Ingrid Verbauwhede

ORCID: 0000-0002-0879-076X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptographic Implementations and Security
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Chaos-based Image/Signal Encryption
  • Coding theory and cryptography
  • Cryptography and Residue Arithmetic
  • Cryptography and Data Security
  • Embedded Systems Design Techniques
  • Security and Verification in Computing
  • Advanced Malware Detection Techniques
  • Parallel Computing and Optimization Techniques
  • Integrated Circuits and Semiconductor Failure Analysis
  • Interconnection Networks and Systems
  • Neuroscience and Neural Engineering
  • VLSI and Analog Circuit Testing
  • Advanced Memory and Neural Computing
  • Advanced Authentication Protocols Security
  • RFID technology advancements
  • Cellular Automata and Applications
  • Advancements in PLL and VCO Technologies
  • Low-power high-performance VLSI design
  • User Authentication and Security Systems
  • Biometric Identification and Security
  • Advanced Wireless Communication Techniques
  • Quantum-Dot Cellular Automata
  • Radiation Effects in Electronics

KU Leuven
2016-2025

VIB-KU Leuven Center for Microbiology
2019-2024

IMEC
1991-2023

Imec the Netherlands
2017-2023

Massachusetts Institute of Technology
2014-2019

University of California, Berkeley
1994-2019

Institute of Electrical and Electronics Engineers
2006-2019

Analog Devices (United States)
2019

Meta (United States)
2019

Menlo School
2019

This paper describes a novel design methodology to implement secure DPA resistant crypto processor. The is suitable for integration in common automated standard cell ASIC or FPGA flow. technique combines building blocks make 'new' compound cells, which have close constant power consumption. Experimental results indicate 50 times reduction the consumption fluctuations.

10.5555/968878.969036 article EN Design, Automation, and Test in Europe 2004-02-16

This paper describes a novel design methodology to implement secure DPA resistant crypto processor. The is suitable for integration in common automated standard cell ASIC or FPGA flow. technique combines building blocks make 'new' compound cells, which have close constant power consumption. Experimental results indicate 50 times reduction the consumption fluctuations.

10.1109/date.2004.1268856 article EN Proceedings Design, Automation and Test in Europe Conference and Exhibition 2004-06-21

Security-critical products rely on the secrecy and integrity of their cryptographic keys. This is challenging for low-cost resource-constrained embedded devices, with an attacker having physical access to integrated circuit (IC). Physically, unclonable functions are emerging technology in this market. They extract bits from unavoidable IC manufacturing variations, remarkably analogous unique human fingerprints. However, post-processing by helper data algorithms (HDAs) indispensable meet...

10.1109/tcad.2014.2370531 article EN IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2014-11-24

We present a lightweight PUF-based authentication approach that is practical in settings where server authenticates device, and for use cases the number of authentications limited over device's lifetime. Our scheme uses server-managed challenge/response pair (CRP) lockdown protocol: unlike prior approaches, an adaptive chosen-challenge adversary with machine learning capabilities cannot obtain new CRPs without server's implicit permission. The faced problem deriving PUF model amount training...

10.1109/tmscs.2016.2553027 article EN IEEE Transactions on Multi-Scale Computing Systems 2016-04-11

RFID (Radio Frequency IDentification) tags need to include security functions, yet at the same time their resources are extremely limited. Moreover, provide privacy, authentication and protection against tracking of without loosing system scalability, a public-key based approach is inevitable, which shown by M. Burmester et al. In this paper, we present an architecture state-of-the-art processor for with Elliptic Curve (EC) over GF(2^163). It shows plausibility meeting both efficiency...

10.1109/tc.2008.148 article EN IEEE Transactions on Computers 2008-08-28

This paper presents the architecture of a fully pipelined AES encryption processor on single chip FPGA. By using loop unrolling and inner-round outer-round pipelining techniques, maximum throughput 21.54 Gbits/s is achieved. A fast an area efficient composite field implementation byte substitution phase designed optimum number pipeline stages for FPGA implementation. achieved 84 block RAMs 5177 slices VirtexII-Pro with latency 31 cycles per rate 4.2 Mbps/Slice.

10.1109/fccm.2004.1 article EN 2004-12-23

This contribution describes the design and performance testing of an Advanced Encryption Standard (AES) compliant encryption chip that delivers 2.29 GB/s throughput at 56 mW power consumption in a 0.18-μm CMOS standard cell technology. integrated circuit implements Rijndael algorithm, any combination block lengths (128, 192, or 25 bits) key 256 bits). We present architecture discuss optimizations. also measurement results were obtained from set 14 test samples this chip.

10.1109/jssc.2002.808300 article EN IEEE Journal of Solid-State Circuits 2003-03-01

RFID-tags are a new generation of bar-codes with added functionality. An emerging application is the use for anti-counterfeiting by embedding them into product. Public-key cryptography (PKC) offers an attractive solution to counterfeiting problem but whether publickey cryptosystem can be implemented on RFID tag or not remains unclear. In this paper, we investigate which PKC-based identification protocols useful these applications. We also discuss feasibility based elliptic curve (ECC) and...

10.1109/percomw.2007.98 article EN 2007-03-01

This paper studies and evaluates the extent to which automated compiler techniques can defend against timing-based side-channel attacks on modern x86 processors. We study how processors leak timing information through side-channels that relate control flow data flow. To eliminate key-dependent behavior related flow, we propose use of if-conversion in a backend, evaluate proof-of-concept prototype implementation. Furthermore, demonstrate two ways programs lack cache still implementations such...

10.1109/sp.2009.19 article EN 2009-05-01

This paper explores the area-throughput trade-off for an ASIC implementation of Advanced Encryption Standard (AES).Different pipelined implementations AES algorithm as well design decisions and area optimizations that lead to a low high throughput encryption processor are presented.With loop unrolling outer-round pipelining techniques, throughputs 30 Gbits/s 70 achievable in 0.18-m CMOS technology.Moreover, by composite field byte substitution phase (inner-round pipelining), consumption is...

10.1109/tc.2006.49 article EN IEEE Transactions on Computers 2006-03-22

In this paper we propose the idea of using soft decision information in helper data algorithms (HDA). We derive and verify a distribution for responses SRAM-based physically unclonable functions (PUFs) show that becomes available without loss min-entropy fuzzy secret. This significantly improves implementation overhead an SRAM PUF + HDA cryptographic key generation compared to previous constructions.

10.1109/isit.2009.5205263 article EN 2009-06-01
Coming Soon ...