default search action
Josep Balasch
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Dilip Kumar S. V., Siemen Dhooghe, Josep Balasch, Benedikt Gierlichs, Ingrid Verbauwhede:
Time Sharing - A Novel Approach to Low-Latency Masking. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(3): 249-272 (2024) - [c27]Songqiao Cui, Josep Balasch:
Configurable Loop Shuffling via Instruction Set Extensions. ASAP 2024: 45-53 - [i8]Dilip S. V. Kumar, Siemen Dhooghe, Josep Balasch, Benedikt Gierlichs, Ingrid Verbauwhede:
Time Sharing - A Novel Approach to Low-Latency Masking. IACR Cryptol. ePrint Arch. 2024: 925 (2024) - 2023
- [c26]Kazuki Monta, Makoto Nagata, Josep Balasch, Ingrid Verbauwhede:
On the Unpredictability of SPICE Simulations for Side-Channel Leakage Verification of Masked Cryptographic Circuits. DAC 2023: 1-6 - [c25]Songqiao Cui, Josep Balasch:
Efficient Software Masking of AES through Instruction Set Extensions. DATE 2023: 1-6 - [c24]Dilip S. V. Kumar, Josep Balasch, Benedikt Gierlichs, Ingrid Verbauwhede:
Low-Cost First-Order Secure Boolean Masking in Glitchy Hardware. DATE 2023: 1-2 - 2022
- [e1]Josep Balasch, Colin O'Flynn:
Constructive Side-Channel Analysis and Secure Design - 13th International Workshop, COSADE 2022, Leuven, Belgium, April 11-12, 2022, Proceedings. Lecture Notes in Computer Science 13211, Springer 2022, ISBN 978-3-030-99765-6 [contents] - 2021
- [j8]Michiel Van Beirendonck, Jan-Pieter D'Anvers, Angshuman Karmakar, Josep Balasch, Ingrid Verbauwhede:
A Side-Channel-Resistant Implementation of SABER. ACM J. Emerg. Technol. Comput. Syst. 17(2): 10:1-10:26 (2021) - 2020
- [j7]Danilo Sijacic, Josep Balasch, Bohan Yang, Santosh Ghosh, Ingrid Verbauwhede:
Towards efficient and automated side-channel evaluations at design time. J. Cryptogr. Eng. 10(4): 305-319 (2020) - [j6]Petr Socha, Jan Brejník, Josep Balasch, Martin Novotný, Nele Mentens:
Side-channel countermeasures utilizing dynamic logic reconfiguration: Protecting AES/Rijndael and Serpent encryption in hardware. Microprocess. Microsystems 78: 103208 (2020) - [c23]Danilo Sijacic, Josep Balasch, Ingrid Verbauwhede:
Sweeping for Leakage in Masked Circuit Layouts. DATE 2020: 915-920 - [i7]Michiel Van Beirendonck, Jan-Pieter D'Anvers, Angshuman Karmakar, Josep Balasch, Ingrid Verbauwhede:
A Side-Channel Resistant Implementation of SABER. IACR Cryptol. ePrint Arch. 2020: 733 (2020)
2010 – 2019
- 2019
- [c22]Arthur Beckers, Masahiro Kinugawa, Yu-ichi Hayashi, Daisuke Fujimoto, Josep Balasch, Benedikt Gierlichs, Ingrid Verbauwhede:
Design Considerations for EM Pulse Fault Injection. CARDIS 2019: 176-192 - 2018
- [j5]Wouter Biesmans, Josep Balasch, Alfredo Rial, Bart Preneel, Ingrid Verbauwhede:
Private Mobile Pay-TV From Priced Oblivious Transfer. IEEE Trans. Inf. Forensics Secur. 13(2): 280-291 (2018) - [c21]Dilip S. V. Kumar, Arthur Beckers, Josep Balasch, Benedikt Gierlichs, Ingrid Verbauwhede:
An In-Depth and Black-Box Characterization of the Effects of Laser Pulses on ATmega328P. CARDIS 2018: 156-170 - [c20]Danilo Sijacic, Josep Balasch, Bohan Yang, Santosh Ghosh, Ingrid Verbauwhede:
Towards Efficient and Automated Side Channel Evaluations at Design Time. PROOFS 2018: 16-31 - [c19]Josep Balasch, Florent Bernard, Viktor Fischer, Milos Grujic, Marek Laban, Oto Petura, Vladimir Rozic, Gerard van Battum, Ingrid Verbauwhede, Marnix Wakker, Bohan Yang:
Design and testing methodologies for true random number generators towards industry certification. ETS 2018: 1-10 - [c18]Josep Balasch, Arthur Beckers, Dusan Bozilov, Sujoy Sinha Roy, Furkan Turan, Ingrid Verbauwhede:
Teaching HW/SW codesign with a Zynq ARM/FPGA SoC. EWME 2018: 63-66 - [c17]Maxime Madau, Michel Agoyan, Josep Balasch, Milos Grujic, Patrick Haddad, Philippe Maurine, Vladimir Rozic, Dave Singelée, Bohan Yang, Ingrid Verbauwhede:
The Impact of Pulsed Electromagnetic Fault Injection on True Random Number Generators. FDTC 2018: 43-48 - 2017
- [c16]Josep Balasch, Sebastian Faust, Benedikt Gierlichs, Clara Paglialonga, François-Xavier Standaert:
Consolidating Inner Product Masking. ASIACRYPT (1) 2017: 724-754 - [c15]Oscar Reparaz, Josep Balasch, Ingrid Verbauwhede:
Dude, is my code constant time? DATE 2017: 1697-1702 - [i6]Josep Balasch, Sebastian Faust, Benedikt Gierlichs, Clara Paglialonga, François-Xavier Standaert:
Consolidating Inner Product Masking. IACR Cryptol. ePrint Arch. 2017: 1047 (2017) - 2016
- [c14]Kimmo Järvinen, Josep Balasch:
Single-Trace Side-Channel Attacks on Scalar Multiplications with Precomputations. CARDIS 2016: 137-155 - [c13]Arthur Beckers, Josep Balasch, Benedikt Gierlichs, Ingrid Verbauwhede:
Design and Implementation of a Waveform-Matching Based Triggering System. COSADE 2016: 184-198 - [c12]Yang Cao, Vladimir Rozic, Bohan Yang, Josep Balasch, Ingrid Verbauwhede:
Exploring active manipulation attacks on the TERO random number generator. MWSCAS 2016: 1-4 - [i5]Oscar Reparaz, Josep Balasch, Ingrid Verbauwhede:
Dude, is my code constant time? IACR Cryptol. ePrint Arch. 2016: 1123 (2016) - 2015
- [j4]Marijn Scheir, Josep Balasch, Alfredo Rial, Bart Preneel, Ingrid Verbauwhede:
Anonymous Split E-Cash - Toward Mobile Anonymous Payments. ACM Trans. Embed. Comput. Syst. 14(4): 85:1-85:25 (2015) - [c11]Josep Balasch, Benedikt Gierlichs, Oscar Reparaz, Ingrid Verbauwhede:
DPA, Bitslicing and Masking at 1 GHz. CHES 2015: 599-619 - [c10]Josep Balasch, Sebastian Faust, Benedikt Gierlichs:
Inner Product Masking Revisited. EUROCRYPT (1) 2015: 486-510 - [c9]Ingrid Verbauwhede, Josep Balasch, Sujoy Sinha Roy, Anthony Van Herrewege:
24.1 Circuit challenges from cryptography. ISSCC 2015: 1-2 - [i4]Josep Balasch, Sebastian Faust, Benedikt Gierlichs:
Inner Product Masking Revisited. IACR Cryptol. ePrint Arch. 2015: 105 (2015) - [i3]Josep Balasch, Benedikt Gierlichs, Oscar Reparaz, Ingrid Verbauwhede:
DPA, Bitslicing and Masking at 1 GHz. IACR Cryptol. ePrint Arch. 2015: 727 (2015) - 2014
- [b1]Josep Balasch Masoliver:
Implementation Aspects of Security and Privacy in Embedded Design (Beveiliging en privacy in ingebedde systemen: implementatieaspecten). Katholieke Universiteit Leuven, Belgium, 2014 - [c8]Josep Balasch, Benedikt Gierlichs, Vincent Grosso, Oscar Reparaz, François-Xavier Standaert:
On the Cost of Lazy Engineering for Masked Software Implementations. CARDIS 2014: 64-81 - [i2]Josep Balasch, Benedikt Gierlichs, Vincent Grosso, Oscar Reparaz, François-Xavier Standaert:
On the Cost of Lazy Engineering for Masked Software Implementations. IACR Cryptol. ePrint Arch. 2014: 413 (2014) - 2013
- [j3]Leif Uhsadel, Markus Ullrich, Amitabh Das, Dusko Karaklajic, Josep Balasch, Ingrid Verbauwhede, Wim Dehaene:
Teaching HW/SW Co-Design With a Public Key Cryptography Application. IEEE Trans. Educ. 56(4): 478-483 (2013) - 2012
- [c7]Josep Balasch, Sebastian Faust, Benedikt Gierlichs, Ingrid Verbauwhede:
Theory and Practice of a Leakage Resilient Masking Scheme. ASIACRYPT 2012: 758-775 - [c6]Josep Balasch, Baris Ege, Thomas Eisenbarth, Benoît Gérard, Zheng Gong, Tim Güneysu, Stefan Heyse, Stéphanie Kerckhof, François Koeune, Thomas Plos, Thomas Pöppelmann, Francesco Regazzoni, François-Xavier Standaert, Gilles Van Assche, Ronny Van Keer, Loïc van Oldeneel tot Oldenzeel, Ingo von Maurich:
Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices. CARDIS 2012: 158-172 - [c5]Josep Balasch, Benedikt Gierlichs, Roel Verdult, Lejla Batina, Ingrid Verbauwhede:
Power Analysis of Atmel CryptoMemory - Recovering Keys from Secure EEPROMs. CT-RSA 2012: 19-34 - [c4]Roel Verdult, Flavio D. Garcia, Josep Balasch:
Gone in 360 Seconds: Hijacking with Hitag2. USENIX Security Symposium 2012: 237-252 - [i1]Josep Balasch, Baris Ege, Thomas Eisenbarth, Benoît Gérard, Zheng Gong, Tim Güneysu, Stefan Heyse, Stéphanie Kerckhof, François Koeune, Thomas Plos, Thomas Pöppelmann, Francesco Regazzoni, François-Xavier Standaert, Gilles Van Assche, Ronny Van Keer, Loïc van Oldeneel tot Oldenzeel, Ingo von Maurich:
Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices. IACR Cryptol. ePrint Arch. 2012: 507 (2012) - 2011
- [j2]Carmela Troncoso, George Danezis, Eleni Kosta, Josep Balasch, Bart Preneel:
PriPAYD: Privacy-Friendly Pay-As-You-Drive Insurance. IEEE Trans. Dependable Secur. Comput. 8(5): 742-755 (2011) - [j1]Alfredo Rial, Josep Balasch, Bart Preneel:
A Privacy-Preserving Buyer-Seller Watermarking Protocol Based on Priced Oblivious Transfer. IEEE Trans. Inf. Forensics Secur. 6(1): 202-212 (2011) - [c3]Josep Balasch, Benedikt Gierlichs, Ingrid Verbauwhede:
An In-depth and Black-box Characterization of the Effects of Clock Glitches on 8-bit MCUs. FDTC 2011: 105-114 - 2010
- [c2]Josep Balasch, Ingrid Verbauwhede, Bart Preneel:
An embedded platform for privacy-friendly road charging applications. DATE 2010: 867-872 - [c1]Josep Balasch, Alfredo Rial, Carmela Troncoso, Bart Preneel, Ingrid Verbauwhede, Christophe Geuens:
PrETP: Privacy-Preserving Electronic Toll Pricing. USENIX Security Symposium 2010: 63-78
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint