scispace - formally typeset
R

Ruan de Clercq

Researcher at Katholieke Universiteit Leuven

Publications -  16
Citations -  529

Ruan de Clercq is an academic researcher from Katholieke Universiteit Leuven. The author has contributed to research in topics: Encryption & Elliptic curve cryptography. The author has an hindex of 10, co-authored 16 publications receiving 426 citations.

Papers
More filters
Journal ArticleDOI

Hardware-Based Trusted Computing Architectures for Isolation and Attestation

TL;DR: The security properties offered by twelve hardware-based attestation and isolation architectures from academia and industry are defined and compared, and all twelve designs are compared with respect to the security properties and architectural features they offer.
Proceedings ArticleDOI

Efficient software implementation of ring-LWE encryption

TL;DR: This paper presents the new state of the art in efficient software implementations of a post-quantum secure public-key encryption scheme based on the ring-LWE problem using a 32-bit ARM Cortex-M4F microcontroller as the target platform and shows that the scheme beats ECC-based public- key encryption schemes by at least one order of magnitude.
Proceedings ArticleDOI

SOFIA: Software and control flow integrity architecture

TL;DR: This paper is the first to propose a mechanism to enforce control flow integrity at the finest possible granularity and provides protection against code injection and code reuse attacks for microprocessors used in safety-critical systems.
Journal ArticleDOI

SOFIA: Software and control flow integrity architecture

TL;DR: This paper is the first to propose a mechanism to enforce control flow integrity at the finest possible granularity and provides protection against code injection and code reuse attacks for microprocessors used in safety-critical systems.
Posted Content

A survey of Hardware-based Control Flow Integrity (CFI).

TL;DR: This work presents a detailed analysis of the security policies enforced by 21 recent hardware-based CFI architectures to evaluate the security, limitations, hardware cost, performance, and practicality of using these policies.