2022 - Research.com Computer Science in Belgium Leader Award
2022 - Research.com Electronics and Electrical Engineering in Belgium Leader Award
2017 - Edward J. McCluskey Technical Achievement Award, IEEE Computer Society For pioneering contributions to design methodologies for tamper-resistant and secure electronic systems.
2013 - IEEE Fellow For contributions to design of secure integrated circuits and systems
Ingrid Verbauwhede focuses on Embedded system, Cryptography, Side channel attack, Computer security and Computer hardware. Her Embedded system study incorporates themes from Physical unclonable function, CMOS and Encryption, Advanced Encryption Standard. Her Cryptography research includes elements of Univariate, Theoretical computer science, Authentication and Key, Public-key cryptography.
Her work is dedicated to discovering how Side channel attack, Power analysis are connected with Routing and Logic gate and other disciplines. Her work on Elliptic curve cryptography, Security service and Computer security model as part of general Computer security research is often related to Security testing, thus linking different fields of science. Her research integrates issues of Software and Logic level in her study of Computer hardware.
Ingrid Verbauwhede mostly deals with Embedded system, Cryptography, Field-programmable gate array, Computer security and Elliptic curve cryptography. Her study in Embedded system is interdisciplinary in nature, drawing from both Software, Encryption, Advanced Encryption Standard and Computer architecture. Ingrid Verbauwhede interconnects Key and Authentication in the investigation of issues within Cryptography.
Her work carried out in the field of Field-programmable gate array brings together such families of science as Algorithm, Random number generation, Application-specific integrated circuit and Parallel computing. The study incorporates disciplines such as Elliptic curve, Modular arithmetic and Arithmetic in addition to Elliptic curve cryptography. Her Side channel attack research is multidisciplinary, incorporating perspectives in CMOS and Power analysis.
Her primary areas of investigation include Field-programmable gate array, Random number generation, Cryptography, Embedded system and Algorithm. Her Field-programmable gate array study combines topics from a wide range of disciplines, such as Homomorphic encryption, Cloud computing and Parallel computing. Her research in Random number generation intersects with topics in Entropy, Computer hardware, Jitter and Ring oscillator.
Her work on Cryptographic protocol as part of general Cryptography study is frequently linked to Automotive industry, therefore connecting diverse disciplines of science. Her research investigates the connection between Embedded system and topics such as Software that intersect with issues in Encryption and Overhead. Her Timing attack study in the realm of Algorithm interacts with subjects such as Boolean expression.
Her primary areas of study are Algorithm, Lattice-based cryptography, Embedded system, Computer hardware and Timing attack. Her Algorithm research includes elements of Kernel and Leakage. Her research integrates issues of Key generation, Cryptography and Software in her study of Embedded system.
Her studies deal with areas such as Computer network and Security level as well as Cryptography. Her study in the field of Field-programmable gate array also crosses realms of Branching. Her Field-programmable gate array study combines topics in areas such as Polynomial ring, Computer architecture, Dimension and Parallel processing.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
A logic level design methodology for a secure DPA resistant ASIC or FPGA implementation
Kris Tiri;Ingrid Verbauwhede.
design, automation, and test in europe (2004)
A dynamic and differential CMOS logic with signal independent power consumption to withstand differential power analysis on smart cards
K. Tiri;M. Akmal;I. Verbauwhede.
european solid-state circuits conference (2002)
Physically Unclonable Functions: A Study on the State of the Art and Future Research Directions
Roel Maes;Ingrid Verbauwhede.
Towards Hardware-Intrinsic Security (2010)
Cryptographic Hardware and Embedded Systems - Ches 2007
Pascal Paillier;Ingrid Verbauwhede.
A 21.54 Gbits/s fully pipelined AES processor on FPGA
A. Hodjat;I. Verbauwhede.
field-programmable custom computing machines (2004)
Public-Key Cryptography for RFID-Tags
Lejla Batina;Jorge Guajardo;Tim Kerins;Nele Mentens.
pervasive computing and communications (2007)
Design and performance testing of a 2.29-GB/s Rijndael processor
I. Verbauwhede;P. Schaumont;H. Kuo.
IEEE Journal of Solid-state Circuits (2003)
SPONGENT: a lightweight hash function
Andrey Bogdanov;Miroslav Knežević;Gregor Leander;Deniz Toz.
cryptographic hardware and embedded systems (2011)
Elliptic-Curve-Based Security Processor for RFID
Yong Ki Lee;K. Sakiyama;L. Batina;I. Verbauwhede.
IEEE Transactions on Computers (2008)
PUFs: myth, fact or busted? a security evaluation of physically unclonable functions (PUFs) cast in silicon
Stefan Katzenbeisser;Ünal Kocabaş;Vladimir Rožić;Ahmad-Reza Sadeghi.
cryptographic hardware and embedded systems (2012)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: