Publications
Chosen filters:
Chosen filters:
Revisiting a Methodology for Efficient CNN Architectures in Profiling Attacks. KU Leuven
This work provides a critical review of the paper by Zaid et al. titled“Methodology for Efficient CNN Architectures in Profiling attacks”, which was pub-lished in TCHES Volume 2020, Issue 1. This work studies the design of CNN networksto perform side-channel analysis of multiple implementations of the AES for embeddeddevices. Based on the authors’ code and public data sets, we were able to cross-checktheir results and perform a thorough ...
The Fifth International Students? Olympiad in cryptography?NSUCRYPTO: Problems and their solutions KU Leuven
Block-Anti-Circulant Unbalanced Oil and Vinegar KU Leuven
We introduce a new technique for compressing the public keys of the UOV signature scheme that makes use of block-anti-circulant matrices. These matrices admit a compact representation as for every block, the remaining elements can be inferred from the first row. This space saving translates to the public key, which as a result of this technique can be shrunk by a small integer factor. We propose parameters sets that take into account the most ...
Dismantling DST80-based Immobiliser Systems KU Leuven
Car manufacturers deploy vehicle immobiliser systems in order to prevent car theft. However, in many cases the underlying cryptographic primitives used to authenticate a transponder are proprietary in nature and thus not open to public scrutiny. In this paper we publish the proprietary Texas Instruments DST80 cipher used in immobilisers of several manufacturers. Additionally, we expose serious flaws in immobiliser systems of major car ...
Lay Down the Common Metrics: Evaluating Proof-of-Work Consensus Protocols' Security KU Leuven
Following Bitcoin's Nakamoto Consensus protocol (NC), hundreds of cryptocurrencies utilize proofs of work (PoW) to maintain their ledgers. However, research shows that NC fails to achieve perfect chain quality, allowing malicious miners to alter the public ledger in order to launch several attacks, i.e., selfish mining, double-spending and feather-forking. Some later designs, represented by Ethereum, Bitcoin-NG, DECOR+, Byzcoin and Publish or ...