scispace - formally typeset
I

Ingrid Verbauwhede

Researcher at Katholieke Universiteit Leuven

Publications -  600
Citations -  23691

Ingrid Verbauwhede is an academic researcher from Katholieke Universiteit Leuven. The author has contributed to research in topics: Cryptography & Elliptic curve cryptography. The author has an hindex of 72, co-authored 575 publications receiving 21110 citations. Previous affiliations of Ingrid Verbauwhede include University of California & Massachusetts Institute of Technology.

Papers
More filters
Book ChapterDOI

Low-Overhead Implementation of a Soft Decision Helper Data Algorithm for SRAM PUFs

TL;DR: This work proposes the first HDA design using soft-decision information providing an implementation that occupies 44.8% less resources than previous proposals and can be reduced upto 58.4% due to the smaller entropy loss.
Journal ArticleDOI

Design and performance testing of a 2.29-GB/s Rijndael processor

TL;DR: This contribution describes the design and performance testing of an Advanced Encryption Standard (AES) compliant encryption chip that delivers 2.29 GB/s of encryption throughput at 56 mW of power consumption in a 0.18-/spl mu/m CMOS standard cell technology.
Proceedings ArticleDOI

Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors

TL;DR: Two ways in which programs that lack key-dependent control flow and key- dependent cache behavior can still leak timing information on modern x86 implementations such as the Intel Core 2 Duo are demonstrated, and defense mechanisms against them are proposed.
Book ChapterDOI

Consolidating Masking Schemes

TL;DR: It is shown that the Ishai–Sahai–Wagner private circuits construction is closely related to Threshold Implementations and the Trichina gate.
Proceedings Article

Sancus: low-cost trustworthy extensible networked devices with a zero-software trusted computing base

TL;DR: Sancus supports extensibility in the form of remote (even third-party) software installation on devices while maintaining strong security guarantees, and can remotely attest to a software provider that a specific software module is running uncompromised.