Nele Mentens
Nele Mentens
Leiden University and KU Leuven
Verified email at esat.kuleuven.be - Homepage
Title
Cited by
Cited by
Year
Public-key cryptography for RFID-tags
L Batina, J Guajardo, T Kerins, N Mentens, P Tuyls, I Verbauwhede
Fifth Annual IEEE International Conference on Pervasive Computing and …, 2007
2892007
Compact ring-LWE cryptoprocessor
SS Roy, F Vercauteren, N Mentens, DD Chen, I Verbauwhede
Cryptographic Hardware and Embedded Systems–CHES 2014, 371-391, 2014
1832014
Low-cost elliptic curve cryptography for wireless sensor networks
L Batina, N Mentens, K Sakiyama, B Preneel, I Verbauwhede
European Workshop on Security in Ad-hoc and Sensor Networks, 6-17, 2006
1732006
A systematic evaluation of compact hardware implementations for the Rijndael S-box
N Mentens, L Batina, B Preneel, I Verbauwhede
Cryptographers’ Track at the RSA Conference, 323-333, 2005
1442005
An elliptic curve processor suitable for RFID-tags
L Batina, J Guajardo, T Kerins, N Mentens, P Tuyls, I Verbauwhede
[Sl: sn], 2006
1352006
High-speed polynomial multiplication architecture for ring-LWE and SHE cryptosystems
DD Chen, N Mentens, F Vercauteren, SS Roy, RCC Cheung, D Pao, ...
IEEE Transactions on Circuits and Systems I: Regular Papers 62 (1), 157-166, 2014
912014
Energy, performance, area versus security trade-offs for stream ciphers
L Batina, J Lano, N Mentens, SB Ors, B Preneel, I Verbauwhede
Brugge:[Sn], 2004
752004
Breaking ECC2K-130.
DV Bailey, L Batina, DJ Bernstein, P Birkner, JW Bos, HC Chen, ...
IACR Cryptology ePrint Archive 2009, 541, 2009
622009
Dietary recommendations for lightweight block ciphers: power, energy and area analysis of recently developed architectures
L Batina, A Das, B Ege, EB Kavun, N Mentens, C Paar, I Verbauwhede, ...
International Workshop on Radio Frequency Identification: Security and …, 2013
592013
A compact FPGA-based architecture for elliptic curve cryptography over prime fields
J Vliegen, N Mentens, J Genoe, A Braeken, S Kubera, A Touhafi, ...
ASAP 2010-21st IEEE International Conference on Application-specific Systems …, 2010
582010
Power and fault analysis resistance in hardware through dynamic reconfiguration
N Mentens, B Gierlichs, I Verbauwhede
International Workshop on Cryptographic Hardware and Embedded Systems, 346-362, 2008
572008
An FPGA implementation of an elliptic curve processor GF(2^m)
N Mentens, SB Ors, B Preneel
Proceedings of the 14th ACM Great Lakes symposium on VLSI, 454-457, 2004
562004
SFINKS: A synchronous stream cipher for restricted hardware environments
A Braeken, J Lano, N Mentens, B Preneel, I Verbauwhede
SKEW-Symmetric Key Encryption Workshop 55, 72, 2005
55*2005
Power analysis of synchronous stream ciphers with resynchronization mechanism
J Lano, N Mentens, B Preneel, I Verbauwhede
International Journal of Intelligent Information Technology Application 1 (2 …, 2008
472008
Side-channel analysis and machine learning: A practical perspective
S Picek, A Heuser, A Jovic, SA Ludwig, S Guilley, D Jakobovic, ...
2017 International Joint Conference on Neural Networks (IJCNN), 4095-4102, 2017
462017
Side-channel analysis of lightweight ciphers: Does lightweight equal easy?
A Heuser, S Picek, S Guilley, N Mentens
International Workshop on Radio Frequency Identification: Security and …, 2016
37*2016
Secure and efficient coprocessor design for cryptographic applications on FPGAs
N Mentens
Tectonophysics 420 (3-4), 371-387, 2007
342007
Reconfigurable modular arithmetic logic unit for high-performance public-key cryptosystems
K Sakiyama, N Mentens, L Batina, B Preneel, I Verbauwhede
International Workshop on Applied Reconfigurable Computing, 347-357, 2006
342006
Time-memory trade-off attack on FPGA platforms: UNIX password cracking
N Mentens, L Batina, B Preneel, I Verbauwhede
International Workshop on Applied Reconfigurable Computing, 323-334, 2006
342006
Public-key cryptography on the top of a needle
L Batina, N Mentens, K Sakiyama, B Preneel, I Verbauwhede
2007 IEEE International Symposium on Circuits and Systems, 1831-1834, 2007
332007
The system can't perform the operation now. Try again later.
Articles 1–20