Dr. Giacomo de Meulenaer

Disclaimer: This page refers to former member of the group. Validity or accuracy of the following information is thus not guaranteed in any way.

218

From 2006 to 2010, I was a research assistant in the UCL Crypto Group, within the Microelectronics Laboratory of the Université catholique de Louvain. I graduated as an electrical engineer in 2006.

I was involved in the project Cosmos (part of the Nanotic programme), which aimed to provide strong security to networks composed of resource-constrained wireless sensor nodes. My other main research interest was cryptanalysis with specialized hardware (FPGAs and ASICs).

My PhD thesis was done under the supervision of Prof. Jean-Jacques Quisquater, Prof. Oliver Pereira and Prof. François-Xavier Standaert. It is entitled "Understanding Power in Cryptography".

Address:Microelectronics Laboratory, Place du Levant, 3
Office:b.127.10
Voice:+32 (0) 10 47 91 64
Fax:+32 10 47 25 98
E-Mail:
BibTeX - de Meulenaer

Publications

Sébastien Canard, Iwen Coisel, Giacomo de Meulenaer, and Olivier Pereira. Group Signatures are Suitable for Constrained Devices, ICISC 2010, Lecture Notes in Computer Science (LNCS), Springer, December 2010 PDF BibTeX

Giacomo de Meulenaer, and François-Xavier Standaert. Stealthy Compromise of Wireless Sensor Nodes with Power Analysis Attacks, 2nd International Conference on Mobile Lightweight Wireless Systems (MOBILIGHT 2010), Springer's Lecture Notes of ICST - LNICST, May 2010 PDF BibTeX

Giacomo de Meulenaer, and François-Xavier Standaert. Stealthy Compromise of Wireless Sensor Nodes with Power Analysis Attacks, March 2010, Extended abstract of the poster presented at the third ACM conference on Wireless Network Security (WiSec ’10) PDF BibTeX

Nidal Aboudagga, Giacomo de Meulenaer, Mohamed Eltoweissy, and Jean-Jacques Quisquater. IMAPS: Imbricated Authentication Protocol Suite for Mobile Users and Groups, IEEE Conference on Local Computer Networks (LCN 2009), IEEE Computer Society, October 2009 PDF BibTeX

Daniel V. Bailey, Brian Baldwin, Lejla Batina, Daniel J. Bernstein, Peter Birkner, Joppe W. Bos, Gauthier van Damme, Giacomo de Meulenaer, Junfeng Fan, Frank Gurkaynak, Tim Güneysu, Thorsten Kleinjung, Tanja Lange, Nele Mentens, Christof Paar, Francesco Regazzoni, Peter Schwabe, and Leif Uhsadel. The Certicom Challenges ECC2-X, Workshop on Special Purpose Hardware for Attacking Cryptographic Systems (SHARCS'09), September 2009 PDF BibTeX

Giacomo de Meulenaer, Christophe Petit, and Jean-Jacques Quisquater. Hardware Implementations of a Variant of the Zémor-Tillich Hash Function: Can a Provably Secure Hash Function be very efficient ?, In Cryptology ePrint Archive, May 2009, Report 2009/229 PDF BibTeX

Giacomo de Meulenaer, François Gosset, François-Xavier Standaert, and Olivier Pereira. On the Energy Cost of Communications and Cryptography in Wireless Sensor Networks, (extended version), IEEE International Workshop on Security and Privacy in Wireless and Mobile Computing, Networking and Communications (SecPriWiMob'2008), pages 580 - 585, October 2008 PDF BibTeX

Giacomo de Meulenaer, François Gosset, François-Xavier Standaert, and Luc Vandendorpe. On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks, Twenty-ninth Symposium on Information Theory in the Benelux, May 2008 PDF BibTeX

Giacomo de Meulenaer, François Gosset, Guerric Meurice de Dormale, and Jean-Jacques Quisquater. Elliptic Curve Factorization Method : Towards Better Exploitation of Reconfigurable Hardware, Workshop on Special Purpose Hardware for Attacking Cryptographic Systems (SHARCS'07), September 2007 PDF BibTeX

Giacomo de Meulenaer, François Gosset, Guerric Meurice de Dormale, and Jean-Jacques Quisquater. Integer Factorization Based on Elliptic Curve Method: Towards Better Exploitation of Reconfigurable Hardware, IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM07), pages 197-207, IEEE Computer Society Press, April 2007 PDF BibTeX

Copyright Notice

(click here to expand/retract)