BibTeX records: Elke De Mulder

download as .bib file

@inproceedings{DBLP:conf/ets/0001AAB0MEGHHHK21,
  author       = {Jaume Abella and
                  Sergi Alcaide and
                  Jens Anders and
                  Francisco Bas and
                  Steffen Becker and
                  Elke De Mulder and
                  Nourhan Elhamawy and
                  Frank K. G{\"{u}}rkaynak and
                  Helena Handschuh and
                  Carles Hern{\'{a}}ndez and
                  Michael Hutter and
                  Leonidas Kosmidis and
                  Ilia Polian and
                  Matthias Sauer and
                  Stefan Wagner and
                  Francesco Regazzoni},
  title        = {Security, Reliability and Test Aspects of the {RISC-V} Ecosystem},
  booktitle    = {26th {IEEE} European Test Symposium, {ETS} 2021, Bruges, Belgium,
                  May 24-28, 2021},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ETS50041.2021.9465449},
  doi          = {10.1109/ETS50041.2021.9465449},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ets/0001AAB0MEGHHHK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/YaoTMKS20,
  author       = {Yuan Yao and
                  Michael Tunstall and
                  Elke De Mulder and
                  Anton Kochepasov and
                  Patrick Schaumont},
  editor       = {Guido Marco Bertoni and
                  Francesco Regazzoni},
  title        = {Augmenting Leakage Detection Using Bootstrapping},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 11th International
                  Workshop, {COSADE} 2020, Lugano, Switzerland, April 1-3, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12244},
  pages        = {104--119},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-68773-1\_6},
  doi          = {10.1007/978-3-030-68773-1\_6},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/YaoTMKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YaoTMKS20,
  author       = {Yuan Yao and
                  Michael Tunstall and
                  Elke De Mulder and
                  Anton Kochepasov and
                  Patrick Schaumont},
  title        = {Augmenting Leakage Detection using Bootstrapping},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {508},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/508},
  timestamp    = {Wed, 27 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YaoTMKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MeyerMT20,
  author       = {Lauren De Meyer and
                  Elke De Mulder and
                  Michael Tunstall},
  title        = {On the Effect of the (Micro)Architecture on the Development of Side-Channel
                  Resistant Software},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1297},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1297},
  timestamp    = {Fri, 30 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/MeyerMT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dac/MulderGH19,
  author       = {Elke De Mulder and
                  Samatha Gummalla and
                  Michael Hutter},
  title        = {Protecting {RISC-V} against Side-Channel Attacks},
  booktitle    = {Proceedings of the 56th Annual Design Automation Conference 2019,
                  {DAC} 2019, Las Vegas, NV, USA, June 02-06, 2019},
  pages        = {45},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3316781.3323485},
  doi          = {10.1145/3316781.3323485},
  timestamp    = {Sun, 08 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dac/MulderGH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dt/MulderES18,
  author       = {Elke De Mulder and
                  Thomas Eisenbarth and
                  Patrick Schaumont},
  title        = {Identifying and Eliminating Side-Channel Leaks in Programmable Systems},
  journal      = {{IEEE} Des. Test},
  volume       = {35},
  number       = {1},
  pages        = {74--89},
  year         = {2018},
  url          = {https://doi.org/10.1109/MDAT.2017.2766166},
  doi          = {10.1109/MDAT.2017.2766166},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dt/MulderES18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GaleaMPT15,
  author       = {Jake Longo and
                  Elke De Mulder and
                  Dan Page and
                  Michael Tunstall},
  editor       = {Tim G{\"{u}}neysu and
                  Helena Handschuh},
  title        = {SoC It to {EM:} ElectroMagnetic Side-Channel Attacks on a Complex
                  System-on-Chip},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International
                  Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9293},
  pages        = {620--640},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48324-4\_31},
  doi          = {10.1007/978-3-662-48324-4\_31},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/GaleaMPT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaleaMPT15,
  author       = {Jake Longo and
                  Elke De Mulder and
                  Daniel Page and
                  Michael Tunstall},
  title        = {SoC it to {EM:} electromagnetic side-channel attacks on a complex
                  system-on-chip},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {561},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/561},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaleaMPT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/MulderHMP14,
  author       = {Elke De Mulder and
                  Michael Hutter and
                  Mark E. Marson and
                  Peter Pearson},
  title        = {Using Bleichenbacher's solution to the hidden number problem to attack
                  nonce leaks in 384-bit {ECDSA:} extended version},
  journal      = {J. Cryptogr. Eng.},
  volume       = {4},
  number       = {1},
  pages        = {33--45},
  year         = {2014},
  url          = {https://doi.org/10.1007/s13389-014-0072-z},
  doi          = {10.1007/S13389-014-0072-Z},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/MulderHMP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/MulderHMP13,
  author       = {Elke De Mulder and
                  Michael Hutter and
                  Mark E. Marson and
                  Peter Pearson},
  editor       = {Guido Bertoni and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Using Bleichenbacher"s Solution to the Hidden Number Problem
                  to Attack Nonce Leaks in 384-Bit {ECDSA}},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International
                  Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8086},
  pages        = {435--452},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40349-1\_25},
  doi          = {10.1007/978-3-642-40349-1\_25},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/MulderHMP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/sps/KnezevicBMFGLMV13,
  author       = {Miroslav Knezevic and
                  Lejla Batina and
                  Elke De Mulder and
                  Junfeng Fan and
                  Benedikt Gierlichs and
                  Yong Ki Lee and
                  Roel Maes and
                  Ingrid Verbauwhede},
  editor       = {Shuvra S. Bhattacharyya and
                  Ed F. Deprettere and
                  Rainer Leupers and
                  Jarmo Takala},
  title        = {Signal Processing for Cryptography and Security Applications},
  booktitle    = {Handbook of Signal Processing Systems},
  pages        = {223--241},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-1-4614-6859-2\_7},
  doi          = {10.1007/978-1-4614-6859-2\_7},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/reference/sps/KnezevicBMFGLMV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MulderHMP13,
  author       = {Elke De Mulder and
                  Michael Hutter and
                  Mark E. Marson and
                  Peter Pearson},
  title        = {Using Bleichenbacher's Solution to the Hidden Number Problem to Attack
                  Nonce Leaks in 384-Bit {ECDSA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {346},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/346},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MulderHMP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/AertsBMMDIKPVV12,
  author       = {Wim Aerts and
                  Eli Biham and
                  Dieter De Moitie and
                  Elke De Mulder and
                  Orr Dunkelman and
                  Sebastiaan Indesteege and
                  Nathan Keller and
                  Bart Preneel and
                  Guy A. E. Vandenbosch and
                  Ingrid Verbauwhede},
  title        = {A Practical Attack on KeeLoq},
  journal      = {J. Cryptol.},
  volume       = {25},
  number       = {1},
  pages        = {136--157},
  year         = {2012},
  url          = {https://doi.org/10.1007/s00145-010-9091-9},
  doi          = {10.1007/S00145-010-9091-9},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/AertsBMMDIKPVV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/HospodarGMVV11,
  author       = {Gabriel Hospodar and
                  Benedikt Gierlichs and
                  Elke De Mulder and
                  Ingrid Verbauwhede and
                  Joos Vandewalle},
  title        = {Machine learning in side-channel analysis: a first study},
  journal      = {J. Cryptogr. Eng.},
  volume       = {1},
  number       = {4},
  pages        = {293--302},
  year         = {2011},
  url          = {https://doi.org/10.1007/s13389-011-0023-x},
  doi          = {10.1007/S13389-011-0023-X},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/HospodarGMVV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/FanGMSPV10,
  author       = {Junfeng Fan and
                  Xu Guo and
                  Elke De Mulder and
                  Patrick Schaumont and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  editor       = {Jim Plusquellic and
                  Ken Mai},
  title        = {State-of-the-art of Secure {ECC} Implementations: {A} Survey on Known
                  Side-channel Attacks and Countermeasures},
  booktitle    = {{HOST} 2010, Proceedings of the 2010 {IEEE} International Symposium
                  on Hardware-Oriented Security and Trust (HOST), 13-14 June 2010, Anaheim
                  Convention Center, California, {USA}},
  pages        = {76--87},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/HST.2010.5513110},
  doi          = {10.1109/HST.2010.5513110},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/FanGMSPV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/daglib/p/KnezevicBMFGLMV10,
  author       = {Miroslav Knezevic and
                  Lejla Batina and
                  Elke De Mulder and
                  Junfeng Fan and
                  Benedikt Gierlichs and
                  Yong Ki Lee and
                  Roel Maes and
                  Ingrid Verbauwhede},
  editor       = {Shuvra S. Bhattacharyya and
                  Ed F. Deprettere and
                  Rainer Leupers and
                  Jarmo Takala},
  title        = {Signal Processing for Cryptography and Security Applications},
  booktitle    = {Handbook of Signal Processing Systems},
  pages        = {161--177},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-6345-1\_7},
  doi          = {10.1007/978-1-4419-6345-1\_7},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/daglib/p/KnezevicBMFGLMV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ddecs/MulderAPVV09,
  author       = {Elke De Mulder and
                  Wim Aerts and
                  Bart Preneel and
                  Ingrid Verbauwhede and
                  Guy A. E. Vandenbosch},
  title        = {Case Study : {A} class {E} power amplifier for {ISO-14443A}},
  booktitle    = {Proceedings of the 2009 {IEEE} Symposium on Design and Diagnostics
                  of Electronic Circuits and Systems, {DDECS} 2009, April 15-17, 2009,
                  Liberec, Czech Republic},
  pages        = {20--23},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/DDECS.2009.5012091},
  doi          = {10.1109/DDECS.2009.5012091},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ddecs/MulderAPVV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecctd/GierlichsMPV09,
  author       = {Benedikt Gierlichs and
                  Elke De Mulder and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  title        = {Empirical comparison of side channel analysis distinguishers on {DES}
                  in hardware},
  booktitle    = {19th European Conference on Circuit Theory and Design, {ECCTD} 2009,
                  Antalya, Turkey, August 23-27, 2009},
  pages        = {391--394},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ECCTD.2009.5275003},
  doi          = {10.1109/ECCTD.2009.5275003},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecctd/GierlichsMPV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/MulderGPV09,
  author       = {Elke De Mulder and
                  Benedikt Gierlichs and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  title        = {Practical {DPA} attacks on {MDPL}},
  booktitle    = {First {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2009, London, UK, December 6-9, 2009},
  pages        = {191--195},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WIFS.2009.5386455},
  doi          = {10.1109/WIFS.2009.5386455},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/MulderGPV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MulderGPV09,
  author       = {Elke De Mulder and
                  Benedikt Gierlichs and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  title        = {Practical {DPA} Attacks on {MDPL}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {231},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/231},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MulderGPV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/MulderOPV07,
  author       = {Elke De Mulder and
                  Siddika Berna {\"{O}}rs and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  title        = {Differential power and electromagnetic attacks on a {FPGA} implementation
                  of elliptic curve cryptosystems},
  journal      = {Comput. Electr. Eng.},
  volume       = {33},
  number       = {5-6},
  pages        = {367--382},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.compeleceng.2007.05.009},
  doi          = {10.1016/J.COMPELECENG.2007.05.009},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/MulderOPV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/glvlsi/SakiyamaMPV07,
  author       = {Kazuo Sakiyama and
                  Elke De Mulder and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  editor       = {Hai Zhou and
                  Enrico Macii and
                  Zhiyuan Yan and
                  Yehia Massoud},
  title        = {Side-channel resistant system-level design flow for public-key cryptography},
  booktitle    = {Proceedings of the 17th {ACM} Great Lakes Symposium on {VLSI} 2007,
                  Stresa, Lago Maggiore, Italy, March 11-13, 2007},
  pages        = {144--147},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1228784.1228822},
  doi          = {10.1145/1228784.1228822},
  timestamp    = {Wed, 16 Aug 2023 21:16:32 +0200},
  biburl       = {https://dblp.org/rec/conf/glvlsi/SakiyamaMPV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/SakiyamaMPV06,
  author       = {Kazuo Sakiyama and
                  Elke De Mulder and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  title        = {A Parallel Processing Hardware Architecture for Elliptic Curve Cryptosystems},
  booktitle    = {2006 {IEEE} International Conference on Acoustics Speech and Signal
                  Processing, {ICASSP} 2006, Toulouse, France, May 14-19, 2006},
  pages        = {904--907},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICASSP.2006.1660801},
  doi          = {10.1109/ICASSP.2006.1660801},
  timestamp    = {Mon, 22 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icassp/SakiyamaMPV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics