K
v
ire
.com
←
Back
Night
Docs
Library
Review
…
Author
Ingrid Verbauwhede
also known as I Verbauwhede, I. Verbauwhede, I.M. Verbauwhede
KU Leuven · University of Ulster · Indian Institute of Technology Kharagpur · Royal Military Academy
About this author
Works
706
Cited by
22,085
h-index
76
i10
367
ORCID ↗
Top papers
A dynamic and differential CMOS logic with signal independent power consumption to withstand differential power analysis on smart cards
Kris Tiri, Muhammad Akmal, Ingrid Verbauwhede
·
2002
·
European Solid-State Circuits Conference
↗ 518
A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation
Kris Tiri, Ingrid Verbauwhede
·
2004
·
Proceedings Design, Automation and Test in Europe Conference and Exhibition
↗ 467
Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions
Roel Maes, Ingrid Verbauwhede
·
2010
·
Information security and cryptography
↗ 463
spongent: A Lightweight Hash Function
Andrey Bogdanov, Miroslav Knežević, Gregor Leander, et al.
·
2011
·
Lecture notes in computer science
↗ 353
RECTANGLE: a bit-slice lightweight block cipher suitable for multiple platforms
Wentao Zhang, Zhenzhen Bao, Dongdai Lin, et al.
·
2015
·
Science China Information Sciences
↗ 335
OA
Machine learning in side-channel analysis: a first study
Gabriel Hospodar, Benedikt Gierlichs, Elke De Mulder, et al.
·
2011
·
Journal of Cryptographic Engineering
↗ 297
OA
Helper Data Algorithms for PUF-Based Key Generation: Overview and Analysis
Jeroen Delvaux, Dawu Gu, Dries Schellekens, et al.
·
2014
·
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
↗ 268
OA
PUFKY: A Fully Functional PUF-Based Cryptographic Key Generator
Roel Maes, Anthony Van Herrewege, Ingrid Verbauwhede
·
2012
·
Lecture notes in computer science
↗ 251
OA
Compact Ring-LWE Cryptoprocessor
Sujoy Sinha Roy, Fréderik Vercauteren, Nele Mentens, et al.
·
2014
·
Lecture notes in computer science
↗ 249
OA
PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon
Stefan Katzenbeisser, Ünal Koçabas, Vladimir Rožić, et al.
·
2012
·
Lecture notes in computer science
↗ 249
OA
CANAuth - A Simple, Backward Compatible Broadcast Authentication Protocol for CAN bus
Anthony Van Herrewege, Dave Singelée, Ingrid Verbauwhede
·
2011
·
Lirias (KU Leuven)
↗ 244
Elliptic-Curve-Based Security Processor for RFID
Yong Ki Lee, Kazuo Sakiyama, Lejla Batina, et al.
·
2008
·
IEEE Transactions on Computers
↗ 230
OA
Books
Lattice-Based Public-Key Cryptography in Hardware
2019
·
Springer
Secure integrated circuits and systems
2010
·
Springer
Cryptographic Hardware and Embedded Systems - CHES 2007
2007
·
Springer London, Limited