I
Ingrid Verbauwhede
Researcher at Katholieke Universiteit Leuven
Publications - 600
Citations - 23691
Ingrid Verbauwhede is an academic researcher from Katholieke Universiteit Leuven. The author has contributed to research in topics: Cryptography & Elliptic curve cryptography. The author has an hindex of 72, co-authored 575 publications receiving 21110 citations. Previous affiliations of Ingrid Verbauwhede include University of California & Massachusetts Institute of Technology.
Papers
More filters
Cracking Unix Passwords using FPGA Platforms
TL;DR: SharCS - Special Purpose Hardware for Attacking Cryptographic Systems, February 24-25, Paris, 2005 : ECRYPT Workshop.
Journal ArticleDOI
High-Performance Ideal Lattice-Based Cryptography on 8-Bit AVR Microcontrollers
Zhe Liu,Thomas Pöppelmann,Tobias Oder,Hwajeong Seo,Sujoy Sinha Roy,Tim Güneysu,Johann Großschädl,Howon Kim,Ingrid Verbauwhede +8 more
TL;DR: This work evaluates and compares implementations of Ring-LWE encryption and the bimodal lattice signature scheme (BLISS) on an 8-bit Atmel ATxmega128 microcontroller and underline the feasibility of lattice-based cryptography on constrained devices.
Journal Article
Faster Pairing Coprocessor Architecture
TL;DR: A high-speed pairing coprocessor using Residue Number System (RNS) which is intrinsically suitable for parallel computation and which outperforms all reported hardware and software designs.
Book ChapterDOI
Lightweight Coprocessor for Koblitz Curves: 283-Bit ECC Including Scalar Conversion with only 4300 Gates
TL;DR: A lightweight coprocessor for 16-bit microcontrollers that implements high security elliptic curve cryptography that uses a 283-bit Koblitz curve and offers 140-bit security and includes countermeasures against side-channel attacks is proposed.
Proceedings ArticleDOI
TOTAL: TRNG on-the-fly testing for attack detection using Lightweight hardware
TL;DR: This is the first paper to address the design of on-the-fly tests based on the attack effects of entropy sources using an empirical design methodology consisting of two phases: collecting the data under attack and finding a useful statistical feature.