Benedikt Gierlichs

Research

Physical security of embedded cryptographic devices, Side Channel Analysis, Fault Analysis, Countermeasures, Secure system on chip design

In charge of

Starting from 10/2006 I am in charge of organising the Cosic seminar.

I am a TA for the courses H05E1A/2A Cryptography and Network Security, H05D9A/0A Cryptografie en netwerkbeveiliging, H03G5a Gevorderde methoden in cryptografie.

Biography

I’m currently postdoctoral fellow at the Flemish research foundation (FWO) and researcher in embedded security at Cosic. After finishing school in 1996, I first studied “Business Administration” at Cologne university until 10/2000. From then on, I studied “Engineering in IT-Security” at Ruhr-University Bochum and finally obtained my Diplom (MSc degree) in 3/2006.
During my studies, I carried out a 3-month internship at the ECIT institute of Queen’s University Belfast and a 6-month internship with the Security Technologies Department of Gemplus (Paris), where I wrote my master thesis.
After graduation, I carried out a 3-month internship with the Security Technologies Department of Gemplus (La Ciotat) and joined Cosic as a PhD student in 7/2006. I obtained my PhD degree in January 2011.

Publications

1. T. De Cnudde, B. Bilgin, B. Gierlichs, V. Nikov, S. Nikova, and V. Rijmen, "Does Coupling Affect the Security of Masked Implementations?," In Workshop on Constructive Side-Channel Analysis and Secure Design 2017, Lecture Notes in Computer Science LNCS 10348, S. Guilley (ed.), Springer-Verlag, 17 pages, 2017.
2. B. Gierlichs, and A. Poschmann, "Introduction to the CHES 2016 special issue," Journal of Cryptographic Engineering 7(2), pp. 97-98, 2017.
3. "Cryptographic Hardware and Embedded Systems - CHES 2016", Lecture Notes in Computer Science 9813, B. Gierlichs, and A. Poschmann (eds.), Springer-Verlag, 2016.
4. O. Reparaz, "Analysis and Design of Masking Schemes for Secure Cryptographic Implementations ," PhD thesis, KU Leuven, B. Gierlichs, and I. Verbauwhede (promotors), 209+20 pages, 2016.
5. A. Beckers, J. Balasch, B. Gierlichs, and I. Verbauwhede, "Design and implementation of a waveform-matching based triggering system," In Workshop on Constructive Side-Channel Analysis and Secure Design 2016, Lecture Notes in Computer Science 9689, E. Oswald, and F. Standaert (eds.), Springer-Verlag, pp. 184-198, 2016.
6. B. Gierlichs, "Security of embedded devices against physical attacks ," Privacy and Security in Smart Energy Grids (Dagstuhl Seminar), 2016.
7. J. Balasch, B. Gierlichs, O. Reparaz, and I. Verbauwhede, "DPA, Bitslicing and Masking at 1 GHz," In Cryptographic Hardware and Embedded Systems - CHES 2015, Lecture Notes in Computer Science 9293, T. Güneysu, and H. Handschuh (eds.), Springer-Verlag, pp. 599-619, 2015.
8. J. Balasch, B. Gierlichs, and I. Verbauwhede, "Electromagnetic Circuit Fingerprints for Hardware Trojan Detection," In International Symposium on Electromagnetic Compatibility, IEEE, pp. 246-251, 2015.
9. O. Reparaz, B. Bilgin, B. Gierlichs, S. Nikova, and I. Verbauwhede, "Consolidating Masking Schemes," In Advances in Cryptology - CRYPTO 2015, Lecture Notes in Computer Science 9215, R. Gennaro, and M. J. Robshaw (eds.), Springer-Verlag, pp. 764-783, 2015.
10. J. Balasch, S. Faust, and B. Gierlichs, "Inner Product Masking Revisited," In Advances in Cryptology - EUROCRYPT 2015, Lecture Notes in Computer Science 9056, M. Fischlin, and E. Oswald (eds.), Springer-Verlag, pp. 486-510 , 2015.
11. B. Bilgin, B. Gierlichs, V. Nikov, S. Nikova, and V. Rijmen, " Trade-offs for Threshold Implementations Illustrated on AES," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 34(7), pp. 1188-1200, 2015.
12. B. Bilgin, B. Gierlichs, S. Nikova, V. Nikov, and V. Rijmen, "Higher-Order Threshold Implementations," In Advances in Cryptology - ASIACRYPT 2014, Lecture Notes in Computer Science 8873, T. Iwata, and P. Sarkar (eds.), Springer-Verlag, pp. 326-343, 2014.
13. J. Balasch, B. Gierlichs, V. Grosso, O. Reparaz, and F. Standaert, "On the Cost of Lazy Engineering for Masked Software Implementations," In Smart Card Research and Advanced Applications - CARDIS 2014, Lecture Notes in Computer Science 8968, M. Joye, and A. Moradi (eds.), Springer-Verlag, pp. 64-81, 2014.
14. N. Smart, V. Rijmen, B. Gierlichs, K. G. Paterson, M. Stam, B. Warinschi, and G. Watson, "Algorithms, key size and parameters report - 2014," ENISA report, 108+5 pages, 2014.
15. J. Balasch, B. Gierlichs, K. Järvinen, and I. Verbauwhede, "Hardware/Software Co-Design Flavors of Elliptic Curve Scalar Multiplication," In International Symposium on Electromagnetic Compatibility, IEEE, pp. 758-763, 2014.
16. B. Bilgin, B. Gierlichs, V. Nikov, S. Nikova, and V. Rijmen, "A More Efficient AES Threshold Implementation," In Progress in Cryptology - AFRICACRYPT 2014, Lecture Notes in Computer Science 8469, D. Pointcheval, and D. Vergnaud (eds.), Springer-Verlag, pp. 267-284, 2014.
17. O. Reparaz, B. Gierlichs, and I. Verbauwhede, "A note on the use of margins to compare distinguishers," In Workshop on Constructive Side-Channel Analysis and Secure Design 2014, Lecture Notes in Computer Science 8622, E. Prouff (ed.), Springer-Verlag, pp. 1-8, 2014.
18. O. Reparaz, B. Gierlichs, and I. Verbauwhede, "Generic DPA attacks: curse or blessing?," In Workshop on Constructive Side-Channel Analysis and Secure Design 2014, Lecture Notes in Computer Science 8622, E. Prouff (ed.), Springer-Verlag, pp. 98-111, 2014.
19. "International Conference on Security, Privacy and Applied Cryptography Engineering", Lecture Notes in Computer Science 8204, B. Gierlichs, S. Guilley, and D. Mukhopadhyay (eds.), Springer-Verlag, 2013.
20. M. Knezevic, L. Batina, E. De Mulder, J. Fan, B. Gierlichs, Y. K. Lee, R. Maes, and I. Verbauwhede, "Signal Processing for Cryptography and Security Applications," In Handbook of Signal Processing Systems (2nd edition), S. S. Bhattacharyya, E. F. Deprettere, R. Leupers, and J. Takala (eds.), Springer, pp. 223-241, 2013.
See all publications