default search action
BibTeX records: Lejla Batina
@article{DBLP:journals/tches/JahandidehMB24, author = {Vahid Jahandideh and Bart Mennink and Lejla Batina}, title = {An Algebraic Approach for Evaluating Random Probing Security With Application to {AES}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {4}, pages = {657--689}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i4.657-689}, doi = {10.46586/TCHES.V2024.I4.657-689}, timestamp = {Thu, 19 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/JahandidehMB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/HorvathCWBY24, author = {P{\'{e}}ter Horv{\'{a}}th and Lukasz Chmielewski and Leo Weissbart and Lejla Batina and Yuval Yarom}, editor = {Martin Andreoni}, title = {{CNN} Architecture Extraction on Edge {GPU}}, booktitle = {Applied Cryptography and Network Security Workshops - {ACNS} 2024 Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14586}, pages = {158--175}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-61486-6\_10}, doi = {10.1007/978-3-031-61486-6\_10}, timestamp = {Wed, 10 Jul 2024 20:46:37 +0200}, biburl = {https://dblp.org/rec/conf/acns/HorvathCWBY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/SerafiniWB24, author = {Gabriele Serafini and L{\'{e}}o Weissbart and Lejla Batina}, editor = {Martin Andreoni}, title = {Everything All at Once: Deep Learning Side-Channel Analysis Optimization Framework}, booktitle = {Applied Cryptography and Network Security Workshops - {ACNS} 2024 Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14586}, pages = {195--212}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-61486-6\_12}, doi = {10.1007/978-3-031-61486-6\_12}, timestamp = {Wed, 10 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/SerafiniWB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/arc/AdhikaryBBBDMMPRSSVZ24, author = {Asmita Adhikary and Abraham Basurto and Lejla Batina and Ileana Buhan and Joan Daemen and Silvia Mella and Nele Mentens and Stjepan Picek and Durga Lakshmi Ramachandran and Abolfazl Sajadi and Todor Stefanov and Dennis Vermoen and Nusa Zidaric}, editor = {Iouliia Skliarova and Piedad Brox Jim{\'{e}}nez and M{\'{a}}rio P. V{\'{e}}stias and Pedro C. Diniz}, title = {{PROACT} - Physical Attack Resistance of Cryptographic Algorithms and Circuits with Reduced Time to Market}, booktitle = {Applied Reconfigurable Computing. Architectures, Tools, and Applications - 20th International Symposium, {ARC} 2024, Aveiro, Portugal, March 20-22, 2024, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14553}, pages = {255--266}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-55673-9\_18}, doi = {10.1007/978-3-031-55673-9\_18}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/arc/AdhikaryBBBDMMPRSSVZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/BazanganiIBB24, author = {Omid Bazangani and Alexandre Iooss and Ileana Buhan and Lejla Batina}, editor = {Jianying Zhou and Tony Q. S. Quek and Debin Gao and Alvaro A. C{\'{a}}rdenas}, title = {{ABBY:} Automating leakage modelling for side-channel analysis}, booktitle = {Proceedings of the 19th {ACM} Asia Conference on Computer and Communications Security, {ASIA} {CCS} 2024, Singapore, July 1-5, 2024}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3634737.3637665}, doi = {10.1145/3634737.3637665}, timestamp = {Fri, 16 Aug 2024 09:08:03 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/BazanganiIBB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/BazanganiEPB24, author = {Omid Bazangani and Parisa Amiri{-}Eliasi and Stjepan Picek and Lejla Batina}, title = {Can Machine Learn Pipeline Leakage?}, booktitle = {Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2024, Valencia, Spain, March 25-27, 2024}, pages = {1--6}, publisher = {{IEEE}}, year = {2024}, url = {https://ieeexplore.ieee.org/document/10546629}, timestamp = {Sun, 01 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/date/BazanganiEPB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ddecs/RiziZBM24, author = {Mahnaz Namazi Rizi and Nusa Zidaric and Lejla Batina and Nele Mentens}, title = {Optimised {AES} with {RISC-V} Vector Extensions}, booktitle = {27th International Symposium on Design {\&} Diagnostics of Electronic Circuits {\&} Systems, {DDECS} 2024, Kielce, Poland, April 3-5, 2024}, pages = {57--60}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/DDECS60919.2024.10508919}, doi = {10.1109/DDECS60919.2024.10508919}, timestamp = {Wed, 15 May 2024 16:26:02 +0200}, biburl = {https://dblp.org/rec/conf/ddecs/RiziZBM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ddecs/EliasiMWBP24, author = {Parisa Amiri{-}Eliasi and Silvia Mella and L{\'{e}}o Weissbart and Lejla Batina and Stjepan Picek}, title = {Xoodyak Under {SCA} Siege}, booktitle = {27th International Symposium on Design {\&} Diagnostics of Electronic Circuits {\&} Systems, {DDECS} 2024, Kielce, Poland, April 3-5, 2024}, pages = {61--66}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/DDECS60919.2024.10508930}, doi = {10.1109/DDECS60919.2024.10508930}, timestamp = {Sun, 01 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ddecs/EliasiMWBP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/HorvathL0B24, author = {P{\'{e}}ter Horv{\'{a}}th and Dirk Lauret and Zhuoran Liu and Lejla Batina}, editor = {Davide Balzarotti and Wenyuan Xu}, title = {SoK: Neural Network Extraction Through Physical Side Channels}, booktitle = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia, PA, USA, August 14-16, 2024}, publisher = {{USENIX} Association}, year = {2024}, url = {https://www.usenix.org/conference/usenixsecurity24/presentation/horvath}, timestamp = {Mon, 22 Jul 2024 17:10:49 +0200}, biburl = {https://dblp.org/rec/conf/uss/HorvathL0B24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acns/2024-1, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14583}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54770-6}, doi = {10.1007/978-3-031-54770-6}, isbn = {978-3-031-54769-0}, timestamp = {Mon, 11 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/2024-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acns/2024-2, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14584}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54773-7}, doi = {10.1007/978-3-031-54773-7}, isbn = {978-3-031-54772-0}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/2024-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acns/2024-3, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14585}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54776-8}, doi = {10.1007/978-3-031-54776-8}, isbn = {978-3-031-54775-1}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/2024-3.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2401-13575, author = {P{\'{e}}ter Horv{\'{a}}th and Lukasz Chmielewski and Leo Weissbart and Lejla Batina and Yuval Yarom}, title = {{CNN} architecture extraction on edge {GPU}}, journal = {CoRR}, volume = {abs/2401.13575}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.13575}, doi = {10.48550/ARXIV.2401.13575}, eprinttype = {arXiv}, eprint = {2401.13575}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-13575.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MiteloudiADBB24, author = {Konstantina Miteloudi and Asmita Adhikary and Niels van Drueten and Lejla Batina and Ileana Buhan}, title = {Plan your defense: {A} comparative analysis of leakage detection methods on {RISC-V} cores}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {423}, year = {2024}, url = {https://eprint.iacr.org/2024/423}, timestamp = {Wed, 24 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MiteloudiADBB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/PicekPMWB23, author = {Stjepan Picek and Guilherme Perin and Luca Mariot and Lichao Wu and Lejla Batina}, title = {SoK: Deep Learning-based Physical Side-channel Analysis}, journal = {{ACM} Comput. Surv.}, volume = {55}, number = {11}, pages = {227:1--227:35}, year = {2023}, url = {https://doi.org/10.1145/3569577}, doi = {10.1145/3569577}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/PicekPMWB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BatinaCHSS23, author = {Lejla Batina and Lukasz Chmielewski and Bj{\"{o}}rn Haase and Niels Samwel and Peter Schwabe}, title = {SoK: SCA-secure {ECC} in software - mission impossible?}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {1}, pages = {557--589}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i1.557-589}, doi = {10.46586/TCHES.V2023.I1.557-589}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/BatinaCHSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WuWKLPBP23, author = {Lichao Wu and L{\'{e}}o Weissbart and Marina Krcek and Huimin Li and Guilherme Perin and Lejla Batina and Stjepan Picek}, title = {Label Correlation in Deep Learning-Based Side-Channel Analysis}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {18}, pages = {3849--3861}, year = {2023}, url = {https://doi.org/10.1109/TIFS.2023.3287728}, doi = {10.1109/TIFS.2023.3287728}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WuWKLPBP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BatinaCFR23, author = {Lejla Batina and Chip{-}Hong Chang and Domenic Forte and Ulrich R{\"{u}}hrmair}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {{ASHES} '23: Workshop on Attacks and Solutions in Hardware Security}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {3664--3665}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3624028}, doi = {10.1145/3576915.3624028}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BatinaCFR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acns/2023w, editor = {Jianying Zhou and Lejla Batina and Zengpeng Li and Jingqiang Lin and Eleonora Losiouk and Suryadipta Majumdar and Daisuke Mashima and Weizhi Meng and Stjepan Picek and Mohammad Ashiqur Rahman and Jun Shao and Masaki Shimaoka and Ezekiel O. Soremekun and Chunhua Su and Je Sen Teh and Aleksei Udovenko and Cong Wang and Leo Yu Zhang and Yury Zhauniarovich}, title = {Applied Cryptography and Network Security Workshops - {ACNS} 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S{\&}P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13907}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-41181-6}, doi = {10.1007/978-3-031-41181-6}, isbn = {978-3-031-41180-9}, timestamp = {Tue, 20 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/2023w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ashes/2023, editor = {Chip{-}Hong Chang and Ulrich R{\"{u}}hrmair and Lejla Batina and Domenic Forte}, title = {Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware Security, {ASHES} 2023, Copenhagen, Denmark, 30 November 2023}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3605769}, doi = {10.1145/3605769}, timestamp = {Fri, 24 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ashes/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-07783, author = {P{\'{e}}ter Horv{\'{a}}th and Lukasz Chmielewski and Leo Weissbart and Lejla Batina and Yuval Yarom}, title = {BarraCUDA: Bringing Electromagnetic Side Channel Into Play to Steal the Weights of Neural Networks from {NVIDIA} GPUs}, journal = {CoRR}, volume = {abs/2312.07783}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.07783}, doi = {10.48550/ARXIV.2312.07783}, eprinttype = {arXiv}, eprint = {2312.07783}, timestamp = {Mon, 08 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-07783.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KulkarniVPB23, author = {Praveen Kulkarni and Vincent Verneuil and Stjepan Picek and Lejla Batina}, title = {Order vs. Chaos: {A} Language Model Approach for Side-channel Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1615}, year = {2023}, url = {https://eprint.iacr.org/2023/1615}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/KulkarniVPB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dt/BatinaBJP22, author = {Lejla Batina and Shivam Bhasin and Dirmanto Jap and Stjepan Picek}, title = {{SCA} Strikes Back: Reverse-Engineering Neural Network Architectures Using Side Channels}, journal = {{IEEE} Des. Test}, volume = {39}, number = {4}, pages = {7--14}, year = {2022}, url = {https://doi.org/10.1109/MDAT.2021.3128436}, doi = {10.1109/MDAT.2021.3128436}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dt/BatinaBJP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/PaguadaBBA22, author = {Servio Paguada and Lejla Batina and Ileana Buhan and Igor Armendariz}, title = {Playing With Blocks: Toward Re-Usable Deep Learning Models for Side-Channel Profiled Attacks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {17}, pages = {2835--2847}, year = {2022}, url = {https://doi.org/10.1109/TIFS.2022.3196273}, doi = {10.1109/TIFS.2022.3196273}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/PaguadaBBA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/RiojaBAF22, author = {Unai Rioja and Lejla Batina and Igor Armendariz and Jose Luis Flores}, title = {Towards Human Dependency Elimination: {AI} Approach to {SCA} Robustness Assessment}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {17}, pages = {3906--3921}, year = {2022}, url = {https://doi.org/10.1109/TIFS.2022.3176189}, doi = {10.1109/TIFS.2022.3176189}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/RiojaBAF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BacuietiBP22, author = {Nicoleta{-}Norica Bacuieti and Lejla Batina and Stjepan Picek}, editor = {Giuseppe Ateniese and Daniele Venturi}, title = {Deep Neural Networks Aiding Cryptanalysis: {A} Case Study of the Speck Distinguisher}, booktitle = {Applied Cryptography and Network Security - 20th International Conference, {ACNS} 2022, Rome, Italy, June 20-23, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13269}, pages = {809--829}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-09234-3\_40}, doi = {10.1007/978-3-031-09234-3\_40}, timestamp = {Tue, 21 Jun 2022 15:24:40 +0200}, biburl = {https://dblp.org/rec/conf/acns/BacuietiBP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/BuhanBYS22, author = {Ileana Buhan and Lejla Batina and Yuval Yarom and Patrick Schaumont}, editor = {Yuji Suga and Kouichi Sakurai and Xuhua Ding and Kazue Sako}, title = {SoK: Design Tools for Side-Channel-Aware Implementations}, booktitle = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022}, pages = {756--770}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3488932.3517415}, doi = {10.1145/3488932.3517415}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/BuhanBYS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/MukhtarPFBK22, author = {Naila Mukhtar and Louiza Papachristodoulou and Apostolos P. Fournaris and Lejla Batina and Yinan Kong}, editor = {Josep Balasch and Colin O'Flynn}, title = {Machine-Learning Assisted Side-Channel Attacks on {RNS} {ECC} Implementations Using Hybrid Feature Engineering}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 13th International Workshop, {COSADE} 2022, Leuven, Belgium, April 11-12, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13211}, pages = {3--28}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-99766-3\_1}, doi = {10.1007/978-3-030-99766-3\_1}, timestamp = {Fri, 01 Apr 2022 15:49:26 +0200}, biburl = {https://dblp.org/rec/conf/cosade/MukhtarPFBK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/MukhtarBPK22, author = {Naila Mukhtar and Lejla Batina and Stjepan Picek and Yinan Kong}, editor = {Steven D. Galbraith}, title = {Fake It Till You Make It: Data Augmentation Using Generative Adversarial Networks for All the Crypto You Need on Small Devices}, booktitle = {Topics in Cryptology - {CT-RSA} 2022 - Cryptographers' Track at the {RSA} Conference 2022, Virtual Event, March 1-2, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13161}, pages = {297--321}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-95312-6\_13}, doi = {10.1007/978-3-030-95312-6\_13}, timestamp = {Tue, 08 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/MukhtarBPK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/BatinaBBHJ22, author = {Lejla Batina and Shivam Bhasin and Jakub Breier and Xiaolu Hou and Dirmanto Jap}, title = {On Implementation-Level Security of Edge-Based Machine Learning Models}, booktitle = {Security and Artificial Intelligence}, pages = {335--359}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-98795-4\_14}, doi = {10.1007/978-3-030-98795-4\_14}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/lncs/BatinaBBHJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acns/2022w, editor = {Jianying Zhou and Sridhar Adepu and Cristina Alcaraz and Lejla Batina and Emiliano Casalicchio and Sudipta Chattopadhyay and Chenglu Jin and Jingqiang Lin and Eleonora Losiouk and Suryadipta Majumdar and Weizhi Meng and Stjepan Picek and Jun Shao and Chunhua Su and Cong Wang and Yury Zhauniarovich and Saman A. Zonouz}, title = {Applied Cryptography and Network Security Workshops - {ACNS} 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S{\&}P, SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13285}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-16815-4}, doi = {10.1007/978-3-031-16815-4}, isbn = {978-3-031-16814-7}, timestamp = {Tue, 20 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/2022w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/africacrypt/2022, editor = {Lejla Batina and Joan Daemen}, title = {Progress in Cryptology - {AFRICACRYPT} 2022: 13th International Conference on Cryptology in Africa, {AFRICACRYPT} 2022, Fes, Morocco, July 18-20, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13503}, publisher = {Springer Nature Switzerland}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17433-9}, doi = {10.1007/978-3-031-17433-9}, isbn = {978-3-031-17433-9}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/africacrypt/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/space/2021, editor = {Lejla Batina and Stjepan Picek and Mainack Mondal}, title = {Security, Privacy, and Applied Cryptography Engineering - 11th International Conference, {SPACE} 2021, Kolkata, India, December 10-13, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13162}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-95085-9}, doi = {10.1007/978-3-030-95085-9}, isbn = {978-3-030-95084-2}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/space/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/space/2022, editor = {Lejla Batina and Stjepan Picek and Mainack Mondal}, title = {Security, Privacy, and Applied Cryptography Engineering - 12th International Conference, {SPACE} 2022, Jaipur, India, December 9-12, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13783}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22829-2}, doi = {10.1007/978-3-031-22829-2}, isbn = {978-3-031-22828-5}, timestamp = {Thu, 08 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/space/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/lncs/13049, editor = {Lejla Batina and Thomas B{\"{a}}ck and Ileana Buhan and Stjepan Picek}, title = {Security and Artificial Intelligence - {A} Crossdisciplinary Approach}, series = {Lecture Notes in Computer Science}, volume = {13049}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-98795-4}, doi = {10.1007/978-3-030-98795-4}, isbn = {978-3-030-98794-7}, timestamp = {Mon, 02 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/13049.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-01158, author = {Ievgen Kabin and Zoya Dyka and Dan Klann and Nele Mentens and Lejla Batina and Peter Langendoerfer}, title = {Breaking a fully Balanced {ASIC} Coprocessor Implementing Complete Addition Formulas on Weierstrass Elliptic Curves}, journal = {CoRR}, volume = {abs/2201.01158}, year = {2022}, url = {https://arxiv.org/abs/2201.01158}, eprinttype = {arXiv}, eprint = {2201.01158}, timestamp = {Mon, 10 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-01158.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2203-08448, author = {Servio Paguada and Lejla Batina and Ileana Buhan and Igor Armendariz}, title = {Playing with blocks: Toward re-usable deep learning models for side-channel profiled attacks}, journal = {CoRR}, volume = {abs/2203.08448}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2203.08448}, doi = {10.48550/ARXIV.2203.08448}, eprinttype = {arXiv}, eprint = {2203.08448}, timestamp = {Mon, 28 Mar 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2203-08448.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BacuietiBP22, author = {Nicoleta{-}Norica Bacuieti and Lejla Batina and Stjepan Picek}, title = {Deep neural networks aiding cryptanalysis: {A} case study of the Speck distinguisher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {341}, year = {2022}, url = {https://eprint.iacr.org/2022/341}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BacuietiBP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WuWKLPBP22, author = {Lichao Wu and Leo Weissbart and Marina Krcek and Huimin Li and Guilherme Perin and Lejla Batina and Stjepan Picek}, title = {{AGE} Is Not Just a Number: Label Distribution in Deep Learning-based Side-channel Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1507}, year = {2022}, url = {https://eprint.iacr.org/2022/1507}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/WuWKLPBP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RezaeezadeB22, author = {Azade Rezaeezade and Lejla Batina}, title = {Regularizers to the Rescue: Fighting Overfitting in Deep Learning-based Side-channel Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1737}, year = {2022}, url = {https://eprint.iacr.org/2022/1737}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/RezaeezadeB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/PaguadaBA21, author = {Servio Paguada and Lejla Batina and Igor Armendariz}, title = {Toward practical autoencoder-based side-channel analysis evaluations}, journal = {Comput. Networks}, volume = {196}, pages = {108230}, year = {2021}, url = {https://doi.org/10.1016/j.comnet.2021.108230}, doi = {10.1016/J.COMNET.2021.108230}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/PaguadaBA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/RiojaBFA21, author = {Unai Rioja and Lejla Batina and Jose Luis Flores and Igor Armendariz}, title = {Auto-tune POIs: Estimation of distribution algorithms for efficient side-channel analysis}, journal = {Comput. Networks}, volume = {198}, pages = {108405}, year = {2021}, url = {https://doi.org/10.1016/j.comnet.2021.108405}, doi = {10.1016/J.COMNET.2021.108405}, timestamp = {Wed, 21 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/RiojaBFA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jetc/RiojaPBA21, author = {Unai Rioja and Servio Paguada and Lejla Batina and Igor Armendariz}, title = {The Uncertainty of Side-channel Analysis: {A} Way to Leverage from Heuristics}, journal = {{ACM} J. Emerg. Technol. Comput. Syst.}, volume = {17}, number = {3}, pages = {40:1--40:27}, year = {2021}, url = {https://doi.org/10.1145/3446997}, doi = {10.1145/3446997}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jetc/RiojaPBA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/PerinCBP21, author = {Guilherme Perin and Lukasz Chmielewski and Lejla Batina and Stjepan Picek}, title = {Keep it Unsupervised: Horizontal Attacks Meet Deep Learning}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {1}, pages = {343--372}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i1.343-372}, doi = {10.46586/TCHES.V2021.I1.343-372}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/PerinCBP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SheltonCS0BY21, author = {Madura A. Shelton and Lukasz Chmielewski and Niels Samwel and Markus Wagner and Lejla Batina and Yuval Yarom}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic Code}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {685--699}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3485380}, doi = {10.1145/3460120.3485380}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/SheltonCS0BY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dac/BatinaCMSSZ21, author = {Lejla Batina and Rosario Cammarota and Nele Mentens and Ahmad{-}Reza Sadeghi and Johanna Sep{\'{u}}lveda and Shaza Zeitouni}, title = {Invited: Security Beyond Bulk Silicon: Opportunities and Challenges of Emerging Devices}, booktitle = {58th {ACM/IEEE} Design Automation Conference, {DAC} 2021, San Francisco, CA, USA, December 5-9, 2021}, pages = {1--4}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DAC18074.2021.9754222}, doi = {10.1109/DAC18074.2021.9754222}, timestamp = {Wed, 20 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dac/BatinaCMSSZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isqed/RiojaBFA21, author = {Unai Rioja and Lejla Batina and Jose Luis Flores and Igor Armendariz}, title = {Towards Automatic and Portable Data Loading Template Attacks on Microcontrollers}, booktitle = {22nd International Symposium on Quality Electronic Design, {ISQED} 2021, Santa Clara, CA, USA, April 7-9, 2021}, pages = {437--443}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISQED51717.2021.9424276}, doi = {10.1109/ISQED51717.2021.9424276}, timestamp = {Wed, 21 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isqed/RiojaBFA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/LiuSW0LBL21, author = {Zhuoran Liu and Niels Samwel and Leo Weissbart and Zhengyu Zhao and Dirk Lauret and Lejla Batina and Martha A. Larson}, title = {Screen Gleaning: {A} Screen Reading {TEMPEST} Attack on Mobile Devices Exploiting an Electromagnetic Side Channel}, booktitle = {28th Annual Network and Distributed System Security Symposium, {NDSS} 2021, virtually, February 21-25, 2021}, publisher = {The Internet Society}, year = {2021}, url = {https://www.ndss-symposium.org/ndss-paper/screen-gleaning-a-screen-reading-tempest-attack-on-mobile-devices-exploiting-an-electromagnetic-side-channel/}, timestamp = {Wed, 19 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/LiuSW0LBL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/SheltonSB00Y21, author = {Madura A. Shelton and Niels Samwel and Lejla Batina and Francesco Regazzoni and Markus Wagner and Yuval Yarom}, title = {Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers}, booktitle = {28th Annual Network and Distributed System Security Symposium, {NDSS} 2021, virtually, February 21-25, 2021}, publisher = {The Internet Society}, year = {2021}, url = {https://www.ndss-symposium.org/ndss-paper/rosita-towards-automatic-elimination-of-power-analysis-leakage-in-ciphers/}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/SheltonSB00Y21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/samos/MiteloudiBDM21, author = {Konstantina Miteloudi and Lejla Batina and Joan Daemen and Nele Mentens}, editor = {Alex Orailoglu and Matthias Jung and Marc Reichenbach}, title = {{ROCKY:} Rotation Countermeasure for the Protection of Keys and Other Sensitive Data}, booktitle = {Embedded Computer Systems: Architectures, Modeling, and Simulation - 21st International Conference, {SAMOS} 2021, Virtual Event, July 4-8, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13227}, pages = {288--299}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-04580-6\_19}, doi = {10.1007/978-3-031-04580-6\_19}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/samos/MiteloudiBDM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vlsi/MiteloudiCBM21, author = {Konstantina Miteloudi and Lukasz Chmielewski and Lejla Batina and Nele Mentens}, title = {Evaluating the {ROCKY} Countermeasure for Side-Channel Leakage}, booktitle = {29th {IFIP/IEEE} International Conference on Very Large Scale Integration, VLSI-SoC 2021, Singapore, Singapore, October 4-7, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/VLSI-SoC53125.2021.9606973}, doi = {10.1109/VLSI-SOC53125.2021.9606973}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vlsi/MiteloudiCBM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/21/BatinaDHP21, author = {Lejla Batina and Milena Djukanovic and Annelie Heuser and Stjepan Picek}, editor = {Gildas Avoine and Julio Hernandez{-}Castro}, title = {It Started with Templates: The Future of Profiling in Side-Channel Analysis}, booktitle = {Security of Ubiquitous Computing Systems}, pages = {133--145}, publisher = {Springer International Publishing}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-10591-4\_8}, doi = {10.1007/978-3-030-10591-4\_8}, timestamp = {Tue, 04 Jul 2023 14:50:55 +0200}, biburl = {https://dblp.org/rec/books/sp/21/BatinaDHP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acns/2021w, editor = {Jianying Zhou and Chuadhry Mujeeb Ahmed and Lejla Batina and Sudipta Chattopadhyay and Olga Gadyatskaya and Chenglu Jin and Jingqiang Lin and Eleonora Losiouk and Bo Luo and Suryadipta Majumdar and Mihalis Maniatakos and Daisuke Mashima and Weizhi Meng and Stjepan Picek and Masaki Shimaoka and Chunhua Su and Cong Wang}, title = {Applied Cryptography and Network Security Workshops - {ACNS} 2021 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S{\&}P, SCI, SecMT, and SiMLA, Kamakura, Japan, June 21-24, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12809}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-81645-2}, doi = {10.1007/978-3-030-81645-2}, isbn = {978-3-030-81644-5}, timestamp = {Mon, 26 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/2021w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisec/2021, editor = {Christina P{\"{o}}pper and Mathy Vanhoef and Lejla Batina and Ren{\'{e}} Mayrhofer}, title = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3448300}, doi = {10.1145/3448300}, isbn = {978-1-4503-8349-3}, timestamp = {Mon, 28 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2104-08593, author = {Ileana Buhan and Lejla Batina and Yuval Yarom and Patrick Schaumont}, title = {SoK: Design Tools for Side-Channel-Aware Implementions}, journal = {CoRR}, volume = {abs/2104.08593}, year = {2021}, url = {https://arxiv.org/abs/2104.08593}, eprinttype = {arXiv}, eprint = {2104.08593}, timestamp = {Mon, 26 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2104-08593.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2109-11741, author = {Madura A. Shelton and Lukasz Chmielewski and Niels Samwel and Markus Wagner and Lejla Batina and Yuval Yarom}, title = {Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic Code}, journal = {CoRR}, volume = {abs/2109.11741}, year = {2021}, url = {https://arxiv.org/abs/2109.11741}, eprinttype = {arXiv}, eprint = {2109.11741}, timestamp = {Mon, 27 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2109-11741.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-13425, author = {Unai Rioja and Lejla Batina and Igor Armendariz and Jose Luis Flores}, title = {Keep It Unbiased: {A} Comparison Between Estimation of Distribution Algorithms and Deep Learning for Human Interaction-Free Side-Channel Analysis}, journal = {CoRR}, volume = {abs/2111.13425}, year = {2021}, url = {https://arxiv.org/abs/2111.13425}, eprinttype = {arXiv}, eprint = {2111.13425}, timestamp = {Wed, 21 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-13425.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-14416, author = {Servio Paguada and Lejla Batina and Ileana Buhan and Igor Armendariz}, title = {Being Patient and Persistent: Optimizing An Early Stopping Strategy for Deep Learning in Profiled Attacks}, journal = {CoRR}, volume = {abs/2111.14416}, year = {2021}, url = {https://arxiv.org/abs/2111.14416}, eprinttype = {arXiv}, eprint = {2111.14416}, timestamp = {Wed, 01 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-14416.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PaguadaBA21, author = {Servio Paguada and Lejla Batina and Igor Armendariz}, title = {Toward Practical Autoencoder-based Side-Channel Analysis Evaluations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {72}, year = {2021}, url = {https://eprint.iacr.org/2021/072}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/PaguadaBA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BuhanBYS21, author = {Ileana Buhan and Lejla Batina and Yuval Yarom and Patrick Schaumont}, title = {SoK: Design Tools for Side-Channel-Aware Implementations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {497}, year = {2021}, url = {https://eprint.iacr.org/2021/497}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BuhanBYS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WeissbartCPB21, author = {Leo Weissbart and Lukasz Chmielewski and Stjepan Picek and Lejla Batina}, title = {Systematic Side-channel Analysis of Curve25519 with Machine Learning}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {944}, year = {2021}, url = {https://eprint.iacr.org/2021/944}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WeissbartCPB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MukhtarBPK21, author = {Naila Mukhtar and Lejla Batina and Stjepan Picek and Yinan Kong}, title = {Fake it till you make it: Data Augmentation using Generative Adversarial Networks for all the crypto you need on small devices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {991}, year = {2021}, url = {https://eprint.iacr.org/2021/991}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MukhtarBPK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BatinaCHSS21, author = {Lejla Batina and Lukasz Chmielewski and Bj{\"{o}}rn Haase and Niels Samwel and Peter Schwabe}, title = {SCA-secure {ECC} in software - mission impossible?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1003}, year = {2021}, url = {https://eprint.iacr.org/2021/1003}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BatinaCHSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PicekPMWB21, author = {Stjepan Picek and Guilherme Perin and Luca Mariot and Lichao Wu and Lejla Batina}, title = {SoK: Deep Learning-based Physical Side-channel Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1092}, year = {2021}, url = {https://eprint.iacr.org/2021/1092}, timestamp = {Mon, 06 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PicekPMWB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SheltonCSWBY21, author = {Madura A. Shelton and Lukasz Chmielewski and Niels Samwel and Markus Wagner and Lejla Batina and Yuval Yarom}, title = {Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic Code}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1181}, year = {2021}, url = {https://eprint.iacr.org/2021/1181}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SheltonCSWBY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RiojaBAF21, author = {Unai Rioja and Lejla Batina and Igor Armendariz and Jose Luis Flores}, title = {Towards Human Dependency Elimination: {AI} Approach to {SCA} Robustness Assessment}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1316}, year = {2021}, url = {https://eprint.iacr.org/2021/1316}, timestamp = {Wed, 21 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RiojaBAF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BazanganiIBB21, author = {Omid Bazangani and Alexandre Iooss and Ileana Buhan and Lejla Batina}, title = {{ABBY:} Automating the creation of fine-grained leakage models}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1569}, year = {2021}, url = {https://eprint.iacr.org/2021/1569}, timestamp = {Fri, 10 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BazanganiIBB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BatinaM20, author = {Lejla Batina and Nele Mentens}, title = {{PROOFS} 2018 Editorial}, journal = {J. Cryptogr. Eng.}, volume = {10}, number = {4}, pages = {287}, year = {2020}, url = {https://doi.org/10.1007/s13389-020-00248-1}, doi = {10.1007/S13389-020-00248-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BatinaM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhss/WeissbartCPB20, author = {Leo Weissbart and Lukasz Chmielewski and Stjepan Picek and Lejla Batina}, title = {Systematic Side-Channel Analysis of Curve25519 with Machine Learning}, journal = {J. Hardw. Syst. Secur.}, volume = {4}, number = {4}, pages = {314--328}, year = {2020}, url = {https://doi.org/10.1007/s41635-020-00106-w}, doi = {10.1007/S41635-020-00106-W}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jhss/WeissbartCPB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/MassolinoLRB20, author = {Pedro Maat C. Massolino and Patrick Longa and Joost Renes and Lejla Batina}, title = {A Compact and Scalable Hardware/Software Co-design of {SIKE}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {2}, pages = {245--271}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i2.245-271}, doi = {10.13154/TCHES.V2020.I2.245-271}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/MassolinoLRB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/RoelofsSBD20, author = {Niels Roelofs and Niels Samwel and Lejla Batina and Joan Daemen}, editor = {Abderrahmane Nitaj and Amr M. Youssef}, title = {Online Template Attack on {ECDSA:} - Extracting Keys via the Other Side}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2020 - 12th International Conference on Cryptology in Africa, Cairo, Egypt, July 20-22, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12174}, pages = {323--336}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-51938-4\_16}, doi = {10.1007/978-3-030-51938-4\_16}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/RoelofsSBD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/RiojaBA20, author = {Unai Rioja and Lejla Batina and Igor Armendariz}, editor = {Abderrahmane Nitaj and Amr M. Youssef}, title = {When Similarities Among Devices are Taken for Granted: Another Look at Portability}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2020 - 12th International Conference on Cryptology in Africa, Cairo, Egypt, July 20-22, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12174}, pages = {337--357}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-51938-4\_17}, doi = {10.1007/978-3-030-51938-4\_17}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/africacrypt/RiojaBA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsd/KabinDKMBL20, author = {Ievgen Kabin and Zoya Dyka and Dan Klann and Nele Mentens and Lejla Batina and Peter Langend{\"{o}}rfer}, title = {Breaking a fully Balanced {ASIC} Coprocessor Implementing Complete Addition Formulas on Weierstrass Elliptic Curves}, booktitle = {23rd Euromicro Conference on Digital System Design, {DSD} 2020, Kranj, Slovenia, August 26-28, 2020}, pages = {270--276}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/DSD51259.2020.00051}, doi = {10.1109/DSD51259.2020.00051}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dsd/KabinDKMBL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/SimonBDGMP0S20, author = {Thierry Simon and Lejla Batina and Joan Daemen and Vincent Grosso and Pedro Maat Costa Massolino and Kostas Papagiannopoulos and Francesco Regazzoni and Niels Samwel}, editor = {Anne Canteaut and Yuval Ishai}, title = {Friet: An Authenticated Encryption Scheme with Built-in Fault Detection}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12105}, pages = {581--611}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45721-1\_21}, doi = {10.1007/978-3-030-45721-1\_21}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/SimonBDGMP0S20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acns/2020w, editor = {Jianying Zhou and Mauro Conti and Chuadhry Mujeeb Ahmed and Man Ho Au and Lejla Batina and Zhou Li and Jingqiang Lin and Eleonora Losiouk and Bo Luo and Suryadipta Majumdar and Weizhi Meng and Mart{\'{\i}}n Ochoa and Stjepan Picek and Georgios Portokalidis and Cong Wang and Kehuan Zhang}, title = {Applied Cryptography and Network Security Workshops - {ACNS} 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S{\&}P, SCI, SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12418}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-61638-0}, doi = {10.1007/978-3-030-61638-0}, isbn = {978-3-030-61637-3}, timestamp = {Thu, 18 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/2020w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/atis/2020, editor = {Lejla Batina and Gang Li}, title = {Applications and Techniques in Information Security - 11th International Conference, {ATIS} 2020, Brisbane, QLD, Australia, November 12-13, 2020, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1338}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-33-4706-9}, doi = {10.1007/978-981-33-4706-9}, isbn = {978-981-33-4705-2}, timestamp = {Thu, 14 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/atis/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/space/2020, editor = {Lejla Batina and Stjepan Picek and Mainack Mondal}, title = {Security, Privacy, and Applied Cryptography Engineering - 10th International Conference, {SPACE} 2020, Kolkata, India, December 17-21, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12586}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-66626-2}, doi = {10.1007/978-3-030-66626-2}, isbn = {978-3-030-66625-5}, timestamp = {Tue, 05 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/space/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-12810, author = {Unai Rioja and Servio Paguada and Lejla Batina and Igor Armendariz}, title = {The uncertainty of Side-Channel Analysis: {A} way to leverage from heuristics}, journal = {CoRR}, volume = {abs/2006.12810}, year = {2020}, url = {https://arxiv.org/abs/2006.12810}, eprinttype = {arXiv}, eprint = {2006.12810}, timestamp = {Wed, 01 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-12810.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2011-09877, author = {Zhuoran Liu and Niels Samwel and Leo Weissbart and Zhengyu Zhao and Dirk Lauret and Lejla Batina and Martha A. Larson}, title = {Screen Gleaning: {A} Screen Reading {TEMPEST} Attack on Mobile Devices Exploiting an Electromagnetic Side Channel}, journal = {CoRR}, volume = {abs/2011.09877}, year = {2020}, url = {https://arxiv.org/abs/2011.09877}, eprinttype = {arXiv}, eprint = {2011.09877}, timestamp = {Wed, 19 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2011-09877.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-13225, author = {Unai Rioja and Lejla Batina and Jose Luis Flores and Igor Armendariz}, title = {Auto-tune POIs: Estimation of distribution algorithms for efficient side-channel analysis}, journal = {CoRR}, volume = {abs/2012.13225}, year = {2020}, url = {https://arxiv.org/abs/2012.13225}, eprinttype = {arXiv}, eprint = {2012.13225}, timestamp = {Wed, 21 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-13225.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MassolinoLRB20, author = {Pedro Maat C. Massolino and Patrick Longa and Joost Renes and Lejla Batina}, title = {A Compact and Scalable Hardware/Software Co-design of {SIKE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {40}, year = {2020}, url = {https://eprint.iacr.org/2020/040}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MassolinoLRB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SimonBDGMPRS20, author = {Thierry Simon and Lejla Batina and Joan Daemen and Vincent Grosso and Pedro Maat Costa Massolino and Kostas Papagiannopoulos and Francesco Regazzoni and Niels Samwel}, title = {Friet: An Authenticated Encryption Scheme with Built-in Fault Detection}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {425}, year = {2020}, url = {https://eprint.iacr.org/2020/425}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SimonBDGMPRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RiojaPBA20, author = {Unai Rioja and Servio Paguada and Lejla Batina and Igor Armendariz}, title = {The uncertainty of Side-Channel Analysis: {A} way to leverage from heuristics}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {766}, year = {2020}, url = {https://eprint.iacr.org/2020/766}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RiojaPBA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PerinCBP20, author = {Guilherme Perin and Lukasz Chmielewski and Lejla Batina and Stjepan Picek}, title = {Keep it Unsupervised: Horizontal Attacks Meet Deep Learning}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {891}, year = {2020}, url = {https://eprint.iacr.org/2020/891}, timestamp = {Mon, 27 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PerinCBP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WuWKLPBP20, author = {Lichao Wu and Leo Weissbart and Marina Krcek and Huimin Li and Guilherme Perin and Lejla Batina and Stjepan Picek}, title = {Everything is Connected: From Model Learnability to Guessing Entropy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {899}, year = {2020}, url = {https://eprint.iacr.org/2020/899}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WuWKLPBP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MukhtarPFBK20, author = {Naila Mukhtar and Louiza Papachristodoulou and Apostolos P. Fournaris and Lejla Batina and Yinan Kong}, title = {Machine-Learning assisted Side-Channel Attacks on RNS-based Elliptic Curve Implementations using Hybrid Feature Engineering}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1065}, year = {2020}, url = {https://eprint.iacr.org/2020/1065}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MukhtarPFBK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RiojaBFA20, author = {Unai Rioja and Lejla Batina and Jose Luis Flores and Igor Armendariz}, title = {Auto-tune POIs: Estimation of distribution algorithms for efficient side-channel analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1600}, year = {2020}, url = {https://eprint.iacr.org/2020/1600}, timestamp = {Wed, 21 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RiojaBFA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BatinaCPST19, author = {Lejla Batina and Lukasz Chmielewski and Louiza Papachristodoulou and Peter Schwabe and Michael Tunstall}, title = {Online template attacks}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {1}, pages = {21--36}, year = {2019}, url = {https://doi.org/10.1007/s13389-017-0171-8}, doi = {10.1007/S13389-017-0171-8}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BatinaCPST19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mam/PirotteVBM19, author = {Niels Pirotte and Jo Vliegen and Lejla Batina and Nele Mentens}, title = {Balancing elliptic curve coprocessors from bottom to top}, journal = {Microprocess. Microsystems}, volume = {71}, year = {2019}, url = {https://doi.org/10.1016/j.micpro.2019.102866}, doi = {10.1016/J.MICPRO.2019.102866}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mam/PirotteVBM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/Papachristodoulou19, author = {Louiza Papachristodoulou and Apostolos P. Fournaris and Kostas Papagiannopoulos and Lejla Batina}, title = {Practical Evaluation of Protected Residue Number System Scalar Multiplication}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {1}, pages = {259--282}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i1.259-282}, doi = {10.13154/TCHES.V2019.I1.259-282}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/Papachristodoulou19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tecs/BatinaCHL19, author = {Lejla Batina and Sherman S. M. Chow and Gerhard P. Hancke and Zhe Liu}, title = {Introduction to the Special Issue on Cryptographic Engineering for Internet of Things: Security Foundations, Lightweight Solutions, and Attacks}, journal = {{ACM} Trans. Embed. Comput. Syst.}, volume = {18}, number = {3}, pages = {22:1--22:3}, year = {2019}, url = {https://doi.org/10.1145/3322641}, doi = {10.1145/3322641}, timestamp = {Mon, 09 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tecs/BatinaCHL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvlsi/PicekHJB19, author = {Stjepan Picek and Annelie Heuser and Alan Jovic and Lejla Batina}, title = {A Systematic Evaluation of Profiling Through Focused Feature Selection}, journal = {{IEEE} Trans. Very Large Scale Integr. Syst.}, volume = {27}, number = {12}, pages = {2802--2815}, year = {2019}, url = {https://doi.org/10.1109/TVLSI.2019.2937365}, doi = {10.1109/TVLSI.2019.2937365}, timestamp = {Wed, 11 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tvlsi/PicekHJB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AndrikosBCLMPPR19, author = {Christos Andrikos and Lejla Batina and Lukasz Chmielewski and Liran Lerman and Vasilios Mavroudis and Kostas Papagiannopoulos and Guilherme Perin and Giorgos Rassias and Alberto Sonnino}, editor = {Steven D. Galbraith and Shiho Moriai}, title = {Location, Location, Location: Revisiting Modeling and Exploitation for Location-Based Side Channel Leakages}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11923}, pages = {285--314}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34618-8\_10}, doi = {10.1007/978-3-030-34618-8\_10}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/AndrikosBCLMPPR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BatinaBJP19, author = {Lejla Batina and Shivam Bhasin and Dirmanto Jap and Stjepan Picek}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {Poster: Recovering the Input of Neural Networks via Single Shot Side-channel Attacks}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {2657--2659}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3363280}, doi = {10.1145/3319535.3363280}, timestamp = {Tue, 10 Nov 2020 20:00:36 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BatinaBJP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dac/BatinaJMSS19, author = {Lejla Batina and Patrick Jauernig and Nele Mentens and Ahmad{-}Reza Sadeghi and Emmanuel Stapf}, title = {In Hardware We Trust: Gains and Pains of Hardware-assisted Security}, booktitle = {Proceedings of the 56th Annual Design Automation Conference 2019, {DAC} 2019, Las Vegas, NV, USA, June 02-06, 2019}, pages = {44}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3316781.3323480}, doi = {10.1145/3316781.3323480}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dac/BatinaJMSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/space/WeissbartPB19, author = {Leo Weissbart and Stjepan Picek and Lejla Batina}, editor = {Shivam Bhasin and Avi Mendelson and Mridul Nandi}, title = {One Trace Is All It Takes: Machine Learning-Based Side-Channel Attack on EdDSA}, booktitle = {Security, Privacy, and Applied Cryptography Engineering - 9th International Conference, {SPACE} 2019, Gandhinagar, India, December 3-7, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11947}, pages = {86--105}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-35869-3\_8}, doi = {10.1007/978-3-030-35869-3\_8}, timestamp = {Fri, 22 Nov 2019 13:35:40 +0100}, biburl = {https://dblp.org/rec/conf/space/WeissbartPB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BatinaBJP19, author = {Lejla Batina and Shivam Bhasin and Dirmanto Jap and Stjepan Picek}, editor = {Nadia Heninger and Patrick Traynor}, title = {{CSI} {NN:} Reverse Engineering of Neural Network Architectures Through Electromagnetic Side Channel}, booktitle = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara, CA, USA, August 14-16, 2019}, pages = {515--532}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/usenixsecurity19/presentation/batina}, timestamp = {Mon, 01 Feb 2021 08:43:12 +0100}, biburl = {https://dblp.org/rec/conf/uss/BatinaBJP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1912-05183, author = {Madura A. Shelton and Niels Samwel and Lejla Batina and Francesco Regazzoni and Markus Wagner and Yuval Yarom}, title = {Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers}, journal = {CoRR}, volume = {abs/1912.05183}, year = {2019}, url = {http://arxiv.org/abs/1912.05183}, eprinttype = {arXiv}, eprint = {1912.05183}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1912-05183.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AndrikosBCLMPPR19, author = {Christos Andrikos and Lejla Batina and Lukasz Chmielewski and Liran Lerman and Vasilios Mavroudis and Kostas Papagiannopoulos and Guilherme Perin and Giorgos Rassias and Alberto Sonnino}, title = {Location, location, location: Revisiting modeling and exploitation for location-based side channel leakages}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {230}, year = {2019}, url = {https://eprint.iacr.org/2019/230}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AndrikosBCLMPPR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WeissbartPB19, author = {Leo Weissbart and Stjepan Picek and Lejla Batina}, title = {One trace is all it takes: Machine Learning-based Side-channel Attack on EdDSA}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {358}, year = {2019}, url = {https://eprint.iacr.org/2019/358}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WeissbartPB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SheltonSBR0Y19, author = {Madura A. Shelton and Niels Samwel and Lejla Batina and Francesco Regazzoni and Markus Wagner and Yuval Yarom}, title = {Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1445}, year = {2019}, url = {https://eprint.iacr.org/2019/1445}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SheltonSBR0Y19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WeissbartPB19a, author = {Leo Weissbart and Stjepan Picek and Lejla Batina}, title = {On the Performance of Multilayer Perceptron in Profiling Side-channel Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1476}, year = {2019}, url = {https://eprint.iacr.org/2019/1476}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WeissbartPB19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/ChavesCRB18, author = {Ricardo Chaves and Lukasz Chmielewski and Francesco Regazzoni and Lejla Batina}, editor = {Antoine Joux and Abderrahmane Nitaj and Tajjeeddine Rachidi}, title = {SCA-Resistance for {AES:} How Cheap Can We Go?}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2018 - 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10831}, pages = {107--123}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-89339-6\_7}, doi = {10.1007/978-3-319-89339-6\_7}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/ChavesCRB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/SamwelB18, author = {Niels Samwel and Lejla Batina}, editor = {Antoine Joux and Abderrahmane Nitaj and Tajjeeddine Rachidi}, title = {Practical Fault Injection on Deterministic Signatures: The Case of EdDSA}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2018 - 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10831}, pages = {306--321}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-89339-6\_17}, doi = {10.1007/978-3-319-89339-6\_17}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/SamwelB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/SamwelBBDS18, author = {Niels Samwel and Lejla Batina and Guido Bertoni and Joan Daemen and Ruggero Susella}, editor = {Nigel P. Smart}, title = {Breaking Ed25519 in WolfSSL}, booktitle = {Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers' Track at the {RSA} Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10808}, pages = {1--20}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76953-0\_1}, doi = {10.1007/978-3-319-76953-0\_1}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/SamwelBBDS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsd/PirotteVBM18, author = {Niels Pirotte and Jo Vliegen and Lejla Batina and Nele Mentens}, editor = {Martin Novotn{\'{y}} and Nikos Konofaos and Amund Skavhaug}, title = {Design of a Fully Balanced {ASIC} Coprocessor Implementing Complete Addition Formulas on Weierstrass Elliptic Curves}, booktitle = {21st Euromicro Conference on Digital System Design, {DSD} 2018, Prague, Czech Republic, August 29-31, 2018}, pages = {545--552}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/DSD.2018.00095}, doi = {10.1109/DSD.2018.00095}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsd/PirotteVBM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/MaldiniSPB18, author = {Antun Maldini and Niels Samwel and Stjepan Picek and Lejla Batina}, title = {Genetic Algorithm-Based Electromagnetic Fault Injection}, booktitle = {2018 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC} 2018, Amsterdam, The Netherlands, September 13, 2018}, pages = {35--42}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/FDTC.2018.00014}, doi = {10.1109/FDTC.2018.00014}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fdtc/MaldiniSPB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ches/2018proofs, editor = {Lejla Batina and Ulrich K{\"{u}}hne and Nele Mentens}, title = {{PROOFS} 2018, 7th International Workshop on Security Proofs for Embedded Systems, colocated with {CHES} 2018, Amsterdam, The Netherlands, September 13, 2018}, series = {Kalpa Publications in Computing}, volume = {7}, publisher = {EasyChair}, year = {2018}, url = {http://www.easychair.org/publications/volume/PROOFS\_2018}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/2018proofs.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1810-09076, author = {Lejla Batina and Shivam Bhasin and Dirmanto Jap and Stjepan Picek}, title = {{CSI} Neural Network: Using Side-channels to Recover Your Artificial Neural Network Information}, journal = {CoRR}, volume = {abs/1810.09076}, year = {2018}, url = {http://arxiv.org/abs/1810.09076}, eprinttype = {arXiv}, eprint = {1810.09076}, timestamp = {Wed, 31 Oct 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1810-09076.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BatinaBJP18, author = {Lejla Batina and Shivam Bhasin and Dirmanto Jap and Stjepan Picek}, title = {{CSI} Neural Network: Using Side-channels to Recover Your Artificial Neural Network Information}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {477}, year = {2018}, url = {https://eprint.iacr.org/2018/477}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BatinaBJP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpl/MassolinoBCM17, author = {Pedro Maat C. Massolino and Lejla Batina and Ricardo Chaves and Nele Mentens}, editor = {Marco D. Santambrogio and Diana G{\"{o}}hringer and Dirk Stroobandt and Nele Mentens and Jari Nurmi}, title = {Area-optimized montgomery multiplication on {IGLOO} 2 FPGAs}, booktitle = {27th International Conference on Field Programmable Logic and Applications, {FPL} 2017, Ghent, Belgium, September 4-8, 2017}, pages = {1--4}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/FPL.2017.8056762}, doi = {10.23919/FPL.2017.8056762}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fpl/MassolinoBCM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/samos/AndrikosRLPB17, author = {Christos Andrikos and Giorgos Rassias and Liran Lerman and Kostas Papagiannopoulos and Lejla Batina}, editor = {Yale N. Patt and S. K. Nandy}, title = {Location-based leakages: New directions in modeling and exploiting}, booktitle = {2017 International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation, {SAMOS} 2017, Pythagorion, Greece, July 17-20, 2017}, pages = {246--252}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/SAMOS.2017.8344636}, doi = {10.1109/SAMOS.2017.8344636}, timestamp = {Tue, 27 Apr 2021 15:13:55 +0200}, biburl = {https://dblp.org/rec/conf/samos/AndrikosRLPB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SamwelBBDS17, author = {Niels Samwel and Lejla Batina and Guido Bertoni and Joan Daemen and Ruggero Susella}, title = {Breaking Ed25519 in WolfSSL}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {985}, year = {2017}, url = {http://eprint.iacr.org/2017/985}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SamwelBBDS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PicekHJBL17, author = {Stjepan Picek and Annelie Heuser and Alan Jovic and Lejla Batina and Axel Legay}, title = {The secrets of profiling for side-channel analysis: feature selection matters}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1110}, year = {2017}, url = {http://eprint.iacr.org/2017/1110}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PicekHJBL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/asc/PicekJMBC16, author = {Stjepan Picek and Domagoj Jakobovic and Julian F. Miller and Lejla Batina and Marko Cupic}, title = {Cryptographic Boolean functions: One output, many design criteria}, journal = {Appl. Soft Comput.}, volume = {40}, pages = {635--653}, year = {2016}, url = {https://doi.org/10.1016/j.asoc.2015.10.066}, doi = {10.1016/J.ASOC.2015.10.066}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/asc/PicekJMBC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/PicekSJB0SM16, author = {Stjepan Picek and Dominik Sisejkovic and Domagoj Jakobovic and Lejla Batina and Bohan Yang and Danilo Sijacic and Nele Mentens}, editor = {David Pointcheval and Abderrahmane Nitaj and Tajjeeddine Rachidi}, title = {Extreme Pipelining Towards the Best Area-Performance Trade-Off in Hardware}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2016 - 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9646}, pages = {147--166}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-31517-1\_8}, doi = {10.1007/978-3-319-31517-1\_8}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/PicekSJB0SM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aspdac/JiangEP0B16, author = {Ke Jiang and Petru Eles and Zebo Peng and Sudipta Chattopadhyay and Lejla Batina}, title = {{SPARTA:} {A} scheduling policy for thwarting differential power analysis attacks}, booktitle = {21st Asia and South Pacific Design Automation Conference, {ASP-DAC} 2016, Macao, Macao, January 25-28, 2016}, pages = {667--672}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ASPDAC.2016.7428088}, doi = {10.1109/ASPDAC.2016.7428088}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/aspdac/JiangEP0B16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cd/AlparBBMKGN16, author = {Gergely Alp{\'{a}}r and Lejla Batina and Lynn Margaret Batten and Veelasha Moonsamy and Anna Krasnova and Antoine Guellier and Iynkaran Natgunanathan}, editor = {Gianluca Palermo and John Feo}, title = {New directions in IoT privacy using attribute-based authentication}, booktitle = {Proceedings of the {ACM} International Conference on Computing Frontiers, CF'16, Como, Italy, May 16-19, 2016}, pages = {461--466}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2903150.2911710}, doi = {10.1145/2903150.2911710}, timestamp = {Tue, 06 Nov 2018 11:07:33 +0100}, biburl = {https://dblp.org/rec/conf/cd/AlparBBMKGN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/RenesSSB16, author = {Joost Renes and Peter Schwabe and Benjamin Smith and Lejla Batina}, editor = {Benedikt Gierlichs and Axel Y. Poschmann}, title = {{\textbackslash}mu Kummer: Efficient Hyperelliptic Signatures and Key Exchange on Microcontrollers}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9813}, pages = {301--320}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53140-2\_15}, doi = {10.1007/978-3-662-53140-2\_15}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/RenesSSB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/DugardinPNBDG16, author = {Margaux Dugardin and Louiza Papachristodoulou and Zakaria Najm and Lejla Batina and Jean{-}Luc Danger and Sylvain Guilley}, editor = {Fran{\c{c}}ois{-}Xavier Standaert and Elisabeth Oswald}, title = {Dismantling Real-World {ECC} with Horizontal and Vertical Template Attacks}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 7th International Workshop, {COSADE} 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9689}, pages = {88--108}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-43283-0\_6}, doi = {10.1007/978-3-319-43283-0\_6}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cosade/DugardinPNBDG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dtis/FournarisPBS16, author = {Apostolos P. Fournaris and Louiza Papachristodoulou and Lejla Batina and Nicolas Sklavos}, title = {Residue Number System as a side channel and fault injection attack countermeasure in elliptic curve cryptography}, booktitle = {2016 International Conference on Design and Technology of Integrated Systems in Nanoscale Era, {DTIS} 2016, Istanbul, Turkey, April 12-14, 2016}, pages = {1--4}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/DTIS.2016.7483807}, doi = {10.1109/DTIS.2016.7483807}, timestamp = {Fri, 15 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dtis/FournarisPBS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/RenesCB16, author = {Joost Renes and Craig Costello and Lejla Batina}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Complete Addition Formulas for Prime Order Elliptic Curves}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9665}, pages = {403--428}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49890-3\_16}, doi = {10.1007/978-3-662-49890-3\_16}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/RenesCB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/OzgenPB16, author = {Elif Ozgen and Louiza Papachristodoulou and Lejla Batina}, editor = {William H. Robinson and Swarup Bhunia and Ryan Kastner}, title = {Template attacks using classification algorithms}, booktitle = {2016 {IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2016, McLean, VA, USA, May 3-5, 2016}, pages = {242--247}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/HST.2016.7495589}, doi = {10.1109/HST.2016.7495589}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/OzgenPB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lightsec/GrootPPSB16, author = {Wouter de Groot and Kostas Papagiannopoulos and Antonio de la Piedra and Erik Schneider and Lejla Batina}, editor = {Andrey Bogdanov}, title = {Bitsliced Masking and {ARM:} Friends or Foes?}, booktitle = {Lightweight Cryptography for Security and Privacy - 5th International Workshop, LightSec 2016, Aksaray, Turkey, September 21-22, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10098}, pages = {91--109}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-55714-4\_7}, doi = {10.1007/978-3-319-55714-4\_7}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/lightsec/GrootPPSB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rfidsec/MahmudluBBB16, author = {Rauf Mahmudlu and Valentina Banciu and Lejla Batina and Ileana Buhan}, editor = {Gerhard P. Hancke and Konstantinos Markantonakis}, title = {LDA-Based Clustering as a Side-Channel Distinguisher}, booktitle = {Radio Frequency Identification and IoT Security - 12th International Workshop, RFIDSec 2016, Hong Kong, China, November 30 - December 2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10155}, pages = {62--75}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62024-4\_5}, doi = {10.1007/978-3-319-62024-4\_5}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/rfidsec/MahmudluBBB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/space/MassolinoRB16, author = {Pedro Maat C. Massolino and Joost Renes and Lejla Batina}, editor = {Claude Carlet and M. Anwar Hasan and Vishal Saraswat}, title = {Implementing Complete Formulas on Weierstrass Curves in Hardware}, booktitle = {Security, Privacy, and Applied Cryptography Engineering - 6th International Conference, {SPACE} 2016, Hyderabad, India, December 14-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10076}, pages = {89--108}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49445-6\_5}, doi = {10.1007/978-3-319-49445-6\_5}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/space/MassolinoRB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/RenesSSB16, author = {Joost Renes and Peter Schwabe and Benjamin Smith and Lejla Batina}, title = {{\textdollar}{\(\mu\)}{\textdollar}Kummer: efficient hyperelliptic signatures and key exchange on microcontrollers}, journal = {CoRR}, volume = {abs/1604.06059}, year = {2016}, url = {http://arxiv.org/abs/1604.06059}, eprinttype = {arXiv}, eprint = {1604.06059}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/RenesSSB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-reports/BatinaBSS16, author = {Lejla Batina and Swarup Bhunia and Patrick Schaumont and Jean{-}Pierre Seifert}, title = {Foundations of Secure Scaling (Dagstuhl Seminar 16342)}, journal = {Dagstuhl Reports}, volume = {6}, number = {8}, pages = {65--90}, year = {2016}, url = {https://doi.org/10.4230/DagRep.6.8.65}, doi = {10.4230/DAGREP.6.8.65}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/BatinaBSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MassolinoBCM16, author = {Pedro Maat C. Massolino and Lejla Batina and Ricardo Chaves and Nele Mentens}, title = {Low Power Montgomery Modular Multiplication on Reconfigurable Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {280}, year = {2016}, url = {http://eprint.iacr.org/2016/280}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MassolinoBCM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RenesSSB16, author = {Joost Renes and Peter Schwabe and Benjamin Smith and Lejla Batina}, title = {{\textbackslash}({\textbackslash}mu{\textbackslash})Kummer: efficient hyperelliptic signatures and key exchange on microcontrollers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {366}, year = {2016}, url = {http://eprint.iacr.org/2016/366}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RenesSSB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrootPPSB16, author = {Wouter de Groot and Kostas Papagiannopoulos and Antonio de la Piedra and Erik Schneider and Lejla Batina}, title = {Bitsliced Masking and {ARM:} Friends or Foes?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {946}, year = {2016}, url = {http://eprint.iacr.org/2016/946}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrootPPSB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MahmudluBBB16, author = {Rauf Mahmudlu and Valentina Banciu and Lejla Batina and Ileana Buhan}, title = {LDA-Based Clustering as a Side-Channel Distinguisher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1024}, year = {2016}, url = {http://eprint.iacr.org/2016/1024}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MahmudluBBB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MassolinoRB16, author = {Pedro Maat C. Massolino and Joost Renes and Lejla Batina}, title = {Implementing Complete Formulas on Weierstrass Curves in Hardware}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1133}, year = {2016}, url = {http://eprint.iacr.org/2016/1133}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MassolinoRB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BatinaR15, author = {Lejla Batina and Matthew J. B. Robshaw}, title = {Introduction to the {CHES} 2014 special issue}, journal = {J. Cryptogr. Eng.}, volume = {5}, number = {2}, pages = {71--72}, year = {2015}, url = {https://doi.org/10.1007/s13389-015-0098-x}, doi = {10.1007/S13389-015-0098-X}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BatinaR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/PicekBBJ15, author = {Stjepan Picek and Lejla Batina and Pieter Buzing and Domagoj Jakobovic}, editor = {Stefan Mangard and Axel Y. Poschmann}, title = {Fault Injection with a New Flavor: Memetic Algorithms Make a Difference}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 6th International Workshop, {COSADE} 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9064}, pages = {159--173}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-21476-4\_11}, doi = {10.1007/978-3-319-21476-4\_11}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cosade/PicekBBJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurogp/PicekJMMB15, author = {Stjepan Picek and Domagoj Jakobovic and Julian F. Miller and Elena Marchiori and Lejla Batina}, editor = {Penousal Machado and Malcolm I. Heywood and James McDermott and Mauro Castelli and Pablo Garc{\'{\i}}a{-}S{\'{a}}nchez and Paolo Burelli and Sebastian Risi and Kevin Sim}, title = {Evolutionary Methods for the Construction of Cryptographic Boolean Functions}, booktitle = {Genetic Programming - 18th European Conference, EuroGP 2015, Copenhagen, Denmark, April 8-10, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9025}, pages = {192--204}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-16501-1\_16}, doi = {10.1007/978-3-319-16501-1\_16}, timestamp = {Sun, 25 Jul 2021 11:44:36 +0200}, biburl = {https://dblp.org/rec/conf/eurogp/PicekJMMB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/PicekCJMB15, author = {Stjepan Picek and Claude Carlet and Domagoj Jakobovic and Julian F. Miller and Lejla Batina}, editor = {Sara Silva and Anna Isabel Esparcia{-}Alc{\'{a}}zar}, title = {Correlation Immunity of Boolean Functions: An Evolutionary Algorithms Perspective}, booktitle = {Proceedings of the Genetic and Evolutionary Computation Conference, {GECCO} 2015, Madrid, Spain, July 11-15, 2015}, pages = {1095--1102}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2739480.2754764}, doi = {10.1145/2739480.2754764}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gecco/PicekCJMB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/PicekMJB15, author = {Stjepan Picek and Julian F. Miller and Domagoj Jakobovic and Lejla Batina}, editor = {Sara Silva and Anna Isabel Esparcia{-}Alc{\'{a}}zar}, title = {Cartesian Genetic Programming Approach for Generating Substitution Boxes of Different Sizes}, booktitle = {Genetic and Evolutionary Computation Conference, {GECCO} 2015, Madrid, Spain, July 11-15, 2015, Companion Material Proceedings}, pages = {1457--1458}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2739482.2764698}, doi = {10.1145/2739482.2764698}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gecco/PicekMJB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/GravesNBBEFMPRR15, author = {Ricardo Chaves and Giorgio Di Natale and Lejla Batina and Shivam Bhasin and Baris Ege and Apostolos P. Fournaris and Nele Mentens and Stjepan Picek and Francesco Regazzoni and Vladimir Rozic and Nicolas Sklavos and Bohan Yang}, title = {Challenges in designing trustworthy cryptographic co-processors}, booktitle = {2015 {IEEE} International Symposium on Circuits and Systems, {ISCAS} 2015, Lisbon, Portugal, May 24-27, 2015}, pages = {2009--2012}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISCAS.2015.7169070}, doi = {10.1109/ISCAS.2015.7169070}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscas/GravesNBBEFMPRR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/EgePBP15, author = {Baris Ege and Kostas Papagiannopoulos and Lejla Batina and Stjepan Picek}, title = {Improving {DPA} resistance of S-boxes: How far can we go?}, booktitle = {2015 {IEEE} International Symposium on Circuits and Systems, {ISCAS} 2015, Lisbon, Portugal, May 24-27, 2015}, pages = {2013--2016}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISCAS.2015.7169071}, doi = {10.1109/ISCAS.2015.7169071}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscas/EgePBP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/EgeEB15, author = {Baris Ege and Thomas Eisenbarth and Lejla Batina}, editor = {Orr Dunkelman and Liam Keliher}, title = {Near Collision Side Channel Attacks}, booktitle = {Selected Areas in Cryptography - {SAC} 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9566}, pages = {277--292}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31301-6\_17}, doi = {10.1007/978-3-319-31301-6\_17}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/EgeEB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/space/PicekMMB15, author = {Stjepan Picek and Bodhisatwa Mazumdar and Debdeep Mukhopadhyay and Lejla Batina}, editor = {Rajat Subhra Chakraborty and Peter Schwabe and Jon A. Solworth}, title = {Modified Transparency Order Property: Solution or Just Another Attempt}, booktitle = {Security, Privacy, and Applied Cryptography Engineering - 5th International Conference, {SPACE} 2015, Jaipur, India, October 3-7, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9354}, pages = {210--227}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24126-5\_13}, doi = {10.1007/978-3-319-24126-5\_13}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/space/PicekMMB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EgeEB15, author = {Baris Ege and Thomas Eisenbarth and Lejla Batina}, title = {Near Collision Side Channel Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {511}, year = {2015}, url = {http://eprint.iacr.org/2015/511}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EgeEB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DugardinPNBDGCT15, author = {Margaux Dugardin and Louiza Papachristodoulou and Zakaria Najm and Lejla Batina and Jean{-}Luc Danger and Sylvain Guilley and Jean{-}Christophe Courr{\`{e}}ge and Carine Therond}, title = {Dismantling real-world {ECC} with Horizontal and Vertical Template Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1001}, year = {2015}, url = {http://eprint.iacr.org/2015/1001}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DugardinPNBDGCT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SingeleeSBV15, author = {Dave Singel{\'{e}}e and Stefaan Seys and Lejla Batina and Ingrid Verbauwhede}, title = {The Energy Budget for Wireless Security: Extended Version}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1029}, year = {2015}, url = {http://eprint.iacr.org/2015/1029}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SingeleeSBV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RenesCB15, author = {Joost Renes and Craig Costello and Lejla Batina}, title = {Complete addition formulas for prime order elliptic curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1060}, year = {2015}, url = {http://eprint.iacr.org/2015/1060}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RenesCB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/balkancryptsec/MentensBB14, author = {Nele Mentens and Lejla Batina and Sel{\c{c}}uk Baktir}, editor = {Berna {\"{O}}rs and Bart Preneel}, title = {An Elliptic Curve Cryptographic Processor Using Edwards Curves and the Number Theoretic Transform}, booktitle = {Cryptography and Information Security in the Balkans - First International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9024}, pages = {94--102}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-21356-9\_7}, doi = {10.1007/978-3-319-21356-9\_7}, timestamp = {Tue, 16 Nov 2021 09:08:54 +0100}, biburl = {https://dblp.org/rec/conf/balkancryptsec/MentensBB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/KorakHEB14, author = {Thomas Korak and Michael Hutter and Baris Ege and Lejla Batina}, editor = {Assia Tria and Dooho Choi}, title = {Clock Glitch Attacks in the Presence of Heating}, booktitle = {2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC} 2014, Busan, South Korea, September 23, 2014}, pages = {104--114}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/FDTC.2014.20}, doi = {10.1109/FDTC.2014.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fdtc/KorakHEB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hipeac/PicekEBJCG14, author = {Stjepan Picek and Baris Ege and Lejla Batina and Domagoj Jakobovic and Lukasz Chmielewski and Marin Golub}, editor = {Jens Knoop and Valentina Salapura and Israel Koren and Gerardo Pelosi}, title = {On using genetic algorithms for intrinsic side-channel resistance: the case of {AES} S-box}, booktitle = {Proceedings of the First Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2014, Vienna, Austria, January 20, 2014}, pages = {13--18}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2556315.2556319}, doi = {10.1145/2556315.2556319}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hipeac/PicekEBJCG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/PicekEPBJ14, author = {Stjepan Picek and Baris Ege and Kostas Papagiannopoulos and Lejla Batina and Domagoj Jakobovic}, title = {Optimality and beyond: The case of 4{\texttimes}4 S-boxes}, booktitle = {2014 {IEEE} International Symposium on Hardware-Oriented Security and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014}, pages = {80--83}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/HST.2014.6855573}, doi = {10.1109/HST.2014.6855573}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/PicekEPBJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/BatinaCPST14, author = {Lejla Batina and Lukasz Chmielewski and Louiza Papachristodoulou and Peter Schwabe and Michael Tunstall}, editor = {Willi Meier and Debdeep Mukhopadhyay}, title = {Online Template Attacks}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2014 - 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8885}, pages = {21--36}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13039-2\_2}, doi = {10.1007/978-3-319-13039-2\_2}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/indocrypt/BatinaCPST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/BatinaJMPPS14, author = {Lejla Batina and Domagoj Jakobovic and Nele Mentens and Stjepan Picek and Antonio de la Piedra and Dominik Sisejkovic}, editor = {Willi Meier and Debdeep Mukhopadhyay}, title = {S-box Pipelining Using Genetic Algorithms for High-Throughput {AES} Implementations: How Fast Can We Go?}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2014 - 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8885}, pages = {322--337}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13039-2\_19}, doi = {10.1007/978-3-319-13039-2\_19}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/BatinaJMPPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/PicekPEBJ14, author = {Stjepan Picek and Kostas Papagiannopoulos and Baris Ege and Lejla Batina and Domagoj Jakobovic}, editor = {Willi Meier and Debdeep Mukhopadhyay}, title = {Confused by Confusion: Systematic Evaluation of {DPA} Resistance of Various S-boxes}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2014 - 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8885}, pages = {374--390}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13039-2\_22}, doi = {10.1007/978-3-319-13039-2\_22}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/PicekPEBJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isvlsi/JiangBEP14, author = {Ke Jiang and Lejla Batina and Petru Eles and Zebo Peng}, title = {Robustness Analysis of Real-Time Scheduling Against Differential Power Analysis Attacks}, booktitle = {{IEEE} Computer Society Annual Symposium on VLSI, {ISVLSI} 2014, Tampa, FL, USA, July 9-11, 2014}, pages = {450--455}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ISVLSI.2014.11}, doi = {10.1109/ISVLSI.2014.11}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isvlsi/JiangBEP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mipro/PicekBJC14, author = {Stjepan Picek and Lejla Batina and Domagoj Jakobovic and Rafael Boix Carpi}, title = {Evolving genetic algorithms for fault injection attacks}, booktitle = {37th International Convention on Information and Communication Technology, Electronics and Microelectronics, {MIPRO} 2014, Opatija, Croatia, May 26-30, 2014}, pages = {1106--1111}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/MIPRO.2014.6859734}, doi = {10.1109/MIPRO.2014.6859734}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mipro/PicekBJC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ppsn/PicekBJ14, author = {Stjepan Picek and Lejla Batina and Domagoj Jakobovic}, editor = {Thomas Bartz{-}Beielstein and J{\"{u}}rgen Branke and Bogdan Filipic and Jim Smith}, title = {Evolving DPA-Resistant Boolean Functions}, booktitle = {Parallel Problem Solving from Nature - {PPSN} {XIII} - 13th International Conference, Ljubljana, Slovenia, September 13-17, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8672}, pages = {812--821}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10762-2\_80}, doi = {10.1007/978-3-319-10762-2\_80}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ppsn/PicekBJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ppsn/PicekMBJ14, author = {Stjepan Picek and Elena Marchiori and Lejla Batina and Domagoj Jakobovic}, editor = {Thomas Bartz{-}Beielstein and J{\"{u}}rgen Branke and Bogdan Filipic and Jim Smith}, title = {Combining Evolutionary Computation and Algebraic Constructions to Find Cryptography-Relevant Boolean Functions}, booktitle = {Parallel Problem Solving from Nature - {PPSN} {XIII} - 13th International Conference, Ljubljana, Slovenia, September 13-17, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8672}, pages = {822--831}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10762-2\_81}, doi = {10.1007/978-3-319-10762-2\_81}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ppsn/PicekMBJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rfidsec/BatinaHHK14, author = {Lejla Batina and Jens Hermans and Jaap{-}Henk Hoepman and Anna Krasnova}, editor = {Nitesh Saxena and Ahmad{-}Reza Sadeghi}, title = {High-Speed Dating Privacy-Preserving Attribute Matching for {RFID}}, booktitle = {Radio Frequency Identification: Security and Privacy Issues - 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8651}, pages = {19--35}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13066-8\_2}, doi = {10.1007/978-3-319-13066-8\_2}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/rfidsec/BatinaHHK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/PicekBJEG14, author = {Stjepan Picek and Lejla Batina and Domagoj Jakobovic and Baris Ege and Marin Golub}, editor = {David Naccache and Damien Sauveron}, title = {S-box, SET, Match: {A} Toolbox for S-box Analysis}, booktitle = {Information Security Theory and Practice. Securing the Internet of Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8501}, pages = {140--149}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43826-8\_10}, doi = {10.1007/978-3-662-43826-8\_10}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/PicekBJEG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ches/2014, editor = {Lejla Batina and Matthew Robshaw}, title = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8731}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44709-3}, doi = {10.1007/978-3-662-44709-3}, isbn = {978-3-662-44708-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BatinaJMPPS14, author = {Lejla Batina and Domagoj Jakobovic and Nele Mentens and Stjepan Picek and Antonio de la Piedra and Dominik Sisejkovic}, title = {S-box pipelining using genetic algorithms for high-throughput {AES} implementations: How fast can we go?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {734}, year = {2014}, url = {http://eprint.iacr.org/2014/734}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BatinaJMPPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcad/DasEGBV13, author = {Amitabh Das and Baris Ege and Santosh Ghosh and Lejla Batina and Ingrid Verbauwhede}, title = {Security Analysis of Industrial Test Compression Schemes}, journal = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.}, volume = {32}, number = {12}, pages = {1966--1977}, year = {2013}, url = {https://doi.org/10.1109/TCAD.2013.2274619}, doi = {10.1109/TCAD.2013.2274619}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcad/DasEGBV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/CarpiPBMJG13, author = {Rafael Boix Carpi and Stjepan Picek and Lejla Batina and Federico Menarini and Domagoj Jakobovic and Marin Golub}, editor = {Aur{\'{e}}lien Francillon and Pankaj Rohatgi}, title = {Glitch It If You Can: Parameter Search Strategies for Successful Fault Injection}, booktitle = {Smart Card Research and Advanced Applications - 12th International Conference, {CARDIS} 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8419}, pages = {236--252}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-08302-5\_16}, doi = {10.1007/978-3-319-08302-5\_16}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/CarpiPBMJG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rfidsec/BatinaDEKMPVY13, author = {Lejla Batina and Amitabh Das and Baris Ege and Elif Bilge Kavun and Nele Mentens and Christof Paar and Ingrid Verbauwhede and Tolga Yal{\c{c}}in}, editor = {Michael Hutter and J{\"{o}}rn{-}Marc Schmidt}, title = {Dietary Recommendations for Lightweight Block Ciphers: Power, Energy and Area Analysis of Recently Developed Architectures}, booktitle = {Radio Frequency Identification - Security and Privacy Issues 9th International Workshop, RFIDsec 2013, Graz, Austria, July 9-11, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8262}, pages = {103--112}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41332-2\_7}, doi = {10.1007/978-3-642-41332-2\_7}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/rfidsec/BatinaDEKMPVY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/sps/KnezevicBMFGLMV13, author = {Miroslav Knezevic and Lejla Batina and Elke De Mulder and Junfeng Fan and Benedikt Gierlichs and Yong Ki Lee and Roel Maes and Ingrid Verbauwhede}, editor = {Shuvra S. Bhattacharyya and Ed F. Deprettere and Rainer Leupers and Jarmo Takala}, title = {Signal Processing for Cryptography and Security Applications}, booktitle = {Handbook of Signal Processing Systems}, pages = {223--241}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-1-4614-6859-2\_7}, doi = {10.1007/978-1-4614-6859-2\_7}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/reference/sps/KnezevicBMFGLMV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BatinaDEKMPVY13, author = {Lejla Batina and Amitabh Das and Baris Ege and Elif Bilge Kavun and Nele Mentens and Christof Paar and Ingrid Verbauwhede and Tolga Yal{\c{c}}in}, title = {Dietary Recommendations for Lightweight Block Ciphers: Power, Energy and Area Analysis of Recently Developed Architectures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {753}, year = {2013}, url = {http://eprint.iacr.org/2013/753}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BatinaDEKMPVY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/puc/BatinaLSSV12, author = {Lejla Batina and Yong Ki Lee and Stefaan Seys and Dave Singel{\'{e}}e and Ingrid Verbauwhede}, title = {Extending ECC-based {RFID} authentication protocols to privacy-preserving multi-party grouping proofs}, journal = {Pers. Ubiquitous Comput.}, volume = {16}, number = {3}, pages = {323--335}, year = {2012}, url = {https://doi.org/10.1007/s00779-011-0392-2}, doi = {10.1007/S00779-011-0392-2}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/puc/BatinaLSSV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/BalaschGVBV12, author = {Josep Balasch and Benedikt Gierlichs and Roel Verdult and Lejla Batina and Ingrid Verbauwhede}, editor = {Orr Dunkelman}, title = {Power Analysis of Atmel CryptoMemory - Recovering Keys from Secure EEPROMs}, booktitle = {Topics in Cryptology - {CT-RSA} 2012 - The Cryptographers' Track at the {RSA} Conference 2012, San Francisco, CA, USA, February 27 - March 2, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7178}, pages = {19--34}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-27954-6\_2}, doi = {10.1007/978-3-642-27954-6\_2}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/BalaschGVBV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/BatinaHW12, author = {Lejla Batina and Jip Hogenboom and Jasper G. J. van Woudenberg}, editor = {Orr Dunkelman}, title = {Getting More from {PCA:} First Results of Using Principal Component Analysis for Extensive Power Analysis}, booktitle = {Topics in Cryptology - {CT-RSA} 2012 - The Cryptographers' Track at the {RSA} Conference 2012, San Francisco, CA, USA, February 27 - March 2, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7178}, pages = {383--397}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-27954-6\_24}, doi = {10.1007/978-3-642-27954-6\_24}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/BatinaHW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmb/AlparBV12, author = {Gergely Alp{\'{a}}r and Lejla Batina and Roel Verdult}, editor = {Jens B. Schmitt}, title = {Using {NFC} Phones for Proving Credentials}, booktitle = {Measurement, Modelling, and Evaluation of Computing Systems and Dependability and Fault Tolerance - 16th International {GI/ITG} Conference, {MMB} {\&} {DFT} 2012, Kaiserslautern, Germany, March 19-21, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7201}, pages = {317--330}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28540-0\_26}, doi = {10.1007/978-3-642-28540-0\_26}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/mmb/AlparBV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkdd/MavroeidisBLM12, author = {Dimitrios Mavroeidis and Lejla Batina and Twan van Laarhoven and Elena Marchiori}, editor = {Peter A. Flach and Tijl De Bie and Nello Cristianini}, title = {PCA, Eigenvector Localization and Clustering for Side-Channel Attacks on Cryptographic Hardware Devices}, booktitle = {Machine Learning and Knowledge Discovery in Databases - European Conference, {ECML} {PKDD} 2012, Bristol, UK, September 24-28, 2012. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {7523}, pages = {253--268}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33460-3\_22}, doi = {10.1007/978-3-642-33460-3\_22}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/pkdd/MavroeidisBLM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rfidsec/AlparBL12, author = {Gergely Alp{\'{a}}r and Lejla Batina and Wouter Lueks}, editor = {Jaap{-}Henk Hoepman and Ingrid Verbauwhede}, title = {Designated Attribute-Based Proofs for {RFID} Applications}, booktitle = {Radio Frequency Identification. Security and Privacy Issues - 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7739}, pages = {59--75}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-36140-1\_5}, doi = {10.1007/978-3-642-36140-1\_5}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/rfidsec/AlparBL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/integration/FanBV11, author = {Junfeng Fan and Lejla Batina and Ingrid Verbauwhede}, title = {Design and design methods for unified multiplier and inverter and its application for {HECC}}, journal = {Integr.}, volume = {44}, number = {4}, pages = {280--289}, year = {2011}, url = {https://doi.org/10.1016/j.vlsi.2011.04.001}, doi = {10.1016/J.VLSI.2011.04.001}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/integration/FanBV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BatinaGPRSV11, author = {Lejla Batina and Benedikt Gierlichs and Emmanuel Prouff and Matthieu Rivain and Fran{\c{c}}ois{-}Xavier Standaert and Nicolas Veyrat{-}Charvillon}, title = {Mutual Information Analysis: a Comprehensive Study}, journal = {J. Cryptol.}, volume = {24}, number = {2}, pages = {269--291}, year = {2011}, url = {https://doi.org/10.1007/s00145-010-9084-8}, doi = {10.1007/S00145-010-9084-8}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BatinaGPRSV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/MuijrersWB11, author = {Ruben A. Muijrers and Jasper G. J. van Woudenberg and Lejla Batina}, editor = {Emmanuel Prouff}, title = {{RAM:} Rapid Alignment Method}, booktitle = {Smart Card Research and Advanced Applications - 10th {IFIP} {WG} 8.8/11.2 International Conference, {CARDIS} 2011, Leuven, Belgium, September 14-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7079}, pages = {266--282}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27257-8\_17}, doi = {10.1007/978-3-642-27257-8\_17}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cardis/MuijrersWB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rfidsec/BatinaSSV11, author = {Lejla Batina and Stefaan Seys and Dave Singel{\'{e}}e and Ingrid Verbauwhede}, editor = {Ari Juels and Christof Paar}, title = {Hierarchical ECC-Based {RFID} Authentication Protocol}, booktitle = {{RFID.} Security and Privacy - 7th International Workshop, RFIDSec 2011, Amherst, USA, June 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7055}, pages = {183--201}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25286-0\_12}, doi = {10.1007/978-3-642-25286-0\_12}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/rfidsec/BatinaSSV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/SingeleeSBV11, author = {Dave Singel{\'{e}}e and Stefaan Seys and Lejla Batina and Ingrid Verbauwhede}, editor = {Dieter Gollmann and Dirk Westhoff and Gene Tsudik and N. Asokan}, title = {The communication and computation cost of wireless security: extended abstract}, booktitle = {Proceedings of the Fourth {ACM} Conference on Wireless Network Security, {WISEC} 2011, Hamburg, Germany, June 14-17, 2011}, pages = {1--4}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1998412.1998414}, doi = {10.1145/1998412.1998414}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/SingeleeSBV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/BatinaHJMV10, author = {Lejla Batina and Jaap{-}Henk Hoepman and Bart Jacobs and Wojciech Mostowski and Pim Vullers}, editor = {Dieter Gollmann and Jean{-}Louis Lanet and Julien Iguchi{-}Cartigny}, title = {Developing Efficient Blinded Attribute Certificates on Smart Cards via Pairings}, booktitle = {Smart Card Research and Advanced Application, 9th {IFIP} {WG} 8.8/11.2 International Conference, {CARDIS} 2010, Passau, Germany, April 14-16, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6035}, pages = {209--222}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12510-2\_15}, doi = {10.1007/978-3-642-12510-2\_15}, timestamp = {Sat, 30 May 2020 20:05:42 +0200}, biburl = {https://dblp.org/rec/conf/cardis/BatinaHJMV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/GierlichsBPV10, author = {Benedikt Gierlichs and Lejla Batina and Bart Preneel and Ingrid Verbauwhede}, editor = {Josef Pieprzyk}, title = {Revisiting Higher-Order {DPA} Attacks:}, booktitle = {Topics in Cryptology - {CT-RSA} 2010, The Cryptographers' Track at the {RSA} Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5985}, pages = {221--234}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11925-5\_16}, doi = {10.1007/978-3-642-11925-5\_16}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/GierlichsBPV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/LiSBNO10, author = {Yang Li and Kazuo Sakiyama and Lejla Batina and Daisuke Nakatsu and Kazuo Ohta}, editor = {Giovanni De Micheli and Bashir M. Al{-}Hashimi and Wolfgang M{\"{u}}ller and Enrico Macii}, title = {Power Variance Analysis breaks a masked {ASIC} implementation of {AES}}, booktitle = {Design, Automation and Test in Europe, {DATE} 2010, Dresden, Germany, March 8-12, 2010}, pages = {1059--1064}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/DATE.2010.5456966}, doi = {10.1109/DATE.2010.5456966}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/date/LiSBNO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpl/FanBBGPV10, author = {Junfeng Fan and Daniel V. Bailey and Lejla Batina and Tim G{\"{u}}neysu and Christof Paar and Ingrid Verbauwhede}, title = {Breaking Elliptic Curve Cryptosystems Using Reconfigurable Hardware}, booktitle = {International Conference on Field Programmable Logic and Applications, {FPL} 2010, August 31 2010 - September 2, 2010, Milano, Italy}, pages = {133--138}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/FPL.2010.34}, doi = {10.1109/FPL.2010.34}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fpl/FanBBGPV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icecsys/BatinaHMMV10, author = {Lejla Batina and Jip Hogenboom and Nele Mentens and Joren Moelans and Jo Vliegen}, title = {Side-channel evaluation of {FPGA} implementations of binary Edwards curves}, booktitle = {17th {IEEE} International Conference on Electronics, Circuits, and Systems, {ICECS} 2010, Athens, Greece, 12-15 December, 2010}, pages = {1248--1251}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ICECS.2010.5724745}, doi = {10.1109/ICECS.2010.5724745}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icecsys/BatinaHMMV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/BatinaLSSV10, author = {Lejla Batina and Yong Ki Lee and Stefaan Seys and Dave Singel{\'{e}}e and Ingrid Verbauwhede}, editor = {Mike Burmester and Gene Tsudik and Spyros S. Magliveras and Ivana Ilic}, title = {Privacy-Preserving ECC-Based Grouping Proofs for {RFID}}, booktitle = {Information Security - 13th International Conference, {ISC} 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6531}, pages = {159--165}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-18178-8\_14}, doi = {10.1007/978-3-642-18178-8\_14}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/BatinaLSSV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobilight/LeeBSV10, author = {Yong Ki Lee and Lejla Batina and Dave Singel{\'{e}}e and Ingrid Verbauwhede}, editor = {Periklis Chatzimisios and Christos V. Verikoukis and Ignacio Santamar{\'{\i}}a and Massimiliano Laddomada and Oliver Hoffmann}, title = {Wide-Weak Privacy-Preserving {RFID} Authentication Protocols}, booktitle = {Mobile Lightweight Wireless Systems - Second International {ICST} Conference, {MOBILIGHT} 2010, Barcelona, Spain, May 10-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {45}, pages = {254--267}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16644-0\_23}, doi = {10.1007/978-3-642-16644-0\_23}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobilight/LeeBSV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/LeeBSV10, author = {Yong Ki Lee and Lejla Batina and Dave Singel{\'{e}}e and Ingrid Verbauwhede}, editor = {Susanne Wetzel and Cristina Nita{-}Rotaru and Frank Stajano}, title = {Low-cost untraceable authentication protocols for {RFID}}, booktitle = {Proceedings of the Third {ACM} Conference on Wireless Network Security, {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010}, pages = {55--64}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1741866.1741877}, doi = {10.1145/1741866.1741877}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/LeeBSV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/daglib/p/KnezevicBMFGLMV10, author = {Miroslav Knezevic and Lejla Batina and Elke De Mulder and Junfeng Fan and Benedikt Gierlichs and Yong Ki Lee and Roel Maes and Ingrid Verbauwhede}, editor = {Shuvra S. Bhattacharyya and Ed F. Deprettere and Rainer Leupers and Jarmo Takala}, title = {Signal Processing for Cryptography and Security Applications}, booktitle = {Handbook of Signal Processing Systems}, pages = {161--177}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-6345-1\_7}, doi = {10.1007/978-1-4419-6345-1\_7}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/daglib/p/KnezevicBMFGLMV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/10/SakiyamaB10, author = {Kazuo Sakiyama and Lejla Batina}, editor = {Ingrid M. R. Verbauwhede}, title = {Arithmetic for Public-Key Cryptography}, booktitle = {Secure Integrated Circuits and Systems}, series = {Integrated Circuits and Systems}, pages = {63--78}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-0-387-71829-3\_4}, doi = {10.1007/978-0-387-71829-3\_4}, timestamp = {Wed, 26 Jun 2019 18:00:01 +0200}, biburl = {https://dblp.org/rec/books/sp/10/SakiyamaB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/10/BatinaSV10, author = {Lejla Batina and Kazuo Sakiyama and Ingrid M. R. Verbauwhede}, editor = {Ingrid M. R. Verbauwhede}, title = {Compact Public-Key Implementations for {RFID} and Sensor Nodes}, booktitle = {Secure Integrated Circuits and Systems}, series = {Integrated Circuits and Systems}, pages = {179--195}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-0-387-71829-3\_10}, doi = {10.1007/978-0-387-71829-3\_10}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/10/BatinaSV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/LeeBSPV10, author = {Yong Ki Lee and Lejla Batina and Dave Singel{\'{e}}e and Bart Preneel and Ingrid Verbauwhede}, editor = {Ahmad{-}Reza Sadeghi and David Naccache}, title = {Anti-counterfeiting, Untraceability and Other Security Challenges for {RFID} Systems: Public-Key-Based Protocols and Hardware}, booktitle = {Towards Hardware-Intrinsic Security - Foundations and Practice}, series = {Information Security and Cryptography}, pages = {237--257}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14452-3\_11}, doi = {10.1007/978-3-642-14452-3\_11}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/LeeBSPV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BatinaGL09, author = {Lejla Batina and Benedikt Gierlichs and Kerstin Lemke{-}Rust}, editor = {Christophe Clavier and Kris Gaj}, title = {Differential Cluster Analysis}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5747}, pages = {112--127}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04138-9\_9}, doi = {10.1007/978-3-642-04138-9\_9}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/BatinaGL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/FanBV09, author = {Junfeng Fan and Lejla Batina and Ingrid Verbauwhede}, title = {Light-weight implementation options for curve-based cryptography: {HECC} is also ready for {RFID}}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402516}, doi = {10.1109/ICITST.2009.5402516}, timestamp = {Mon, 09 Aug 2021 17:01:45 +0200}, biburl = {https://dblp.org/rec/conf/icitst/FanBV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iolts/FanKKMRBV09, author = {Junfeng Fan and Miroslav Knezevic and Dusko Karaklajic and Roel Maes and Vladimir Rozic and Lejla Batina and Ingrid Verbauwhede}, title = {FPGA-based testing strategy for cryptographic chips: {A} case study on Elliptic Curve Processor for {RFID} tags}, booktitle = {15th {IEEE} International On-Line Testing Symposium {(IOLTS} 2009), 24-26 June 2009, Sesimbra-Lisbon, Portugal}, pages = {189--191}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/IOLTS.2009.5196009}, doi = {10.1109/IOLTS.2009.5196009}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iolts/FanKKMRBV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/KnezevicBV09, author = {Miroslav Knezevic and Lejla Batina and Ingrid Verbauwhede}, title = {Modular Reduction without Precomputational Phase}, booktitle = {International Symposium on Circuits and Systems {(ISCAS} 2009), 24-17 May 2009, Taipei, Taiwan}, pages = {1389--1392}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ISCAS.2009.5118024}, doi = {10.1109/ISCAS.2009.5118024}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/iscas/KnezevicBV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanrightB09, author = {David Canright and Lejla Batina}, title = {A Very Compact "Perfectly Masked" S-Box for {AES} (corrected)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {11}, year = {2009}, url = {http://eprint.iacr.org/2009/011}, timestamp = {Mon, 08 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanrightB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GierlichsBPV09, author = {Benedikt Gierlichs and Lejla Batina and Bart Preneel and Ingrid Verbauwhede}, title = {Revisiting Higher-Order {DPA} Attacks: Multivariate Mutual Information Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {228}, year = {2009}, url = {http://eprint.iacr.org/2009/228}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GierlichsBPV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaileyBBBBBDMFGGKLMPRSU09, author = {Daniel V. Bailey and Brian Baldwin and Lejla Batina and Daniel J. Bernstein and Peter Birkner and Joppe W. Bos and Gauthier Van Damme and Giacomo de Meulenaer and Junfeng Fan and Tim G{\"{u}}neysu and Frank K. G{\"{u}}rkaynak and Thorsten Kleinjung and Tanja Lange and Nele Mentens and Christof Paar and Francesco Regazzoni and Peter Schwabe and Leif Uhsadel}, title = {The Certicom Challenges {ECC2-X}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {466}, year = {2009}, url = {http://eprint.iacr.org/2009/466}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaileyBBBBBDMFGGKLMPRSU09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaileyBBBBCCDMPFGGKLMNPRSUHY09, author = {Daniel V. Bailey and Lejla Batina and Daniel J. Bernstein and Peter Birkner and Joppe W. Bos and Hsieh{-}Chung Chen and Chen{-}Mou Cheng and Gauthier Van Damme and Giacomo de Meulenaer and Luis J. Dominguez Perez and Junfeng Fan and Tim G{\"{u}}neysu and Frank K. G{\"{u}}rkaynak and Thorsten Kleinjung and Tanja Lange and Nele Mentens and Ruben Niederhagen and Christof Paar and Francesco Regazzoni and Peter Schwabe and Leif Uhsadel and Anthony Van Herrewege and Bo{-}Yin Yang}, title = {Breaking {ECC2K-130}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {541}, year = {2009}, url = {http://eprint.iacr.org/2009/541}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaileyBBBBCCDMPFGGKLMNPRSUHY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijes/OrsBPV08, author = {Siddika Berna {\"{O}}rs and Lejla Batina and Bart Preneel and Joos Vandewalle}, title = {Hardware implementation of an elliptic curve processor over GF(p) with Montgomery modular multiplier}, journal = {Int. J. Embed. Syst.}, volume = {3}, number = {4}, pages = {229--240}, year = {2008}, url = {https://doi.org/10.1504/IJES.2008.022394}, doi = {10.1504/IJES.2008.022394}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijes/OrsBPV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/LeeSBV08, author = {Yong Ki Lee and Kazuo Sakiyama and Lejla Batina and Ingrid Verbauwhede}, title = {Elliptic-Curve-Based Security Processor for {RFID}}, journal = {{IEEE} Trans. Computers}, volume = {57}, number = {11}, pages = {1514--1527}, year = {2008}, url = {https://doi.org/10.1109/TC.2008.148}, doi = {10.1109/TC.2008.148}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/LeeSBV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/CanrightB08, author = {David Canright and Lejla Batina}, editor = {Steven M. Bellovin and Rosario Gennaro and Angelos D. Keromytis and Moti Yung}, title = {A Very Compact "Perfectly Masked" S-Box for {AES}}, booktitle = {Applied Cryptography and Network Security, 6th International Conference, {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5037}, pages = {446--459}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68914-0\_27}, doi = {10.1007/978-3-540-68914-0\_27}, timestamp = {Mon, 08 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/CanrightB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asap/AticiBFVY08, author = {Ali Can Atici and Lejla Batina and Junfeng Fan and Ingrid Verbauwhede and Siddika Berna {\"{O}}rs}, title = {Low-cost implementations of {NTRU} for pervasive security}, booktitle = {19th {IEEE} International Conference on Application-Specific Systems, Architectures and Processors, {ASAP} 2008, July 2-4, 2008, Leuven, Belgium}, pages = {79--84}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ASAP.2008.4580158}, doi = {10.1109/ASAP.2008.4580158}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asap/AticiBFVY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GierlichsBTP08, author = {Benedikt Gierlichs and Lejla Batina and Pim Tuyls and Bart Preneel}, editor = {Elisabeth Oswald and Pankaj Rohatgi}, title = {Mutual Information Analysis}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5154}, pages = {426--442}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85053-3\_27}, doi = {10.1007/978-3-540-85053-3\_27}, timestamp = {Thu, 14 Oct 2021 10:28:51 +0200}, biburl = {https://dblp.org/rec/conf/ches/GierlichsBTP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/FanBSV08, author = {Junfeng Fan and Lejla Batina and Kazuo Sakiyama and Ingrid Verbauwhede}, editor = {Donatella Sciuto}, title = {{FPGA} Design for Algebraic Tori-Based Public-Key Cryptography}, booktitle = {Design, Automation and Test in Europe, {DATE} 2008, Munich, Germany, March 10-14, 2008}, pages = {1292--1297}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1109/DATE.2008.4484857}, doi = {10.1109/DATE.2008.4484857}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/date/FanBSV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/BatinaGL08, author = {Lejla Batina and Benedikt Gierlichs and Kerstin Lemke{-}Rust}, editor = {Tzong{-}Chen Wu and Chin{-}Laung Lei and Vincent Rijmen and Der{-}Tsai Lee}, title = {Comparative Evaluation of Rank Correlation Based {DPA} on an {AES} Prototype Chip}, booktitle = {Information Security, 11th International Conference, {ISC} 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5222}, pages = {341--354}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85886-7\_24}, doi = {10.1007/978-3-540-85886-7\_24}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/BatinaGL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/FanBV08, author = {Junfeng Fan and Lejla Batina and Ingrid Verbauwhede}, editor = {Roberto Maria Avanzi and Liam Keliher and Francesco Sica}, title = {{HECC} Goes Embedded: An Area-Efficient Implementation of {HECC}}, booktitle = {Selected Areas in Cryptography, 15th International Workshop, {SAC} 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5381}, pages = {387--400}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-04159-4\_25}, doi = {10.1007/978-3-642-04159-4\_25}, timestamp = {Thu, 07 Sep 2023 13:44:11 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/FanBV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/MulderDBP08, author = {Yoni De Mulder and George Danezis and Lejla Batina and Bart Preneel}, editor = {Vijay Atluri and Marianne Winslett}, title = {Identification via location-profiling in {GSM} networks}, booktitle = {Proceedings of the 2008 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2008, Alexandria, VA, USA, October 27, 2008}, pages = {23--32}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456403.1456409}, doi = {10.1145/1456403.1456409}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/MulderDBP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/SakiyamaBPV07, author = {Kazuo Sakiyama and Lejla Batina and Bart Preneel and Ingrid Verbauwhede}, title = {{HW/SW} co-design for public-key cryptosystems on the 8051 micro-controller}, journal = {Comput. Electr. Eng.}, volume = {33}, number = {5-6}, pages = {324--332}, year = {2007}, url = {https://doi.org/10.1016/j.compeleceng.2007.05.005}, doi = {10.1016/J.COMPELECENG.2007.05.005}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/SakiyamaBPV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/integration/HodjatBHV07, author = {Alireza Hodjat and Lejla Batina and David Hwang and Ingrid Verbauwhede}, title = {{HW/SW} co-design of a hyperelliptic curve cryptosystem using a microcode instruction set coprocessor}, journal = {Integr.}, volume = {40}, number = {1}, pages = {45--51}, year = {2007}, url = {https://doi.org/10.1016/j.vlsi.2005.12.011}, doi = {10.1016/J.VLSI.2005.12.011}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/integration/HodjatBHV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/SakiyamaBPV07, author = {Kazuo Sakiyama and Lejla Batina and Bart Preneel and Ingrid Verbauwhede}, title = {High-performance Public-key Cryptoprocessor for Wireless Mobile Applications}, journal = {Mob. Networks Appl.}, volume = {12}, number = {4}, pages = {245--258}, year = {2007}, url = {https://doi.org/10.1007/s11036-007-0020-6}, doi = {10.1007/S11036-007-0020-6}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/monet/SakiyamaBPV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/SakiyamaBPV07, author = {Kazuo Sakiyama and Lejla Batina and Bart Preneel and Ingrid Verbauwhede}, title = {Multicore Curve-Based Cryptoprocessor with Reconfigurable Modular Arithmetic Logic Units over GF(2\({}^{\mbox{n}}\))}, journal = {{IEEE} Trans. Computers}, volume = {56}, number = {9}, pages = {1269--1282}, year = {2007}, url = {https://doi.org/10.1109/TC.2007.1071}, doi = {10.1109/TC.2007.1071}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/SakiyamaBPV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/BatinaMSPV07, author = {Lejla Batina and Nele Mentens and Kazuo Sakiyama and Bart Preneel and Ingrid Verbauwhede}, title = {Public-Key Cryptography on the Top of a Needle}, booktitle = {International Symposium on Circuits and Systems {(ISCAS} 2007), 27-20 May 2007, New Orleans, Louisiana, {USA}}, pages = {1831--1834}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/ISCAS.2007.378270}, doi = {10.1109/ISCAS.2007.378270}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscas/BatinaMSPV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/BatinaGKMTV07, author = {Lejla Batina and Jorge Guajardo and Tim Kerins and Nele Mentens and Pim Tuyls and Ingrid Verbauwhede}, title = {Public-Key Cryptography for RFID-Tags}, booktitle = {Fifth Annual {IEEE} International Conference on Pervasive Computing and Communications - Workshops (PerCom Workshops 2007), 19-23 March 2007, White Plains, New York, {USA}}, pages = {217--222}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/PERCOMW.2007.98}, doi = {10.1109/PERCOMW.2007.98}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/BatinaGKMTV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/samos/MentensSBPV07, author = {Nele Mentens and Kazuo Sakiyama and Lejla Batina and Bart Preneel and Ingrid Verbauwhede}, editor = {Holger Blume and Georgi Gaydadjiev and C. John Glossner and Peter M. W. Knijnenburg}, title = {A Side-channel Attack Resistant Programmable {PKC} Coprocessor for Embedded Applications}, booktitle = {Proceedings of the 2007 International Conference on Embedded Computer Systems: Architectures, Modeling and Simulation {(IC-SAMOS} 2007), Samos, Greece, July 16-19, 2007}, pages = {194--200}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/ICSAMOS.2007.4285751}, doi = {10.1109/ICSAMOS.2007.4285751}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/samos/MentensSBPV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GierlichsBT07, author = {Benedikt Gierlichs and Lejla Batina and Pim Tuyls}, title = {Mutual Information Analysis - {A} Universal Differential Side-Channel Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {198}, year = {2007}, url = {http://eprint.iacr.org/2007/198}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GierlichsBT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/arc/MentensBPV06, author = {Nele Mentens and Lejla Batina and Bart Preneel and Ingrid Verbauwhede}, editor = {Koen Bertels and Jo{\~{a}}o M. P. Cardoso and Stamatis Vassiliadis}, title = {Time-Memory Trade-Off Attack on {FPGA} Platforms: {UNIX} Password Cracking}, booktitle = {Reconfigurable Computing: Architectures and Applications, Second International Workshop, {ARC} 2006, Delft, The Netherlands, March 1-3, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3985}, pages = {323--334}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11802839\_41}, doi = {10.1007/11802839\_41}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/arc/MentensBPV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/arc/SakiyamaMBPV06, author = {Kazuo Sakiyama and Nele Mentens and Lejla Batina and Bart Preneel and Ingrid Verbauwhede}, editor = {Koen Bertels and Jo{\~{a}}o M. P. Cardoso and Stamatis Vassiliadis}, title = {Reconfigurable Modular Arithmetic Logic Unit for High-Performance Public-Key Cryptosystems}, booktitle = {Reconfigurable Computing: Architectures and Applications, Second International Workshop, {ARC} 2006, Delft, The Netherlands, March 1-3, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3985}, pages = {347--357}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11802839\_43}, doi = {10.1007/11802839\_43}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/arc/SakiyamaMBPV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/SakiyamaBPV06, author = {Kazuo Sakiyama and Lejla Batina and Bart Preneel and Ingrid Verbauwhede}, editor = {Louis Goubin and Mitsuru Matsui}, title = {Superscalar Coprocessor for High-Speed Curve-Based Cryptography}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4249}, pages = {415--429}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11894063\_33}, doi = {10.1007/11894063\_33}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/SakiyamaBPV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/TuylsB06, author = {Pim Tuyls and Lejla Batina}, editor = {David Pointcheval}, title = {RFID-Tags for Anti-counterfeiting}, booktitle = {Topics in Cryptology - {CT-RSA} 2006, The Cryptographers' Track at the {RSA} Conference 2006, San Jose, CA, USA, February 13-17, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3860}, pages = {115--131}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11605805\_8}, doi = {10.1007/11605805\_8}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/TuylsB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/BatinaMSPV06, author = {Lejla Batina and Nele Mentens and Kazuo Sakiyama and Bart Preneel and Ingrid Verbauwhede}, editor = {Levente Butty{\'{a}}n and Virgil D. Gligor and Dirk Westhoff}, title = {Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks}, booktitle = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4357}, pages = {6--17}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11964254\_3}, doi = {10.1007/11964254\_3}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/BatinaMSPV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpl/BatinaHHSV06, author = {Lejla Batina and Alireza Hodjat and David Hwang and Kazuo Sakiyama and Ingrid Verbauwhede}, title = {Reconfigurable Architectures for Curve-Based Cryptography on Embedded Micro-Controllers}, booktitle = {Proceedings of the 2006 International Conference on Field Programmable Logic and Applications (FPL), Madrid, Spain, August 28-30, 2006}, pages = {1--4}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/FPL.2006.311286}, doi = {10.1109/FPL.2006.311286}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fpl/BatinaHHSV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpl/MentensSBVP06, author = {Nele Mentens and Kazuo Sakiyama and Lejla Batina and Ingrid Verbauwhede and Bart Preneel}, title = {Fpga-Oriented Secure Data Path Design: Implementation of a Public Key Coprocessor}, booktitle = {Proceedings of the 2006 International Conference on Field Programmable Logic and Applications (FPL), Madrid, Spain, August 28-30, 2006}, pages = {1--6}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/FPL.2006.311205}, doi = {10.1109/FPL.2006.311205}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fpl/MentensSBVP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/BatinaMPV06, author = {Lejla Batina and Nele Mentens and Bart Preneel and Ingrid Verbauwhede}, title = {Flexible hardware architectures for curve-based cryptography}, booktitle = {International Symposium on Circuits and Systems {(ISCAS} 2006), 21-24 May 2006, Island of Kos, Greece}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ISCAS.2006.1693714}, doi = {10.1109/ISCAS.2006.1693714}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscas/BatinaMPV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BatinaGKMTV06, author = {Lejla Batina and Jorge Guajardo and Tim Kerins and Nele Mentens and Pim Tuyls and Ingrid Verbauwhede}, title = {An Elliptic Curve Processor Suitable For RFID-Tags}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {227}, year = {2006}, url = {http://eprint.iacr.org/2006/227}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BatinaGKMTV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asap/BatinaMPV05, author = {Lejla Batina and Nele Mentens and Bart Preneel and Ingrid Verbauwhede}, title = {Side-channel aware design: Algorithms and Architectures for Elliptic Curve Cryptography over GF(2\({}^{\mbox{n}}\))}, booktitle = {16th {IEEE} International Conference on Application-Specific Systems, Architectures, and Processors {(ASAP} 2005), 23-25 July 2005, Samos, Greece}, pages = {350--355}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ASAP.2005.57}, doi = {10.1109/ASAP.2005.57}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asap/BatinaMPV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BatinaHHPV05, author = {Lejla Batina and David Hwang and Alireza Hodjat and Bart Preneel and Ingrid Verbauwhede}, editor = {Josyula R. Rao and Berk Sunar}, title = {Hardware/Software Co-design for Hyperelliptic Curve Cryptography {(HECC)} on the 8051{\(\mathrm{\mu}\)}P}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {106--118}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_8}, doi = {10.1007/11545262\_8}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BatinaHHPV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/MentensBPV05, author = {Nele Mentens and Lejla Batina and Bart Preneel and Ingrid Verbauwhede}, editor = {Alfred Menezes}, title = {A Systematic Evaluation of Compact Hardware Implementations for the Rijndael S-Box}, booktitle = {Topics in Cryptology - {CT-RSA} 2005, The Cryptographers' Track at the {RSA} Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3376}, pages = {323--333}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30574-3\_22}, doi = {10.1007/978-3-540-30574-3\_22}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/MentensBPV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iolts/BatinaMV05, author = {Lejla Batina and Nele Mentens and Ingrid Verbauwhede}, title = {Side-Channel Issues for Designing Secure Hardware Implementations}, booktitle = {11th {IEEE} International On-Line Testing Symposium {(IOLTS} 2005), 6-8 July 2005, Saint Raphael, France}, pages = {118--121}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/IOLTS.2005.64}, doi = {10.1109/IOLTS.2005.64}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iolts/BatinaMV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/BatinaBO04, author = {Lejla Batina and Geeke Bruin{-}Muurling and Siddika Berna {\"{O}}rs}, editor = {Tatsuaki Okamoto}, title = {Flexible Hardware Design for {RSA} and Elliptic Curve Cryptosystems}, booktitle = {Topics in Cryptology - {CT-RSA} 2004, The Cryptographers' Track at the {RSA} Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2964}, pages = {250--263}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24660-2\_20}, doi = {10.1007/978-3-540-24660-2\_20}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/BatinaBO04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/integration/BatinaOPV03, author = {Lejla Batina and Siddika Berna {\"{O}}rs and Bart Preneel and Joos Vandewalle}, title = {Hardware architectures for public key cryptography}, journal = {Integr.}, volume = {34}, number = {1-2}, pages = {1--64}, year = {2003}, url = {https://doi.org/10.1016/S0167-9260(02)00053-6}, doi = {10.1016/S0167-9260(02)00053-6}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/integration/BatinaOPV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asap/OrsBPV03, author = {Siddika Berna {\"{O}}rs and Lejla Batina and Bart Preneel and Joos Vandewalle}, title = {Hardware Implementation of an Elliptic Curve Processor over GF(p)}, booktitle = {14th {IEEE} International Conference on Application-Specific Systems, Architectures, and Processors {(ASAP} 2003), 24-26 June 2003, The Hague, The Netherlands}, pages = {433--443}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/ASAP.2003.1212866}, doi = {10.1109/ASAP.2003.1212866}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asap/OrsBPV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipps/OrsBPV03, author = {Siddika Berna {\"{O}}rs and Lejla Batina and Bart Preneel and Joos Vandewalle}, title = {Hardware Implementation of a Montgomery Modular Multiplier in a Systolic Array}, booktitle = {17th International Parallel and Distributed Processing Symposium {(IPDPS} 2003), 22-26 April 2003, Nice, France, CD-ROM/Abstracts Proceedings}, pages = {184}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/IPDPS.2003.1213341}, doi = {10.1109/IPDPS.2003.1213341}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipps/OrsBPV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/BatinaM02, author = {Lejla Batina and Geeke Muurling}, editor = {Bart Preneel}, title = {Montgomery in Practice: How to Do It More Efficiently in Hardware}, booktitle = {Topics in Cryptology - {CT-RSA} 2002, The Cryptographer's Track at the {RSA} Conference, 2002, San Jose, CA, USA, February 18-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2271}, pages = {40--52}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45760-7\_4}, doi = {10.1007/3-540-45760-7\_4}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/BatinaM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/BatinaM01, author = {Lejla Batina and Geeke Muurling}, editor = {Bahram Honary}, title = {Another Way of Doing {RSA} Cryptography in Hardware}, booktitle = {Cryptography and Coding, 8th {IMA} International Conference, Cirencester, UK, December 17-19, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2260}, pages = {364--373}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45325-3\_33}, doi = {10.1007/3-540-45325-3\_33}, timestamp = {Wed, 18 Mar 2020 16:01:01 +0100}, biburl = {https://dblp.org/rec/conf/ima/BatinaM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/XuB01, author = {Sheng{-}Bo Xu and Lejla Batina}, editor = {George I. Davida and Yair Frankel}, title = {Efficient Implementation of Elliptic Curve Cryptosystems on an {ARM7} with Hardware Accelerator}, booktitle = {Information Security, 4th International Conference, {ISC} 2001, Malaga, Spain, October 1-3, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2200}, pages = {266--279}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45439-X\_18}, doi = {10.1007/3-540-45439-X\_18}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/XuB01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.