BibTeX records: Lejla Batina

download as .bib file

@article{DBLP:journals/tches/JahandidehMB24,
  author       = {Vahid Jahandideh and
                  Bart Mennink and
                  Lejla Batina},
  title        = {An Algebraic Approach for Evaluating Random Probing Security With
                  Application to {AES}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {4},
  pages        = {657--689},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i4.657-689},
  doi          = {10.46586/TCHES.V2024.I4.657-689},
  timestamp    = {Thu, 19 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/JahandidehMB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/HorvathCWBY24,
  author       = {P{\'{e}}ter Horv{\'{a}}th and
                  Lukasz Chmielewski and
                  Leo Weissbart and
                  Lejla Batina and
                  Yuval Yarom},
  editor       = {Martin Andreoni},
  title        = {{CNN} Architecture Extraction on Edge {GPU}},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2024
                  Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE,
                  and CIMSS, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14586},
  pages        = {158--175},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-61486-6\_10},
  doi          = {10.1007/978-3-031-61486-6\_10},
  timestamp    = {Wed, 10 Jul 2024 20:46:37 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/HorvathCWBY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/SerafiniWB24,
  author       = {Gabriele Serafini and
                  L{\'{e}}o Weissbart and
                  Lejla Batina},
  editor       = {Martin Andreoni},
  title        = {Everything All at Once: Deep Learning Side-Channel Analysis Optimization
                  Framework},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2024
                  Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE,
                  and CIMSS, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14586},
  pages        = {195--212},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-61486-6\_12},
  doi          = {10.1007/978-3-031-61486-6\_12},
  timestamp    = {Wed, 10 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/SerafiniWB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/arc/AdhikaryBBBDMMPRSSVZ24,
  author       = {Asmita Adhikary and
                  Abraham Basurto and
                  Lejla Batina and
                  Ileana Buhan and
                  Joan Daemen and
                  Silvia Mella and
                  Nele Mentens and
                  Stjepan Picek and
                  Durga Lakshmi Ramachandran and
                  Abolfazl Sajadi and
                  Todor Stefanov and
                  Dennis Vermoen and
                  Nusa Zidaric},
  editor       = {Iouliia Skliarova and
                  Piedad Brox Jim{\'{e}}nez and
                  M{\'{a}}rio P. V{\'{e}}stias and
                  Pedro C. Diniz},
  title        = {{PROACT} - Physical Attack Resistance of Cryptographic Algorithms
                  and Circuits with Reduced Time to Market},
  booktitle    = {Applied Reconfigurable Computing. Architectures, Tools, and Applications
                  - 20th International Symposium, {ARC} 2024, Aveiro, Portugal, March
                  20-22, 2024, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14553},
  pages        = {255--266},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-55673-9\_18},
  doi          = {10.1007/978-3-031-55673-9\_18},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/arc/AdhikaryBBBDMMPRSSVZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/BazanganiIBB24,
  author       = {Omid Bazangani and
                  Alexandre Iooss and
                  Ileana Buhan and
                  Lejla Batina},
  editor       = {Jianying Zhou and
                  Tony Q. S. Quek and
                  Debin Gao and
                  Alvaro A. C{\'{a}}rdenas},
  title        = {{ABBY:} Automating leakage modelling for side-channel analysis},
  booktitle    = {Proceedings of the 19th {ACM} Asia Conference on Computer and Communications
                  Security, {ASIA} {CCS} 2024, Singapore, July 1-5, 2024},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3634737.3637665},
  doi          = {10.1145/3634737.3637665},
  timestamp    = {Fri, 16 Aug 2024 09:08:03 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/BazanganiIBB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/BazanganiEPB24,
  author       = {Omid Bazangani and
                  Parisa Amiri{-}Eliasi and
                  Stjepan Picek and
                  Lejla Batina},
  title        = {Can Machine Learn Pipeline Leakage?},
  booktitle    = {Design, Automation {\&} Test in Europe Conference {\&} Exhibition,
                  {DATE} 2024, Valencia, Spain, March 25-27, 2024},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://ieeexplore.ieee.org/document/10546629},
  timestamp    = {Sun, 01 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/date/BazanganiEPB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ddecs/RiziZBM24,
  author       = {Mahnaz Namazi Rizi and
                  Nusa Zidaric and
                  Lejla Batina and
                  Nele Mentens},
  title        = {Optimised {AES} with {RISC-V} Vector Extensions},
  booktitle    = {27th International Symposium on Design {\&} Diagnostics of Electronic
                  Circuits {\&} Systems, {DDECS} 2024, Kielce, Poland, April 3-5,
                  2024},
  pages        = {57--60},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/DDECS60919.2024.10508919},
  doi          = {10.1109/DDECS60919.2024.10508919},
  timestamp    = {Wed, 15 May 2024 16:26:02 +0200},
  biburl       = {https://dblp.org/rec/conf/ddecs/RiziZBM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ddecs/EliasiMWBP24,
  author       = {Parisa Amiri{-}Eliasi and
                  Silvia Mella and
                  L{\'{e}}o Weissbart and
                  Lejla Batina and
                  Stjepan Picek},
  title        = {Xoodyak Under {SCA} Siege},
  booktitle    = {27th International Symposium on Design {\&} Diagnostics of Electronic
                  Circuits {\&} Systems, {DDECS} 2024, Kielce, Poland, April 3-5,
                  2024},
  pages        = {61--66},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/DDECS60919.2024.10508930},
  doi          = {10.1109/DDECS60919.2024.10508930},
  timestamp    = {Sun, 01 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ddecs/EliasiMWBP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/HorvathL0B24,
  author       = {P{\'{e}}ter Horv{\'{a}}th and
                  Dirk Lauret and
                  Zhuoran Liu and
                  Lejla Batina},
  editor       = {Davide Balzarotti and
                  Wenyuan Xu},
  title        = {SoK: Neural Network Extraction Through Physical Side Channels},
  booktitle    = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia,
                  PA, USA, August 14-16, 2024},
  publisher    = {{USENIX} Association},
  year         = {2024},
  url          = {https://www.usenix.org/conference/usenixsecurity24/presentation/horvath},
  timestamp    = {Mon, 22 Jul 2024 17:10:49 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/HorvathL0B24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2024-1,
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14583},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54770-6},
  doi          = {10.1007/978-3-031-54770-6},
  isbn         = {978-3-031-54769-0},
  timestamp    = {Mon, 11 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/2024-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2024-2,
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14584},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54773-7},
  doi          = {10.1007/978-3-031-54773-7},
  isbn         = {978-3-031-54772-0},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/2024-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2024-3,
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14585},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54776-8},
  doi          = {10.1007/978-3-031-54776-8},
  isbn         = {978-3-031-54775-1},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/2024-3.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2401-13575,
  author       = {P{\'{e}}ter Horv{\'{a}}th and
                  Lukasz Chmielewski and
                  Leo Weissbart and
                  Lejla Batina and
                  Yuval Yarom},
  title        = {{CNN} architecture extraction on edge {GPU}},
  journal      = {CoRR},
  volume       = {abs/2401.13575},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2401.13575},
  doi          = {10.48550/ARXIV.2401.13575},
  eprinttype    = {arXiv},
  eprint       = {2401.13575},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2401-13575.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MiteloudiADBB24,
  author       = {Konstantina Miteloudi and
                  Asmita Adhikary and
                  Niels van Drueten and
                  Lejla Batina and
                  Ileana Buhan},
  title        = {Plan your defense: {A} comparative analysis of leakage detection methods
                  on {RISC-V} cores},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {423},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/423},
  timestamp    = {Wed, 24 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MiteloudiADBB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/PicekPMWB23,
  author       = {Stjepan Picek and
                  Guilherme Perin and
                  Luca Mariot and
                  Lichao Wu and
                  Lejla Batina},
  title        = {SoK: Deep Learning-based Physical Side-channel Analysis},
  journal      = {{ACM} Comput. Surv.},
  volume       = {55},
  number       = {11},
  pages        = {227:1--227:35},
  year         = {2023},
  url          = {https://doi.org/10.1145/3569577},
  doi          = {10.1145/3569577},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csur/PicekPMWB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BatinaCHSS23,
  author       = {Lejla Batina and
                  Lukasz Chmielewski and
                  Bj{\"{o}}rn Haase and
                  Niels Samwel and
                  Peter Schwabe},
  title        = {SoK: SCA-secure {ECC} in software - mission impossible?},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {1},
  pages        = {557--589},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i1.557-589},
  doi          = {10.46586/TCHES.V2023.I1.557-589},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/BatinaCHSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WuWKLPBP23,
  author       = {Lichao Wu and
                  L{\'{e}}o Weissbart and
                  Marina Krcek and
                  Huimin Li and
                  Guilherme Perin and
                  Lejla Batina and
                  Stjepan Picek},
  title        = {Label Correlation in Deep Learning-Based Side-Channel Analysis},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {18},
  pages        = {3849--3861},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIFS.2023.3287728},
  doi          = {10.1109/TIFS.2023.3287728},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WuWKLPBP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BatinaCFR23,
  author       = {Lejla Batina and
                  Chip{-}Hong Chang and
                  Domenic Forte and
                  Ulrich R{\"{u}}hrmair},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {{ASHES} '23: Workshop on Attacks and Solutions in Hardware Security},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {3664--3665},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3624028},
  doi          = {10.1145/3576915.3624028},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BatinaCFR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2023w,
  editor       = {Jianying Zhou and
                  Lejla Batina and
                  Zengpeng Li and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Suryadipta Majumdar and
                  Daisuke Mashima and
                  Weizhi Meng and
                  Stjepan Picek and
                  Mohammad Ashiqur Rahman and
                  Jun Shao and
                  Masaki Shimaoka and
                  Ezekiel O. Soremekun and
                  Chunhua Su and
                  Je Sen Teh and
                  Aleksei Udovenko and
                  Cong Wang and
                  Leo Yu Zhang and
                  Yury Zhauniarovich},
  title        = {Applied Cryptography and Network Security Workshops - {ACNS} 2023
                  Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S{\&}P,
                  SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13907},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-41181-6},
  doi          = {10.1007/978-3-031-41181-6},
  isbn         = {978-3-031-41180-9},
  timestamp    = {Tue, 20 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/2023w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ashes/2023,
  editor       = {Chip{-}Hong Chang and
                  Ulrich R{\"{u}}hrmair and
                  Lejla Batina and
                  Domenic Forte},
  title        = {Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware
                  Security, {ASHES} 2023, Copenhagen, Denmark, 30 November 2023},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3605769},
  doi          = {10.1145/3605769},
  timestamp    = {Fri, 24 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ashes/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-07783,
  author       = {P{\'{e}}ter Horv{\'{a}}th and
                  Lukasz Chmielewski and
                  Leo Weissbart and
                  Lejla Batina and
                  Yuval Yarom},
  title        = {BarraCUDA: Bringing Electromagnetic Side Channel Into Play to Steal
                  the Weights of Neural Networks from {NVIDIA} GPUs},
  journal      = {CoRR},
  volume       = {abs/2312.07783},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.07783},
  doi          = {10.48550/ARXIV.2312.07783},
  eprinttype    = {arXiv},
  eprint       = {2312.07783},
  timestamp    = {Mon, 08 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-07783.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KulkarniVPB23,
  author       = {Praveen Kulkarni and
                  Vincent Verneuil and
                  Stjepan Picek and
                  Lejla Batina},
  title        = {Order vs. Chaos: {A} Language Model Approach for Side-channel Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1615},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1615},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/KulkarniVPB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dt/BatinaBJP22,
  author       = {Lejla Batina and
                  Shivam Bhasin and
                  Dirmanto Jap and
                  Stjepan Picek},
  title        = {{SCA} Strikes Back: Reverse-Engineering Neural Network Architectures
                  Using Side Channels},
  journal      = {{IEEE} Des. Test},
  volume       = {39},
  number       = {4},
  pages        = {7--14},
  year         = {2022},
  url          = {https://doi.org/10.1109/MDAT.2021.3128436},
  doi          = {10.1109/MDAT.2021.3128436},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dt/BatinaBJP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PaguadaBBA22,
  author       = {Servio Paguada and
                  Lejla Batina and
                  Ileana Buhan and
                  Igor Armendariz},
  title        = {Playing With Blocks: Toward Re-Usable Deep Learning Models for Side-Channel
                  Profiled Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {17},
  pages        = {2835--2847},
  year         = {2022},
  url          = {https://doi.org/10.1109/TIFS.2022.3196273},
  doi          = {10.1109/TIFS.2022.3196273},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/PaguadaBBA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RiojaBAF22,
  author       = {Unai Rioja and
                  Lejla Batina and
                  Igor Armendariz and
                  Jose Luis Flores},
  title        = {Towards Human Dependency Elimination: {AI} Approach to {SCA} Robustness
                  Assessment},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {17},
  pages        = {3906--3921},
  year         = {2022},
  url          = {https://doi.org/10.1109/TIFS.2022.3176189},
  doi          = {10.1109/TIFS.2022.3176189},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/RiojaBAF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BacuietiBP22,
  author       = {Nicoleta{-}Norica Bacuieti and
                  Lejla Batina and
                  Stjepan Picek},
  editor       = {Giuseppe Ateniese and
                  Daniele Venturi},
  title        = {Deep Neural Networks Aiding Cryptanalysis: {A} Case Study of the Speck
                  Distinguisher},
  booktitle    = {Applied Cryptography and Network Security - 20th International Conference,
                  {ACNS} 2022, Rome, Italy, June 20-23, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13269},
  pages        = {809--829},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-09234-3\_40},
  doi          = {10.1007/978-3-031-09234-3\_40},
  timestamp    = {Tue, 21 Jun 2022 15:24:40 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/BacuietiBP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/BuhanBYS22,
  author       = {Ileana Buhan and
                  Lejla Batina and
                  Yuval Yarom and
                  Patrick Schaumont},
  editor       = {Yuji Suga and
                  Kouichi Sakurai and
                  Xuhua Ding and
                  Kazue Sako},
  title        = {SoK: Design Tools for Side-Channel-Aware Implementations},
  booktitle    = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications
                  Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022},
  pages        = {756--770},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3488932.3517415},
  doi          = {10.1145/3488932.3517415},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/BuhanBYS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/MukhtarPFBK22,
  author       = {Naila Mukhtar and
                  Louiza Papachristodoulou and
                  Apostolos P. Fournaris and
                  Lejla Batina and
                  Yinan Kong},
  editor       = {Josep Balasch and
                  Colin O'Flynn},
  title        = {Machine-Learning Assisted Side-Channel Attacks on {RNS} {ECC} Implementations
                  Using Hybrid Feature Engineering},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 13th International
                  Workshop, {COSADE} 2022, Leuven, Belgium, April 11-12, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13211},
  pages        = {3--28},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-99766-3\_1},
  doi          = {10.1007/978-3-030-99766-3\_1},
  timestamp    = {Fri, 01 Apr 2022 15:49:26 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/MukhtarPFBK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/MukhtarBPK22,
  author       = {Naila Mukhtar and
                  Lejla Batina and
                  Stjepan Picek and
                  Yinan Kong},
  editor       = {Steven D. Galbraith},
  title        = {Fake It Till You Make It: Data Augmentation Using Generative Adversarial
                  Networks for All the Crypto You Need on Small Devices},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2022 - Cryptographers' Track at the
                  {RSA} Conference 2022, Virtual Event, March 1-2, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13161},
  pages        = {297--321},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-95312-6\_13},
  doi          = {10.1007/978-3-030-95312-6\_13},
  timestamp    = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/MukhtarBPK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/BatinaBBHJ22,
  author       = {Lejla Batina and
                  Shivam Bhasin and
                  Jakub Breier and
                  Xiaolu Hou and
                  Dirmanto Jap},
  title        = {On Implementation-Level Security of Edge-Based Machine Learning Models},
  booktitle    = {Security and Artificial Intelligence},
  pages        = {335--359},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-98795-4\_14},
  doi          = {10.1007/978-3-030-98795-4\_14},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/lncs/BatinaBBHJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2022w,
  editor       = {Jianying Zhou and
                  Sridhar Adepu and
                  Cristina Alcaraz and
                  Lejla Batina and
                  Emiliano Casalicchio and
                  Sudipta Chattopadhyay and
                  Chenglu Jin and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Suryadipta Majumdar and
                  Weizhi Meng and
                  Stjepan Picek and
                  Jun Shao and
                  Chunhua Su and
                  Cong Wang and
                  Yury Zhauniarovich and
                  Saman A. Zonouz},
  title        = {Applied Cryptography and Network Security Workshops - {ACNS} 2022
                  Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S{\&}P,
                  SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13285},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-16815-4},
  doi          = {10.1007/978-3-031-16815-4},
  isbn         = {978-3-031-16814-7},
  timestamp    = {Tue, 20 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/2022w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/africacrypt/2022,
  editor       = {Lejla Batina and
                  Joan Daemen},
  title        = {Progress in Cryptology - {AFRICACRYPT} 2022: 13th International Conference
                  on Cryptology in Africa, {AFRICACRYPT} 2022, Fes, Morocco, July 18-20,
                  2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13503},
  publisher    = {Springer Nature Switzerland},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17433-9},
  doi          = {10.1007/978-3-031-17433-9},
  isbn         = {978-3-031-17433-9},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/africacrypt/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/space/2021,
  editor       = {Lejla Batina and
                  Stjepan Picek and
                  Mainack Mondal},
  title        = {Security, Privacy, and Applied Cryptography Engineering - 11th International
                  Conference, {SPACE} 2021, Kolkata, India, December 10-13, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13162},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-95085-9},
  doi          = {10.1007/978-3-030-95085-9},
  isbn         = {978-3-030-95084-2},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/space/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/space/2022,
  editor       = {Lejla Batina and
                  Stjepan Picek and
                  Mainack Mondal},
  title        = {Security, Privacy, and Applied Cryptography Engineering - 12th International
                  Conference, {SPACE} 2022, Jaipur, India, December 9-12, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13783},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22829-2},
  doi          = {10.1007/978-3-031-22829-2},
  isbn         = {978-3-031-22828-5},
  timestamp    = {Thu, 08 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/space/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/lncs/13049,
  editor       = {Lejla Batina and
                  Thomas B{\"{a}}ck and
                  Ileana Buhan and
                  Stjepan Picek},
  title        = {Security and Artificial Intelligence - {A} Crossdisciplinary Approach},
  series       = {Lecture Notes in Computer Science},
  volume       = {13049},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-98795-4},
  doi          = {10.1007/978-3-030-98795-4},
  isbn         = {978-3-030-98794-7},
  timestamp    = {Mon, 02 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/13049.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-01158,
  author       = {Ievgen Kabin and
                  Zoya Dyka and
                  Dan Klann and
                  Nele Mentens and
                  Lejla Batina and
                  Peter Langendoerfer},
  title        = {Breaking a fully Balanced {ASIC} Coprocessor Implementing Complete
                  Addition Formulas on Weierstrass Elliptic Curves},
  journal      = {CoRR},
  volume       = {abs/2201.01158},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.01158},
  eprinttype    = {arXiv},
  eprint       = {2201.01158},
  timestamp    = {Mon, 10 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-01158.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2203-08448,
  author       = {Servio Paguada and
                  Lejla Batina and
                  Ileana Buhan and
                  Igor Armendariz},
  title        = {Playing with blocks: Toward re-usable deep learning models for side-channel
                  profiled attacks},
  journal      = {CoRR},
  volume       = {abs/2203.08448},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2203.08448},
  doi          = {10.48550/ARXIV.2203.08448},
  eprinttype    = {arXiv},
  eprint       = {2203.08448},
  timestamp    = {Mon, 28 Mar 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2203-08448.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BacuietiBP22,
  author       = {Nicoleta{-}Norica Bacuieti and
                  Lejla Batina and
                  Stjepan Picek},
  title        = {Deep neural networks aiding cryptanalysis: {A} case study of the Speck
                  distinguisher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {341},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/341},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BacuietiBP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WuWKLPBP22,
  author       = {Lichao Wu and
                  Leo Weissbart and
                  Marina Krcek and
                  Huimin Li and
                  Guilherme Perin and
                  Lejla Batina and
                  Stjepan Picek},
  title        = {{AGE} Is Not Just a Number: Label Distribution in Deep Learning-based
                  Side-channel Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1507},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1507},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/WuWKLPBP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RezaeezadeB22,
  author       = {Azade Rezaeezade and
                  Lejla Batina},
  title        = {Regularizers to the Rescue: Fighting Overfitting in Deep Learning-based
                  Side-channel Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1737},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1737},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/RezaeezadeB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/PaguadaBA21,
  author       = {Servio Paguada and
                  Lejla Batina and
                  Igor Armendariz},
  title        = {Toward practical autoencoder-based side-channel analysis evaluations},
  journal      = {Comput. Networks},
  volume       = {196},
  pages        = {108230},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.comnet.2021.108230},
  doi          = {10.1016/J.COMNET.2021.108230},
  timestamp    = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/PaguadaBA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/RiojaBFA21,
  author       = {Unai Rioja and
                  Lejla Batina and
                  Jose Luis Flores and
                  Igor Armendariz},
  title        = {Auto-tune POIs: Estimation of distribution algorithms for efficient
                  side-channel analysis},
  journal      = {Comput. Networks},
  volume       = {198},
  pages        = {108405},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.comnet.2021.108405},
  doi          = {10.1016/J.COMNET.2021.108405},
  timestamp    = {Wed, 21 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/RiojaBFA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jetc/RiojaPBA21,
  author       = {Unai Rioja and
                  Servio Paguada and
                  Lejla Batina and
                  Igor Armendariz},
  title        = {The Uncertainty of Side-channel Analysis: {A} Way to Leverage from
                  Heuristics},
  journal      = {{ACM} J. Emerg. Technol. Comput. Syst.},
  volume       = {17},
  number       = {3},
  pages        = {40:1--40:27},
  year         = {2021},
  url          = {https://doi.org/10.1145/3446997},
  doi          = {10.1145/3446997},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jetc/RiojaPBA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/PerinCBP21,
  author       = {Guilherme Perin and
                  Lukasz Chmielewski and
                  Lejla Batina and
                  Stjepan Picek},
  title        = {Keep it Unsupervised: Horizontal Attacks Meet Deep Learning},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {1},
  pages        = {343--372},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i1.343-372},
  doi          = {10.46586/TCHES.V2021.I1.343-372},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/PerinCBP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SheltonCS0BY21,
  author       = {Madura A. Shelton and
                  Lukasz Chmielewski and
                  Niels Samwel and
                  Markus Wagner and
                  Lejla Batina and
                  Yuval Yarom},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic
                  Code},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {685--699},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3485380},
  doi          = {10.1145/3460120.3485380},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/SheltonCS0BY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dac/BatinaCMSSZ21,
  author       = {Lejla Batina and
                  Rosario Cammarota and
                  Nele Mentens and
                  Ahmad{-}Reza Sadeghi and
                  Johanna Sep{\'{u}}lveda and
                  Shaza Zeitouni},
  title        = {Invited: Security Beyond Bulk Silicon: Opportunities and Challenges
                  of Emerging Devices},
  booktitle    = {58th {ACM/IEEE} Design Automation Conference, {DAC} 2021, San Francisco,
                  CA, USA, December 5-9, 2021},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/DAC18074.2021.9754222},
  doi          = {10.1109/DAC18074.2021.9754222},
  timestamp    = {Wed, 20 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dac/BatinaCMSSZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isqed/RiojaBFA21,
  author       = {Unai Rioja and
                  Lejla Batina and
                  Jose Luis Flores and
                  Igor Armendariz},
  title        = {Towards Automatic and Portable Data Loading Template Attacks on Microcontrollers},
  booktitle    = {22nd International Symposium on Quality Electronic Design, {ISQED}
                  2021, Santa Clara, CA, USA, April 7-9, 2021},
  pages        = {437--443},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ISQED51717.2021.9424276},
  doi          = {10.1109/ISQED51717.2021.9424276},
  timestamp    = {Wed, 21 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isqed/RiojaBFA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/LiuSW0LBL21,
  author       = {Zhuoran Liu and
                  Niels Samwel and
                  Leo Weissbart and
                  Zhengyu Zhao and
                  Dirk Lauret and
                  Lejla Batina and
                  Martha A. Larson},
  title        = {Screen Gleaning: {A} Screen Reading {TEMPEST} Attack on Mobile Devices
                  Exploiting an Electromagnetic Side Channel},
  booktitle    = {28th Annual Network and Distributed System Security Symposium, {NDSS}
                  2021, virtually, February 21-25, 2021},
  publisher    = {The Internet Society},
  year         = {2021},
  url          = {https://www.ndss-symposium.org/ndss-paper/screen-gleaning-a-screen-reading-tempest-attack-on-mobile-devices-exploiting-an-electromagnetic-side-channel/},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/LiuSW0LBL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/SheltonSB00Y21,
  author       = {Madura A. Shelton and
                  Niels Samwel and
                  Lejla Batina and
                  Francesco Regazzoni and
                  Markus Wagner and
                  Yuval Yarom},
  title        = {Rosita: Towards Automatic Elimination of Power-Analysis Leakage in
                  Ciphers},
  booktitle    = {28th Annual Network and Distributed System Security Symposium, {NDSS}
                  2021, virtually, February 21-25, 2021},
  publisher    = {The Internet Society},
  year         = {2021},
  url          = {https://www.ndss-symposium.org/ndss-paper/rosita-towards-automatic-elimination-of-power-analysis-leakage-in-ciphers/},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/SheltonSB00Y21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/samos/MiteloudiBDM21,
  author       = {Konstantina Miteloudi and
                  Lejla Batina and
                  Joan Daemen and
                  Nele Mentens},
  editor       = {Alex Orailoglu and
                  Matthias Jung and
                  Marc Reichenbach},
  title        = {{ROCKY:} Rotation Countermeasure for the Protection of Keys and Other
                  Sensitive Data},
  booktitle    = {Embedded Computer Systems: Architectures, Modeling, and Simulation
                  - 21st International Conference, {SAMOS} 2021, Virtual Event, July
                  4-8, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13227},
  pages        = {288--299},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-04580-6\_19},
  doi          = {10.1007/978-3-031-04580-6\_19},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/samos/MiteloudiBDM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vlsi/MiteloudiCBM21,
  author       = {Konstantina Miteloudi and
                  Lukasz Chmielewski and
                  Lejla Batina and
                  Nele Mentens},
  title        = {Evaluating the {ROCKY} Countermeasure for Side-Channel Leakage},
  booktitle    = {29th {IFIP/IEEE} International Conference on Very Large Scale Integration,
                  VLSI-SoC 2021, Singapore, Singapore, October 4-7, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/VLSI-SoC53125.2021.9606973},
  doi          = {10.1109/VLSI-SOC53125.2021.9606973},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vlsi/MiteloudiCBM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/21/BatinaDHP21,
  author       = {Lejla Batina and
                  Milena Djukanovic and
                  Annelie Heuser and
                  Stjepan Picek},
  editor       = {Gildas Avoine and
                  Julio Hernandez{-}Castro},
  title        = {It Started with Templates: The Future of Profiling in Side-Channel
                  Analysis},
  booktitle    = {Security of Ubiquitous Computing Systems},
  pages        = {133--145},
  publisher    = {Springer International Publishing},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-10591-4\_8},
  doi          = {10.1007/978-3-030-10591-4\_8},
  timestamp    = {Tue, 04 Jul 2023 14:50:55 +0200},
  biburl       = {https://dblp.org/rec/books/sp/21/BatinaDHP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2021w,
  editor       = {Jianying Zhou and
                  Chuadhry Mujeeb Ahmed and
                  Lejla Batina and
                  Sudipta Chattopadhyay and
                  Olga Gadyatskaya and
                  Chenglu Jin and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Bo Luo and
                  Suryadipta Majumdar and
                  Mihalis Maniatakos and
                  Daisuke Mashima and
                  Weizhi Meng and
                  Stjepan Picek and
                  Masaki Shimaoka and
                  Chunhua Su and
                  Cong Wang},
  title        = {Applied Cryptography and Network Security Workshops - {ACNS} 2021
                  Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S{\&}P,
                  SCI, SecMT, and SiMLA, Kamakura, Japan, June 21-24, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12809},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-81645-2},
  doi          = {10.1007/978-3-030-81645-2},
  isbn         = {978-3-030-81644-5},
  timestamp    = {Mon, 26 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/2021w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisec/2021,
  editor       = {Christina P{\"{o}}pper and
                  Mathy Vanhoef and
                  Lejla Batina and
                  Ren{\'{e}} Mayrhofer},
  title        = {WiSec '21: 14th {ACM} Conference on Security and Privacy in Wireless
                  and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2
                  July, 2021},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3448300},
  doi          = {10.1145/3448300},
  isbn         = {978-1-4503-8349-3},
  timestamp    = {Mon, 28 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2104-08593,
  author       = {Ileana Buhan and
                  Lejla Batina and
                  Yuval Yarom and
                  Patrick Schaumont},
  title        = {SoK: Design Tools for Side-Channel-Aware Implementions},
  journal      = {CoRR},
  volume       = {abs/2104.08593},
  year         = {2021},
  url          = {https://arxiv.org/abs/2104.08593},
  eprinttype    = {arXiv},
  eprint       = {2104.08593},
  timestamp    = {Mon, 26 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2104-08593.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2109-11741,
  author       = {Madura A. Shelton and
                  Lukasz Chmielewski and
                  Niels Samwel and
                  Markus Wagner and
                  Lejla Batina and
                  Yuval Yarom},
  title        = {Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic
                  Code},
  journal      = {CoRR},
  volume       = {abs/2109.11741},
  year         = {2021},
  url          = {https://arxiv.org/abs/2109.11741},
  eprinttype    = {arXiv},
  eprint       = {2109.11741},
  timestamp    = {Mon, 27 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2109-11741.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-13425,
  author       = {Unai Rioja and
                  Lejla Batina and
                  Igor Armendariz and
                  Jose Luis Flores},
  title        = {Keep It Unbiased: {A} Comparison Between Estimation of Distribution
                  Algorithms and Deep Learning for Human Interaction-Free Side-Channel
                  Analysis},
  journal      = {CoRR},
  volume       = {abs/2111.13425},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.13425},
  eprinttype    = {arXiv},
  eprint       = {2111.13425},
  timestamp    = {Wed, 21 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-13425.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-14416,
  author       = {Servio Paguada and
                  Lejla Batina and
                  Ileana Buhan and
                  Igor Armendariz},
  title        = {Being Patient and Persistent: Optimizing An Early Stopping Strategy
                  for Deep Learning in Profiled Attacks},
  journal      = {CoRR},
  volume       = {abs/2111.14416},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.14416},
  eprinttype    = {arXiv},
  eprint       = {2111.14416},
  timestamp    = {Wed, 01 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-14416.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PaguadaBA21,
  author       = {Servio Paguada and
                  Lejla Batina and
                  Igor Armendariz},
  title        = {Toward Practical Autoencoder-based Side-Channel Analysis Evaluations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {72},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/072},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/PaguadaBA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BuhanBYS21,
  author       = {Ileana Buhan and
                  Lejla Batina and
                  Yuval Yarom and
                  Patrick Schaumont},
  title        = {SoK: Design Tools for Side-Channel-Aware Implementations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {497},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/497},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BuhanBYS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WeissbartCPB21,
  author       = {Leo Weissbart and
                  Lukasz Chmielewski and
                  Stjepan Picek and
                  Lejla Batina},
  title        = {Systematic Side-channel Analysis of Curve25519 with Machine Learning},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {944},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/944},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WeissbartCPB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MukhtarBPK21,
  author       = {Naila Mukhtar and
                  Lejla Batina and
                  Stjepan Picek and
                  Yinan Kong},
  title        = {Fake it till you make it: Data Augmentation using Generative Adversarial
                  Networks for all the crypto you need on small devices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {991},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/991},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MukhtarBPK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BatinaCHSS21,
  author       = {Lejla Batina and
                  Lukasz Chmielewski and
                  Bj{\"{o}}rn Haase and
                  Niels Samwel and
                  Peter Schwabe},
  title        = {SCA-secure {ECC} in software - mission impossible?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1003},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1003},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BatinaCHSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PicekPMWB21,
  author       = {Stjepan Picek and
                  Guilherme Perin and
                  Luca Mariot and
                  Lichao Wu and
                  Lejla Batina},
  title        = {SoK: Deep Learning-based Physical Side-channel Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1092},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1092},
  timestamp    = {Mon, 06 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PicekPMWB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SheltonCSWBY21,
  author       = {Madura A. Shelton and
                  Lukasz Chmielewski and
                  Niels Samwel and
                  Markus Wagner and
                  Lejla Batina and
                  Yuval Yarom},
  title        = {Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic
                  Code},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1181},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1181},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SheltonCSWBY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RiojaBAF21,
  author       = {Unai Rioja and
                  Lejla Batina and
                  Igor Armendariz and
                  Jose Luis Flores},
  title        = {Towards Human Dependency Elimination: {AI} Approach to {SCA} Robustness
                  Assessment},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1316},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1316},
  timestamp    = {Wed, 21 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RiojaBAF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BazanganiIBB21,
  author       = {Omid Bazangani and
                  Alexandre Iooss and
                  Ileana Buhan and
                  Lejla Batina},
  title        = {{ABBY:} Automating the creation of fine-grained leakage models},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1569},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1569},
  timestamp    = {Fri, 10 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BazanganiIBB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BatinaM20,
  author       = {Lejla Batina and
                  Nele Mentens},
  title        = {{PROOFS} 2018 Editorial},
  journal      = {J. Cryptogr. Eng.},
  volume       = {10},
  number       = {4},
  pages        = {287},
  year         = {2020},
  url          = {https://doi.org/10.1007/s13389-020-00248-1},
  doi          = {10.1007/S13389-020-00248-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BatinaM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jhss/WeissbartCPB20,
  author       = {Leo Weissbart and
                  Lukasz Chmielewski and
                  Stjepan Picek and
                  Lejla Batina},
  title        = {Systematic Side-Channel Analysis of Curve25519 with Machine Learning},
  journal      = {J. Hardw. Syst. Secur.},
  volume       = {4},
  number       = {4},
  pages        = {314--328},
  year         = {2020},
  url          = {https://doi.org/10.1007/s41635-020-00106-w},
  doi          = {10.1007/S41635-020-00106-W},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jhss/WeissbartCPB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/MassolinoLRB20,
  author       = {Pedro Maat C. Massolino and
                  Patrick Longa and
                  Joost Renes and
                  Lejla Batina},
  title        = {A Compact and Scalable Hardware/Software Co-design of {SIKE}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {2},
  pages        = {245--271},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i2.245-271},
  doi          = {10.13154/TCHES.V2020.I2.245-271},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/MassolinoLRB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/RoelofsSBD20,
  author       = {Niels Roelofs and
                  Niels Samwel and
                  Lejla Batina and
                  Joan Daemen},
  editor       = {Abderrahmane Nitaj and
                  Amr M. Youssef},
  title        = {Online Template Attack on {ECDSA:} - Extracting Keys via the Other
                  Side},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2020 - 12th International Conference
                  on Cryptology in Africa, Cairo, Egypt, July 20-22, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12174},
  pages        = {323--336},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-51938-4\_16},
  doi          = {10.1007/978-3-030-51938-4\_16},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/RoelofsSBD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/RiojaBA20,
  author       = {Unai Rioja and
                  Lejla Batina and
                  Igor Armendariz},
  editor       = {Abderrahmane Nitaj and
                  Amr M. Youssef},
  title        = {When Similarities Among Devices are Taken for Granted: Another Look
                  at Portability},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2020 - 12th International Conference
                  on Cryptology in Africa, Cairo, Egypt, July 20-22, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12174},
  pages        = {337--357},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-51938-4\_17},
  doi          = {10.1007/978-3-030-51938-4\_17},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/africacrypt/RiojaBA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsd/KabinDKMBL20,
  author       = {Ievgen Kabin and
                  Zoya Dyka and
                  Dan Klann and
                  Nele Mentens and
                  Lejla Batina and
                  Peter Langend{\"{o}}rfer},
  title        = {Breaking a fully Balanced {ASIC} Coprocessor Implementing Complete
                  Addition Formulas on Weierstrass Elliptic Curves},
  booktitle    = {23rd Euromicro Conference on Digital System Design, {DSD} 2020, Kranj,
                  Slovenia, August 26-28, 2020},
  pages        = {270--276},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/DSD51259.2020.00051},
  doi          = {10.1109/DSD51259.2020.00051},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dsd/KabinDKMBL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/SimonBDGMP0S20,
  author       = {Thierry Simon and
                  Lejla Batina and
                  Joan Daemen and
                  Vincent Grosso and
                  Pedro Maat Costa Massolino and
                  Kostas Papagiannopoulos and
                  Francesco Regazzoni and
                  Niels Samwel},
  editor       = {Anne Canteaut and
                  Yuval Ishai},
  title        = {Friet: An Authenticated Encryption Scheme with Built-in Fault Detection},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12105},
  pages        = {581--611},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45721-1\_21},
  doi          = {10.1007/978-3-030-45721-1\_21},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/SimonBDGMP0S20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2020w,
  editor       = {Jianying Zhou and
                  Mauro Conti and
                  Chuadhry Mujeeb Ahmed and
                  Man Ho Au and
                  Lejla Batina and
                  Zhou Li and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Bo Luo and
                  Suryadipta Majumdar and
                  Weizhi Meng and
                  Mart{\'{\i}}n Ochoa and
                  Stjepan Picek and
                  Georgios Portokalidis and
                  Cong Wang and
                  Kehuan Zhang},
  title        = {Applied Cryptography and Network Security Workshops - {ACNS} 2020
                  Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S{\&}P, SCI,
                  SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12418},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61638-0},
  doi          = {10.1007/978-3-030-61638-0},
  isbn         = {978-3-030-61637-3},
  timestamp    = {Thu, 18 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/2020w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/atis/2020,
  editor       = {Lejla Batina and
                  Gang Li},
  title        = {Applications and Techniques in Information Security - 11th International
                  Conference, {ATIS} 2020, Brisbane, QLD, Australia, November 12-13,
                  2020, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1338},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-981-33-4706-9},
  doi          = {10.1007/978-981-33-4706-9},
  isbn         = {978-981-33-4705-2},
  timestamp    = {Thu, 14 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/atis/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/space/2020,
  editor       = {Lejla Batina and
                  Stjepan Picek and
                  Mainack Mondal},
  title        = {Security, Privacy, and Applied Cryptography Engineering - 10th International
                  Conference, {SPACE} 2020, Kolkata, India, December 17-21, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12586},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-66626-2},
  doi          = {10.1007/978-3-030-66626-2},
  isbn         = {978-3-030-66625-5},
  timestamp    = {Tue, 05 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/space/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-12810,
  author       = {Unai Rioja and
                  Servio Paguada and
                  Lejla Batina and
                  Igor Armendariz},
  title        = {The uncertainty of Side-Channel Analysis: {A} way to leverage from
                  heuristics},
  journal      = {CoRR},
  volume       = {abs/2006.12810},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.12810},
  eprinttype    = {arXiv},
  eprint       = {2006.12810},
  timestamp    = {Wed, 01 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-12810.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2011-09877,
  author       = {Zhuoran Liu and
                  Niels Samwel and
                  Leo Weissbart and
                  Zhengyu Zhao and
                  Dirk Lauret and
                  Lejla Batina and
                  Martha A. Larson},
  title        = {Screen Gleaning: {A} Screen Reading {TEMPEST} Attack on Mobile Devices
                  Exploiting an Electromagnetic Side Channel},
  journal      = {CoRR},
  volume       = {abs/2011.09877},
  year         = {2020},
  url          = {https://arxiv.org/abs/2011.09877},
  eprinttype    = {arXiv},
  eprint       = {2011.09877},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2011-09877.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-13225,
  author       = {Unai Rioja and
                  Lejla Batina and
                  Jose Luis Flores and
                  Igor Armendariz},
  title        = {Auto-tune POIs: Estimation of distribution algorithms for efficient
                  side-channel analysis},
  journal      = {CoRR},
  volume       = {abs/2012.13225},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.13225},
  eprinttype    = {arXiv},
  eprint       = {2012.13225},
  timestamp    = {Wed, 21 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-13225.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MassolinoLRB20,
  author       = {Pedro Maat C. Massolino and
                  Patrick Longa and
                  Joost Renes and
                  Lejla Batina},
  title        = {A Compact and Scalable Hardware/Software Co-design of {SIKE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {40},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/040},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MassolinoLRB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SimonBDGMPRS20,
  author       = {Thierry Simon and
                  Lejla Batina and
                  Joan Daemen and
                  Vincent Grosso and
                  Pedro Maat Costa Massolino and
                  Kostas Papagiannopoulos and
                  Francesco Regazzoni and
                  Niels Samwel},
  title        = {Friet: An Authenticated Encryption Scheme with Built-in Fault Detection},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {425},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/425},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SimonBDGMPRS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RiojaPBA20,
  author       = {Unai Rioja and
                  Servio Paguada and
                  Lejla Batina and
                  Igor Armendariz},
  title        = {The uncertainty of Side-Channel Analysis: {A} way to leverage from
                  heuristics},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {766},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/766},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RiojaPBA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PerinCBP20,
  author       = {Guilherme Perin and
                  Lukasz Chmielewski and
                  Lejla Batina and
                  Stjepan Picek},
  title        = {Keep it Unsupervised: Horizontal Attacks Meet Deep Learning},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {891},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/891},
  timestamp    = {Mon, 27 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PerinCBP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WuWKLPBP20,
  author       = {Lichao Wu and
                  Leo Weissbart and
                  Marina Krcek and
                  Huimin Li and
                  Guilherme Perin and
                  Lejla Batina and
                  Stjepan Picek},
  title        = {Everything is Connected: From Model Learnability to Guessing Entropy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {899},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/899},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WuWKLPBP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MukhtarPFBK20,
  author       = {Naila Mukhtar and
                  Louiza Papachristodoulou and
                  Apostolos P. Fournaris and
                  Lejla Batina and
                  Yinan Kong},
  title        = {Machine-Learning assisted Side-Channel Attacks on RNS-based Elliptic
                  Curve Implementations using Hybrid Feature Engineering},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1065},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1065},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MukhtarPFBK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RiojaBFA20,
  author       = {Unai Rioja and
                  Lejla Batina and
                  Jose Luis Flores and
                  Igor Armendariz},
  title        = {Auto-tune POIs: Estimation of distribution algorithms for efficient
                  side-channel analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1600},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1600},
  timestamp    = {Wed, 21 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RiojaBFA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BatinaCPST19,
  author       = {Lejla Batina and
                  Lukasz Chmielewski and
                  Louiza Papachristodoulou and
                  Peter Schwabe and
                  Michael Tunstall},
  title        = {Online template attacks},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {1},
  pages        = {21--36},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-017-0171-8},
  doi          = {10.1007/S13389-017-0171-8},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BatinaCPST19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mam/PirotteVBM19,
  author       = {Niels Pirotte and
                  Jo Vliegen and
                  Lejla Batina and
                  Nele Mentens},
  title        = {Balancing elliptic curve coprocessors from bottom to top},
  journal      = {Microprocess. Microsystems},
  volume       = {71},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.micpro.2019.102866},
  doi          = {10.1016/J.MICPRO.2019.102866},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mam/PirotteVBM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/Papachristodoulou19,
  author       = {Louiza Papachristodoulou and
                  Apostolos P. Fournaris and
                  Kostas Papagiannopoulos and
                  Lejla Batina},
  title        = {Practical Evaluation of Protected Residue Number System Scalar Multiplication},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {1},
  pages        = {259--282},
  year         = {2019},
  url          = {https://doi.org/10.13154/tches.v2019.i1.259-282},
  doi          = {10.13154/TCHES.V2019.I1.259-282},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/Papachristodoulou19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tecs/BatinaCHL19,
  author       = {Lejla Batina and
                  Sherman S. M. Chow and
                  Gerhard P. Hancke and
                  Zhe Liu},
  title        = {Introduction to the Special Issue on Cryptographic Engineering for
                  Internet of Things: Security Foundations, Lightweight Solutions, and
                  Attacks},
  journal      = {{ACM} Trans. Embed. Comput. Syst.},
  volume       = {18},
  number       = {3},
  pages        = {22:1--22:3},
  year         = {2019},
  url          = {https://doi.org/10.1145/3322641},
  doi          = {10.1145/3322641},
  timestamp    = {Mon, 09 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tecs/BatinaCHL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvlsi/PicekHJB19,
  author       = {Stjepan Picek and
                  Annelie Heuser and
                  Alan Jovic and
                  Lejla Batina},
  title        = {A Systematic Evaluation of Profiling Through Focused Feature Selection},
  journal      = {{IEEE} Trans. Very Large Scale Integr. Syst.},
  volume       = {27},
  number       = {12},
  pages        = {2802--2815},
  year         = {2019},
  url          = {https://doi.org/10.1109/TVLSI.2019.2937365},
  doi          = {10.1109/TVLSI.2019.2937365},
  timestamp    = {Wed, 11 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tvlsi/PicekHJB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AndrikosBCLMPPR19,
  author       = {Christos Andrikos and
                  Lejla Batina and
                  Lukasz Chmielewski and
                  Liran Lerman and
                  Vasilios Mavroudis and
                  Kostas Papagiannopoulos and
                  Guilherme Perin and
                  Giorgos Rassias and
                  Alberto Sonnino},
  editor       = {Steven D. Galbraith and
                  Shiho Moriai},
  title        = {Location, Location, Location: Revisiting Modeling and Exploitation
                  for Location-Based Side Channel Leakages},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kobe, Japan, December 8-12, 2019, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11923},
  pages        = {285--314},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34618-8\_10},
  doi          = {10.1007/978-3-030-34618-8\_10},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AndrikosBCLMPPR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BatinaBJP19,
  author       = {Lejla Batina and
                  Shivam Bhasin and
                  Dirmanto Jap and
                  Stjepan Picek},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {Poster: Recovering the Input of Neural Networks via Single Shot Side-channel
                  Attacks},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {2657--2659},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3363280},
  doi          = {10.1145/3319535.3363280},
  timestamp    = {Tue, 10 Nov 2020 20:00:36 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BatinaBJP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dac/BatinaJMSS19,
  author       = {Lejla Batina and
                  Patrick Jauernig and
                  Nele Mentens and
                  Ahmad{-}Reza Sadeghi and
                  Emmanuel Stapf},
  title        = {In Hardware We Trust: Gains and Pains of Hardware-assisted Security},
  booktitle    = {Proceedings of the 56th Annual Design Automation Conference 2019,
                  {DAC} 2019, Las Vegas, NV, USA, June 02-06, 2019},
  pages        = {44},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3316781.3323480},
  doi          = {10.1145/3316781.3323480},
  timestamp    = {Sun, 08 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dac/BatinaJMSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/space/WeissbartPB19,
  author       = {Leo Weissbart and
                  Stjepan Picek and
                  Lejla Batina},
  editor       = {Shivam Bhasin and
                  Avi Mendelson and
                  Mridul Nandi},
  title        = {One Trace Is All It Takes: Machine Learning-Based Side-Channel Attack
                  on EdDSA},
  booktitle    = {Security, Privacy, and Applied Cryptography Engineering - 9th International
                  Conference, {SPACE} 2019, Gandhinagar, India, December 3-7, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11947},
  pages        = {86--105},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-35869-3\_8},
  doi          = {10.1007/978-3-030-35869-3\_8},
  timestamp    = {Fri, 22 Nov 2019 13:35:40 +0100},
  biburl       = {https://dblp.org/rec/conf/space/WeissbartPB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BatinaBJP19,
  author       = {Lejla Batina and
                  Shivam Bhasin and
                  Dirmanto Jap and
                  Stjepan Picek},
  editor       = {Nadia Heninger and
                  Patrick Traynor},
  title        = {{CSI} {NN:} Reverse Engineering of Neural Network Architectures Through
                  Electromagnetic Side Channel},
  booktitle    = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara,
                  CA, USA, August 14-16, 2019},
  pages        = {515--532},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/usenixsecurity19/presentation/batina},
  timestamp    = {Mon, 01 Feb 2021 08:43:12 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/BatinaBJP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1912-05183,
  author       = {Madura A. Shelton and
                  Niels Samwel and
                  Lejla Batina and
                  Francesco Regazzoni and
                  Markus Wagner and
                  Yuval Yarom},
  title        = {Rosita: Towards Automatic Elimination of Power-Analysis Leakage in
                  Ciphers},
  journal      = {CoRR},
  volume       = {abs/1912.05183},
  year         = {2019},
  url          = {http://arxiv.org/abs/1912.05183},
  eprinttype    = {arXiv},
  eprint       = {1912.05183},
  timestamp    = {Tue, 31 Mar 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1912-05183.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AndrikosBCLMPPR19,
  author       = {Christos Andrikos and
                  Lejla Batina and
                  Lukasz Chmielewski and
                  Liran Lerman and
                  Vasilios Mavroudis and
                  Kostas Papagiannopoulos and
                  Guilherme Perin and
                  Giorgos Rassias and
                  Alberto Sonnino},
  title        = {Location, location, location: Revisiting modeling and exploitation
                  for location-based side channel leakages},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {230},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/230},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AndrikosBCLMPPR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WeissbartPB19,
  author       = {Leo Weissbart and
                  Stjepan Picek and
                  Lejla Batina},
  title        = {One trace is all it takes: Machine Learning-based Side-channel Attack
                  on EdDSA},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {358},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/358},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WeissbartPB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SheltonSBR0Y19,
  author       = {Madura A. Shelton and
                  Niels Samwel and
                  Lejla Batina and
                  Francesco Regazzoni and
                  Markus Wagner and
                  Yuval Yarom},
  title        = {Rosita: Towards Automatic Elimination of Power-Analysis Leakage in
                  Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1445},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1445},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SheltonSBR0Y19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WeissbartPB19a,
  author       = {Leo Weissbart and
                  Stjepan Picek and
                  Lejla Batina},
  title        = {On the Performance of Multilayer Perceptron in Profiling Side-channel
                  Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1476},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1476},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WeissbartPB19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/ChavesCRB18,
  author       = {Ricardo Chaves and
                  Lukasz Chmielewski and
                  Francesco Regazzoni and
                  Lejla Batina},
  editor       = {Antoine Joux and
                  Abderrahmane Nitaj and
                  Tajjeeddine Rachidi},
  title        = {SCA-Resistance for {AES:} How Cheap Can We Go?},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2018 - 10th International Conference
                  on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10831},
  pages        = {107--123},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-89339-6\_7},
  doi          = {10.1007/978-3-319-89339-6\_7},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/ChavesCRB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/SamwelB18,
  author       = {Niels Samwel and
                  Lejla Batina},
  editor       = {Antoine Joux and
                  Abderrahmane Nitaj and
                  Tajjeeddine Rachidi},
  title        = {Practical Fault Injection on Deterministic Signatures: The Case of
                  EdDSA},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2018 - 10th International Conference
                  on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10831},
  pages        = {306--321},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-89339-6\_17},
  doi          = {10.1007/978-3-319-89339-6\_17},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/SamwelB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/SamwelBBDS18,
  author       = {Niels Samwel and
                  Lejla Batina and
                  Guido Bertoni and
                  Joan Daemen and
                  Ruggero Susella},
  editor       = {Nigel P. Smart},
  title        = {Breaking Ed25519 in WolfSSL},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers' Track at
                  the {RSA} Conference 2018, San Francisco, CA, USA, April 16-20, 2018,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10808},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76953-0\_1},
  doi          = {10.1007/978-3-319-76953-0\_1},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/SamwelBBDS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsd/PirotteVBM18,
  author       = {Niels Pirotte and
                  Jo Vliegen and
                  Lejla Batina and
                  Nele Mentens},
  editor       = {Martin Novotn{\'{y}} and
                  Nikos Konofaos and
                  Amund Skavhaug},
  title        = {Design of a Fully Balanced {ASIC} Coprocessor Implementing Complete
                  Addition Formulas on Weierstrass Elliptic Curves},
  booktitle    = {21st Euromicro Conference on Digital System Design, {DSD} 2018, Prague,
                  Czech Republic, August 29-31, 2018},
  pages        = {545--552},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/DSD.2018.00095},
  doi          = {10.1109/DSD.2018.00095},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsd/PirotteVBM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/MaldiniSPB18,
  author       = {Antun Maldini and
                  Niels Samwel and
                  Stjepan Picek and
                  Lejla Batina},
  title        = {Genetic Algorithm-Based Electromagnetic Fault Injection},
  booktitle    = {2018 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC}
                  2018, Amsterdam, The Netherlands, September 13, 2018},
  pages        = {35--42},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/FDTC.2018.00014},
  doi          = {10.1109/FDTC.2018.00014},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fdtc/MaldiniSPB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2018proofs,
  editor       = {Lejla Batina and
                  Ulrich K{\"{u}}hne and
                  Nele Mentens},
  title        = {{PROOFS} 2018, 7th International Workshop on Security Proofs for Embedded
                  Systems, colocated with {CHES} 2018, Amsterdam, The Netherlands, September
                  13, 2018},
  series       = {Kalpa Publications in Computing},
  volume       = {7},
  publisher    = {EasyChair},
  year         = {2018},
  url          = {http://www.easychair.org/publications/volume/PROOFS\_2018},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/2018proofs.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1810-09076,
  author       = {Lejla Batina and
                  Shivam Bhasin and
                  Dirmanto Jap and
                  Stjepan Picek},
  title        = {{CSI} Neural Network: Using Side-channels to Recover Your Artificial
                  Neural Network Information},
  journal      = {CoRR},
  volume       = {abs/1810.09076},
  year         = {2018},
  url          = {http://arxiv.org/abs/1810.09076},
  eprinttype    = {arXiv},
  eprint       = {1810.09076},
  timestamp    = {Wed, 31 Oct 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1810-09076.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BatinaBJP18,
  author       = {Lejla Batina and
                  Shivam Bhasin and
                  Dirmanto Jap and
                  Stjepan Picek},
  title        = {{CSI} Neural Network: Using Side-channels to Recover Your Artificial
                  Neural Network Information},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {477},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/477},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BatinaBJP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpl/MassolinoBCM17,
  author       = {Pedro Maat C. Massolino and
                  Lejla Batina and
                  Ricardo Chaves and
                  Nele Mentens},
  editor       = {Marco D. Santambrogio and
                  Diana G{\"{o}}hringer and
                  Dirk Stroobandt and
                  Nele Mentens and
                  Jari Nurmi},
  title        = {Area-optimized montgomery multiplication on {IGLOO} 2 FPGAs},
  booktitle    = {27th International Conference on Field Programmable Logic and Applications,
                  {FPL} 2017, Ghent, Belgium, September 4-8, 2017},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/FPL.2017.8056762},
  doi          = {10.23919/FPL.2017.8056762},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fpl/MassolinoBCM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/samos/AndrikosRLPB17,
  author       = {Christos Andrikos and
                  Giorgos Rassias and
                  Liran Lerman and
                  Kostas Papagiannopoulos and
                  Lejla Batina},
  editor       = {Yale N. Patt and
                  S. K. Nandy},
  title        = {Location-based leakages: New directions in modeling and exploiting},
  booktitle    = {2017 International Conference on Embedded Computer Systems: Architectures,
                  Modeling, and Simulation, {SAMOS} 2017, Pythagorion, Greece, July
                  17-20, 2017},
  pages        = {246--252},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/SAMOS.2017.8344636},
  doi          = {10.1109/SAMOS.2017.8344636},
  timestamp    = {Tue, 27 Apr 2021 15:13:55 +0200},
  biburl       = {https://dblp.org/rec/conf/samos/AndrikosRLPB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SamwelBBDS17,
  author       = {Niels Samwel and
                  Lejla Batina and
                  Guido Bertoni and
                  Joan Daemen and
                  Ruggero Susella},
  title        = {Breaking Ed25519 in WolfSSL},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {985},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/985},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SamwelBBDS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PicekHJBL17,
  author       = {Stjepan Picek and
                  Annelie Heuser and
                  Alan Jovic and
                  Lejla Batina and
                  Axel Legay},
  title        = {The secrets of profiling for side-channel analysis: feature selection
                  matters},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1110},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1110},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PicekHJBL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/asc/PicekJMBC16,
  author       = {Stjepan Picek and
                  Domagoj Jakobovic and
                  Julian F. Miller and
                  Lejla Batina and
                  Marko Cupic},
  title        = {Cryptographic Boolean functions: One output, many design criteria},
  journal      = {Appl. Soft Comput.},
  volume       = {40},
  pages        = {635--653},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.asoc.2015.10.066},
  doi          = {10.1016/J.ASOC.2015.10.066},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/asc/PicekJMBC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/PicekSJB0SM16,
  author       = {Stjepan Picek and
                  Dominik Sisejkovic and
                  Domagoj Jakobovic and
                  Lejla Batina and
                  Bohan Yang and
                  Danilo Sijacic and
                  Nele Mentens},
  editor       = {David Pointcheval and
                  Abderrahmane Nitaj and
                  Tajjeeddine Rachidi},
  title        = {Extreme Pipelining Towards the Best Area-Performance Trade-Off in
                  Hardware},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2016 - 8th International Conference
                  on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9646},
  pages        = {147--166},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-31517-1\_8},
  doi          = {10.1007/978-3-319-31517-1\_8},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/PicekSJB0SM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aspdac/JiangEP0B16,
  author       = {Ke Jiang and
                  Petru Eles and
                  Zebo Peng and
                  Sudipta Chattopadhyay and
                  Lejla Batina},
  title        = {{SPARTA:} {A} scheduling policy for thwarting differential power analysis
                  attacks},
  booktitle    = {21st Asia and South Pacific Design Automation Conference, {ASP-DAC}
                  2016, Macao, Macao, January 25-28, 2016},
  pages        = {667--672},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ASPDAC.2016.7428088},
  doi          = {10.1109/ASPDAC.2016.7428088},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/aspdac/JiangEP0B16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cd/AlparBBMKGN16,
  author       = {Gergely Alp{\'{a}}r and
                  Lejla Batina and
                  Lynn Margaret Batten and
                  Veelasha Moonsamy and
                  Anna Krasnova and
                  Antoine Guellier and
                  Iynkaran Natgunanathan},
  editor       = {Gianluca Palermo and
                  John Feo},
  title        = {New directions in IoT privacy using attribute-based authentication},
  booktitle    = {Proceedings of the {ACM} International Conference on Computing Frontiers,
                  CF'16, Como, Italy, May 16-19, 2016},
  pages        = {461--466},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2903150.2911710},
  doi          = {10.1145/2903150.2911710},
  timestamp    = {Tue, 06 Nov 2018 11:07:33 +0100},
  biburl       = {https://dblp.org/rec/conf/cd/AlparBBMKGN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/RenesSSB16,
  author       = {Joost Renes and
                  Peter Schwabe and
                  Benjamin Smith and
                  Lejla Batina},
  editor       = {Benedikt Gierlichs and
                  Axel Y. Poschmann},
  title        = {{\textbackslash}mu Kummer: Efficient Hyperelliptic Signatures and
                  Key Exchange on Microcontrollers},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International
                  Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9813},
  pages        = {301--320},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53140-2\_15},
  doi          = {10.1007/978-3-662-53140-2\_15},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/RenesSSB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/DugardinPNBDG16,
  author       = {Margaux Dugardin and
                  Louiza Papachristodoulou and
                  Zakaria Najm and
                  Lejla Batina and
                  Jean{-}Luc Danger and
                  Sylvain Guilley},
  editor       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Elisabeth Oswald},
  title        = {Dismantling Real-World {ECC} with Horizontal and Vertical Template
                  Attacks},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 7th International
                  Workshop, {COSADE} 2016, Graz, Austria, April 14-15, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9689},
  pages        = {88--108},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-43283-0\_6},
  doi          = {10.1007/978-3-319-43283-0\_6},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/DugardinPNBDG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dtis/FournarisPBS16,
  author       = {Apostolos P. Fournaris and
                  Louiza Papachristodoulou and
                  Lejla Batina and
                  Nicolas Sklavos},
  title        = {Residue Number System as a side channel and fault injection attack
                  countermeasure in elliptic curve cryptography},
  booktitle    = {2016 International Conference on Design and Technology of Integrated
                  Systems in Nanoscale Era, {DTIS} 2016, Istanbul, Turkey, April 12-14,
                  2016},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/DTIS.2016.7483807},
  doi          = {10.1109/DTIS.2016.7483807},
  timestamp    = {Fri, 15 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dtis/FournarisPBS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/RenesCB16,
  author       = {Joost Renes and
                  Craig Costello and
                  Lejla Batina},
  editor       = {Marc Fischlin and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Complete Addition Formulas for Prime Order Elliptic Curves},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9665},
  pages        = {403--428},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49890-3\_16},
  doi          = {10.1007/978-3-662-49890-3\_16},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/RenesCB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/OzgenPB16,
  author       = {Elif Ozgen and
                  Louiza Papachristodoulou and
                  Lejla Batina},
  editor       = {William H. Robinson and
                  Swarup Bhunia and
                  Ryan Kastner},
  title        = {Template attacks using classification algorithms},
  booktitle    = {2016 {IEEE} International Symposium on Hardware Oriented Security
                  and Trust, {HOST} 2016, McLean, VA, USA, May 3-5, 2016},
  pages        = {242--247},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/HST.2016.7495589},
  doi          = {10.1109/HST.2016.7495589},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/OzgenPB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lightsec/GrootPPSB16,
  author       = {Wouter de Groot and
                  Kostas Papagiannopoulos and
                  Antonio de la Piedra and
                  Erik Schneider and
                  Lejla Batina},
  editor       = {Andrey Bogdanov},
  title        = {Bitsliced Masking and {ARM:} Friends or Foes?},
  booktitle    = {Lightweight Cryptography for Security and Privacy - 5th International
                  Workshop, LightSec 2016, Aksaray, Turkey, September 21-22, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10098},
  pages        = {91--109},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-55714-4\_7},
  doi          = {10.1007/978-3-319-55714-4\_7},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/lightsec/GrootPPSB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/MahmudluBBB16,
  author       = {Rauf Mahmudlu and
                  Valentina Banciu and
                  Lejla Batina and
                  Ileana Buhan},
  editor       = {Gerhard P. Hancke and
                  Konstantinos Markantonakis},
  title        = {LDA-Based Clustering as a Side-Channel Distinguisher},
  booktitle    = {Radio Frequency Identification and IoT Security - 12th International
                  Workshop, RFIDSec 2016, Hong Kong, China, November 30 - December 2,
                  2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10155},
  pages        = {62--75},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62024-4\_5},
  doi          = {10.1007/978-3-319-62024-4\_5},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/rfidsec/MahmudluBBB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/space/MassolinoRB16,
  author       = {Pedro Maat C. Massolino and
                  Joost Renes and
                  Lejla Batina},
  editor       = {Claude Carlet and
                  M. Anwar Hasan and
                  Vishal Saraswat},
  title        = {Implementing Complete Formulas on Weierstrass Curves in Hardware},
  booktitle    = {Security, Privacy, and Applied Cryptography Engineering - 6th International
                  Conference, {SPACE} 2016, Hyderabad, India, December 14-18, 2016,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10076},
  pages        = {89--108},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49445-6\_5},
  doi          = {10.1007/978-3-319-49445-6\_5},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/space/MassolinoRB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/RenesSSB16,
  author       = {Joost Renes and
                  Peter Schwabe and
                  Benjamin Smith and
                  Lejla Batina},
  title        = {{\textdollar}{\(\mu\)}{\textdollar}Kummer: efficient hyperelliptic
                  signatures and key exchange on microcontrollers},
  journal      = {CoRR},
  volume       = {abs/1604.06059},
  year         = {2016},
  url          = {http://arxiv.org/abs/1604.06059},
  eprinttype    = {arXiv},
  eprint       = {1604.06059},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/RenesSSB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/BatinaBSS16,
  author       = {Lejla Batina and
                  Swarup Bhunia and
                  Patrick Schaumont and
                  Jean{-}Pierre Seifert},
  title        = {Foundations of Secure Scaling (Dagstuhl Seminar 16342)},
  journal      = {Dagstuhl Reports},
  volume       = {6},
  number       = {8},
  pages        = {65--90},
  year         = {2016},
  url          = {https://doi.org/10.4230/DagRep.6.8.65},
  doi          = {10.4230/DAGREP.6.8.65},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/BatinaBSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MassolinoBCM16,
  author       = {Pedro Maat C. Massolino and
                  Lejla Batina and
                  Ricardo Chaves and
                  Nele Mentens},
  title        = {Low Power Montgomery Modular Multiplication on Reconfigurable Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {280},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/280},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MassolinoBCM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RenesSSB16,
  author       = {Joost Renes and
                  Peter Schwabe and
                  Benjamin Smith and
                  Lejla Batina},
  title        = {{\textbackslash}({\textbackslash}mu{\textbackslash})Kummer: efficient
                  hyperelliptic signatures and key exchange on microcontrollers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {366},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/366},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RenesSSB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrootPPSB16,
  author       = {Wouter de Groot and
                  Kostas Papagiannopoulos and
                  Antonio de la Piedra and
                  Erik Schneider and
                  Lejla Batina},
  title        = {Bitsliced Masking and {ARM:} Friends or Foes?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {946},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/946},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrootPPSB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MahmudluBBB16,
  author       = {Rauf Mahmudlu and
                  Valentina Banciu and
                  Lejla Batina and
                  Ileana Buhan},
  title        = {LDA-Based Clustering as a Side-Channel Distinguisher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1024},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1024},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MahmudluBBB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MassolinoRB16,
  author       = {Pedro Maat C. Massolino and
                  Joost Renes and
                  Lejla Batina},
  title        = {Implementing Complete Formulas on Weierstrass Curves in Hardware},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1133},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1133},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MassolinoRB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BatinaR15,
  author       = {Lejla Batina and
                  Matthew J. B. Robshaw},
  title        = {Introduction to the {CHES} 2014 special issue},
  journal      = {J. Cryptogr. Eng.},
  volume       = {5},
  number       = {2},
  pages        = {71--72},
  year         = {2015},
  url          = {https://doi.org/10.1007/s13389-015-0098-x},
  doi          = {10.1007/S13389-015-0098-X},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BatinaR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/PicekBBJ15,
  author       = {Stjepan Picek and
                  Lejla Batina and
                  Pieter Buzing and
                  Domagoj Jakobovic},
  editor       = {Stefan Mangard and
                  Axel Y. Poschmann},
  title        = {Fault Injection with a New Flavor: Memetic Algorithms Make a Difference},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 6th International
                  Workshop, {COSADE} 2015, Berlin, Germany, April 13-14, 2015. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9064},
  pages        = {159--173},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-21476-4\_11},
  doi          = {10.1007/978-3-319-21476-4\_11},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/PicekBBJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurogp/PicekJMMB15,
  author       = {Stjepan Picek and
                  Domagoj Jakobovic and
                  Julian F. Miller and
                  Elena Marchiori and
                  Lejla Batina},
  editor       = {Penousal Machado and
                  Malcolm I. Heywood and
                  James McDermott and
                  Mauro Castelli and
                  Pablo Garc{\'{\i}}a{-}S{\'{a}}nchez and
                  Paolo Burelli and
                  Sebastian Risi and
                  Kevin Sim},
  title        = {Evolutionary Methods for the Construction of Cryptographic Boolean
                  Functions},
  booktitle    = {Genetic Programming - 18th European Conference, EuroGP 2015, Copenhagen,
                  Denmark, April 8-10, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9025},
  pages        = {192--204},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-16501-1\_16},
  doi          = {10.1007/978-3-319-16501-1\_16},
  timestamp    = {Sun, 25 Jul 2021 11:44:36 +0200},
  biburl       = {https://dblp.org/rec/conf/eurogp/PicekJMMB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/PicekCJMB15,
  author       = {Stjepan Picek and
                  Claude Carlet and
                  Domagoj Jakobovic and
                  Julian F. Miller and
                  Lejla Batina},
  editor       = {Sara Silva and
                  Anna Isabel Esparcia{-}Alc{\'{a}}zar},
  title        = {Correlation Immunity of Boolean Functions: An Evolutionary Algorithms
                  Perspective},
  booktitle    = {Proceedings of the Genetic and Evolutionary Computation Conference,
                  {GECCO} 2015, Madrid, Spain, July 11-15, 2015},
  pages        = {1095--1102},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2739480.2754764},
  doi          = {10.1145/2739480.2754764},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gecco/PicekCJMB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/PicekMJB15,
  author       = {Stjepan Picek and
                  Julian F. Miller and
                  Domagoj Jakobovic and
                  Lejla Batina},
  editor       = {Sara Silva and
                  Anna Isabel Esparcia{-}Alc{\'{a}}zar},
  title        = {Cartesian Genetic Programming Approach for Generating Substitution
                  Boxes of Different Sizes},
  booktitle    = {Genetic and Evolutionary Computation Conference, {GECCO} 2015, Madrid,
                  Spain, July 11-15, 2015, Companion Material Proceedings},
  pages        = {1457--1458},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2739482.2764698},
  doi          = {10.1145/2739482.2764698},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gecco/PicekMJB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/GravesNBBEFMPRR15,
  author       = {Ricardo Chaves and
                  Giorgio Di Natale and
                  Lejla Batina and
                  Shivam Bhasin and
                  Baris Ege and
                  Apostolos P. Fournaris and
                  Nele Mentens and
                  Stjepan Picek and
                  Francesco Regazzoni and
                  Vladimir Rozic and
                  Nicolas Sklavos and
                  Bohan Yang},
  title        = {Challenges in designing trustworthy cryptographic co-processors},
  booktitle    = {2015 {IEEE} International Symposium on Circuits and Systems, {ISCAS}
                  2015, Lisbon, Portugal, May 24-27, 2015},
  pages        = {2009--2012},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISCAS.2015.7169070},
  doi          = {10.1109/ISCAS.2015.7169070},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscas/GravesNBBEFMPRR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/EgePBP15,
  author       = {Baris Ege and
                  Kostas Papagiannopoulos and
                  Lejla Batina and
                  Stjepan Picek},
  title        = {Improving {DPA} resistance of S-boxes: How far can we go?},
  booktitle    = {2015 {IEEE} International Symposium on Circuits and Systems, {ISCAS}
                  2015, Lisbon, Portugal, May 24-27, 2015},
  pages        = {2013--2016},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISCAS.2015.7169071},
  doi          = {10.1109/ISCAS.2015.7169071},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscas/EgePBP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/EgeEB15,
  author       = {Baris Ege and
                  Thomas Eisenbarth and
                  Lejla Batina},
  editor       = {Orr Dunkelman and
                  Liam Keliher},
  title        = {Near Collision Side Channel Attacks},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2015 - 22nd International Conference,
                  Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9566},
  pages        = {277--292},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31301-6\_17},
  doi          = {10.1007/978-3-319-31301-6\_17},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/EgeEB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/space/PicekMMB15,
  author       = {Stjepan Picek and
                  Bodhisatwa Mazumdar and
                  Debdeep Mukhopadhyay and
                  Lejla Batina},
  editor       = {Rajat Subhra Chakraborty and
                  Peter Schwabe and
                  Jon A. Solworth},
  title        = {Modified Transparency Order Property: Solution or Just Another Attempt},
  booktitle    = {Security, Privacy, and Applied Cryptography Engineering - 5th International
                  Conference, {SPACE} 2015, Jaipur, India, October 3-7, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9354},
  pages        = {210--227},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24126-5\_13},
  doi          = {10.1007/978-3-319-24126-5\_13},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/space/PicekMMB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EgeEB15,
  author       = {Baris Ege and
                  Thomas Eisenbarth and
                  Lejla Batina},
  title        = {Near Collision Side Channel Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {511},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/511},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EgeEB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DugardinPNBDGCT15,
  author       = {Margaux Dugardin and
                  Louiza Papachristodoulou and
                  Zakaria Najm and
                  Lejla Batina and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Jean{-}Christophe Courr{\`{e}}ge and
                  Carine Therond},
  title        = {Dismantling real-world {ECC} with Horizontal and Vertical Template
                  Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1001},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1001},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DugardinPNBDGCT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SingeleeSBV15,
  author       = {Dave Singel{\'{e}}e and
                  Stefaan Seys and
                  Lejla Batina and
                  Ingrid Verbauwhede},
  title        = {The Energy Budget for Wireless Security: Extended Version},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1029},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1029},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SingeleeSBV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RenesCB15,
  author       = {Joost Renes and
                  Craig Costello and
                  Lejla Batina},
  title        = {Complete addition formulas for prime order elliptic curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1060},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1060},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RenesCB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/balkancryptsec/MentensBB14,
  author       = {Nele Mentens and
                  Lejla Batina and
                  Sel{\c{c}}uk Baktir},
  editor       = {Berna {\"{O}}rs and
                  Bart Preneel},
  title        = {An Elliptic Curve Cryptographic Processor Using Edwards Curves and
                  the Number Theoretic Transform},
  booktitle    = {Cryptography and Information Security in the Balkans - First International
                  Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17,
                  2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9024},
  pages        = {94--102},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-21356-9\_7},
  doi          = {10.1007/978-3-319-21356-9\_7},
  timestamp    = {Tue, 16 Nov 2021 09:08:54 +0100},
  biburl       = {https://dblp.org/rec/conf/balkancryptsec/MentensBB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/KorakHEB14,
  author       = {Thomas Korak and
                  Michael Hutter and
                  Baris Ege and
                  Lejla Batina},
  editor       = {Assia Tria and
                  Dooho Choi},
  title        = {Clock Glitch Attacks in the Presence of Heating},
  booktitle    = {2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC}
                  2014, Busan, South Korea, September 23, 2014},
  pages        = {104--114},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/FDTC.2014.20},
  doi          = {10.1109/FDTC.2014.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fdtc/KorakHEB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hipeac/PicekEBJCG14,
  author       = {Stjepan Picek and
                  Baris Ege and
                  Lejla Batina and
                  Domagoj Jakobovic and
                  Lukasz Chmielewski and
                  Marin Golub},
  editor       = {Jens Knoop and
                  Valentina Salapura and
                  Israel Koren and
                  Gerardo Pelosi},
  title        = {On using genetic algorithms for intrinsic side-channel resistance:
                  the case of {AES} S-box},
  booktitle    = {Proceedings of the First Workshop on Cryptography and Security in
                  Computing Systems, CS2@HiPEAC 2014, Vienna, Austria, January 20, 2014},
  pages        = {13--18},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2556315.2556319},
  doi          = {10.1145/2556315.2556319},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hipeac/PicekEBJCG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/PicekEPBJ14,
  author       = {Stjepan Picek and
                  Baris Ege and
                  Kostas Papagiannopoulos and
                  Lejla Batina and
                  Domagoj Jakobovic},
  title        = {Optimality and beyond: The case of 4{\texttimes}4 S-boxes},
  booktitle    = {2014 {IEEE} International Symposium on Hardware-Oriented Security
                  and Trust, {HOST} 2014, Arlington, VA, USA, May 6-7, 2014},
  pages        = {80--83},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/HST.2014.6855573},
  doi          = {10.1109/HST.2014.6855573},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/PicekEPBJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/BatinaCPST14,
  author       = {Lejla Batina and
                  Lukasz Chmielewski and
                  Louiza Papachristodoulou and
                  Peter Schwabe and
                  Michael Tunstall},
  editor       = {Willi Meier and
                  Debdeep Mukhopadhyay},
  title        = {Online Template Attacks},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2014 - 15th International Conference
                  on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8885},
  pages        = {21--36},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13039-2\_2},
  doi          = {10.1007/978-3-319-13039-2\_2},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/indocrypt/BatinaCPST14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/BatinaJMPPS14,
  author       = {Lejla Batina and
                  Domagoj Jakobovic and
                  Nele Mentens and
                  Stjepan Picek and
                  Antonio de la Piedra and
                  Dominik Sisejkovic},
  editor       = {Willi Meier and
                  Debdeep Mukhopadhyay},
  title        = {S-box Pipelining Using Genetic Algorithms for High-Throughput {AES}
                  Implementations: How Fast Can We Go?},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2014 - 15th International Conference
                  on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8885},
  pages        = {322--337},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13039-2\_19},
  doi          = {10.1007/978-3-319-13039-2\_19},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/BatinaJMPPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/PicekPEBJ14,
  author       = {Stjepan Picek and
                  Kostas Papagiannopoulos and
                  Baris Ege and
                  Lejla Batina and
                  Domagoj Jakobovic},
  editor       = {Willi Meier and
                  Debdeep Mukhopadhyay},
  title        = {Confused by Confusion: Systematic Evaluation of {DPA} Resistance of
                  Various S-boxes},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2014 - 15th International Conference
                  on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8885},
  pages        = {374--390},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13039-2\_22},
  doi          = {10.1007/978-3-319-13039-2\_22},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/PicekPEBJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isvlsi/JiangBEP14,
  author       = {Ke Jiang and
                  Lejla Batina and
                  Petru Eles and
                  Zebo Peng},
  title        = {Robustness Analysis of Real-Time Scheduling Against Differential Power
                  Analysis Attacks},
  booktitle    = {{IEEE} Computer Society Annual Symposium on VLSI, {ISVLSI} 2014, Tampa,
                  FL, USA, July 9-11, 2014},
  pages        = {450--455},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISVLSI.2014.11},
  doi          = {10.1109/ISVLSI.2014.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isvlsi/JiangBEP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mipro/PicekBJC14,
  author       = {Stjepan Picek and
                  Lejla Batina and
                  Domagoj Jakobovic and
                  Rafael Boix Carpi},
  title        = {Evolving genetic algorithms for fault injection attacks},
  booktitle    = {37th International Convention on Information and Communication Technology,
                  Electronics and Microelectronics, {MIPRO} 2014, Opatija, Croatia,
                  May 26-30, 2014},
  pages        = {1106--1111},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/MIPRO.2014.6859734},
  doi          = {10.1109/MIPRO.2014.6859734},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mipro/PicekBJC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ppsn/PicekBJ14,
  author       = {Stjepan Picek and
                  Lejla Batina and
                  Domagoj Jakobovic},
  editor       = {Thomas Bartz{-}Beielstein and
                  J{\"{u}}rgen Branke and
                  Bogdan Filipic and
                  Jim Smith},
  title        = {Evolving DPA-Resistant Boolean Functions},
  booktitle    = {Parallel Problem Solving from Nature - {PPSN} {XIII} - 13th International
                  Conference, Ljubljana, Slovenia, September 13-17, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8672},
  pages        = {812--821},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10762-2\_80},
  doi          = {10.1007/978-3-319-10762-2\_80},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ppsn/PicekBJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ppsn/PicekMBJ14,
  author       = {Stjepan Picek and
                  Elena Marchiori and
                  Lejla Batina and
                  Domagoj Jakobovic},
  editor       = {Thomas Bartz{-}Beielstein and
                  J{\"{u}}rgen Branke and
                  Bogdan Filipic and
                  Jim Smith},
  title        = {Combining Evolutionary Computation and Algebraic Constructions to
                  Find Cryptography-Relevant Boolean Functions},
  booktitle    = {Parallel Problem Solving from Nature - {PPSN} {XIII} - 13th International
                  Conference, Ljubljana, Slovenia, September 13-17, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8672},
  pages        = {822--831},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10762-2\_81},
  doi          = {10.1007/978-3-319-10762-2\_81},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ppsn/PicekMBJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/BatinaHHK14,
  author       = {Lejla Batina and
                  Jens Hermans and
                  Jaap{-}Henk Hoepman and
                  Anna Krasnova},
  editor       = {Nitesh Saxena and
                  Ahmad{-}Reza Sadeghi},
  title        = {High-Speed Dating Privacy-Preserving Attribute Matching for {RFID}},
  booktitle    = {Radio Frequency Identification: Security and Privacy Issues - 10th
                  International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8651},
  pages        = {19--35},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13066-8\_2},
  doi          = {10.1007/978-3-319-13066-8\_2},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/rfidsec/BatinaHHK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/PicekBJEG14,
  author       = {Stjepan Picek and
                  Lejla Batina and
                  Domagoj Jakobovic and
                  Baris Ege and
                  Marin Golub},
  editor       = {David Naccache and
                  Damien Sauveron},
  title        = {S-box, SET, Match: {A} Toolbox for S-box Analysis},
  booktitle    = {Information Security Theory and Practice. Securing the Internet of
                  Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014,
                  Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8501},
  pages        = {140--149},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43826-8\_10},
  doi          = {10.1007/978-3-662-43826-8\_10},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/PicekBJEG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2014,
  editor       = {Lejla Batina and
                  Matthew Robshaw},
  title        = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International
                  Workshop, Busan, South Korea, September 23-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8731},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44709-3},
  doi          = {10.1007/978-3-662-44709-3},
  isbn         = {978-3-662-44708-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BatinaJMPPS14,
  author       = {Lejla Batina and
                  Domagoj Jakobovic and
                  Nele Mentens and
                  Stjepan Picek and
                  Antonio de la Piedra and
                  Dominik Sisejkovic},
  title        = {S-box pipelining using genetic algorithms for high-throughput {AES}
                  implementations: How fast can we go?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {734},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/734},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BatinaJMPPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcad/DasEGBV13,
  author       = {Amitabh Das and
                  Baris Ege and
                  Santosh Ghosh and
                  Lejla Batina and
                  Ingrid Verbauwhede},
  title        = {Security Analysis of Industrial Test Compression Schemes},
  journal      = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.},
  volume       = {32},
  number       = {12},
  pages        = {1966--1977},
  year         = {2013},
  url          = {https://doi.org/10.1109/TCAD.2013.2274619},
  doi          = {10.1109/TCAD.2013.2274619},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcad/DasEGBV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/CarpiPBMJG13,
  author       = {Rafael Boix Carpi and
                  Stjepan Picek and
                  Lejla Batina and
                  Federico Menarini and
                  Domagoj Jakobovic and
                  Marin Golub},
  editor       = {Aur{\'{e}}lien Francillon and
                  Pankaj Rohatgi},
  title        = {Glitch It If You Can: Parameter Search Strategies for Successful Fault
                  Injection},
  booktitle    = {Smart Card Research and Advanced Applications - 12th International
                  Conference, {CARDIS} 2013, Berlin, Germany, November 27-29, 2013.
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8419},
  pages        = {236--252},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-08302-5\_16},
  doi          = {10.1007/978-3-319-08302-5\_16},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/CarpiPBMJG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/BatinaDEKMPVY13,
  author       = {Lejla Batina and
                  Amitabh Das and
                  Baris Ege and
                  Elif Bilge Kavun and
                  Nele Mentens and
                  Christof Paar and
                  Ingrid Verbauwhede and
                  Tolga Yal{\c{c}}in},
  editor       = {Michael Hutter and
                  J{\"{o}}rn{-}Marc Schmidt},
  title        = {Dietary Recommendations for Lightweight Block Ciphers: Power, Energy
                  and Area Analysis of Recently Developed Architectures},
  booktitle    = {Radio Frequency Identification - Security and Privacy Issues 9th International
                  Workshop, RFIDsec 2013, Graz, Austria, July 9-11, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8262},
  pages        = {103--112},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41332-2\_7},
  doi          = {10.1007/978-3-642-41332-2\_7},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/rfidsec/BatinaDEKMPVY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/sps/KnezevicBMFGLMV13,
  author       = {Miroslav Knezevic and
                  Lejla Batina and
                  Elke De Mulder and
                  Junfeng Fan and
                  Benedikt Gierlichs and
                  Yong Ki Lee and
                  Roel Maes and
                  Ingrid Verbauwhede},
  editor       = {Shuvra S. Bhattacharyya and
                  Ed F. Deprettere and
                  Rainer Leupers and
                  Jarmo Takala},
  title        = {Signal Processing for Cryptography and Security Applications},
  booktitle    = {Handbook of Signal Processing Systems},
  pages        = {223--241},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-1-4614-6859-2\_7},
  doi          = {10.1007/978-1-4614-6859-2\_7},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/reference/sps/KnezevicBMFGLMV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BatinaDEKMPVY13,
  author       = {Lejla Batina and
                  Amitabh Das and
                  Baris Ege and
                  Elif Bilge Kavun and
                  Nele Mentens and
                  Christof Paar and
                  Ingrid Verbauwhede and
                  Tolga Yal{\c{c}}in},
  title        = {Dietary Recommendations for Lightweight Block Ciphers: Power, Energy
                  and Area Analysis of Recently Developed Architectures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {753},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/753},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BatinaDEKMPVY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/puc/BatinaLSSV12,
  author       = {Lejla Batina and
                  Yong Ki Lee and
                  Stefaan Seys and
                  Dave Singel{\'{e}}e and
                  Ingrid Verbauwhede},
  title        = {Extending ECC-based {RFID} authentication protocols to privacy-preserving
                  multi-party grouping proofs},
  journal      = {Pers. Ubiquitous Comput.},
  volume       = {16},
  number       = {3},
  pages        = {323--335},
  year         = {2012},
  url          = {https://doi.org/10.1007/s00779-011-0392-2},
  doi          = {10.1007/S00779-011-0392-2},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/puc/BatinaLSSV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/BalaschGVBV12,
  author       = {Josep Balasch and
                  Benedikt Gierlichs and
                  Roel Verdult and
                  Lejla Batina and
                  Ingrid Verbauwhede},
  editor       = {Orr Dunkelman},
  title        = {Power Analysis of Atmel CryptoMemory - Recovering Keys from Secure
                  EEPROMs},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2012 - The Cryptographers' Track at
                  the {RSA} Conference 2012, San Francisco, CA, USA, February 27 - March
                  2, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7178},
  pages        = {19--34},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-27954-6\_2},
  doi          = {10.1007/978-3-642-27954-6\_2},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/BalaschGVBV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/BatinaHW12,
  author       = {Lejla Batina and
                  Jip Hogenboom and
                  Jasper G. J. van Woudenberg},
  editor       = {Orr Dunkelman},
  title        = {Getting More from {PCA:} First Results of Using Principal Component
                  Analysis for Extensive Power Analysis},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2012 - The Cryptographers' Track at
                  the {RSA} Conference 2012, San Francisco, CA, USA, February 27 - March
                  2, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7178},
  pages        = {383--397},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-27954-6\_24},
  doi          = {10.1007/978-3-642-27954-6\_24},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/BatinaHW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmb/AlparBV12,
  author       = {Gergely Alp{\'{a}}r and
                  Lejla Batina and
                  Roel Verdult},
  editor       = {Jens B. Schmitt},
  title        = {Using {NFC} Phones for Proving Credentials},
  booktitle    = {Measurement, Modelling, and Evaluation of Computing Systems and Dependability
                  and Fault Tolerance - 16th International {GI/ITG} Conference, {MMB}
                  {\&} {DFT} 2012, Kaiserslautern, Germany, March 19-21, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7201},
  pages        = {317--330},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28540-0\_26},
  doi          = {10.1007/978-3-642-28540-0\_26},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/mmb/AlparBV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkdd/MavroeidisBLM12,
  author       = {Dimitrios Mavroeidis and
                  Lejla Batina and
                  Twan van Laarhoven and
                  Elena Marchiori},
  editor       = {Peter A. Flach and
                  Tijl De Bie and
                  Nello Cristianini},
  title        = {PCA, Eigenvector Localization and Clustering for Side-Channel Attacks
                  on Cryptographic Hardware Devices},
  booktitle    = {Machine Learning and Knowledge Discovery in Databases - European Conference,
                  {ECML} {PKDD} 2012, Bristol, UK, September 24-28, 2012. Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7523},
  pages        = {253--268},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33460-3\_22},
  doi          = {10.1007/978-3-642-33460-3\_22},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/pkdd/MavroeidisBLM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/AlparBL12,
  author       = {Gergely Alp{\'{a}}r and
                  Lejla Batina and
                  Wouter Lueks},
  editor       = {Jaap{-}Henk Hoepman and
                  Ingrid Verbauwhede},
  title        = {Designated Attribute-Based Proofs for {RFID} Applications},
  booktitle    = {Radio Frequency Identification. Security and Privacy Issues - 8th
                  International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July
                  2-3, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7739},
  pages        = {59--75},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-36140-1\_5},
  doi          = {10.1007/978-3-642-36140-1\_5},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/rfidsec/AlparBL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/integration/FanBV11,
  author       = {Junfeng Fan and
                  Lejla Batina and
                  Ingrid Verbauwhede},
  title        = {Design and design methods for unified multiplier and inverter and
                  its application for {HECC}},
  journal      = {Integr.},
  volume       = {44},
  number       = {4},
  pages        = {280--289},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.vlsi.2011.04.001},
  doi          = {10.1016/J.VLSI.2011.04.001},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/integration/FanBV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BatinaGPRSV11,
  author       = {Lejla Batina and
                  Benedikt Gierlichs and
                  Emmanuel Prouff and
                  Matthieu Rivain and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Nicolas Veyrat{-}Charvillon},
  title        = {Mutual Information Analysis: a Comprehensive Study},
  journal      = {J. Cryptol.},
  volume       = {24},
  number       = {2},
  pages        = {269--291},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00145-010-9084-8},
  doi          = {10.1007/S00145-010-9084-8},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BatinaGPRSV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/MuijrersWB11,
  author       = {Ruben A. Muijrers and
                  Jasper G. J. van Woudenberg and
                  Lejla Batina},
  editor       = {Emmanuel Prouff},
  title        = {{RAM:} Rapid Alignment Method},
  booktitle    = {Smart Card Research and Advanced Applications - 10th {IFIP} {WG} 8.8/11.2
                  International Conference, {CARDIS} 2011, Leuven, Belgium, September
                  14-16, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7079},
  pages        = {266--282},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27257-8\_17},
  doi          = {10.1007/978-3-642-27257-8\_17},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/MuijrersWB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/BatinaSSV11,
  author       = {Lejla Batina and
                  Stefaan Seys and
                  Dave Singel{\'{e}}e and
                  Ingrid Verbauwhede},
  editor       = {Ari Juels and
                  Christof Paar},
  title        = {Hierarchical ECC-Based {RFID} Authentication Protocol},
  booktitle    = {{RFID.} Security and Privacy - 7th International Workshop, RFIDSec
                  2011, Amherst, USA, June 26-28, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7055},
  pages        = {183--201},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25286-0\_12},
  doi          = {10.1007/978-3-642-25286-0\_12},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/rfidsec/BatinaSSV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SingeleeSBV11,
  author       = {Dave Singel{\'{e}}e and
                  Stefaan Seys and
                  Lejla Batina and
                  Ingrid Verbauwhede},
  editor       = {Dieter Gollmann and
                  Dirk Westhoff and
                  Gene Tsudik and
                  N. Asokan},
  title        = {The communication and computation cost of wireless security: extended
                  abstract},
  booktitle    = {Proceedings of the Fourth {ACM} Conference on Wireless Network Security,
                  {WISEC} 2011, Hamburg, Germany, June 14-17, 2011},
  pages        = {1--4},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1998412.1998414},
  doi          = {10.1145/1998412.1998414},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/SingeleeSBV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/BatinaHJMV10,
  author       = {Lejla Batina and
                  Jaap{-}Henk Hoepman and
                  Bart Jacobs and
                  Wojciech Mostowski and
                  Pim Vullers},
  editor       = {Dieter Gollmann and
                  Jean{-}Louis Lanet and
                  Julien Iguchi{-}Cartigny},
  title        = {Developing Efficient Blinded Attribute Certificates on Smart Cards
                  via Pairings},
  booktitle    = {Smart Card Research and Advanced Application, 9th {IFIP} {WG} 8.8/11.2
                  International Conference, {CARDIS} 2010, Passau, Germany, April 14-16,
                  2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6035},
  pages        = {209--222},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12510-2\_15},
  doi          = {10.1007/978-3-642-12510-2\_15},
  timestamp    = {Sat, 30 May 2020 20:05:42 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/BatinaHJMV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/GierlichsBPV10,
  author       = {Benedikt Gierlichs and
                  Lejla Batina and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  editor       = {Josef Pieprzyk},
  title        = {Revisiting Higher-Order {DPA} Attacks:},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2010, The Cryptographers' Track at
                  the {RSA} Conference 2010, San Francisco, CA, USA, March 1-5, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5985},
  pages        = {221--234},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11925-5\_16},
  doi          = {10.1007/978-3-642-11925-5\_16},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/GierlichsBPV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/LiSBNO10,
  author       = {Yang Li and
                  Kazuo Sakiyama and
                  Lejla Batina and
                  Daisuke Nakatsu and
                  Kazuo Ohta},
  editor       = {Giovanni De Micheli and
                  Bashir M. Al{-}Hashimi and
                  Wolfgang M{\"{u}}ller and
                  Enrico Macii},
  title        = {Power Variance Analysis breaks a masked {ASIC} implementation of {AES}},
  booktitle    = {Design, Automation and Test in Europe, {DATE} 2010, Dresden, Germany,
                  March 8-12, 2010},
  pages        = {1059--1064},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/DATE.2010.5456966},
  doi          = {10.1109/DATE.2010.5456966},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/date/LiSBNO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpl/FanBBGPV10,
  author       = {Junfeng Fan and
                  Daniel V. Bailey and
                  Lejla Batina and
                  Tim G{\"{u}}neysu and
                  Christof Paar and
                  Ingrid Verbauwhede},
  title        = {Breaking Elliptic Curve Cryptosystems Using Reconfigurable Hardware},
  booktitle    = {International Conference on Field Programmable Logic and Applications,
                  {FPL} 2010, August 31 2010 - September 2, 2010, Milano, Italy},
  pages        = {133--138},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/FPL.2010.34},
  doi          = {10.1109/FPL.2010.34},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fpl/FanBBGPV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icecsys/BatinaHMMV10,
  author       = {Lejla Batina and
                  Jip Hogenboom and
                  Nele Mentens and
                  Joren Moelans and
                  Jo Vliegen},
  title        = {Side-channel evaluation of {FPGA} implementations of binary Edwards
                  curves},
  booktitle    = {17th {IEEE} International Conference on Electronics, Circuits, and
                  Systems, {ICECS} 2010, Athens, Greece, 12-15 December, 2010},
  pages        = {1248--1251},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICECS.2010.5724745},
  doi          = {10.1109/ICECS.2010.5724745},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icecsys/BatinaHMMV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/BatinaLSSV10,
  author       = {Lejla Batina and
                  Yong Ki Lee and
                  Stefaan Seys and
                  Dave Singel{\'{e}}e and
                  Ingrid Verbauwhede},
  editor       = {Mike Burmester and
                  Gene Tsudik and
                  Spyros S. Magliveras and
                  Ivana Ilic},
  title        = {Privacy-Preserving ECC-Based Grouping Proofs for {RFID}},
  booktitle    = {Information Security - 13th International Conference, {ISC} 2010,
                  Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6531},
  pages        = {159--165},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-18178-8\_14},
  doi          = {10.1007/978-3-642-18178-8\_14},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/BatinaLSSV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobilight/LeeBSV10,
  author       = {Yong Ki Lee and
                  Lejla Batina and
                  Dave Singel{\'{e}}e and
                  Ingrid Verbauwhede},
  editor       = {Periklis Chatzimisios and
                  Christos V. Verikoukis and
                  Ignacio Santamar{\'{\i}}a and
                  Massimiliano Laddomada and
                  Oliver Hoffmann},
  title        = {Wide-Weak Privacy-Preserving {RFID} Authentication Protocols},
  booktitle    = {Mobile Lightweight Wireless Systems - Second International {ICST}
                  Conference, {MOBILIGHT} 2010, Barcelona, Spain, May 10-12, 2010, Revised
                  Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {45},
  pages        = {254--267},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16644-0\_23},
  doi          = {10.1007/978-3-642-16644-0\_23},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobilight/LeeBSV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/LeeBSV10,
  author       = {Yong Ki Lee and
                  Lejla Batina and
                  Dave Singel{\'{e}}e and
                  Ingrid Verbauwhede},
  editor       = {Susanne Wetzel and
                  Cristina Nita{-}Rotaru and
                  Frank Stajano},
  title        = {Low-cost untraceable authentication protocols for {RFID}},
  booktitle    = {Proceedings of the Third {ACM} Conference on Wireless Network Security,
                  {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010},
  pages        = {55--64},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1741866.1741877},
  doi          = {10.1145/1741866.1741877},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/LeeBSV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/daglib/p/KnezevicBMFGLMV10,
  author       = {Miroslav Knezevic and
                  Lejla Batina and
                  Elke De Mulder and
                  Junfeng Fan and
                  Benedikt Gierlichs and
                  Yong Ki Lee and
                  Roel Maes and
                  Ingrid Verbauwhede},
  editor       = {Shuvra S. Bhattacharyya and
                  Ed F. Deprettere and
                  Rainer Leupers and
                  Jarmo Takala},
  title        = {Signal Processing for Cryptography and Security Applications},
  booktitle    = {Handbook of Signal Processing Systems},
  pages        = {161--177},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-6345-1\_7},
  doi          = {10.1007/978-1-4419-6345-1\_7},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/daglib/p/KnezevicBMFGLMV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/10/SakiyamaB10,
  author       = {Kazuo Sakiyama and
                  Lejla Batina},
  editor       = {Ingrid M. R. Verbauwhede},
  title        = {Arithmetic for Public-Key Cryptography},
  booktitle    = {Secure Integrated Circuits and Systems},
  series       = {Integrated Circuits and Systems},
  pages        = {63--78},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-0-387-71829-3\_4},
  doi          = {10.1007/978-0-387-71829-3\_4},
  timestamp    = {Wed, 26 Jun 2019 18:00:01 +0200},
  biburl       = {https://dblp.org/rec/books/sp/10/SakiyamaB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/10/BatinaSV10,
  author       = {Lejla Batina and
                  Kazuo Sakiyama and
                  Ingrid M. R. Verbauwhede},
  editor       = {Ingrid M. R. Verbauwhede},
  title        = {Compact Public-Key Implementations for {RFID} and Sensor Nodes},
  booktitle    = {Secure Integrated Circuits and Systems},
  series       = {Integrated Circuits and Systems},
  pages        = {179--195},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-0-387-71829-3\_10},
  doi          = {10.1007/978-0-387-71829-3\_10},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/sp/10/BatinaSV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/LeeBSPV10,
  author       = {Yong Ki Lee and
                  Lejla Batina and
                  Dave Singel{\'{e}}e and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  editor       = {Ahmad{-}Reza Sadeghi and
                  David Naccache},
  title        = {Anti-counterfeiting, Untraceability and Other Security Challenges
                  for {RFID} Systems: Public-Key-Based Protocols and Hardware},
  booktitle    = {Towards Hardware-Intrinsic Security - Foundations and Practice},
  series       = {Information Security and Cryptography},
  pages        = {237--257},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14452-3\_11},
  doi          = {10.1007/978-3-642-14452-3\_11},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/LeeBSPV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BatinaGL09,
  author       = {Lejla Batina and
                  Benedikt Gierlichs and
                  Kerstin Lemke{-}Rust},
  editor       = {Christophe Clavier and
                  Kris Gaj},
  title        = {Differential Cluster Analysis},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International
                  Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5747},
  pages        = {112--127},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04138-9\_9},
  doi          = {10.1007/978-3-642-04138-9\_9},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BatinaGL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/FanBV09,
  author       = {Junfeng Fan and
                  Lejla Batina and
                  Ingrid Verbauwhede},
  title        = {Light-weight implementation options for curve-based cryptography:
                  {HECC} is also ready for {RFID}},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402516},
  doi          = {10.1109/ICITST.2009.5402516},
  timestamp    = {Mon, 09 Aug 2021 17:01:45 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/FanBV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iolts/FanKKMRBV09,
  author       = {Junfeng Fan and
                  Miroslav Knezevic and
                  Dusko Karaklajic and
                  Roel Maes and
                  Vladimir Rozic and
                  Lejla Batina and
                  Ingrid Verbauwhede},
  title        = {FPGA-based testing strategy for cryptographic chips: {A} case study
                  on Elliptic Curve Processor for {RFID} tags},
  booktitle    = {15th {IEEE} International On-Line Testing Symposium {(IOLTS} 2009),
                  24-26 June 2009, Sesimbra-Lisbon, Portugal},
  pages        = {189--191},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IOLTS.2009.5196009},
  doi          = {10.1109/IOLTS.2009.5196009},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iolts/FanKKMRBV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/KnezevicBV09,
  author       = {Miroslav Knezevic and
                  Lejla Batina and
                  Ingrid Verbauwhede},
  title        = {Modular Reduction without Precomputational Phase},
  booktitle    = {International Symposium on Circuits and Systems {(ISCAS} 2009), 24-17
                  May 2009, Taipei, Taiwan},
  pages        = {1389--1392},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ISCAS.2009.5118024},
  doi          = {10.1109/ISCAS.2009.5118024},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/iscas/KnezevicBV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanrightB09,
  author       = {David Canright and
                  Lejla Batina},
  title        = {A Very Compact "Perfectly Masked" S-Box for {AES} (corrected)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {11},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/011},
  timestamp    = {Mon, 08 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanrightB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GierlichsBPV09,
  author       = {Benedikt Gierlichs and
                  Lejla Batina and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  title        = {Revisiting Higher-Order {DPA} Attacks: Multivariate Mutual Information
                  Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {228},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/228},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GierlichsBPV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaileyBBBBBDMFGGKLMPRSU09,
  author       = {Daniel V. Bailey and
                  Brian Baldwin and
                  Lejla Batina and
                  Daniel J. Bernstein and
                  Peter Birkner and
                  Joppe W. Bos and
                  Gauthier Van Damme and
                  Giacomo de Meulenaer and
                  Junfeng Fan and
                  Tim G{\"{u}}neysu and
                  Frank K. G{\"{u}}rkaynak and
                  Thorsten Kleinjung and
                  Tanja Lange and
                  Nele Mentens and
                  Christof Paar and
                  Francesco Regazzoni and
                  Peter Schwabe and
                  Leif Uhsadel},
  title        = {The Certicom Challenges {ECC2-X}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {466},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/466},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaileyBBBBBDMFGGKLMPRSU09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaileyBBBBCCDMPFGGKLMNPRSUHY09,
  author       = {Daniel V. Bailey and
                  Lejla Batina and
                  Daniel J. Bernstein and
                  Peter Birkner and
                  Joppe W. Bos and
                  Hsieh{-}Chung Chen and
                  Chen{-}Mou Cheng and
                  Gauthier Van Damme and
                  Giacomo de Meulenaer and
                  Luis J. Dominguez Perez and
                  Junfeng Fan and
                  Tim G{\"{u}}neysu and
                  Frank K. G{\"{u}}rkaynak and
                  Thorsten Kleinjung and
                  Tanja Lange and
                  Nele Mentens and
                  Ruben Niederhagen and
                  Christof Paar and
                  Francesco Regazzoni and
                  Peter Schwabe and
                  Leif Uhsadel and
                  Anthony Van Herrewege and
                  Bo{-}Yin Yang},
  title        = {Breaking {ECC2K-130}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {541},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/541},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaileyBBBBCCDMPFGGKLMNPRSUHY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/OrsBPV08,
  author       = {Siddika Berna {\"{O}}rs and
                  Lejla Batina and
                  Bart Preneel and
                  Joos Vandewalle},
  title        = {Hardware implementation of an elliptic curve processor over GF(p)
                  with Montgomery modular multiplier},
  journal      = {Int. J. Embed. Syst.},
  volume       = {3},
  number       = {4},
  pages        = {229--240},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJES.2008.022394},
  doi          = {10.1504/IJES.2008.022394},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijes/OrsBPV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/LeeSBV08,
  author       = {Yong Ki Lee and
                  Kazuo Sakiyama and
                  Lejla Batina and
                  Ingrid Verbauwhede},
  title        = {Elliptic-Curve-Based Security Processor for {RFID}},
  journal      = {{IEEE} Trans. Computers},
  volume       = {57},
  number       = {11},
  pages        = {1514--1527},
  year         = {2008},
  url          = {https://doi.org/10.1109/TC.2008.148},
  doi          = {10.1109/TC.2008.148},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/LeeSBV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/CanrightB08,
  author       = {David Canright and
                  Lejla Batina},
  editor       = {Steven M. Bellovin and
                  Rosario Gennaro and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {A Very Compact "Perfectly Masked" S-Box for {AES}},
  booktitle    = {Applied Cryptography and Network Security, 6th International Conference,
                  {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5037},
  pages        = {446--459},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68914-0\_27},
  doi          = {10.1007/978-3-540-68914-0\_27},
  timestamp    = {Mon, 08 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/CanrightB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asap/AticiBFVY08,
  author       = {Ali Can Atici and
                  Lejla Batina and
                  Junfeng Fan and
                  Ingrid Verbauwhede and
                  Siddika Berna {\"{O}}rs},
  title        = {Low-cost implementations of {NTRU} for pervasive security},
  booktitle    = {19th {IEEE} International Conference on Application-Specific Systems,
                  Architectures and Processors, {ASAP} 2008, July 2-4, 2008, Leuven,
                  Belgium},
  pages        = {79--84},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ASAP.2008.4580158},
  doi          = {10.1109/ASAP.2008.4580158},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asap/AticiBFVY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GierlichsBTP08,
  author       = {Benedikt Gierlichs and
                  Lejla Batina and
                  Pim Tuyls and
                  Bart Preneel},
  editor       = {Elisabeth Oswald and
                  Pankaj Rohatgi},
  title        = {Mutual Information Analysis},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International
                  Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5154},
  pages        = {426--442},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85053-3\_27},
  doi          = {10.1007/978-3-540-85053-3\_27},
  timestamp    = {Thu, 14 Oct 2021 10:28:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GierlichsBTP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/FanBSV08,
  author       = {Junfeng Fan and
                  Lejla Batina and
                  Kazuo Sakiyama and
                  Ingrid Verbauwhede},
  editor       = {Donatella Sciuto},
  title        = {{FPGA} Design for Algebraic Tori-Based Public-Key Cryptography},
  booktitle    = {Design, Automation and Test in Europe, {DATE} 2008, Munich, Germany,
                  March 10-14, 2008},
  pages        = {1292--1297},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1109/DATE.2008.4484857},
  doi          = {10.1109/DATE.2008.4484857},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/date/FanBSV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/BatinaGL08,
  author       = {Lejla Batina and
                  Benedikt Gierlichs and
                  Kerstin Lemke{-}Rust},
  editor       = {Tzong{-}Chen Wu and
                  Chin{-}Laung Lei and
                  Vincent Rijmen and
                  Der{-}Tsai Lee},
  title        = {Comparative Evaluation of Rank Correlation Based {DPA} on an {AES}
                  Prototype Chip},
  booktitle    = {Information Security, 11th International Conference, {ISC} 2008, Taipei,
                  Taiwan, September 15-18, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5222},
  pages        = {341--354},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85886-7\_24},
  doi          = {10.1007/978-3-540-85886-7\_24},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/BatinaGL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/FanBV08,
  author       = {Junfeng Fan and
                  Lejla Batina and
                  Ingrid Verbauwhede},
  editor       = {Roberto Maria Avanzi and
                  Liam Keliher and
                  Francesco Sica},
  title        = {{HECC} Goes Embedded: An Area-Efficient Implementation of {HECC}},
  booktitle    = {Selected Areas in Cryptography, 15th International Workshop, {SAC}
                  2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5381},
  pages        = {387--400},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04159-4\_25},
  doi          = {10.1007/978-3-642-04159-4\_25},
  timestamp    = {Thu, 07 Sep 2023 13:44:11 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/FanBV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/MulderDBP08,
  author       = {Yoni De Mulder and
                  George Danezis and
                  Lejla Batina and
                  Bart Preneel},
  editor       = {Vijay Atluri and
                  Marianne Winslett},
  title        = {Identification via location-profiling in {GSM} networks},
  booktitle    = {Proceedings of the 2008 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2008, Alexandria, VA, USA, October 27, 2008},
  pages        = {23--32},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456403.1456409},
  doi          = {10.1145/1456403.1456409},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/MulderDBP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/SakiyamaBPV07,
  author       = {Kazuo Sakiyama and
                  Lejla Batina and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  title        = {{HW/SW} co-design for public-key cryptosystems on the 8051 micro-controller},
  journal      = {Comput. Electr. Eng.},
  volume       = {33},
  number       = {5-6},
  pages        = {324--332},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.compeleceng.2007.05.005},
  doi          = {10.1016/J.COMPELECENG.2007.05.005},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/SakiyamaBPV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/integration/HodjatBHV07,
  author       = {Alireza Hodjat and
                  Lejla Batina and
                  David Hwang and
                  Ingrid Verbauwhede},
  title        = {{HW/SW} co-design of a hyperelliptic curve cryptosystem using a microcode
                  instruction set coprocessor},
  journal      = {Integr.},
  volume       = {40},
  number       = {1},
  pages        = {45--51},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.vlsi.2005.12.011},
  doi          = {10.1016/J.VLSI.2005.12.011},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/integration/HodjatBHV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/SakiyamaBPV07,
  author       = {Kazuo Sakiyama and
                  Lejla Batina and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  title        = {High-performance Public-key Cryptoprocessor for Wireless Mobile Applications},
  journal      = {Mob. Networks Appl.},
  volume       = {12},
  number       = {4},
  pages        = {245--258},
  year         = {2007},
  url          = {https://doi.org/10.1007/s11036-007-0020-6},
  doi          = {10.1007/S11036-007-0020-6},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/monet/SakiyamaBPV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/SakiyamaBPV07,
  author       = {Kazuo Sakiyama and
                  Lejla Batina and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  title        = {Multicore Curve-Based Cryptoprocessor with Reconfigurable Modular
                  Arithmetic Logic Units over GF(2\({}^{\mbox{n}}\))},
  journal      = {{IEEE} Trans. Computers},
  volume       = {56},
  number       = {9},
  pages        = {1269--1282},
  year         = {2007},
  url          = {https://doi.org/10.1109/TC.2007.1071},
  doi          = {10.1109/TC.2007.1071},
  timestamp    = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/SakiyamaBPV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/BatinaMSPV07,
  author       = {Lejla Batina and
                  Nele Mentens and
                  Kazuo Sakiyama and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  title        = {Public-Key Cryptography on the Top of a Needle},
  booktitle    = {International Symposium on Circuits and Systems {(ISCAS} 2007), 27-20
                  May 2007, New Orleans, Louisiana, {USA}},
  pages        = {1831--1834},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/ISCAS.2007.378270},
  doi          = {10.1109/ISCAS.2007.378270},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscas/BatinaMSPV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/BatinaGKMTV07,
  author       = {Lejla Batina and
                  Jorge Guajardo and
                  Tim Kerins and
                  Nele Mentens and
                  Pim Tuyls and
                  Ingrid Verbauwhede},
  title        = {Public-Key Cryptography for RFID-Tags},
  booktitle    = {Fifth Annual {IEEE} International Conference on Pervasive Computing
                  and Communications - Workshops (PerCom Workshops 2007), 19-23 March
                  2007, White Plains, New York, {USA}},
  pages        = {217--222},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/PERCOMW.2007.98},
  doi          = {10.1109/PERCOMW.2007.98},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/BatinaGKMTV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/samos/MentensSBPV07,
  author       = {Nele Mentens and
                  Kazuo Sakiyama and
                  Lejla Batina and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  editor       = {Holger Blume and
                  Georgi Gaydadjiev and
                  C. John Glossner and
                  Peter M. W. Knijnenburg},
  title        = {A Side-channel Attack Resistant Programmable {PKC} Coprocessor for
                  Embedded Applications},
  booktitle    = {Proceedings of the 2007 International Conference on Embedded Computer
                  Systems: Architectures, Modeling and Simulation {(IC-SAMOS} 2007),
                  Samos, Greece, July 16-19, 2007},
  pages        = {194--200},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICSAMOS.2007.4285751},
  doi          = {10.1109/ICSAMOS.2007.4285751},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/samos/MentensSBPV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GierlichsBT07,
  author       = {Benedikt Gierlichs and
                  Lejla Batina and
                  Pim Tuyls},
  title        = {Mutual Information Analysis - {A} Universal Differential Side-Channel
                  Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {198},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/198},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GierlichsBT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/arc/MentensBPV06,
  author       = {Nele Mentens and
                  Lejla Batina and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  editor       = {Koen Bertels and
                  Jo{\~{a}}o M. P. Cardoso and
                  Stamatis Vassiliadis},
  title        = {Time-Memory Trade-Off Attack on {FPGA} Platforms: {UNIX} Password
                  Cracking},
  booktitle    = {Reconfigurable Computing: Architectures and Applications, Second International
                  Workshop, {ARC} 2006, Delft, The Netherlands, March 1-3, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3985},
  pages        = {323--334},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11802839\_41},
  doi          = {10.1007/11802839\_41},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/arc/MentensBPV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/arc/SakiyamaMBPV06,
  author       = {Kazuo Sakiyama and
                  Nele Mentens and
                  Lejla Batina and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  editor       = {Koen Bertels and
                  Jo{\~{a}}o M. P. Cardoso and
                  Stamatis Vassiliadis},
  title        = {Reconfigurable Modular Arithmetic Logic Unit for High-Performance
                  Public-Key Cryptosystems},
  booktitle    = {Reconfigurable Computing: Architectures and Applications, Second International
                  Workshop, {ARC} 2006, Delft, The Netherlands, March 1-3, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3985},
  pages        = {347--357},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11802839\_43},
  doi          = {10.1007/11802839\_43},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/arc/SakiyamaMBPV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/SakiyamaBPV06,
  author       = {Kazuo Sakiyama and
                  Lejla Batina and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  editor       = {Louis Goubin and
                  Mitsuru Matsui},
  title        = {Superscalar Coprocessor for High-Speed Curve-Based Cryptography},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
                  Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4249},
  pages        = {415--429},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11894063\_33},
  doi          = {10.1007/11894063\_33},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/SakiyamaBPV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/TuylsB06,
  author       = {Pim Tuyls and
                  Lejla Batina},
  editor       = {David Pointcheval},
  title        = {RFID-Tags for Anti-counterfeiting},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2006, The Cryptographers' Track at
                  the {RSA} Conference 2006, San Jose, CA, USA, February 13-17, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3860},
  pages        = {115--131},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11605805\_8},
  doi          = {10.1007/11605805\_8},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/TuylsB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/BatinaMSPV06,
  author       = {Lejla Batina and
                  Nele Mentens and
                  Kazuo Sakiyama and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  editor       = {Levente Butty{\'{a}}n and
                  Virgil D. Gligor and
                  Dirk Westhoff},
  title        = {Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks},
  booktitle    = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European
                  Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4357},
  pages        = {6--17},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11964254\_3},
  doi          = {10.1007/11964254\_3},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/BatinaMSPV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpl/BatinaHHSV06,
  author       = {Lejla Batina and
                  Alireza Hodjat and
                  David Hwang and
                  Kazuo Sakiyama and
                  Ingrid Verbauwhede},
  title        = {Reconfigurable Architectures for Curve-Based Cryptography on Embedded
                  Micro-Controllers},
  booktitle    = {Proceedings of the 2006 International Conference on Field Programmable
                  Logic and Applications (FPL), Madrid, Spain, August 28-30, 2006},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/FPL.2006.311286},
  doi          = {10.1109/FPL.2006.311286},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fpl/BatinaHHSV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpl/MentensSBVP06,
  author       = {Nele Mentens and
                  Kazuo Sakiyama and
                  Lejla Batina and
                  Ingrid Verbauwhede and
                  Bart Preneel},
  title        = {Fpga-Oriented Secure Data Path Design: Implementation of a Public
                  Key Coprocessor},
  booktitle    = {Proceedings of the 2006 International Conference on Field Programmable
                  Logic and Applications (FPL), Madrid, Spain, August 28-30, 2006},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/FPL.2006.311205},
  doi          = {10.1109/FPL.2006.311205},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fpl/MentensSBVP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/BatinaMPV06,
  author       = {Lejla Batina and
                  Nele Mentens and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  title        = {Flexible hardware architectures for curve-based cryptography},
  booktitle    = {International Symposium on Circuits and Systems {(ISCAS} 2006), 21-24
                  May 2006, Island of Kos, Greece},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/ISCAS.2006.1693714},
  doi          = {10.1109/ISCAS.2006.1693714},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscas/BatinaMPV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BatinaGKMTV06,
  author       = {Lejla Batina and
                  Jorge Guajardo and
                  Tim Kerins and
                  Nele Mentens and
                  Pim Tuyls and
                  Ingrid Verbauwhede},
  title        = {An Elliptic Curve Processor Suitable For RFID-Tags},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {227},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/227},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BatinaGKMTV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asap/BatinaMPV05,
  author       = {Lejla Batina and
                  Nele Mentens and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  title        = {Side-channel aware design: Algorithms and Architectures for Elliptic
                  Curve Cryptography over GF(2\({}^{\mbox{n}}\))},
  booktitle    = {16th {IEEE} International Conference on Application-Specific Systems,
                  Architectures, and Processors {(ASAP} 2005), 23-25 July 2005, Samos,
                  Greece},
  pages        = {350--355},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ASAP.2005.57},
  doi          = {10.1109/ASAP.2005.57},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asap/BatinaMPV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BatinaHHPV05,
  author       = {Lejla Batina and
                  David Hwang and
                  Alireza Hodjat and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Hardware/Software Co-design for Hyperelliptic Curve Cryptography {(HECC)}
                  on the 8051{\(\mathrm{\mu}\)}P},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {106--118},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_8},
  doi          = {10.1007/11545262\_8},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BatinaHHPV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/MentensBPV05,
  author       = {Nele Mentens and
                  Lejla Batina and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  editor       = {Alfred Menezes},
  title        = {A Systematic Evaluation of Compact Hardware Implementations for the
                  Rijndael S-Box},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2005, The Cryptographers' Track at
                  the {RSA} Conference 2005, San Francisco, CA, USA, February 14-18,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3376},
  pages        = {323--333},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30574-3\_22},
  doi          = {10.1007/978-3-540-30574-3\_22},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/MentensBPV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iolts/BatinaMV05,
  author       = {Lejla Batina and
                  Nele Mentens and
                  Ingrid Verbauwhede},
  title        = {Side-Channel Issues for Designing Secure Hardware Implementations},
  booktitle    = {11th {IEEE} International On-Line Testing Symposium {(IOLTS} 2005),
                  6-8 July 2005, Saint Raphael, France},
  pages        = {118--121},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/IOLTS.2005.64},
  doi          = {10.1109/IOLTS.2005.64},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iolts/BatinaMV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/BatinaBO04,
  author       = {Lejla Batina and
                  Geeke Bruin{-}Muurling and
                  Siddika Berna {\"{O}}rs},
  editor       = {Tatsuaki Okamoto},
  title        = {Flexible Hardware Design for {RSA} and Elliptic Curve Cryptosystems},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2004, The Cryptographers' Track at
                  the {RSA} Conference 2004, San Francisco, CA, USA, February 23-27,
                  2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2964},
  pages        = {250--263},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24660-2\_20},
  doi          = {10.1007/978-3-540-24660-2\_20},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/BatinaBO04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/integration/BatinaOPV03,
  author       = {Lejla Batina and
                  Siddika Berna {\"{O}}rs and
                  Bart Preneel and
                  Joos Vandewalle},
  title        = {Hardware architectures for public key cryptography},
  journal      = {Integr.},
  volume       = {34},
  number       = {1-2},
  pages        = {1--64},
  year         = {2003},
  url          = {https://doi.org/10.1016/S0167-9260(02)00053-6},
  doi          = {10.1016/S0167-9260(02)00053-6},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/integration/BatinaOPV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asap/OrsBPV03,
  author       = {Siddika Berna {\"{O}}rs and
                  Lejla Batina and
                  Bart Preneel and
                  Joos Vandewalle},
  title        = {Hardware Implementation of an Elliptic Curve Processor over GF(p)},
  booktitle    = {14th {IEEE} International Conference on Application-Specific Systems,
                  Architectures, and Processors {(ASAP} 2003), 24-26 June 2003, The
                  Hague, The Netherlands},
  pages        = {433--443},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/ASAP.2003.1212866},
  doi          = {10.1109/ASAP.2003.1212866},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asap/OrsBPV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipps/OrsBPV03,
  author       = {Siddika Berna {\"{O}}rs and
                  Lejla Batina and
                  Bart Preneel and
                  Joos Vandewalle},
  title        = {Hardware Implementation of a Montgomery Modular Multiplier in a Systolic
                  Array},
  booktitle    = {17th International Parallel and Distributed Processing Symposium {(IPDPS}
                  2003), 22-26 April 2003, Nice, France, CD-ROM/Abstracts Proceedings},
  pages        = {184},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/IPDPS.2003.1213341},
  doi          = {10.1109/IPDPS.2003.1213341},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipps/OrsBPV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/BatinaM02,
  author       = {Lejla Batina and
                  Geeke Muurling},
  editor       = {Bart Preneel},
  title        = {Montgomery in Practice: How to Do It More Efficiently in Hardware},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2002, The Cryptographer's Track at
                  the {RSA} Conference, 2002, San Jose, CA, USA, February 18-22, 2002,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2271},
  pages        = {40--52},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45760-7\_4},
  doi          = {10.1007/3-540-45760-7\_4},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/BatinaM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/BatinaM01,
  author       = {Lejla Batina and
                  Geeke Muurling},
  editor       = {Bahram Honary},
  title        = {Another Way of Doing {RSA} Cryptography in Hardware},
  booktitle    = {Cryptography and Coding, 8th {IMA} International Conference, Cirencester,
                  UK, December 17-19, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2260},
  pages        = {364--373},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45325-3\_33},
  doi          = {10.1007/3-540-45325-3\_33},
  timestamp    = {Wed, 18 Mar 2020 16:01:01 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/BatinaM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/XuB01,
  author       = {Sheng{-}Bo Xu and
                  Lejla Batina},
  editor       = {George I. Davida and
                  Yair Frankel},
  title        = {Efficient Implementation of Elliptic Curve Cryptosystems on an {ARM7}
                  with Hardware Accelerator},
  booktitle    = {Information Security, 4th International Conference, {ISC} 2001, Malaga,
                  Spain, October 1-3, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2200},
  pages        = {266--279},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45439-X\_18},
  doi          = {10.1007/3-540-45439-X\_18},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/XuB01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}