Follow
Lauren De Meyer
Lauren De Meyer
Rambus Cryptography Research
Verified email at esat.kuleuven.be - Homepage
Title
Cited by
Cited by
Year
BBQ: using AES in picnic signatures
CD de Saint Guilhem, L De Meyer, E Orsini, NP Smart
International Conference on Selected Areas in Cryptography, 669-692, 2019
562019
CAPA: The Spirit of Beaver against Physical Attacks
O Reparaz, L De Meyer, B Bilgin, V Arribas, S Nikova, V Nikov, N Smart
https://eprint.iacr.org/2017/1195.pdf, 2017
542017
M&M: Masks and macs against physical attacks
L De Meyer, V Arribas Abril, S Nikova, V Nikov, V Rijmen
IACR Transactions on Cryptographic Hardware and Embedded Systems 2019 (1), 25-50, 2018
472018
Multiplicative masking for AES in hardware
L De Meyer, O Reparaz, B Bilgin
IACR Transactions on Cryptographic Hardware and Embedded Systems, 431-468, 2018
452018
Low AND depth and efficient inverses: a guide on s-boxes for low-latency masking
B Bilgin, L De Meyer, S Duval, I Levi, FX Standaert
IACR Transactions on Symmetric Cryptology 2020 (1), 144-184, 2020
352020
Spin me right round rotational symmetry for FPGA-specific AES: Extended version
F Wegener, L De Meyer, A Moradi
Journal of Cryptology 33, 1114-1155, 2020
262020
Consolidating security notions in hardware masking
L De Meyer, B Bilgin, O Reparaz
IACR Transactions on Cryptographic Hardware and Embedded Systems, 119-147, 2019
252019
On the effect of the (micro) architecture on the development of side-channel resistant software
L De Meyer, E De Mulder, M Tunstall
Cryptology ePrint Archive, 2020
202020
First-order masking with only two random bits
H Gross, K Stoffelen, L De Meyer, M Krenn, S Mangard
Proceedings of ACM Workshop on Theory of Implementation Security Workshop, 10-23, 2019
172019
Spin me right round: Rotational symmetry for FPGA-specific AES
F Wegener, L De Meyer, A Moradi
Cryptology ePrint Archive, 2019
162019
Classification of balanced quadratic functions
L De Meyer, B Bilgin
Cryptology ePrint Archive, 2018
122018
DES S-box generator
L De Meyer, S Vaudenay
Cryptologia 41 (2), 153-171, 2017
112017
Recovering the CTR_DRBG state in 256 traces
L De Meyer
IACR Transactions on Cryptographic Hardware and Embedded Systems, 37-65, 2020
102020
Trade-offs in Protecting Keccak Against Combined Side-Channel and Fault Attacks
A Purnal, V Arribas, L De Meyer
Constructive Side-Channel Analysis and Secure Design: 10th International …, 2019
82019
Cryptography in the presence of physical attacks: Design, implementation and analysis
L De Meyer
42020
Extended Analysis of DES S-boxes
L De Meyer, B Bilgin, B Preneel
34th WIC Symposium on Information Theory in the Benelux 2013, 140-146, 2013
42013
Looking at the NIST lightweight candidates from a masking point-of-view
L De Meyer
Cryptology ePrint Archive, 2020
22020
A note on masking generic Boolean functions
L De Meyer, F Wegener, A Moradi
Cryptology ePrint Archive, 2019
22019
More Constructions for strong 8-bit S-boxes with efficient masking in hardware
L De Meyer, K Varici, E IMEC-COSIC
38th Symposium on Information Theory in the Benelux, 2017
22017
Revisiting the Generation of DES-Like S-boxes
L De Meyer, B Bilgin, B Preneel
Proceedings of the 34th Symposium on Information Theory in the Benelux …, 2013
22013
The system can't perform the operation now. Try again later.
Articles 1–20