Consolidating masking schemes O Reparaz, B Bilgin, S Nikova, B Gierlichs, I Verbauwhede Annual Cryptology Conference, 764-783, 2015 | 284 | 2015 |
Higher-order threshold implementations B Bilgin, B Gierlichs, S Nikova, V Nikov, V Rijmen International Conference on the Theory and Application of Cryptology and …, 2014 | 232 | 2014 |
Masking AES with d+ 1 Shares in Hardware T De Cnudde, O Reparaz, B Bilgin, S Nikova, V Nikov, V Rijmen International Conference on Cryptographic Hardware and Embedded Systems, 194-212, 2016 | 175 | 2016 |
A more efficient AES threshold implementation B Bilgin, B Gierlichs, S Nikova, V Nikov, V Rijmen International Conference on Cryptology in Africa, 267-284, 2014 | 168 | 2014 |
Threshold implementations of all 3× 3 and 4× 4 S-boxes B Bilgin, S Nikova, V Nikov, V Rijmen, G Stütz International Workshop on Cryptographic Hardware and Embedded Systems, 76-91, 2012 | 155 | 2012 |
Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware B Bilgin, A Bogdanov, M Knežević, F Mendel, Q Wang International Conference on Cryptographic Hardware and Embedded Systems, 142-158, 2013 | 152 | 2013 |
Trade-offs for threshold implementations illustrated on AES B Bilgin, B Gierlichs, S Nikova, V Nikov, V Rijmen IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2015 | 103 | 2015 |
Efficient and first-order DPA resistant implementations of Keccak B Bilgin, J Daemen, V Nikov, S Nikova, V Rijmen, G Van Assche International Conference on Smart Card Research and Advanced Applications …, 2013 | 92 | 2013 |
APE: Authenticated permutation-based encryption for lightweight cryptography E Andreeva, B Bilgin, A Bogdanov, A Luykx, B Mennink, N Mouha, ... International Workshop on Fast Software Encryption, 168-186, 2014 | 91 | 2014 |
Does Coupling Affect the Security of Masked Implementations? T De Cnudde, B Bilgin, B Gierlichs, V Nikov, S Nikova, V Rijmen International Workshop on Constructive Side-Channel Analysis and Secure …, 2017 | 87 | 2017 |
Threshold implementations of small S-boxes B Bilgin, S Nikova, V Nikov, V Rijmen, N Tokareva, V Vitkup Cryptography and Communications 7 (1), 3-33, 2015 | 81 | 2015 |
Higher-Order Threshold Implementation of the AES S-box T De Cnudde, B Bilgin, O Reparaz, V Nikov, S Nikova International Conference on Smart Card Research and Advanced Applications …, 2015 | 71 | 2015 |
PRIMATEs v2. 0 E Andreeva, B Bilgin, A Bogdanov, A Luykx, F Mendel, B Mennink, ... DIAC 2015-Directions in Authenticated Ciphers, 2015 | 62* | 2015 |
CAPA: The Spirit of Beaver Against Physical Attacks O Reparaz, L De Meyer, B Bilgin, V Arribas, S Nikova, V Nikov, N Smart Annual International Cryptology Conference, 121-151, 2018 | 52 | 2018 |
Threshold Implementations, As Countermeasure Against Higher-Order Differential Power Analysis (Cum Laude) B Bilgin Twente University Press, 2015 | 51* | 2015 |
Multiplicative Masking for AES in Hardware L De Meyer, O Reparaz, B Bilgin IACR Transactions on Cryptographic Hardware and Embedded Systems, 431-468, 2018 | 45 | 2018 |
Low-Latency Hardware Masking with Application to AES P Sasdrich, B Bilgin, M Hutter, ME Marson IACR Transactions on Cryptographic Hardware and Embedded Systems, 300-326, 2020 | 42 | 2020 |
Rhythmic Keccak: SCA security and low latency in hw V Arribas, B Bilgin, G Petrides, S Nikova, V Rijmen IACR Transactions on Cryptographic Hardware and Embedded Systems, 269-290, 2018 | 39 | 2018 |
Low and depth and efficient inverses: a guide on s-boxes for low-latency masking B Bilgin, L De Meyer, S Duval, I Levi, FX Standaert IACR Transactions on Symmetric Cryptology 2020 (1), 144-184, 2020 | 36 | 2020 |
Consolidating security notions in hardware masking L De Meyer, B Bilgin, O Reparaz IACR Transactions on Cryptographic Hardware and Embedded Systems, 119-147, 2019 | 26 | 2019 |