


default search action
Lejla Batina
Person information
- affiliation: Radboud University Nijmegen, Digital Security Group
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j35]Servio Paguada
, Lejla Batina
, Ileana Buhan, Igor Armendariz
:
Being Patient and Persistent: Optimizing An Early Stopping Strategy for Deep Learning in Profiled Attacks. IEEE Trans. Computers 74(3): 875-886 (2025) - [i66]Zhuoran Liu, Senna van Hoek, Péter Horváth, Dirk Lauret, Xiaoyun Xu, Lejla Batina:
Real-world Edge Neural Network Implementations Leak Private Interactions Through Physical Side Channel. CoRR abs/2501.14512 (2025) - [i65]Vahid Jahandideh, Bart Mennink, Lejla Batina:
Higher-Order Deterministic Masking with Application to Ascon. IACR Cryptol. ePrint Arch. 2025: 179 (2025) - [i64]Vahid Jahandideh, Bart Mennink, Lejla Batina:
A Decomposition Approach for Evaluating Security of Masking. IACR Cryptol. ePrint Arch. 2025: 270 (2025) - [i63]Vahid Jahandideh, Jan Schoone, Lejla Batina:
Clustering Approach for Higher-Order Deterministic Masking. IACR Cryptol. ePrint Arch. 2025: 273 (2025) - 2024
- [j34]Unai Rioja, Lejla Batina, Igor Armendariz, Jose Luis Flores:
Keep it unbiased: a comparison between estimation of distribution algorithms and deep learning for human interaction-free side-channel analysis. J. Cryptogr. Eng. 14(3): 499-511 (2024) - [j33]Azade Rezaeezade, Lejla Batina:
Regularizers to the rescue: fighting overfitting in deep learning-based side-channel analysis. J. Cryptogr. Eng. 14(4): 609-629 (2024) - [j32]Vahid Jahandideh, Bart Mennink, Lejla Batina:
An Algebraic Approach for Evaluating Random Probing Security With Application to AES. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(4): 657-689 (2024) - [c120]Péter Horváth, Lukasz Chmielewski, Leo Weissbart, Lejla Batina, Yuval Yarom:
CNN Architecture Extraction on Edge GPU. ACNS Workshops (1) 2024: 158-175 - [c119]Gabriele Serafini, Léo Weissbart, Lejla Batina:
Everything All at Once: Deep Learning Side-Channel Analysis Optimization Framework. ACNS Workshops (1) 2024: 195-212 - [c118]Asmita Adhikary, Abraham Basurto, Lejla Batina, Ileana Buhan, Joan Daemen, Silvia Mella, Nele Mentens
, Stjepan Picek, Durga Lakshmi Ramachandran, Abolfazl Sajadi
, Todor Stefanov, Dennis Vermoen, Nusa Zidaric
:
PROACT - Physical Attack Resistance of Cryptographic Algorithms and Circuits with Reduced Time to Market. ARC 2024: 255-266 - [c117]Omid Bazangani
, Alexandre Iooss
, Ileana Buhan
, Lejla Batina
:
ABBY: Automating leakage modelling for side-channel analysis. AsiaCCS 2024 - [c116]Lejla Batina
, Chip-Hong Chang
, Ulrich Rührmair
, Jakub Szefer
:
ASHES '24: Workshop on Attacks and Solutions in Hardware Security. CCS 2024: 4909-4910 - [c115]Omid Bazangani, Parisa Amiri-Eliasi, Stjepan Picek, Lejla Batina:
Can Machine Learn Pipeline Leakage? DATE 2024: 1-6 - [c114]Mahnaz Namazi Rizi, Nusa Zidaric, Lejla Batina, Nele Mentens
:
Optimised AES with RISC-V Vector Extensions. DDECS 2024: 57-60 - [c113]Parisa Amiri-Eliasi, Silvia Mella, Léo Weissbart, Lejla Batina, Stjepan Picek:
Xoodyak Under SCA Siege. DDECS 2024: 61-66 - [c112]Konstantina Miteloudi, Asmita Adhikary, Niels van Drueten, Lejla Batina, Ileana Buhan:
Plan Your Defense: A Comparative Analysis of Leakage Detection Methods on RISC-V Cores. SAMOS 2024: 139-151 - [c111]Péter Horváth, Dirk Lauret, Zhuoran Liu, Lejla Batina:
SoK: Neural Network Extraction Through Physical Side Channels. USENIX Security Symposium 2024 - [e18]Christina Pöpper
, Lejla Batina
:
Applied Cryptography and Network Security - 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part I. Lecture Notes in Computer Science 14583, Springer 2024, ISBN 978-3-031-54769-0 [contents] - [e17]Christina Pöpper
, Lejla Batina
:
Applied Cryptography and Network Security - 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part II. Lecture Notes in Computer Science 14584, Springer 2024, ISBN 978-3-031-54772-0 [contents] - [e16]Christina Pöpper
, Lejla Batina
:
Applied Cryptography and Network Security - 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part III. Lecture Notes in Computer Science 14585, Springer 2024, ISBN 978-3-031-54775-1 [contents] - [e15]Chip-Hong Chang, Ulrich Rührmair, Jakub Szefer, Lejla Batina, Francesco Regazzoni:
Proceedings of the 2024 Workshop on Attacks and Solutions in Hardware Security, ASHES 2024, Salt Lake City, UT, USA, October 14-18, 2024. ACM 2024, ISBN 979-8-4007-1235-7 [contents] - [i62]Péter Horváth, Lukasz Chmielewski, Leo Weissbart, Lejla Batina, Yuval Yarom:
CNN architecture extraction on edge GPU. CoRR abs/2401.13575 (2024) - [i61]Konstantina Miteloudi, Asmita Adhikary, Niels van Drueten, Lejla Batina, Ileana Buhan:
Plan your defense: A comparative analysis of leakage detection methods on RISC-V cores. IACR Cryptol. ePrint Arch. 2024: 423 (2024) - [i60]Asmita Adhikary, Abraham Basurto-Becerra, Lejla Batina, Ileana Buhan, Durba Chatterjee, Senna van Hoek, Eloi Sanfelix Gonzalez:
ARCHER: Architecture-Level Simulator for Side-Channel Analysis in RISC-V Processors. IACR Cryptol. ePrint Arch. 2024: 1866 (2024) - [i59]Asier Gambra, Durba Chatterjee, Unai Rioja, Igor Armendariz, Lejla Batina:
Machine Learning-Based Detection of Glitch Attacks in Clock Signal Data. IACR Cryptol. ePrint Arch. 2024: 1939 (2024) - 2023
- [j31]Stjepan Picek
, Guilherme Perin
, Luca Mariot
, Lichao Wu
, Lejla Batina
:
SoK: Deep Learning-based Physical Side-channel Analysis. ACM Comput. Surv. 55(11): 227:1-227:35 (2023) - [j30]Lejla Batina, Lukasz Chmielewski
, Björn Haase
, Niels Samwel, Peter Schwabe:
SoK: SCA-secure ECC in software - mission impossible? IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(1): 557-589 (2023) - [j29]Lichao Wu
, Léo Weissbart, Marina Krcek
, Huimin Li, Guilherme Perin, Lejla Batina
, Stjepan Picek
:
Label Correlation in Deep Learning-Based Side-Channel Analysis. IEEE Trans. Inf. Forensics Secur. 18: 3849-3861 (2023) - [c110]Lejla Batina
, Chip-Hong Chang
, Domenic Forte
, Ulrich Rührmair
:
ASHES '23: Workshop on Attacks and Solutions in Hardware Security. CCS 2023: 3664-3665 - [e14]Jianying Zhou
, Lejla Batina
, Zengpeng Li
, Jingqiang Lin
, Eleonora Losiouk
, Suryadipta Majumdar
, Daisuke Mashima
, Weizhi Meng
, Stjepan Picek
, Mohammad Ashiqur Rahman
, Jun Shao, Masaki Shimaoka
, Ezekiel O. Soremekun
, Chunhua Su
, Je Sen Teh
, Aleksei Udovenko
, Cong Wang
, Leo Yu Zhang
, Yury Zhauniarovich
:
Applied Cryptography and Network Security Workshops - ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings. Lecture Notes in Computer Science 13907, Springer 2023, ISBN 978-3-031-41180-9 [contents] - [e13]Chip-Hong Chang, Ulrich Rührmair, Lejla Batina, Domenic Forte:
Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware Security, ASHES 2023, Copenhagen, Denmark, 30 November 2023. ACM 2023 [contents] - [i58]Péter Horváth, Lukasz Chmielewski, Leo Weissbart, Lejla Batina, Yuval Yarom:
BarraCUDA: Bringing Electromagnetic Side Channel Into Play to Steal the Weights of Neural Networks from NVIDIA GPUs. CoRR abs/2312.07783 (2023) - [i57]Praveen Kulkarni, Vincent Verneuil, Stjepan Picek, Lejla Batina:
Order vs. Chaos: A Language Model Approach for Side-channel Attacks. IACR Cryptol. ePrint Arch. 2023: 1615 (2023) - 2022
- [j28]Lejla Batina, Shivam Bhasin
, Dirmanto Jap
, Stjepan Picek
:
SCA Strikes Back: Reverse-Engineering Neural Network Architectures Using Side Channels. IEEE Des. Test 39(4): 7-14 (2022) - [j27]Servio Paguada
, Lejla Batina
, Ileana Buhan, Igor Armendariz
:
Playing With Blocks: Toward Re-Usable Deep Learning Models for Side-Channel Profiled Attacks. IEEE Trans. Inf. Forensics Secur. 17: 2835-2847 (2022) - [j26]Unai Rioja
, Lejla Batina
, Igor Armendariz
, Jose Luis Flores
:
Towards Human Dependency Elimination: AI Approach to SCA Robustness Assessment. IEEE Trans. Inf. Forensics Secur. 17: 3906-3921 (2022) - [c109]Nicoleta-Norica Bacuieti, Lejla Batina, Stjepan Picek:
Deep Neural Networks Aiding Cryptanalysis: A Case Study of the Speck Distinguisher. ACNS 2022: 809-829 - [c108]Ileana Buhan, Lejla Batina, Yuval Yarom, Patrick Schaumont
:
SoK: Design Tools for Side-Channel-Aware Implementations. AsiaCCS 2022: 756-770 - [c107]Naila Mukhtar, Louiza Papachristodoulou, Apostolos P. Fournaris, Lejla Batina, Yinan Kong:
Machine-Learning Assisted Side-Channel Attacks on RNS ECC Implementations Using Hybrid Feature Engineering. COSADE 2022: 3-28 - [c106]Naila Mukhtar
, Lejla Batina, Stjepan Picek
, Yinan Kong:
Fake It Till You Make It: Data Augmentation Using Generative Adversarial Networks for All the Crypto You Need on Small Devices. CT-RSA 2022: 297-321 - [p7]Lejla Batina, Shivam Bhasin, Jakub Breier
, Xiaolu Hou
, Dirmanto Jap:
On Implementation-Level Security of Edge-Based Machine Learning Models. Security and Artificial Intelligence 2022: 335-359 - [e12]Jianying Zhou
, Sridhar Adepu
, Cristina Alcaraz
, Lejla Batina
, Emiliano Casalicchio
, Sudipta Chattopadhyay
, Chenglu Jin
, Jingqiang Lin
, Eleonora Losiouk
, Suryadipta Majumdar
, Weizhi Meng
, Stjepan Picek
, Jun Shao, Chunhua Su
, Cong Wang
, Yury Zhauniarovich
, Saman A. Zonouz:
Applied Cryptography and Network Security Workshops - ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings. Lecture Notes in Computer Science 13285, Springer 2022, ISBN 978-3-031-16814-7 [contents] - [e11]Lejla Batina
, Joan Daemen
:
Progress in Cryptology - AFRICACRYPT 2022: 13th International Conference on Cryptology in Africa, AFRICACRYPT 2022, Fes, Morocco, July 18-20, 2022, Proceedings. Lecture Notes in Computer Science 13503, Springer Nature Switzerland 2022, ISBN 978-3-031-17433-9 - [e10]Lejla Batina
, Stjepan Picek
, Mainack Mondal
:
Security, Privacy, and Applied Cryptography Engineering - 11th International Conference, SPACE 2021, Kolkata, India, December 10-13, 2021, Proceedings. Lecture Notes in Computer Science 13162, Springer 2022, ISBN 978-3-030-95084-2 [contents] - [e9]Lejla Batina
, Stjepan Picek
, Mainack Mondal
:
Security, Privacy, and Applied Cryptography Engineering - 12th International Conference, SPACE 2022, Jaipur, India, December 9-12, 2022, Proceedings. Lecture Notes in Computer Science 13783, Springer 2022, ISBN 978-3-031-22828-5 [contents] - [e8]Lejla Batina
, Thomas Bäck
, Ileana Buhan, Stjepan Picek
:
Security and Artificial Intelligence - A Crossdisciplinary Approach. Lecture Notes in Computer Science 13049, Springer 2022, ISBN 978-3-030-98794-7 [contents] - [i56]Ievgen Kabin, Zoya Dyka, Dan Klann, Nele Mentens, Lejla Batina, Peter Langendoerfer:
Breaking a fully Balanced ASIC Coprocessor Implementing Complete Addition Formulas on Weierstrass Elliptic Curves. CoRR abs/2201.01158 (2022) - [i55]Servio Paguada, Lejla Batina, Ileana Buhan, Igor Armendariz:
Playing with blocks: Toward re-usable deep learning models for side-channel profiled attacks. CoRR abs/2203.08448 (2022) - [i54]Nicoleta-Norica Bacuieti, Lejla Batina, Stjepan Picek:
Deep neural networks aiding cryptanalysis: A case study of the Speck distinguisher. IACR Cryptol. ePrint Arch. 2022: 341 (2022) - [i53]Lichao Wu, Leo Weissbart, Marina Krcek, Huimin Li, Guilherme Perin, Lejla Batina, Stjepan Picek:
AGE Is Not Just a Number: Label Distribution in Deep Learning-based Side-channel Analysis. IACR Cryptol. ePrint Arch. 2022: 1507 (2022) - [i52]Azade Rezaeezade, Lejla Batina:
Regularizers to the Rescue: Fighting Overfitting in Deep Learning-based Side-channel Analysis. IACR Cryptol. ePrint Arch. 2022: 1737 (2022) - 2021
- [j25]Servio Paguada
, Lejla Batina, Igor Armendariz
:
Toward practical autoencoder-based side-channel analysis evaluations. Comput. Networks 196: 108230 (2021) - [j24]Unai Rioja
, Lejla Batina, Jose Luis Flores
, Igor Armendariz
:
Auto-tune POIs: Estimation of distribution algorithms for efficient side-channel analysis. Comput. Networks 198: 108405 (2021) - [j23]Unai Rioja
, Servio Paguada
, Lejla Batina, Igor Armendariz
:
The Uncertainty of Side-channel Analysis: A Way to Leverage from Heuristics. ACM J. Emerg. Technol. Comput. Syst. 17(3): 40:1-40:27 (2021) - [j22]Guilherme Perin, Lukasz Chmielewski, Lejla Batina, Stjepan Picek:
Keep it Unsupervised: Horizontal Attacks Meet Deep Learning. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(1): 343-372 (2021) - [c105]Madura A. Shelton, Lukasz Chmielewski, Niels Samwel
, Markus Wagner, Lejla Batina, Yuval Yarom:
Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic Code. CCS 2021: 685-699 - [c104]Lejla Batina, Rosario Cammarota, Nele Mentens, Ahmad-Reza Sadeghi, Johanna Sepúlveda, Shaza Zeitouni:
Invited: Security Beyond Bulk Silicon: Opportunities and Challenges of Emerging Devices. DAC 2021: 1-4 - [c103]Unai Rioja
, Lejla Batina, Jose Luis Flores
, Igor Armendariz
:
Towards Automatic and Portable Data Loading Template Attacks on Microcontrollers. ISQED 2021: 437-443 - [c102]Zhuoran Liu, Niels Samwel, Leo Weissbart, Zhengyu Zhao, Dirk Lauret, Lejla Batina, Martha A. Larson:
Screen Gleaning: A Screen Reading TEMPEST Attack on Mobile Devices Exploiting an Electromagnetic Side Channel. NDSS 2021 - [c101]Madura A. Shelton, Niels Samwel, Lejla Batina, Francesco Regazzoni, Markus Wagner
, Yuval Yarom:
Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers. NDSS 2021 - [c100]Konstantina Miteloudi, Lejla Batina, Joan Daemen, Nele Mentens
:
ROCKY: Rotation Countermeasure for the Protection of Keys and Other Sensitive Data. SAMOS 2021: 288-299 - [c99]Konstantina Miteloudi, Lukasz Chmielewski, Lejla Batina, Nele Mentens
:
Evaluating the ROCKY Countermeasure for Side-Channel Leakage. VLSI-SoC 2021: 1-6 - [p6]Lejla Batina, Milena Djukanovic, Annelie Heuser, Stjepan Picek:
It Started with Templates: The Future of Profiling in Side-Channel Analysis. Security of Ubiquitous Computing Systems 2021: 133-145 - [e7]Jianying Zhou
, Chuadhry Mujeeb Ahmed
, Lejla Batina
, Sudipta Chattopadhyay
, Olga Gadyatskaya
, Chenglu Jin
, Jingqiang Lin, Eleonora Losiouk
, Bo Luo, Suryadipta Majumdar
, Mihalis Maniatakos
, Daisuke Mashima
, Weizhi Meng
, Stjepan Picek
, Masaki Shimaoka
, Chunhua Su
, Cong Wang
:
Applied Cryptography and Network Security Workshops - ACNS 2021 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, and SiMLA, Kamakura, Japan, June 21-24, 2021, Proceedings. Lecture Notes in Computer Science 12809, Springer 2021, ISBN 978-3-030-81644-5 [contents] - [e6]Christina Pöpper, Mathy Vanhoef, Lejla Batina, René Mayrhofer:
WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021. ACM 2021, ISBN 978-1-4503-8349-3 [contents] - [i51]Ileana Buhan, Lejla Batina, Yuval Yarom, Patrick Schaumont:
SoK: Design Tools for Side-Channel-Aware Implementions. CoRR abs/2104.08593 (2021) - [i50]Madura A. Shelton, Lukasz Chmielewski, Niels Samwel, Markus Wagner, Lejla Batina, Yuval Yarom:
Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic Code. CoRR abs/2109.11741 (2021) - [i49]Unai Rioja, Lejla Batina, Igor Armendariz, Jose Luis Flores:
Keep It Unbiased: A Comparison Between Estimation of Distribution Algorithms and Deep Learning for Human Interaction-Free Side-Channel Analysis. CoRR abs/2111.13425 (2021) - [i48]Servio Paguada, Lejla Batina, Ileana Buhan, Igor Armendariz:
Being Patient and Persistent: Optimizing An Early Stopping Strategy for Deep Learning in Profiled Attacks. CoRR abs/2111.14416 (2021) - [i47]Servio Paguada, Lejla Batina, Igor Armendariz:
Toward Practical Autoencoder-based Side-Channel Analysis Evaluations. IACR Cryptol. ePrint Arch. 2021: 72 (2021) - [i46]Ileana Buhan, Lejla Batina, Yuval Yarom, Patrick Schaumont:
SoK: Design Tools for Side-Channel-Aware Implementations. IACR Cryptol. ePrint Arch. 2021: 497 (2021) - [i45]Leo Weissbart, Lukasz Chmielewski, Stjepan Picek, Lejla Batina:
Systematic Side-channel Analysis of Curve25519 with Machine Learning. IACR Cryptol. ePrint Arch. 2021: 944 (2021) - [i44]Naila Mukhtar, Lejla Batina, Stjepan Picek, Yinan Kong:
Fake it till you make it: Data Augmentation using Generative Adversarial Networks for all the crypto you need on small devices. IACR Cryptol. ePrint Arch. 2021: 991 (2021) - [i43]Lejla Batina, Lukasz Chmielewski, Björn Haase, Niels Samwel, Peter Schwabe:
SCA-secure ECC in software - mission impossible? IACR Cryptol. ePrint Arch. 2021: 1003 (2021) - [i42]Stjepan Picek, Guilherme Perin, Luca Mariot, Lichao Wu, Lejla Batina:
SoK: Deep Learning-based Physical Side-channel Analysis. IACR Cryptol. ePrint Arch. 2021: 1092 (2021) - [i41]Madura A. Shelton, Lukasz Chmielewski, Niels Samwel, Markus Wagner, Lejla Batina, Yuval Yarom:
Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic Code. IACR Cryptol. ePrint Arch. 2021: 1181 (2021) - [i40]Unai Rioja, Lejla Batina, Igor Armendariz, Jose Luis Flores:
Towards Human Dependency Elimination: AI Approach to SCA Robustness Assessment. IACR Cryptol. ePrint Arch. 2021: 1316 (2021) - [i39]Omid Bazangani, Alexandre Iooss, Ileana Buhan, Lejla Batina:
ABBY: Automating the creation of fine-grained leakage models. IACR Cryptol. ePrint Arch. 2021: 1569 (2021) - 2020
- [j21]Lejla Batina, Nele Mentens
:
PROOFS 2018 Editorial. J. Cryptogr. Eng. 10(4): 287 (2020) - [j20]Leo Weissbart
, Lukasz Chmielewski, Stjepan Picek, Lejla Batina:
Systematic Side-Channel Analysis of Curve25519 with Machine Learning. J. Hardw. Syst. Secur. 4(4): 314-328 (2020) - [j19]Pedro Maat C. Massolino, Patrick Longa, Joost Renes
, Lejla Batina:
A Compact and Scalable Hardware/Software Co-design of SIKE. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(2): 245-271 (2020) - [c98]Niels Roelofs, Niels Samwel
, Lejla Batina, Joan Daemen:
Online Template Attack on ECDSA: - Extracting Keys via the Other Side. AFRICACRYPT 2020: 323-336 - [c97]Unai Rioja
, Lejla Batina, Igor Armendariz
:
When Similarities Among Devices are Taken for Granted: Another Look at Portability. AFRICACRYPT 2020: 337-357 - [c96]Ievgen Kabin
, Zoya Dyka
, Dan Klann, Nele Mentens
, Lejla Batina, Peter Langendörfer
:
Breaking a fully Balanced ASIC Coprocessor Implementing Complete Addition Formulas on Weierstrass Elliptic Curves. DSD 2020: 270-276 - [c95]Thierry Simon, Lejla Batina, Joan Daemen, Vincent Grosso, Pedro Maat Costa Massolino, Kostas Papagiannopoulos, Francesco Regazzoni
, Niels Samwel
:
Friet: An Authenticated Encryption Scheme with Built-in Fault Detection. EUROCRYPT (1) 2020: 581-611 - [e5]Jianying Zhou
, Mauro Conti
, Chuadhry Mujeeb Ahmed
, Man Ho Au
, Lejla Batina
, Zhou Li
, Jingqiang Lin, Eleonora Losiouk
, Bo Luo, Suryadipta Majumdar
, Weizhi Meng
, Martín Ochoa
, Stjepan Picek
, Georgios Portokalidis
, Cong Wang
, Kehuan Zhang:
Applied Cryptography and Network Security Workshops - ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings. Lecture Notes in Computer Science 12418, Springer 2020, ISBN 978-3-030-61637-3 [contents] - [e4]Lejla Batina
, Gang Li
:
Applications and Techniques in Information Security - 11th International Conference, ATIS 2020, Brisbane, QLD, Australia, November 12-13, 2020, Proceedings. Communications in Computer and Information Science 1338, Springer 2020, ISBN 978-981-33-4705-2 [contents] - [e3]Lejla Batina
, Stjepan Picek
, Mainack Mondal
:
Security, Privacy, and Applied Cryptography Engineering - 10th International Conference, SPACE 2020, Kolkata, India, December 17-21, 2020, Proceedings. Lecture Notes in Computer Science 12586, Springer 2020, ISBN 978-3-030-66625-5 [contents] - [i38]Unai Rioja, Servio Paguada, Lejla Batina, Igor Armendariz:
The uncertainty of Side-Channel Analysis: A way to leverage from heuristics. CoRR abs/2006.12810 (2020) - [i37]Zhuoran Liu, Niels Samwel, Leo Weissbart, Zhengyu Zhao, Dirk Lauret
, Lejla Batina, Martha A. Larson:
Screen Gleaning: A Screen Reading TEMPEST Attack on Mobile Devices Exploiting an Electromagnetic Side Channel. CoRR abs/2011.09877 (2020) - [i36]Unai Rioja, Lejla Batina, Jose Luis Flores, Igor Armendariz:
Auto-tune POIs: Estimation of distribution algorithms for efficient side-channel analysis. CoRR abs/2012.13225 (2020) - [i35]Pedro Maat C. Massolino, Patrick Longa, Joost Renes, Lejla Batina:
A Compact and Scalable Hardware/Software Co-design of SIKE. IACR Cryptol. ePrint Arch. 2020: 40 (2020) - [i34]Thierry Simon, Lejla Batina, Joan Daemen, Vincent Grosso, Pedro Maat Costa Massolino, Kostas Papagiannopoulos, Francesco Regazzoni, Niels Samwel:
Friet: An Authenticated Encryption Scheme with Built-in Fault Detection. IACR Cryptol. ePrint Arch. 2020: 425 (2020) - [i33]Unai Rioja, Servio Paguada, Lejla Batina, Igor Armendariz:
The uncertainty of Side-Channel Analysis: A way to leverage from heuristics. IACR Cryptol. ePrint Arch. 2020: 766 (2020) - [i32]Guilherme Perin, Lukasz Chmielewski, Lejla Batina, Stjepan Picek:
Keep it Unsupervised: Horizontal Attacks Meet Deep Learning. IACR Cryptol. ePrint Arch. 2020: 891 (2020) - [i31]Lichao Wu, Leo Weissbart, Marina Krcek, Huimin Li, Guilherme Perin, Lejla Batina, Stjepan Picek:
Everything is Connected: From Model Learnability to Guessing Entropy. IACR Cryptol. ePrint Arch. 2020: 899 (2020) - [i30]Naila Mukhtar, Louiza Papachristodoulou, Apostolos P. Fournaris, Lejla Batina, Yinan Kong:
Machine-Learning assisted Side-Channel Attacks on RNS-based Elliptic Curve Implementations using Hybrid Feature Engineering. IACR Cryptol. ePrint Arch. 2020: 1065 (2020) - [i29]Unai Rioja, Lejla Batina, Jose Luis Flores, Igor Armendariz:
Auto-tune POIs: Estimation of distribution algorithms for efficient side-channel analysis. IACR Cryptol. ePrint Arch. 2020: 1600 (2020)
2010 – 2019
- 2019
- [j18]Lejla Batina, Lukasz Chmielewski
, Louiza Papachristodoulou, Peter Schwabe, Michael Tunstall
:
Online template attacks. J. Cryptogr. Eng. 9(1): 21-36 (2019) - [j17]Niels Pirotte, Jo Vliegen, Lejla Batina, Nele Mentens
:
Balancing elliptic curve coprocessors from bottom to top. Microprocess. Microsystems 71 (2019) - [j16]Louiza Papachristodoulou, Apostolos P. Fournaris, Kostas Papagiannopoulos, Lejla Batina:
Practical Evaluation of Protected Residue Number System Scalar Multiplication. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(1): 259-282 (2019) - [j15]Lejla Batina, Sherman S. M. Chow
, Gerhard P. Hancke
, Zhe Liu:
Introduction to the Special Issue on Cryptographic Engineering for Internet of Things: Security Foundations, Lightweight Solutions, and Attacks. ACM Trans. Embed. Comput. Syst. 18(3): 22:1-22:3 (2019) - [j14]Stjepan Picek, Annelie Heuser
, Alan Jovic
, Lejla Batina:
A Systematic Evaluation of Profiling Through Focused Feature Selection. IEEE Trans. Very Large Scale Integr. Syst. 27(12): 2802-2815 (2019) - [c94]Christos Andrikos, Lejla Batina, Lukasz Chmielewski, Liran Lerman, Vasilios Mavroudis
, Kostas Papagiannopoulos, Guilherme Perin, Giorgos Rassias, Alberto Sonnino:
Location, Location, Location: Revisiting Modeling and Exploitation for Location-Based Side Channel Leakages. ASIACRYPT (3) 2019: 285-314 - [c93]Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek:
Poster: Recovering the Input of Neural Networks via Single Shot Side-channel Attacks. CCS 2019: 2657-2659 - [c92]Lejla Batina, Patrick Jauernig, Nele Mentens
, Ahmad-Reza Sadeghi, Emmanuel Stapf:
In Hardware We Trust: Gains and Pains of Hardware-assisted Security. DAC 2019: 44 - [c91]Leo Weissbart, Stjepan Picek, Lejla Batina:
One Trace Is All It Takes: Machine Learning-Based Side-Channel Attack on EdDSA. SPACE 2019: 86-105 - [c90]Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek:
CSI NN: Reverse Engineering of Neural Network Architectures Through Electromagnetic Side Channel. USENIX Security Symposium 2019: 515-532 - [i28]Madura A. Shelton, Niels Samwel, Lejla Batina, Francesco Regazzoni, Markus Wagner, Yuval Yarom:
Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers. CoRR abs/1912.05183 (2019) - [i27]Christos Andrikos, Lejla Batina, Lukasz Chmielewski, Liran Lerman, Vasilios Mavroudis, Kostas Papagiannopoulos, Guilherme Perin, Giorgos Rassias, Alberto Sonnino:
Location, location, location: Revisiting modeling and exploitation for location-based side channel leakages. IACR Cryptol. ePrint Arch. 2019: 230 (2019) - [i26]Leo Weissbart, Stjepan Picek, Lejla Batina:
One trace is all it takes: Machine Learning-based Side-channel Attack on EdDSA. IACR Cryptol. ePrint Arch. 2019: 358 (2019) - [i25]Madura A. Shelton, Niels Samwel, Lejla Batina, Francesco Regazzoni, Markus Wagner
, Yuval Yarom:
Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers. IACR Cryptol. ePrint Arch. 2019: 1445 (2019) - [i24]Leo Weissbart, Stjepan Picek, Lejla Batina:
On the Performance of Multilayer Perceptron in Profiling Side-channel Analysis. IACR Cryptol. ePrint Arch. 2019: 1476 (2019) - 2018
- [c89]Ricardo Chaves
, Lukasz Chmielewski, Francesco Regazzoni
, Lejla Batina:
SCA-Resistance for AES: How Cheap Can We Go? AFRICACRYPT 2018: 107-123 - [c88]Niels Samwel
, Lejla Batina:
Practical Fault Injection on Deterministic Signatures: The Case of EdDSA. AFRICACRYPT 2018: 306-321 - [c87]Niels Samwel
, Lejla Batina, Guido Bertoni
, Joan Daemen, Ruggero Susella:
Breaking Ed25519 in WolfSSL. CT-RSA 2018: 1-20 - [c86]Niels Pirotte, Jo Vliegen, Lejla Batina, Nele Mentens
:
Design of a Fully Balanced ASIC Coprocessor Implementing Complete Addition Formulas on Weierstrass Elliptic Curves. DSD 2018: 545-552 - [c85]Antun Maldini, Niels Samwel
, Stjepan Picek, Lejla Batina:
Genetic Algorithm-Based Electromagnetic Fault Injection. FDTC 2018: 35-42 - [e2]Lejla Batina, Ulrich Kühne, Nele Mentens:
PROOFS 2018, 7th International Workshop on Security Proofs for Embedded Systems, colocated with CHES 2018, Amsterdam, The Netherlands, September 13, 2018. Kalpa Publications in Computing 7, EasyChair 2018 [contents] - [i23]Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek:
CSI Neural Network: Using Side-channels to Recover Your Artificial Neural Network Information. CoRR abs/1810.09076 (2018) - [i22]Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek:
CSI Neural Network: Using Side-channels to Recover Your Artificial Neural Network Information. IACR Cryptol. ePrint Arch. 2018: 477 (2018) - 2017
- [c84]Pedro Maat C. Massolino, Lejla Batina, Ricardo Chaves
, Nele Mentens
:
Area-optimized montgomery multiplication on IGLOO 2 FPGAs. FPL 2017: 1-4 - [c83]Christos Andrikos, Giorgos Rassias, Liran Lerman, Kostas Papagiannopoulos, Lejla Batina:
Location-based leakages: New directions in modeling and exploiting. SAMOS 2017: 246-252 - [i21]Niels Samwel, Lejla Batina, Guido Bertoni, Joan Daemen, Ruggero Susella:
Breaking Ed25519 in WolfSSL. IACR Cryptol. ePrint Arch. 2017: 985 (2017) - [i20]Stjepan Picek, Annelie Heuser, Alan Jovic, Lejla Batina, Axel Legay:
The secrets of profiling for side-channel analysis: feature selection matters. IACR Cryptol. ePrint Arch. 2017: 1110 (2017) - 2016
- [j13]Stjepan Picek, Domagoj Jakobovic
, Julian F. Miller, Lejla Batina, Marko Cupic:
Cryptographic Boolean functions: One output, many design criteria. Appl. Soft Comput. 40: 635-653 (2016) - [c82]Stjepan Picek, Dominik Sisejkovic, Domagoj Jakobovic
, Lejla Batina, Bohan Yang, Danilo Sijacic, Nele Mentens
:
Extreme Pipelining Towards the Best Area-Performance Trade-Off in Hardware. AFRICACRYPT 2016: 147-166 - [c81]Ke Jiang, Petru Eles, Zebo Peng, Sudipta Chattopadhyay
, Lejla Batina:
SPARTA: A scheduling policy for thwarting differential power analysis attacks. ASP-DAC 2016: 667-672 - [c80]Gergely Alpár, Lejla Batina, Lynn Margaret Batten, Veelasha Moonsamy, Anna Krasnova, Antoine Guellier, Iynkaran Natgunanathan:
New directions in IoT privacy using attribute-based authentication. Conf. Computing Frontiers 2016: 461-466 - [c79]Joost Renes
, Peter Schwabe, Benjamin Smith
, Lejla Batina:
\mu Kummer: Efficient Hyperelliptic Signatures and Key Exchange on Microcontrollers. CHES 2016: 301-320 - [c78]Margaux Dugardin, Louiza Papachristodoulou, Zakaria Najm, Lejla Batina, Jean-Luc Danger, Sylvain Guilley:
Dismantling Real-World ECC with Horizontal and Vertical Template Attacks. COSADE 2016: 88-108 - [c77]Apostolos P. Fournaris, Louiza Papachristodoulou, Lejla Batina, Nicolas Sklavos
:
Residue Number System as a side channel and fault injection attack countermeasure in elliptic curve cryptography. DTIS 2016: 1-4 - [c76]Joost Renes, Craig Costello
, Lejla Batina:
Complete Addition Formulas for Prime Order Elliptic Curves. EUROCRYPT (1) 2016: 403-428 - [c75]Elif Ozgen, Louiza Papachristodoulou, Lejla Batina:
Template attacks using classification algorithms. HOST 2016: 242-247 - [c74]Wouter de Groot, Kostas Papagiannopoulos, Antonio de la Piedra
, Erik Schneider, Lejla Batina:
Bitsliced Masking and ARM: Friends or Foes? LightSec 2016: 91-109 - [c73]Rauf Mahmudlu, Valentina Banciu, Lejla Batina, Ileana Buhan:
LDA-Based Clustering as a Side-Channel Distinguisher. RFIDSec 2016: 62-75 - [c72]Pedro Maat C. Massolino, Joost Renes, Lejla Batina:
Implementing Complete Formulas on Weierstrass Curves in Hardware. SPACE 2016: 89-108 - [i19]Joost Renes
, Peter Schwabe, Benjamin Smith
, Lejla Batina:
$μ$Kummer: efficient hyperelliptic signatures and key exchange on microcontrollers. CoRR abs/1604.06059 (2016) - [i18]Lejla Batina, Swarup Bhunia, Patrick Schaumont
, Jean-Pierre Seifert:
Foundations of Secure Scaling (Dagstuhl Seminar 16342). Dagstuhl Reports 6(8): 65-90 (2016) - [i17]Pedro Maat C. Massolino, Lejla Batina, Ricardo Chaves, Nele Mentens:
Low Power Montgomery Modular Multiplication on Reconfigurable Systems. IACR Cryptol. ePrint Arch. 2016: 280 (2016) - [i16]Joost Renes, Peter Schwabe, Benjamin Smith, Lejla Batina:
\(\mu\)Kummer: efficient hyperelliptic signatures and key exchange on microcontrollers. IACR Cryptol. ePrint Arch. 2016: 366 (2016) - [i15]Wouter de Groot, Kostas Papagiannopoulos, Antonio de la Piedra, Erik Schneider, Lejla Batina:
Bitsliced Masking and ARM: Friends or Foes? IACR Cryptol. ePrint Arch. 2016: 946 (2016) - [i14]Rauf Mahmudlu, Valentina Banciu, Lejla Batina, Ileana Buhan:
LDA-Based Clustering as a Side-Channel Distinguisher. IACR Cryptol. ePrint Arch. 2016: 1024 (2016) - [i13]Pedro Maat C. Massolino, Joost Renes, Lejla Batina:
Implementing Complete Formulas on Weierstrass Curves in Hardware. IACR Cryptol. ePrint Arch. 2016: 1133 (2016) - 2015
- [j12]Lejla Batina, Matthew J. B. Robshaw:
Introduction to the CHES 2014 special issue. J. Cryptogr. Eng. 5(2): 71-72 (2015) - [c71]Stjepan Picek, Lejla Batina, Pieter Buzing, Domagoj Jakobovic
:
Fault Injection with a New Flavor: Memetic Algorithms Make a Difference. COSADE 2015: 159-173 - [c70]Stjepan Picek, Domagoj Jakobovic
, Julian F. Miller, Elena Marchiori, Lejla Batina:
Evolutionary Methods for the Construction of Cryptographic Boolean Functions. EuroGP 2015: 192-204 - [c69]Stjepan Picek, Claude Carlet, Domagoj Jakobovic
, Julian F. Miller, Lejla Batina:
Correlation Immunity of Boolean Functions: An Evolutionary Algorithms Perspective. GECCO 2015: 1095-1102 - [c68]Stjepan Picek, Julian F. Miller, Domagoj Jakobovic
, Lejla Batina:
Cartesian Genetic Programming Approach for Generating Substitution Boxes of Different Sizes. GECCO (Companion) 2015: 1457-1458 - [c67]Ricardo Chaves
, Giorgio Di Natale, Lejla Batina, Shivam Bhasin, Baris Ege, Apostolos P. Fournaris, Nele Mentens
, Stjepan Picek, Francesco Regazzoni
, Vladimir Rozic, Nicolas Sklavos
, Bohan Yang:
Challenges in designing trustworthy cryptographic co-processors. ISCAS 2015: 2009-2012 - [c66]Baris Ege, Kostas Papagiannopoulos, Lejla Batina, Stjepan Picek:
Improving DPA resistance of S-boxes: How far can we go? ISCAS 2015: 2013-2016 - [c65]Baris Ege, Thomas Eisenbarth
, Lejla Batina:
Near Collision Side Channel Attacks. SAC 2015: 277-292 - [c64]Stjepan Picek, Bodhisatwa Mazumdar, Debdeep Mukhopadhyay, Lejla Batina:
Modified Transparency Order Property: Solution or Just Another Attempt. SPACE 2015: 210-227 - [i12]Baris Ege, Thomas Eisenbarth, Lejla Batina:
Near Collision Side Channel Attacks. IACR Cryptol. ePrint Arch. 2015: 511 (2015) - [i11]Margaux Dugardin, Louiza Papachristodoulou, Zakaria Najm, Lejla Batina, Jean-Luc Danger, Sylvain Guilley, Jean-Christophe Courrège, Carine Therond:
Dismantling real-world ECC with Horizontal and Vertical Template Attacks. IACR Cryptol. ePrint Arch. 2015: 1001 (2015) - [i10]Dave Singelée, Stefaan Seys, Lejla Batina, Ingrid Verbauwhede:
The Energy Budget for Wireless Security: Extended Version. IACR Cryptol. ePrint Arch. 2015: 1029 (2015) - [i9]Joost Renes, Craig Costello, Lejla Batina:
Complete addition formulas for prime order elliptic curves. IACR Cryptol. ePrint Arch. 2015: 1060 (2015) - 2014
- [c63]Nele Mentens
, Lejla Batina, Selçuk Baktir
:
An Elliptic Curve Cryptographic Processor Using Edwards Curves and the Number Theoretic Transform. BalkanCryptSec 2014: 94-102 - [c62]Thomas Korak, Michael Hutter, Baris Ege, Lejla Batina:
Clock Glitch Attacks in the Presence of Heating. FDTC 2014: 104-114 - [c61]Stjepan Picek, Baris Ege, Lejla Batina, Domagoj Jakobovic
, Lukasz Chmielewski, Marin Golub:
On using genetic algorithms for intrinsic side-channel resistance: the case of AES S-box. CS2@HiPEAC 2014: 13-18 - [c60]Stjepan Picek, Baris Ege, Kostas Papagiannopoulos, Lejla Batina, Domagoj Jakobovic
:
Optimality and beyond: The case of 4×4 S-boxes. HOST 2014: 80-83 - [c59]Lejla Batina, Lukasz Chmielewski, Louiza Papachristodoulou, Peter Schwabe, Michael Tunstall
:
Online Template Attacks. INDOCRYPT 2014: 21-36 - [c58]Lejla Batina, Domagoj Jakobovic
, Nele Mentens
, Stjepan Picek, Antonio de la Piedra
, Dominik Sisejkovic:
S-box Pipelining Using Genetic Algorithms for High-Throughput AES Implementations: How Fast Can We Go? INDOCRYPT 2014: 322-337 - [c57]Stjepan Picek, Kostas Papagiannopoulos, Baris Ege, Lejla Batina, Domagoj Jakobovic
:
Confused by Confusion: Systematic Evaluation of DPA Resistance of Various S-boxes. INDOCRYPT 2014: 374-390 - [c56]Ke Jiang, Lejla Batina, Petru Eles, Zebo Peng:
Robustness Analysis of Real-Time Scheduling Against Differential Power Analysis Attacks. ISVLSI 2014: 450-455 - [c55]Stjepan Picek, Lejla Batina, Domagoj Jakobovic
, Rafael Boix Carpi:
Evolving genetic algorithms for fault injection attacks. MIPRO 2014: 1106-1111 - [c54]Stjepan Picek, Lejla Batina, Domagoj Jakobovic:
Evolving DPA-Resistant Boolean Functions. PPSN 2014: 812-821 - [c53]Stjepan Picek, Elena Marchiori, Lejla Batina, Domagoj Jakobovic:
Combining Evolutionary Computation and Algebraic Constructions to Find Cryptography-Relevant Boolean Functions. PPSN 2014: 822-831 - [c52]Lejla Batina, Jens Hermans, Jaap-Henk Hoepman, Anna Krasnova:
High-Speed Dating Privacy-Preserving Attribute Matching for RFID. RFIDSec 2014: 19-35 - [c51]Stjepan Picek, Lejla Batina, Domagoj Jakobovic
, Baris Ege, Marin Golub:
S-box, SET, Match: A Toolbox for S-box Analysis. WISTP 2014: 140-149 - [e1]Lejla Batina, Matthew Robshaw:
Cryptographic Hardware and Embedded Systems - CHES 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings. Lecture Notes in Computer Science 8731, Springer 2014, ISBN 978-3-662-44708-6 [contents] - [i8]Lejla Batina, Domagoj Jakobovic, Nele Mentens, Stjepan Picek, Antonio de la Piedra, Dominik Sisejkovic:
S-box pipelining using genetic algorithms for high-throughput AES implementations: How fast can we go? IACR Cryptol. ePrint Arch. 2014: 734 (2014) - 2013
- [j11]Amitabh Das, Baris Ege, Santosh Ghosh, Lejla Batina, Ingrid Verbauwhede
:
Security Analysis of Industrial Test Compression Schemes. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 32(12): 1966-1977 (2013) - [c50]Rafael Boix Carpi, Stjepan Picek, Lejla Batina, Federico Menarini, Domagoj Jakobovic
, Marin Golub:
Glitch It If You Can: Parameter Search Strategies for Successful Fault Injection. CARDIS 2013: 236-252 - [c49]Lejla Batina, Amitabh Das, Baris Ege, Elif Bilge Kavun
, Nele Mentens
, Christof Paar, Ingrid Verbauwhede
, Tolga Yalçin
:
Dietary Recommendations for Lightweight Block Ciphers: Power, Energy and Area Analysis of Recently Developed Architectures. RFIDSec 2013: 103-112 - [p5]Miroslav Knezevic, Lejla Batina, Elke De Mulder, Junfeng Fan, Benedikt Gierlichs, Yong Ki Lee, Roel Maes, Ingrid Verbauwhede
:
Signal Processing for Cryptography and Security Applications. Handbook of Signal Processing Systems 2013: 223-241 - [i7]Lejla Batina, Amitabh Das, Baris Ege, Elif Bilge Kavun, Nele Mentens, Christof Paar, Ingrid Verbauwhede, Tolga Yalçin:
Dietary Recommendations for Lightweight Block Ciphers: Power, Energy and Area Analysis of Recently Developed Architectures. IACR Cryptol. ePrint Arch. 2013: 753 (2013) - 2012
- [j10]Lejla Batina, Yong Ki Lee, Stefaan Seys, Dave Singelée
, Ingrid Verbauwhede
:
Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs. Pers. Ubiquitous Comput. 16(3): 323-335 (2012) - [c48]Josep Balasch, Benedikt Gierlichs, Roel Verdult, Lejla Batina, Ingrid Verbauwhede
:
Power Analysis of Atmel CryptoMemory - Recovering Keys from Secure EEPROMs. CT-RSA 2012: 19-34 - [c47]Lejla Batina, Jip Hogenboom, Jasper G. J. van Woudenberg:
Getting More from PCA: First Results of Using Principal Component Analysis for Extensive Power Analysis. CT-RSA 2012: 383-397 - [c46]Gergely Alpár, Lejla Batina, Roel Verdult:
Using NFC Phones for Proving Credentials. MMB/DFT 2012: 317-330 - [c45]Dimitrios Mavroeidis, Lejla Batina, Twan van Laarhoven, Elena Marchiori:
PCA, Eigenvector Localization and Clustering for Side-Channel Attacks on Cryptographic Hardware Devices. ECML/PKDD (1) 2012: 253-268 - [c44]Gergely Alpár, Lejla Batina, Wouter Lueks:
Designated Attribute-Based Proofs for RFID Applications. RFIDSec 2012: 59-75 - 2011
- [j9]Junfeng Fan, Lejla Batina, Ingrid Verbauwhede
:
Design and design methods for unified multiplier and inverter and its application for HECC. Integr. 44(4): 280-289 (2011) - [j8]Lejla Batina, Benedikt Gierlichs, Emmanuel Prouff, Matthieu Rivain, François-Xavier Standaert
, Nicolas Veyrat-Charvillon:
Mutual Information Analysis: a Comprehensive Study. J. Cryptol. 24(2): 269-291 (2011) - [c43]Ruben A. Muijrers, Jasper G. J. van Woudenberg, Lejla Batina:
RAM: Rapid Alignment Method. CARDIS 2011: 266-282 - [c42]Lejla Batina, Stefaan Seys, Dave Singelée
, Ingrid Verbauwhede
:
Hierarchical ECC-Based RFID Authentication Protocol. RFIDSec 2011: 183-201 - [c41]Dave Singelée
, Stefaan Seys, Lejla Batina, Ingrid Verbauwhede
:
The communication and computation cost of wireless security: extended abstract. WISEC 2011: 1-4 - 2010
- [c40]Lejla Batina, Jaap-Henk Hoepman, Bart Jacobs, Wojciech Mostowski, Pim Vullers:
Developing Efficient Blinded Attribute Certificates on Smart Cards via Pairings. CARDIS 2010: 209-222 - [c39]Benedikt Gierlichs, Lejla Batina, Bart Preneel
, Ingrid Verbauwhede
:
Revisiting Higher-Order DPA Attacks: . CT-RSA 2010: 221-234 - [c38]Yang Li, Kazuo Sakiyama, Lejla Batina, Daisuke Nakatsu, Kazuo Ohta:
Power Variance Analysis breaks a masked ASIC implementation of AES. DATE 2010: 1059-1064 - [c37]Junfeng Fan, Daniel V. Bailey, Lejla Batina, Tim Güneysu
, Christof Paar, Ingrid Verbauwhede
:
Breaking Elliptic Curve Cryptosystems Using Reconfigurable Hardware. FPL 2010: 133-138 - [c36]Lejla Batina, Jip Hogenboom, Nele Mentens
, Joren Moelans, Jo Vliegen:
Side-channel evaluation of FPGA implementations of binary Edwards curves. ICECS 2010: 1248-1251 - [c35]Lejla Batina, Yong Ki Lee, Stefaan Seys, Dave Singelée
, Ingrid Verbauwhede
:
Privacy-Preserving ECC-Based Grouping Proofs for RFID. ISC 2010: 159-165 - [c34]Yong Ki Lee, Lejla Batina, Dave Singelée
, Ingrid Verbauwhede
:
Wide-Weak Privacy-Preserving RFID Authentication Protocols. MOBILIGHT 2010: 254-267 - [c33]Yong Ki Lee, Lejla Batina, Dave Singelée
, Ingrid Verbauwhede
:
Low-cost untraceable authentication protocols for RFID. WISEC 2010: 55-64 - [p4]Miroslav Knezevic, Lejla Batina, Elke De Mulder, Junfeng Fan, Benedikt Gierlichs, Yong Ki Lee, Roel Maes
, Ingrid Verbauwhede
:
Signal Processing for Cryptography and Security Applications. Handbook of Signal Processing Systems 2010: 161-177 - [p3]Kazuo Sakiyama, Lejla Batina:
Arithmetic for Public-Key Cryptography. Secure Integrated Circuits and Systems 2010: 63-78 - [p2]Lejla Batina, Kazuo Sakiyama, Ingrid M. R. Verbauwhede
:
Compact Public-Key Implementations for RFID and Sensor Nodes. Secure Integrated Circuits and Systems 2010: 179-195 - [p1]Yong Ki Lee, Lejla Batina, Dave Singelée
, Bart Preneel
, Ingrid Verbauwhede
:
Anti-counterfeiting, Untraceability and Other Security Challenges for RFID Systems: Public-Key-Based Protocols and Hardware. Towards Hardware-Intrinsic Security 2010: 237-257
2000 – 2009
- 2009
- [c32]Lejla Batina, Benedikt Gierlichs, Kerstin Lemke-Rust:
Differential Cluster Analysis. CHES 2009: 112-127 - [c31]Junfeng Fan, Lejla Batina, Ingrid Verbauwhede:
Light-weight implementation options for curve-based cryptography: HECC is also ready for RFID. ICITST 2009: 1-6 - [c30]Junfeng Fan, Miroslav Knezevic, Dusko Karaklajic, Roel Maes
, Vladimir Rozic, Lejla Batina, Ingrid Verbauwhede
:
FPGA-based testing strategy for cryptographic chips: A case study on Elliptic Curve Processor for RFID tags. IOLTS 2009: 189-191 - [c29]Miroslav Knezevic, Lejla Batina, Ingrid Verbauwhede
:
Modular Reduction without Precomputational Phase. ISCAS 2009: 1389-1392 - [i6]David Canright, Lejla Batina:
A Very Compact "Perfectly Masked" S-Box for AES (corrected). IACR Cryptol. ePrint Arch. 2009: 11 (2009) - [i5]Benedikt Gierlichs, Lejla Batina, Bart Preneel, Ingrid Verbauwhede:
Revisiting Higher-Order DPA Attacks: Multivariate Mutual Information Analysis. IACR Cryptol. ePrint Arch. 2009: 228 (2009) - [i4]Daniel V. Bailey, Brian Baldwin, Lejla Batina, Daniel J. Bernstein, Peter Birkner, Joppe W. Bos, Gauthier Van Damme, Giacomo de Meulenaer, Junfeng Fan, Tim Güneysu, Frank K. Gürkaynak, Thorsten Kleinjung, Tanja Lange, Nele Mentens, Christof Paar, Francesco Regazzoni, Peter Schwabe, Leif Uhsadel:
The Certicom Challenges ECC2-X. IACR Cryptol. ePrint Arch. 2009: 466 (2009) - [i3]Daniel V. Bailey, Lejla Batina, Daniel J. Bernstein, Peter Birkner, Joppe W. Bos, Hsieh-Chung Chen, Chen-Mou Cheng, Gauthier Van Damme, Giacomo de Meulenaer, Luis J. Dominguez Perez, Junfeng Fan, Tim Güneysu, Frank K. Gürkaynak, Thorsten Kleinjung, Tanja Lange, Nele Mentens, Ruben Niederhagen, Christof Paar, Francesco Regazzoni, Peter Schwabe, Leif Uhsadel, Anthony Van Herrewege, Bo-Yin Yang:
Breaking ECC2K-130. IACR Cryptol. ePrint Arch. 2009: 541 (2009) - 2008
- [j7]Siddika Berna Örs
, Lejla Batina, Bart Preneel, Joos Vandewalle:
Hardware implementation of an elliptic curve processor over GF(p) with Montgomery modular multiplier. Int. J. Embed. Syst. 3(4): 229-240 (2008) - [j6]Yong Ki Lee, Kazuo Sakiyama, Lejla Batina, Ingrid Verbauwhede
:
Elliptic-Curve-Based Security Processor for RFID. IEEE Trans. Computers 57(11): 1514-1527 (2008) - [c28]David Canright, Lejla Batina:
A Very Compact "Perfectly Masked" S-Box for AES. ACNS 2008: 446-459 - [c27]Ali Can Atici, Lejla Batina, Junfeng Fan, Ingrid Verbauwhede
, Siddika Berna Örs
:
Low-cost implementations of NTRU for pervasive security. ASAP 2008: 79-84 - [c26]Benedikt Gierlichs, Lejla Batina, Pim Tuyls, Bart Preneel:
Mutual Information Analysis. CHES 2008: 426-442 - [c25]Junfeng Fan, Lejla Batina, Kazuo Sakiyama, Ingrid Verbauwhede
:
FPGA Design for Algebraic Tori-Based Public-Key Cryptography. DATE 2008: 1292-1297 - [c24]Lejla Batina, Benedikt Gierlichs, Kerstin Lemke-Rust:
Comparative Evaluation of Rank Correlation Based DPA on an AES Prototype Chip. ISC 2008: 341-354 - [c23]Junfeng Fan, Lejla Batina, Ingrid Verbauwhede
:
HECC Goes Embedded: An Area-Efficient Implementation of HECC. Selected Areas in Cryptography 2008: 387-400 - [c22]Yoni De Mulder, George Danezis, Lejla Batina, Bart Preneel:
Identification via location-profiling in GSM networks. WPES 2008: 23-32 - 2007
- [j5]Kazuo Sakiyama, Lejla Batina, Bart Preneel, Ingrid Verbauwhede
:
HW/SW co-design for public-key cryptosystems on the 8051 micro-controller. Comput. Electr. Eng. 33(5-6): 324-332 (2007) - [j4]Alireza Hodjat, Lejla Batina, David Hwang, Ingrid Verbauwhede
:
HW/SW co-design of a hyperelliptic curve cryptosystem using a microcode instruction set coprocessor. Integr. 40(1): 45-51 (2007) - [j3]Kazuo Sakiyama, Lejla Batina, Bart Preneel, Ingrid Verbauwhede
:
High-performance Public-key Cryptoprocessor for Wireless Mobile Applications. Mob. Networks Appl. 12(4): 245-258 (2007) - [j2]Kazuo Sakiyama, Lejla Batina, Bart Preneel, Ingrid Verbauwhede
:
Multicore Curve-Based Cryptoprocessor with Reconfigurable Modular Arithmetic Logic Units over GF(2n). IEEE Trans. Computers 56(9): 1269-1282 (2007) - [c21]Lejla Batina, Nele Mentens
, Kazuo Sakiyama, Bart Preneel, Ingrid Verbauwhede
:
Public-Key Cryptography on the Top of a Needle. ISCAS 2007: 1831-1834 - [c20]Lejla Batina, Jorge Guajardo, Tim Kerins, Nele Mentens
, Pim Tuyls, Ingrid Verbauwhede
:
Public-Key Cryptography for RFID-Tags. PerCom Workshops 2007: 217-222 - [c19]Nele Mentens
, Kazuo Sakiyama, Lejla Batina, Bart Preneel, Ingrid Verbauwhede
:
A Side-channel Attack Resistant Programmable PKC Coprocessor for Embedded Applications. ICSAMOS 2007: 194-200 - [i2]Benedikt Gierlichs, Lejla Batina, Pim Tuyls:
Mutual Information Analysis - A Universal Differential Side-Channel Attack. IACR Cryptol. ePrint Arch. 2007: 198 (2007) - 2006
- [c18]Nele Mentens
, Lejla Batina, Bart Preneel, Ingrid Verbauwhede
:
Time-Memory Trade-Off Attack on FPGA Platforms: UNIX Password Cracking. ARC 2006: 323-334 - [c17]Kazuo Sakiyama, Nele Mentens
, Lejla Batina, Bart Preneel, Ingrid Verbauwhede:
Reconfigurable Modular Arithmetic Logic Unit for High-Performance Public-Key Cryptosystems. ARC 2006: 347-357 - [c16]Kazuo Sakiyama, Lejla Batina, Bart Preneel, Ingrid Verbauwhede:
Superscalar Coprocessor for High-Speed Curve-Based Cryptography. CHES 2006: 415-429 - [c15]Pim Tuyls, Lejla Batina:
RFID-Tags for Anti-counterfeiting. CT-RSA 2006: 115-131 - [c14]Lejla Batina, Nele Mentens
, Kazuo Sakiyama, Bart Preneel, Ingrid Verbauwhede
:
Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks. ESAS 2006: 6-17 - [c13]Lejla Batina, Alireza Hodjat, David Hwang, Kazuo Sakiyama, Ingrid Verbauwhede
:
Reconfigurable Architectures for Curve-Based Cryptography on Embedded Micro-Controllers. FPL 2006: 1-4 - [c12]Nele Mentens
, Kazuo Sakiyama, Lejla Batina, Ingrid Verbauwhede
, Bart Preneel:
Fpga-Oriented Secure Data Path Design: Implementation of a Public Key Coprocessor. FPL 2006: 1-6 - [c11]Lejla Batina, Nele Mentens
, Bart Preneel, Ingrid Verbauwhede
:
Flexible hardware architectures for curve-based cryptography. ISCAS 2006 - [i1]Lejla Batina, Jorge Guajardo, Tim Kerins, Nele Mentens, Pim Tuyls, Ingrid Verbauwhede:
An Elliptic Curve Processor Suitable For RFID-Tags. IACR Cryptol. ePrint Arch. 2006: 227 (2006) - 2005
- [c10]Lejla Batina, Nele Mentens
, Bart Preneel, Ingrid Verbauwhede
:
Side-channel aware design: Algorithms and Architectures for Elliptic Curve Cryptography over GF(2n). ASAP 2005: 350-355 - [c9]Lejla Batina, David Hwang, Alireza Hodjat, Bart Preneel, Ingrid Verbauwhede:
Hardware/Software Co-design for Hyperelliptic Curve Cryptography (HECC) on the 8051µP. CHES 2005: 106-118 - [c8]Nele Mentens
, Lejla Batina, Bart Preneel, Ingrid Verbauwhede
:
A Systematic Evaluation of Compact Hardware Implementations for the Rijndael S-Box. CT-RSA 2005: 323-333 - [c7]Lejla Batina, Nele Mentens
, Ingrid Verbauwhede
:
Side-Channel Issues for Designing Secure Hardware Implementations. IOLTS 2005: 118-121 - 2004
- [c6]Lejla Batina, Geeke Bruin-Muurling, Siddika Berna Örs
:
Flexible Hardware Design for RSA and Elliptic Curve Cryptosystems. CT-RSA 2004: 250-263 - 2003
- [j1]Lejla Batina, Siddika Berna Örs
, Bart Preneel, Joos Vandewalle:
Hardware architectures for public key cryptography. Integr. 34(1-2): 1-64 (2003) - [c5]Siddika Berna Örs
, Lejla Batina, Bart Preneel, Joos Vandewalle:
Hardware Implementation of an Elliptic Curve Processor over GF(p). ASAP 2003: 433-443 - [c4]Siddika Berna Örs
, Lejla Batina, Bart Preneel, Joos Vandewalle:
Hardware Implementation of a Montgomery Modular Multiplier in a Systolic Array. IPDPS 2003: 184 - 2002
- [c3]Lejla Batina, Geeke Muurling:
Montgomery in Practice: How to Do It More Efficiently in Hardware. CT-RSA 2002: 40-52 - 2001
- [c2]Lejla Batina, Geeke Muurling:
Another Way of Doing RSA Cryptography in Hardware. IMACC 2001: 364-373 - [c1]Sheng-Bo Xu, Lejla Batina:
Efficient Implementation of Elliptic Curve Cryptosystems on an ARM7 with Hardware Accelerator. ISC 2001: 266-279
Coauthor Index
aka: Pedro Maat C. Massolino
aka: Ingrid M. R. Verbauwhede
aka: Léo Weissbart

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-18 20:40 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint