Tomer Ashur

ASM International (Belgium)Belgium

Computer Science · Physical Sciences

15h-index705citations71works1.02yr avg

Accepting Students?

No reports yet. Know if this professor is taking students?


Research Topics

Cryptographic Implementations and Security(50), Chaos-based Image/Signal Encryption(40), Coding theory and cryptography(38), Cryptography and Data Security(17), Physical Unclonable Functions (PUFs) and Hardware Security(5)

Publications71 total

The Computer Journal·2023· 1 citedOpen Access
Lecture notes in computer science·2023· 3 citedOpen Access
IEEE Open Journal of the Solid-State Circuits Society·2022· 15 citedOpen Access
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security·2022· 31 citedOpen Access
2022 IEEE Symposium on Computers and Communications (ISCC)·2022· 6 citedOpen Access
IET Information Security·2022· 13 citedOpen Access
Lirias (KU Leuven)·2021Open Access
IEEE Transactions on Aerospace and Electronic Systems·2021· 24 citedOpen Access
How to Backdoor a Cipher.
IACR Cryptology ePrint Archive·2021
Analysis and Recommendations for MAC and Key Lengths in Delayed Disclosure GNSS Authentication Protocols.
IACR Cryptology ePrint Archive·2021
Structural and Statistical Analysis of Multidimensional Linear Approximations of Random Functions and Permutations
IACR Cryptology ePrint Archive·2021
A New Framework for Garbled Circuits.
IACR Cryptology ePrint Archive·2021
TU/e Research Portal·2020· 61 citedOpen Access
page 1 of 4Next →

Frequent Co-authors

Orr Dunkelman(11), Yunwen Liu(8), Vincent Rijmen(8), Siemen Dhooghe(5), Alan Szepieniec(5), Mohammad Mahzoun(4), Liliya Kraleva(4), Raluca Posteuca(4), Abdelrahaman Aly(3), Eli Ben‐Sasson(3), Eduard Marin(3), Bart Preneel(3), Glenn De Witte(3), Adrián Ranea(3), Atul Luykx(2), Lennert Wouters(2), Benedikt Gierlichs(2), Dilara Toprakhisar(2), Jinyu Lu(2), Bing Sun(2)