Skip to main content

and
  1. No Access

    Article

    A novel, multi-active emollient for the prevention of acute radiation dermatitis in breast cancer patients: a randomized clinical trial

    To investigate the efficacy of a novel, multi-active emollient in preventing and managing acute radiation dermatitis (ARD) in breast cancer patients undergoing moderate hypofractionated (HF) radiotherapy (RT) ...

    Jolien Robijns, Leen Van Bever, Sanne Hermans, Marithé Claes in Supportive Care in Cancer (2023)

  2. No Access

    Chapter and Conference Paper

    Implementation of the AES-128 on Virtex-5 FPGAs

    This paper presents an updated implementation of the Advanced Encryption Standard (AES) on the recent **linx Virtex-5 FPGAs. We show how a modified slice structure in these reconfigurable hardware devices resu...

    Philippe Bulens, François-Xavier Standaert in Progress in Cryptology – AFRICACRYPT 2008 (2008)

  3. No Access

    Chapter and Conference Paper

    Fault Attacks on Public Key Elements: Application to DLP-Based Schemes

    Many cryptosystems suffer from fault attacks when implemented in physical devices such as smart cards. Fault attacks on secret key elements have successfully targeted many protocols relying on the Elliptic Cur...

    Chong Hee Kim, Philippe Bulens, Christophe Petit in Public Key Infrastructure (2008)

  4. Chapter and Conference Paper

    Collision Search for Elliptic Curve Discrete Logarithm over GF(2 m ) with FPGA

    In this last decade, Elliptic Curve Cryptography (ECC) has gained increasing acceptance in the industry and the academic community and has been the subject of several standards. This interest is mainly due to ...

    Guerric Meurice de Dormale, Philippe Bulens in Cryptographic Hardware and Embedded System… (2007)

  5. No Access

    Chapter and Conference Paper

    Efficient Modular Division Implementation

    Elliptic Curve Public Key Cryptosystems (ECPKC) are becoming increasingly popular for use in mobile appliances where bandwidth and chip area are strongly constrained. For the same level of security, ECPKC use ...

    Guerric Meurice de Dormale, Philippe Bulens in Field Programmable Logic and Application (2004)