Midori: A Block Cipher for Low Energy S Banik, A Bogdanov, T Isobe, K Shibutani, H Hiwatari, T Akishita, ... International Conference on the Theory and Application of Cryptology and …, 2015 | 295 | 2015 |
Midori: A Block Cipher for Low Energy S Banik, A Bogdanov, T Isobe, K Shibutani, H Hiwatari, T Akishita, ... International Conference on the Theory and Application of Cryptology and …, 2015 | 295 | 2015 |
Stealthy dopant-level hardware trojans GT Becker, F Regazzoni, C Paar, WP Burleson International Conference on Cryptographic Hardware and Embedded Systems, 197-214, 2013 | 278 | 2013 |
Fresh re-keying: Security against side-channel and fault attacks for low-cost devices M Medwed, FX Standaert, J Großschädl, F Regazzoni International Conference on Cryptology in Africa, 279-296, 2010 | 145 | 2010 |
ALE: AES-based lightweight authenticated encryption A Bogdanov, F Mendel, F Regazzoni, V Rijmen, E Tischhauser International Workshop on Fast Software Encryption, 447-466, 2013 | 126 | 2013 |
Compact implementation and performance evaluation of block ciphers in ATtiny devices T Eisenbarth, Z Gong, T Güneysu, S Heyse, S Indesteege, S Kerckhof, ... International Conference on Cryptology in Africa, 172-187, 2012 | 116 | 2012 |
A first step towards automatic application of power analysis countermeasures AG Bayrak, F Regazzoni, P Brisk, FX Standaert, P Ienne 2011 48th ACM/EDAC/IEEE Design Automation Conference (DAC), 230-235, 2011 | 102 | 2011 |
Architecture and applications of a high resolution gated SPAD image sensor S Burri, Y Maruyama, X Michalet, F Regazzoni, C Bruschini, E Charbon Optics express 22 (14), 17573-17589, 2014 | 98 | 2014 |
The curse of class imbalance and conflicting metrics with machine learning for side-channel evaluations S Picek, A Heuser, A Jovic, S Bhasin, F Regazzoni IACR Transactions on Cryptographic Hardware and Embedded Systems 2019 (1), 1-29, 2019 | 80 | 2019 |
Sleuth: Automated verification of software power analysis countermeasures AG Bayrak, F Regazzoni, D Novo, P Ienne International Conference on Cryptographic Hardware and Embedded Systems, 293-310, 2013 | 79 | 2013 |
Countermeasures against fault attacks on software implemented AES: effectiveness and cost A Barenghi, L Breveglieri, I Koren, G Pelosi, F Regazzoni Proceedings of the 5th Workshop on Embedded Systems Security, 1-10, 2010 | 77 | 2010 |
Compact FPGA implementations of the five SHA-3 finalists S Kerckhof, F Durvaux, N Veyrat-Charvillon, F Regazzoni, ... International Conference on Smart Card Research and Advanced Applications …, 2011 | 76 | 2011 |
A survey on hardware trojan detection techniques S Bhasin, F Regazzoni 2015 IEEE International Symposium on Circuits and Systems (ISCAS), 2021-2024, 2015 | 75 | 2015 |
A design flow and evaluation framework for DPA-resistant instruction set extensions F Regazzoni, A Cevrero, FX Standaert, S Badel, T Kluter, P Brisk, ... International Workshop on Cryptographic Hardware and Embedded Systems, 205-219, 2009 | 72 | 2009 |
Breaking ECC2K-130. DV Bailey, L Batina, DJ Bernstein, P Birkner, JW Bos, HC Chen, ... IACR Cryptol. ePrint Arch. 2009, 541, 2009 | 66 | 2009 |
Exploring energy efficiency of lightweight block ciphers S Banik, A Bogdanov, F Regazzoni International Conference on Selected Areas in Cryptography, 178-194, 2015 | 65 | 2015 |
Stealthy dopant-level hardware trojans: extended version GT Becker, F Regazzoni, C Paar, WP Burleson Journal of Cryptographic Engineering 4 (1), 19-31, 2014 | 54 | 2014 |
FPGA implementations of the AES masked against power analysis attacks F Regazzoni, Y Wang, FX Standaert Proceedings of COSADE 2011, 56-66, 2011 | 54 | 2011 |
Post-quantum lattice-based cryptography implementations: A survey H Nejatollahi, N Dutt, S Ray, F Regazzoni, I Banerjee, R Cammarota ACM Computing Surveys (CSUR) 51 (6), 1-41, 2019 | 53 | 2019 |
Compact implementation and performance evaluation of hash functions in attiny devices J Balasch, B Ege, T Eisenbarth, B Gérard, Z Gong, T Güneysu, S Heyse, ... International Conference on Smart Card Research and Advanced Applications …, 2012 | 53 | 2012 |