Revisiting a Methodology for Efficient CNN Architectures in Profiling Attacks L Wouters, V Arribas, B Gierlichs, B Preneel IACR Transactions on Cryptographic Hardware and Embedded Systems 2020 (3 …, 2020 | 269* | 2020 |
Fast, furious and insecure: Passive keyless entry and start systems in modern supercars L Wouters, E Marin, T Ashur, B Gierlichs, B Preneel IACR Transactions on Cryptographic Hardware and Embedded Systems 2019 (3), 66-85, 2019 | 66 | 2019 |
Side-channel analysis of lattice-based post-quantum cryptography: Exploiting polynomial multiplication C Mujdei, L Wouters, A Karmakar, A Beckers, JMB Mera, I Verbauwhede ACM Transactions on Embedded Computing Systems, 2022 | 57 | 2022 |
Dismantling DST80-based Immobiliser Systems L Wouters, J Van den Herrewegen, F D Garcia, D Oswald, B Gierlichs, ... IACR Transactions on Cryptographic Hardware and Embedded Systems 2020 (2 …, 2020 | 40 | 2020 |
My other car is your car: compromising the Tesla Model X keyless entry system. L Wouters, B Gierlichs, B Preneel IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021 (4), 149-172, 2021 | 35 | 2021 |
Provable Secure Software Masking in the Real-World A Beckers, L Wouters, B Gierlichs, B Preneel, I Verbauwhede International Workshop on Constructive Side-Channel Analysis and Secure …, 2022 | 20 | 2022 |
Semi-Automatic Locating of Cryptographic Operations in Side-Channel Traces J Trautmann, A Beckers, L Wouters, S Wildermann, I Verbauwhede, ... IACR Transactions on Cryptographic Hardware and Embedded Systems, 345-366, 2022 | 16 | 2022 |
Glitched on Earth by Humans: A Black-Box Security Evaluation of the SpaceX Starlink User Terminal L Wouters Black Hat USA 2022, 2022 | 4 | 2022 |
On the susceptibility of Texas Instruments SimpleLink platform microcontrollers to non-invasive physical attacks L Wouters, B Gierlichs, B Preneel International Workshop on Constructive Side-Channel Analysis and Secure …, 2022 | 4 | 2022 |
SPECTREM: Exploiting Electromagnetic Emanations During Transient Execution J De Meulemeester, A Purnal, L Wouters, A Beckers, I Verbauwhede 32nd USENIX Security Symposium (USENIX Security 23), 2023 | 1 | 2023 |
Energy and side-channel security evaluation of near-threshold cryptographic circuits in 28nm FD-SOI technology A Beckers, R Uytterhoeven, T Vandenabeele, J Vliegen, L Wouters, ... Proceedings of the 19th ACM International Conference on Computing Frontiers …, 2022 | 1 | 2022 |
An In-Depth Security Evaluation of the Nintendo DSi Gaming Console pcy Sluys, L Wouters, B Gierlichs, I Verbauwhede International Conference on Smart Card Research and Advanced Applications, 23-42, 2023 | | 2023 |