Design of symmetric-key primitives for advanced cryptographic protocols A Aly, T Ashur, E Ben-Sasson, S Dhooghe, A Szepieniec IACR Transactions on Symmetric Cryptology, 1-45, 2020 | 227 | 2020 |
MARVELlous: a STARK-friendly family of cryptographic primitives T Ashur, S Dhooghe Cryptology ePrint Archive, 2018 | 84 | 2018 |
Sepcar: A secure and privacy-enhancing protocol for car access provision I Symeonidis, A Aly, MA Mustafa, B Mennink, S Dhooghe, B Preneel Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017 | 46 | 2017 |
Rescue-prime: a standard specification (SoK) A Szepieniec, T Ashur, S Dhooghe Cryptology ePrint Archive, 2020 | 44 | 2020 |
My gadget just cares for me-how NINA can prove security against combined attacks S Dhooghe, S Nikova Topics in Cryptology–CT-RSA 2020: The Cryptographers’ Track at the RSA …, 2020 | 30 | 2020 |
Threshold implementations in the robust probing model S Dhooghe, S Nikova, V Rijmen Proceedings of ACM Workshop on Theory of Implementation Security Workshop, 30-37, 2019 | 24 | 2019 |
Cryptanalysis of masked ciphers: A not so random idea T Beyne, S Dhooghe, Z Zhang Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the …, 2020 | 18 | 2020 |
Cryptanalysis of efficient masked ciphers: applications to low latency T Beyne, S Dhooghe, A Moradi, AR Shahmirzadi IACR Transactions on Cryptographic Hardware and Embedded Systems, 679-721, 2022 | 16 | 2022 |
Threshold implementations in software: Micro-architectural leakages in algorithms J Gaspoz, S Dhooghe IACR Transactions on Cryptographic Hardware and Embedded Systems, 155-179, 2023 | 15 | 2023 |
Efficient Symmetric Primitives for Advanced Cryptographic Protocols (A Marvellous Contribution). A Aly, T Ashur, E Ben-Sasson, S Dhooghe, A Szepieniec | 13 | 2019 |
A low-randomness second-order masked AES T Beyne, S Dhooghe, A Ranea, D Šijačić International Conference on Selected Areas in Cryptography, 87-110, 2021 | 11 | 2021 |
Guarding the first order: The rise of AES maskings A Askeland, S Dhooghe, S Nikova, V Rijmen, Z Zhang International Conference on Smart Card Research and Advanced Applications …, 2022 | 8 | 2022 |
Second-order low-randomness d+ 1 hardware sharing of the AES S Dhooghe, AR Shahmirzadi, A Moradi Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 8 | 2022 |
An overview of the eight international olympiad in cryptography" Non-Stop University Crypto" A Gorodilova, N Tokareva, S Agievich, I Beterov, T Beyne, L Budaghyan, ... arXiv preprint arXiv:2204.11502, 2022 | 8 | 2022 |
Let’s tessellate: tiling for security against advanced probe and fault adversaries S Dhooghe, S Nikova Smart Card Research and Advanced Applications: 19th International Conference …, 2021 | 6 | 2021 |
An optimal universal construction for the threshold implementation of bijective S-boxes E Piccione, S Andreoli, L Budaghyan, C Carlet, S Dhooghe, S Nikova, ... IEEE Transactions on Information Theory 69 (10), 6700-6710, 2023 | 5 | 2023 |
Stati: Protecting against fault attacks using stable threshold implementations S Dhooghe, A Ovchinnikov, D Toprakhisar Cryptology ePrint Archive, 2023 | 4 | 2023 |
Low-latency and low-randomness second-order masked cubic functions AR Shahmirzadi, S Dhooghe, A Moradi IACR Transactions on Cryptographic Hardware and Embedded Systems, 113-152, 2023 | 4 | 2023 |
Resilient uniformity: applying resiliency in masking S Dhooghe, S Nikova Cryptography and Communications, 1-18, 2022 | 3 | 2022 |
The Random Fault Model S Dhooghe, S Nikova International Conference on Selected Areas in Cryptography, 191-212, 2023 | 2 | 2023 |