Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Elke De Mulder
@inproceedings{DBLP:conf/ets/0001AAB0MEGHHHK21, author = {Jaume Abella and Sergi Alcaide and Jens Anders and Francisco Bas and Steffen Becker and Elke De Mulder and Nourhan Elhamawy and Frank K. G{\"{u}}rkaynak and Helena Handschuh and Carles Hern{\'{a}}ndez and Michael Hutter and Leonidas Kosmidis and Ilia Polian and Matthias Sauer and Stefan Wagner and Francesco Regazzoni}, title = {Security, Reliability and Test Aspects of the {RISC-V} Ecosystem}, booktitle = {26th {IEEE} European Test Symposium, {ETS} 2021, Bruges, Belgium, May 24-28, 2021}, pages = {1--10}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ETS50041.2021.9465449}, doi = {10.1109/ETS50041.2021.9465449}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ets/0001AAB0MEGHHHK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/YaoTMKS20, author = {Yuan Yao and Michael Tunstall and Elke De Mulder and Anton Kochepasov and Patrick Schaumont}, editor = {Guido Marco Bertoni and Francesco Regazzoni}, title = {Augmenting Leakage Detection Using Bootstrapping}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 11th International Workshop, {COSADE} 2020, Lugano, Switzerland, April 1-3, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12244}, pages = {104--119}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-68773-1\_6}, doi = {10.1007/978-3-030-68773-1\_6}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cosade/YaoTMKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YaoTMKS20, author = {Yuan Yao and Michael Tunstall and Elke De Mulder and Anton Kochepasov and Patrick Schaumont}, title = {Augmenting Leakage Detection using Bootstrapping}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {508}, year = {2020}, url = {https://eprint.iacr.org/2020/508}, timestamp = {Wed, 27 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YaoTMKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MeyerMT20, author = {Lauren De Meyer and Elke De Mulder and Michael Tunstall}, title = {On the Effect of the (Micro)Architecture on the Development of Side-Channel Resistant Software}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1297}, year = {2020}, url = {https://eprint.iacr.org/2020/1297}, timestamp = {Fri, 30 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/MeyerMT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dac/MulderGH19, author = {Elke De Mulder and Samatha Gummalla and Michael Hutter}, title = {Protecting {RISC-V} against Side-Channel Attacks}, booktitle = {Proceedings of the 56th Annual Design Automation Conference 2019, {DAC} 2019, Las Vegas, NV, USA, June 02-06, 2019}, pages = {45}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3316781.3323485}, doi = {10.1145/3316781.3323485}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dac/MulderGH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dt/MulderES18, author = {Elke De Mulder and Thomas Eisenbarth and Patrick Schaumont}, title = {Identifying and Eliminating Side-Channel Leaks in Programmable Systems}, journal = {{IEEE} Des. Test}, volume = {35}, number = {1}, pages = {74--89}, year = {2018}, url = {https://doi.org/10.1109/MDAT.2017.2766166}, doi = {10.1109/MDAT.2017.2766166}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dt/MulderES18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GaleaMPT15, author = {Jake Longo and Elke De Mulder and Dan Page and Michael Tunstall}, editor = {Tim G{\"{u}}neysu and Helena Handschuh}, title = {SoC It to {EM:} ElectroMagnetic Side-Channel Attacks on a Complex System-on-Chip}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9293}, pages = {620--640}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48324-4\_31}, doi = {10.1007/978-3-662-48324-4\_31}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/GaleaMPT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaleaMPT15, author = {Jake Longo and Elke De Mulder and Daniel Page and Michael Tunstall}, title = {SoC it to {EM:} electromagnetic side-channel attacks on a complex system-on-chip}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {561}, year = {2015}, url = {http://eprint.iacr.org/2015/561}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaleaMPT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/MulderHMP14, author = {Elke De Mulder and Michael Hutter and Mark E. Marson and Peter Pearson}, title = {Using Bleichenbacher's solution to the hidden number problem to attack nonce leaks in 384-bit {ECDSA:} extended version}, journal = {J. Cryptogr. Eng.}, volume = {4}, number = {1}, pages = {33--45}, year = {2014}, url = {https://doi.org/10.1007/s13389-014-0072-z}, doi = {10.1007/S13389-014-0072-Z}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/MulderHMP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/MulderHMP13, author = {Elke De Mulder and Michael Hutter and Mark E. Marson and Peter Pearson}, editor = {Guido Bertoni and Jean{-}S{\'{e}}bastien Coron}, title = {Using Bleichenbacher"s Solution to the Hidden Number Problem to Attack Nonce Leaks in 384-Bit {ECDSA}}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8086}, pages = {435--452}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40349-1\_25}, doi = {10.1007/978-3-642-40349-1\_25}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/MulderHMP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/sps/KnezevicBMFGLMV13, author = {Miroslav Knezevic and Lejla Batina and Elke De Mulder and Junfeng Fan and Benedikt Gierlichs and Yong Ki Lee and Roel Maes and Ingrid Verbauwhede}, editor = {Shuvra S. Bhattacharyya and Ed F. Deprettere and Rainer Leupers and Jarmo Takala}, title = {Signal Processing for Cryptography and Security Applications}, booktitle = {Handbook of Signal Processing Systems}, pages = {223--241}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-1-4614-6859-2\_7}, doi = {10.1007/978-1-4614-6859-2\_7}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/reference/sps/KnezevicBMFGLMV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MulderHMP13, author = {Elke De Mulder and Michael Hutter and Mark E. Marson and Peter Pearson}, title = {Using Bleichenbacher's Solution to the Hidden Number Problem to Attack Nonce Leaks in 384-Bit {ECDSA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {346}, year = {2013}, url = {http://eprint.iacr.org/2013/346}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MulderHMP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/AertsBMMDIKPVV12, author = {Wim Aerts and Eli Biham and Dieter De Moitie and Elke De Mulder and Orr Dunkelman and Sebastiaan Indesteege and Nathan Keller and Bart Preneel and Guy A. E. Vandenbosch and Ingrid Verbauwhede}, title = {A Practical Attack on KeeLoq}, journal = {J. Cryptol.}, volume = {25}, number = {1}, pages = {136--157}, year = {2012}, url = {https://doi.org/10.1007/s00145-010-9091-9}, doi = {10.1007/S00145-010-9091-9}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/AertsBMMDIKPVV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/HospodarGMVV11, author = {Gabriel Hospodar and Benedikt Gierlichs and Elke De Mulder and Ingrid Verbauwhede and Joos Vandewalle}, title = {Machine learning in side-channel analysis: a first study}, journal = {J. Cryptogr. Eng.}, volume = {1}, number = {4}, pages = {293--302}, year = {2011}, url = {https://doi.org/10.1007/s13389-011-0023-x}, doi = {10.1007/S13389-011-0023-X}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/HospodarGMVV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/FanGMSPV10, author = {Junfeng Fan and Xu Guo and Elke De Mulder and Patrick Schaumont and Bart Preneel and Ingrid Verbauwhede}, editor = {Jim Plusquellic and Ken Mai}, title = {State-of-the-art of Secure {ECC} Implementations: {A} Survey on Known Side-channel Attacks and Countermeasures}, booktitle = {{HOST} 2010, Proceedings of the 2010 {IEEE} International Symposium on Hardware-Oriented Security and Trust (HOST), 13-14 June 2010, Anaheim Convention Center, California, {USA}}, pages = {76--87}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/HST.2010.5513110}, doi = {10.1109/HST.2010.5513110}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/FanGMSPV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/daglib/p/KnezevicBMFGLMV10, author = {Miroslav Knezevic and Lejla Batina and Elke De Mulder and Junfeng Fan and Benedikt Gierlichs and Yong Ki Lee and Roel Maes and Ingrid Verbauwhede}, editor = {Shuvra S. Bhattacharyya and Ed F. Deprettere and Rainer Leupers and Jarmo Takala}, title = {Signal Processing for Cryptography and Security Applications}, booktitle = {Handbook of Signal Processing Systems}, pages = {161--177}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-6345-1\_7}, doi = {10.1007/978-1-4419-6345-1\_7}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/daglib/p/KnezevicBMFGLMV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ddecs/MulderAPVV09, author = {Elke De Mulder and Wim Aerts and Bart Preneel and Ingrid Verbauwhede and Guy A. E. Vandenbosch}, title = {Case Study : {A} class {E} power amplifier for {ISO-14443A}}, booktitle = {Proceedings of the 2009 {IEEE} Symposium on Design and Diagnostics of Electronic Circuits and Systems, {DDECS} 2009, April 15-17, 2009, Liberec, Czech Republic}, pages = {20--23}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/DDECS.2009.5012091}, doi = {10.1109/DDECS.2009.5012091}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ddecs/MulderAPVV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecctd/GierlichsMPV09, author = {Benedikt Gierlichs and Elke De Mulder and Bart Preneel and Ingrid Verbauwhede}, title = {Empirical comparison of side channel analysis distinguishers on {DES} in hardware}, booktitle = {19th European Conference on Circuit Theory and Design, {ECCTD} 2009, Antalya, Turkey, August 23-27, 2009}, pages = {391--394}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ECCTD.2009.5275003}, doi = {10.1109/ECCTD.2009.5275003}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecctd/GierlichsMPV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/MulderGPV09, author = {Elke De Mulder and Benedikt Gierlichs and Bart Preneel and Ingrid Verbauwhede}, title = {Practical {DPA} attacks on {MDPL}}, booktitle = {First {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2009, London, UK, December 6-9, 2009}, pages = {191--195}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/WIFS.2009.5386455}, doi = {10.1109/WIFS.2009.5386455}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/MulderGPV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MulderGPV09, author = {Elke De Mulder and Benedikt Gierlichs and Bart Preneel and Ingrid Verbauwhede}, title = {Practical {DPA} Attacks on {MDPL}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {231}, year = {2009}, url = {http://eprint.iacr.org/2009/231}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MulderGPV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/MulderOPV07, author = {Elke De Mulder and Siddika Berna {\"{O}}rs and Bart Preneel and Ingrid Verbauwhede}, title = {Differential power and electromagnetic attacks on a {FPGA} implementation of elliptic curve cryptosystems}, journal = {Comput. Electr. Eng.}, volume = {33}, number = {5-6}, pages = {367--382}, year = {2007}, url = {https://doi.org/10.1016/j.compeleceng.2007.05.009}, doi = {10.1016/J.COMPELECENG.2007.05.009}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/MulderOPV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/glvlsi/SakiyamaMPV07, author = {Kazuo Sakiyama and Elke De Mulder and Bart Preneel and Ingrid Verbauwhede}, editor = {Hai Zhou and Enrico Macii and Zhiyuan Yan and Yehia Massoud}, title = {Side-channel resistant system-level design flow for public-key cryptography}, booktitle = {Proceedings of the 17th {ACM} Great Lakes Symposium on {VLSI} 2007, Stresa, Lago Maggiore, Italy, March 11-13, 2007}, pages = {144--147}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1228784.1228822}, doi = {10.1145/1228784.1228822}, timestamp = {Wed, 16 Aug 2023 21:16:32 +0200}, biburl = {https://dblp.org/rec/conf/glvlsi/SakiyamaMPV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/SakiyamaMPV06, author = {Kazuo Sakiyama and Elke De Mulder and Bart Preneel and Ingrid Verbauwhede}, title = {A Parallel Processing Hardware Architecture for Elliptic Curve Cryptosystems}, booktitle = {2006 {IEEE} International Conference on Acoustics Speech and Signal Processing, {ICASSP} 2006, Toulouse, France, May 14-19, 2006}, pages = {904--907}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ICASSP.2006.1660801}, doi = {10.1109/ICASSP.2006.1660801}, timestamp = {Mon, 22 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icassp/SakiyamaMPV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.