119-147, 2019 | 26 | 2019 |
On the effect of the (micro) architecture on the development of side-channel resistant software L De Meyer, E De Mulder, M Tunstall Cryptology ePrint Archive, 2020 | 22 | 2020 |
First-order masking with only two random bits H Gross, K Stoffelen, L De Meyer, M Krenn, S Mangard Proceedings of ACM Workshop on Theory of Implementation Security Workshop, 10-23, 2019 | 18 | 2019 |
Spin me right round: Rotational symmetry for FPGA-specific AES F Wegener, L De Meyer, A Moradi Cryptology ePrint Archive, 2019 | 16 | 2019 |
Classification of balanced quadratic functions L De Meyer, B Bilgin Cryptology ePrint Archive, 2018 | 12 | 2018 |
DES S-box generator L De Meyer, S Vaudenay Cryptologia 41 (2), 153-171, 2017 | 11 | 2017 |
Recovering the CTR_DRBG state in 256 traces L De Meyer IACR Transactions on Cryptographic Hardware and Embedded Systems, 37-65, 2020 | 10 | 2020 |
Trade-offs in Protecting Keccak Against Combined Side-Channel and Fault Attacks A Purnal, V Arribas, L De Meyer Constructive Side-Channel Analysis and Secure Design: 10th International …, 2019 | 8 | 2019 |
Cryptography in the presence of physical attacks: Design, implementation and analysis L De Meyer | 4 | 2020 |
Extended Analysis of DES S-boxes L De Meyer, B Bilgin, B Preneel 34th WIC Symposium on Information Theory in the Benelux 2013, 140-146, 2013 | 4 | 2013 |
Looking at the NIST lightweight candidates from a masking point-of-view L De Meyer Cryptology ePrint Archive, 2020 | 3 | 2020 |
A note on masking generic Boolean functions L De Meyer, F Wegener, A Moradi Cryptology ePrint Archive, 2019 | 2 | 2019 |
More Constructions for strong 8-bit S-boxes with efficient masking in hardware L De Meyer, K Varici, E IMEC-COSIC 38th Symposium on Information Theory in the Benelux, 2017 | 2 | 2017 |
Revisiting the Generation of DES-Like S-boxes L De Meyer, B Bilgin, B Preneel Proceedings of the 34th Symposium on Information Theory in the Benelux …, 2013 | 2 | 2013 |