Zobrazeno 1 - 10
of 37
pro vyhledávání: '"Bilgin, Begül"'
Autor:
Bilgin, Begul
Generating functions are important tools that are used in many areas of mathematics and especially statistics. Besides analyzing the general structure of sequences and their asymptotic behavior
these functions, which can be roughly thought as th
these functions, which can be roughly thought as th
Externí odkaz:
http://etd.lib.metu.edu.tr/upload/12612437/index.pdf
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2018, Iss 1 (2018)
Glitches entail a great issue when securing a cryptographic implementation in hardware. Several masking schemes have been proposed in the literature that provide security even in the presence of glitches. The key property that allows this protection
Autor:
De Meyer, Lauren, Bilgin, Begül
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2019, Iss 2 (2019)
IACR Transactions on Symmetric Cryptology; Volume 2019, Issue 2; 169-192
IACR Transactions on Symmetric Cryptology; Volume 2019, Issue 2; 169-192
S-boxes, typically the only nonlinear part of a block cipher, are the heart of symmetric cryptographic primitives. They significantly impact the cryptographic strength and the implementation characteristics of an algorithm. Due to their simplicity, q
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::7650e3219bd93803c9891e046566a427
https://lirias.kuleuven.be/handle/123456789/642439
https://lirias.kuleuven.be/handle/123456789/642439
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2019, Iss 3 (2019)
In this paper, we revisit the security conditions of masked hardware implementations. We describe a new, succinct, information-theoretic condition called d-glitch immunity which is both necessary and sufficient for security in the presence of glitche
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::85fc3c73083c641cc039881ac4ee2546
https://lirias.kuleuven.be/handle/123456789/642437
https://lirias.kuleuven.be/handle/123456789/642437
Autor:
Bilgin, Begül, Gierlichs, Benedikt, Nikova, Svetla, Nikov, Ventzislav, Rijmen, Vincent, Sarkar, Palash, Iwata, Tetsu
Publikováno v:
Advances in Cryptology – ASIACRYPT 2014: 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, 326-343
STARTPAGE=326;ENDPAGE=343;TITLE=Advances in Cryptology – ASIACRYPT 2014
Lecture Notes in Computer Science ISBN: 9783662456071
ASIACRYPT (2)
STARTPAGE=326;ENDPAGE=343;TITLE=Advances in Cryptology – ASIACRYPT 2014
Lecture Notes in Computer Science ISBN: 9783662456071
ASIACRYPT (2)
Higher-order differential power analysis attacks are a serious threat for cryptographic hardware implementations. In particular, glitches in the circuit make it hard to protect the implementation with masking. The existing higher-order masking counte
Autor:
Andreeva, Elena, Bilgin, Begül, Bogdanov, Andrey, Luykx, Atul, Mennink, Bart, Mouha, Nicky, Yasuda, Kan, Cid, Carlos, Rechberger, Christian
Publikováno v:
Fast Software Encryption ISBN: 9783662467053
FSE
Fast Software Encryption: 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers, 168-186
STARTPAGE=168;ENDPAGE=186;TITLE=Fast Software Encryption
FSE
Fast Software Encryption: 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers, 168-186
STARTPAGE=168;ENDPAGE=186;TITLE=Fast Software Encryption
The domain of lightweight cryptography focuses on cryptographic algorithms for extremely constrained devices. It is very costly to avoid nonce reuse in such environments, because this requires either a hardware source of randomness, or non-volatile m
Autor:
Andreeva, Elena, Bilgin, Begül, Bogdanov, Andrey, Luykx, Atul, Mendel, Florian, Mennink, Bart, Mouha, Nicky, Wang, Qingju, Yasuda, Kan
Publikováno v:
DIAC 2015-Directions in Authenticated Ciphers
DIAC 2015-Directions in Authenticated Ciphers, Sep 2015, Singapore, Singapore
DIAC 2015-Directions in Authenticated Ciphers, Sep 2015, Singapore, Singapore
International audience; PRIMATEs are a family of permutation-based authenticated encryption algorithms for lightweight applications. They are currently under submission to the CAESAR competition. There are three PRIMATEs: the basic SpongeWrap-variant
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______212::5f7a755e28660f3a6bf1228abd76c14f
https://hal.inria.fr/hal-01241081
https://hal.inria.fr/hal-01241081
Autor:
Bilgin, Begül
Embedded devices are used pervasively in a wide range of applications some of which require cryptographic algorithms in order to provide security. Today’s standardized algorithms are secure in the black-box model where an adversary has access to se
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=narcis______::59c52fe51860cbae754ed4eeda0b816e
https://research.utwente.nl/en/publications/threshold-implementations(32d0c8a0-dd9b-46b2-b848-8b679a26835f).html
https://research.utwente.nl/en/publications/threshold-implementations(32d0c8a0-dd9b-46b2-b848-8b679a26835f).html
Autor:
Bilgin, Begül
status: published
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______1131::c2017fda56ac4a79d8a002ce588d272d
https://lirias.kuleuven.be/handle/123456789/481954
https://lirias.kuleuven.be/handle/123456789/481954