


Остановите войну!
for scientists:


default search action
Lejla Batina
Person information

- affiliation: Radboud University Nijmegen, Digital Security Group
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j31]Stjepan Picek
, Guilherme Perin
, Luca Mariot
, Lichao Wu
, Lejla Batina
:
SoK: Deep Learning-based Physical Side-channel Analysis. ACM Comput. Surv. 55(11): 227:1-227:35 (2023) - [j30]Lejla Batina, Lukasz Chmielewski
, Björn Haase
, Niels Samwel, Peter Schwabe:
SoK: SCA-secure ECC in software - mission impossible? IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(1): 557-589 (2023) - [j29]Lichao Wu
, Léo Weissbart, Marina Krcek
, Huimin Li, Guilherme Perin, Lejla Batina
, Stjepan Picek
:
Label Correlation in Deep Learning-Based Side-Channel Analysis. IEEE Trans. Inf. Forensics Secur. 18: 3849-3861 (2023) - [c110]Lejla Batina
, Chip-Hong Chang
, Domenic Forte
, Ulrich Rührmair
:
ASHES '23: Workshop on Attacks and Solutions in Hardware Security. CCS 2023: 3664-3665 - [e14]Jianying Zhou
, Lejla Batina
, Zengpeng Li
, Jingqiang Lin
, Eleonora Losiouk
, Suryadipta Majumdar
, Daisuke Mashima
, Weizhi Meng
, Stjepan Picek
, Mohammad Ashiqur Rahman
, Jun Shao, Masaki Shimaoka
, Ezekiel O. Soremekun
, Chunhua Su
, Je Sen Teh
, Aleksei Udovenko
, Cong Wang
, Leo Yu Zhang
, Yury Zhauniarovich
:
Applied Cryptography and Network Security Workshops - ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings. Lecture Notes in Computer Science 13907, Springer 2023, ISBN 978-3-031-41180-9 [contents] - [e13]Chip-Hong Chang, Ulrich Rührmair, Lejla Batina, Domenic Forte:
Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware Security, ASHES 2023, Copenhagen, Denmark, 30 November 2023. ACM 2023 [contents] - [i57]Praveen Kulkarni, Vincent Verneuil, Stjepan Picek, Lejla Batina:
Order vs. Chaos: A Language Model Approach for Side-channel Attacks. IACR Cryptol. ePrint Arch. 2023: 1615 (2023) - 2022
- [j28]Lejla Batina, Shivam Bhasin
, Dirmanto Jap
, Stjepan Picek
:
SCA Strikes Back: Reverse-Engineering Neural Network Architectures Using Side Channels. IEEE Des. Test 39(4): 7-14 (2022) - [j27]Servio Paguada
, Lejla Batina
, Ileana Buhan, Igor Armendariz
:
Playing With Blocks: Toward Re-Usable Deep Learning Models for Side-Channel Profiled Attacks. IEEE Trans. Inf. Forensics Secur. 17: 2835-2847 (2022) - [j26]Unai Rioja
, Lejla Batina
, Igor Armendariz
, Jose Luis Flores
:
Towards Human Dependency Elimination: AI Approach to SCA Robustness Assessment. IEEE Trans. Inf. Forensics Secur. 17: 3906-3921 (2022) - [c109]Nicoleta-Norica Bacuieti, Lejla Batina, Stjepan Picek:
Deep Neural Networks Aiding Cryptanalysis: A Case Study of the Speck Distinguisher. ACNS 2022: 809-829 - [c108]Ileana Buhan, Lejla Batina, Yuval Yarom, Patrick Schaumont
:
SoK: Design Tools for Side-Channel-Aware Implementations. AsiaCCS 2022: 756-770 - [c107]Naila Mukhtar, Louiza Papachristodoulou, Apostolos P. Fournaris, Lejla Batina, Yinan Kong:
Machine-Learning Assisted Side-Channel Attacks on RNS ECC Implementations Using Hybrid Feature Engineering. COSADE 2022: 3-28 - [c106]Naila Mukhtar
, Lejla Batina, Stjepan Picek
, Yinan Kong:
Fake It Till You Make It: Data Augmentation Using Generative Adversarial Networks for All the Crypto You Need on Small Devices. CT-RSA 2022: 297-321 - [p7]Lejla Batina, Shivam Bhasin, Jakub Breier, Xiaolu Hou, Dirmanto Jap:
On Implementation-Level Security of Edge-Based Machine Learning Models. Security and Artificial Intelligence 2022: 335-359 - [e12]Jianying Zhou
, Sridhar Adepu
, Cristina Alcaraz
, Lejla Batina
, Emiliano Casalicchio
, Sudipta Chattopadhyay
, Chenglu Jin
, Jingqiang Lin
, Eleonora Losiouk
, Suryadipta Majumdar
, Weizhi Meng
, Stjepan Picek
, Jun Shao, Chunhua Su
, Cong Wang
, Yury Zhauniarovich
, Saman A. Zonouz:
Applied Cryptography and Network Security Workshops - ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings. Lecture Notes in Computer Science 13285, Springer 2022, ISBN 978-3-031-16814-7 [contents] - [e11]Lejla Batina
, Joan Daemen
:
Progress in Cryptology - AFRICACRYPT 2022: 13th International Conference on Cryptology in Africa, AFRICACRYPT 2022, Fes, Morocco, July 18-20, 2022, Proceedings. Lecture Notes in Computer Science 13503, Springer Nature Switzerland 2022, ISBN 978-3-031-17433-9 - [e10]Lejla Batina
, Stjepan Picek
, Mainack Mondal
:
Security, Privacy, and Applied Cryptography Engineering - 11th International Conference, SPACE 2021, Kolkata, India, December 10-13, 2021, Proceedings. Lecture Notes in Computer Science 13162, Springer 2022, ISBN 978-3-030-95084-2 [contents] - [e9]Lejla Batina
, Stjepan Picek
, Mainack Mondal
:
Security, Privacy, and Applied Cryptography Engineering - 12th International Conference, SPACE 2022, Jaipur, India, December 9-12, 2022, Proceedings. Lecture Notes in Computer Science 13783, Springer 2022, ISBN 978-3-031-22828-5 [contents] - [e8]Lejla Batina
, Thomas Bäck
, Ileana Buhan, Stjepan Picek
:
Security and Artificial Intelligence - A Crossdisciplinary Approach. Lecture Notes in Computer Science 13049, Springer 2022, ISBN 978-3-030-98794-7 [contents] - [i56]Ievgen Kabin, Zoya Dyka, Dan Klann, Nele Mentens, Lejla Batina, Peter Langendoerfer:
Breaking a fully Balanced ASIC Coprocessor Implementing Complete Addition Formulas on Weierstrass Elliptic Curves. CoRR abs/2201.01158 (2022) - [i55]Servio Paguada, Lejla Batina, Ileana Buhan, Igor Armendariz:
Playing with blocks: Toward re-usable deep learning models for side-channel profiled attacks. CoRR abs/2203.08448 (2022) - [i54]Nicoleta-Norica Bacuieti, Lejla Batina, Stjepan Picek:
Deep neural networks aiding cryptanalysis: A case study of the Speck distinguisher. IACR Cryptol. ePrint Arch. 2022: 341 (2022) - [i53]Lichao Wu, Leo Weissbart, Marina Krcek, Huimin Li, Guilherme Perin, Lejla Batina, Stjepan Picek:
AGE Is Not Just a Number: Label Distribution in Deep Learning-based Side-channel Analysis. IACR Cryptol. ePrint Arch. 2022: 1507 (2022) - [i52]Azade Rezaeezade, Lejla Batina:
Regularizers to the Rescue: Fighting Overfitting in Deep Learning-based Side-channel Analysis. IACR Cryptol. ePrint Arch. 2022: 1737 (2022) - 2021
- [j25]Servio Paguada
, Lejla Batina, Igor Armendariz
:
Toward practical autoencoder-based side-channel analysis evaluations. Comput. Networks 196: 108230 (2021) - [j24]Unai Rioja
, Lejla Batina, Jose Luis Flores
, Igor Armendariz
:
Auto-tune POIs: Estimation of distribution algorithms for efficient side-channel analysis. Comput. Networks 198: 108405 (2021) - [j23]Unai Rioja
, Servio Paguada
, Lejla Batina, Igor Armendariz
:
The Uncertainty of Side-channel Analysis: A Way to Leverage from Heuristics. ACM J. Emerg. Technol. Comput. Syst. 17(3): 40:1-40:27 (2021) - [j22]Guilherme Perin, Lukasz Chmielewski, Lejla Batina, Stjepan Picek:
Keep it Unsupervised: Horizontal Attacks Meet Deep Learning. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(1): 343-372 (2021) - [c105]Madura A. Shelton, Lukasz Chmielewski, Niels Samwel
, Markus Wagner, Lejla Batina, Yuval Yarom:
Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic Code. CCS 2021: 685-699 - [c104]Lejla Batina, Rosario Cammarota, Nele Mentens, Ahmad-Reza Sadeghi, Johanna Sepúlveda, Shaza Zeitouni:
Invited: Security Beyond Bulk Silicon: Opportunities and Challenges of Emerging Devices. DAC 2021: 1-4 - [c103]Unai Rioja
, Lejla Batina, Jose Luis Flores
, Igor Armendariz
:
Towards Automatic and Portable Data Loading Template Attacks on Microcontrollers. ISQED 2021: 437-443 - [c102]Zhuoran Liu, Niels Samwel, Leo Weissbart, Zhengyu Zhao, Dirk Lauret, Lejla Batina, Martha A. Larson:
Screen Gleaning: A Screen Reading TEMPEST Attack on Mobile Devices Exploiting an Electromagnetic Side Channel. NDSS 2021 - [c101]Madura A. Shelton, Niels Samwel, Lejla Batina, Francesco Regazzoni, Markus Wagner
, Yuval Yarom:
Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers. NDSS 2021 - [c100]Konstantina Miteloudi, Lejla Batina, Joan Daemen, Nele Mentens
:
ROCKY: Rotation Countermeasure for the Protection of Keys and Other Sensitive Data. SAMOS 2021: 288-299 - [c99]Konstantina Miteloudi, Lukasz Chmielewski, Lejla Batina, Nele Mentens
:
Evaluating the ROCKY Countermeasure for Side-Channel Leakage. VLSI-SoC 2021: 1-6 - [p6]Lejla Batina, Milena Djukanovic, Annelie Heuser, Stjepan Picek:
It Started with Templates: The Future of Profiling in Side-Channel Analysis. Security of Ubiquitous Computing Systems 2021: 133-145 - [e7]Jianying Zhou
, Chuadhry Mujeeb Ahmed
, Lejla Batina
, Sudipta Chattopadhyay
, Olga Gadyatskaya
, Chenglu Jin
, Jingqiang Lin, Eleonora Losiouk
, Bo Luo, Suryadipta Majumdar
, Mihalis Maniatakos
, Daisuke Mashima
, Weizhi Meng
, Stjepan Picek
, Masaki Shimaoka
, Chunhua Su
, Cong Wang
:
Applied Cryptography and Network Security Workshops - ACNS 2021 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, and SiMLA, Kamakura, Japan, June 21-24, 2021, Proceedings. Lecture Notes in Computer Science 12809, Springer 2021, ISBN 978-3-030-81644-5 [contents] - [e6]Christina Pöpper, Mathy Vanhoef, Lejla Batina, René Mayrhofer:
WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021. ACM 2021, ISBN 978-1-4503-8349-3 [contents] - [i51]Ileana Buhan, Lejla Batina, Yuval Yarom, Patrick Schaumont:
SoK: Design Tools for Side-Channel-Aware Implementions. CoRR abs/2104.08593 (2021) - [i50]Madura A. Shelton, Lukasz Chmielewski, Niels Samwel, Markus Wagner, Lejla Batina, Yuval Yarom:
Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic Code. CoRR abs/2109.11741 (2021) - [i49]Unai Rioja, Lejla Batina, Igor Armendariz, Jose Luis Flores:
Keep It Unbiased: A Comparison Between Estimation of Distribution Algorithms and Deep Learning for Human Interaction-Free Side-Channel Analysis. CoRR abs/2111.13425 (2021) - [i48]Servio Paguada, Lejla Batina, Ileana Buhan, Igor Armendariz:
Being Patient and Persistent: Optimizing An Early Stopping Strategy for Deep Learning in Profiled Attacks. CoRR abs/2111.14416 (2021) - [i47]Servio Paguada, Lejla Batina, Igor Armendariz:
Toward Practical Autoencoder-based Side-Channel Analysis Evaluations. IACR Cryptol. ePrint Arch. 2021: 72 (2021) - [i46]Ileana Buhan, Lejla Batina, Yuval Yarom, Patrick Schaumont:
SoK: Design Tools for Side-Channel-Aware Implementations. IACR Cryptol. ePrint Arch. 2021: 497 (2021) - [i45]Leo Weissbart, Lukasz Chmielewski, Stjepan Picek, Lejla Batina:
Systematic Side-channel Analysis of Curve25519 with Machine Learning. IACR Cryptol. ePrint Arch. 2021: 944 (2021) - [i44]Naila Mukhtar, Lejla Batina, Stjepan Picek, Yinan Kong:
Fake it till you make it: Data Augmentation using Generative Adversarial Networks for all the crypto you need on small devices. IACR Cryptol. ePrint Arch. 2021: 991 (2021) - [i43]Lejla Batina, Lukasz Chmielewski, Björn Haase, Niels Samwel, Peter Schwabe:
SCA-secure ECC in software - mission impossible? IACR Cryptol. ePrint Arch. 2021: 1003 (2021) - [i42]Stjepan Picek, Guilherme Perin, Luca Mariot, Lichao Wu, Lejla Batina:
SoK: Deep Learning-based Physical Side-channel Analysis. IACR Cryptol. ePrint Arch. 2021: 1092 (2021) - [i41]Madura A. Shelton, Lukasz Chmielewski, Niels Samwel, Markus Wagner, Lejla Batina, Yuval Yarom:
Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic Code. IACR Cryptol. ePrint Arch. 2021: 1181 (2021) - [i40]Unai Rioja, Lejla Batina, Igor Armendariz, Jose Luis Flores:
Towards Human Dependency Elimination: AI Approach to SCA Robustness Assessment. IACR Cryptol. ePrint Arch. 2021: 1316 (2021) - [i39]Omid Bazangani, Alexandre Iooss, Ileana Buhan, Lejla Batina:
ABBY: Automating the creation of fine-grained leakage models. IACR Cryptol. ePrint Arch. 2021: 1569 (2021) - 2020
- [j21]Lejla Batina, Nele Mentens
:
PROOFS 2018 Editorial. J. Cryptogr. Eng. 10(4): 287 (2020) - [j20]Leo Weissbart
, Lukasz Chmielewski, Stjepan Picek, Lejla Batina:
Systematic Side-Channel Analysis of Curve25519 with Machine Learning. J. Hardw. Syst. Secur. 4(4): 314-328 (2020) - [j19]Pedro Maat C. Massolino, Patrick Longa, Joost Renes
, Lejla Batina:
A Compact and Scalable Hardware/Software Co-design of SIKE. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(2): 245-271 (2020) - [c98]Niels Roelofs, Niels Samwel
, Lejla Batina, Joan Daemen:
Online Template Attack on ECDSA: - Extracting Keys via the Other Side. AFRICACRYPT 2020: 323-336 - [c97]Unai Rioja
, Lejla Batina, Igor Armendariz
:
When Similarities Among Devices are Taken for Granted: Another Look at Portability. AFRICACRYPT 2020: 337-357 - [c96]Ievgen Kabin, Zoya Dyka, Dan Klann, Nele Mentens
, Lejla Batina, Peter Langendörfer:
Breaking a fully Balanced ASIC Coprocessor Implementing Complete Addition Formulas on Weierstrass Elliptic Curves. DSD 2020: 270-276 - [c95]Thierry Simon, Lejla Batina, Joan Daemen, Vincent Grosso, Pedro Maat Costa Massolino, Kostas Papagiannopoulos, Francesco Regazzoni, Niels Samwel
:
Friet: An Authenticated Encryption Scheme with Built-in Fault Detection. EUROCRYPT (1) 2020: 581-611 - [e5]Jianying Zhou
, Mauro Conti
, Chuadhry Mujeeb Ahmed
, Man Ho Au
, Lejla Batina
, Zhou Li
, Jingqiang Lin, Eleonora Losiouk
, Bo Luo, Suryadipta Majumdar
, Weizhi Meng
, Martín Ochoa
, Stjepan Picek
, Georgios Portokalidis
, Cong Wang
, Kehuan Zhang:
Applied Cryptography and Network Security Workshops - ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings. Lecture Notes in Computer Science 12418, Springer 2020, ISBN 978-3-030-61637-3 [contents] - [e4]Lejla Batina
, Gang Li
:
Applications and Techniques in Information Security - 11th International Conference, ATIS 2020, Brisbane, QLD, Australia, November 12-13, 2020, Proceedings. Communications in Computer and Information Science 1338, Springer 2020, ISBN 978-981-33-4705-2 [contents] - [e3]Lejla Batina
, Stjepan Picek
, Mainack Mondal
:
Security, Privacy, and Applied Cryptography Engineering - 10th International Conference, SPACE 2020, Kolkata, India, December 17-21, 2020, Proceedings. Lecture Notes in Computer Science 12586, Springer 2020, ISBN 978-3-030-66625-5 [contents] - [i38]Unai Rioja, Servio Paguada, Lejla Batina, Igor Armendariz:
The uncertainty of Side-Channel Analysis: A way to leverage from heuristics. CoRR abs/2006.12810 (2020) - [i37]Zhuoran Liu, Niels Samwel, Leo Weissbart, Zhengyu Zhao, Dirk Lauret
, Lejla Batina, Martha A. Larson:
Screen Gleaning: A Screen Reading TEMPEST Attack on Mobile Devices Exploiting an Electromagnetic Side Channel. CoRR abs/2011.09877 (2020) - [i36]Unai Rioja, Lejla Batina, Jose Luis Flores, Igor Armendariz:
Auto-tune POIs: Estimation of distribution algorithms for efficient side-channel analysis. CoRR abs/2012.13225 (2020) - [i35]Pedro Maat C. Massolino, Patrick Longa, Joost Renes, Lejla Batina:
A Compact and Scalable Hardware/Software Co-design of SIKE. IACR Cryptol. ePrint Arch. 2020: 40 (2020) - [i34]Thierry Simon, Lejla Batina, Joan Daemen, Vincent Grosso, Pedro Maat Costa Massolino, Kostas Papagiannopoulos, Francesco Regazzoni, Niels Samwel:
Friet: An Authenticated Encryption Scheme with Built-in Fault Detection. IACR Cryptol. ePrint Arch. 2020: 425 (2020) - [i33]Unai Rioja, Servio Paguada, Lejla Batina, Igor Armendariz:
The uncertainty of Side-Channel Analysis: A way to leverage from heuristics. IACR Cryptol. ePrint Arch. 2020: 766 (2020) - [i32]Guilherme Perin, Lukasz Chmielewski, Lejla Batina, Stjepan Picek:
Keep it Unsupervised: Horizontal Attacks Meet Deep Learning. IACR Cryptol. ePrint Arch. 2020: 891 (2020) - [i31]Lichao Wu, Leo Weissbart, Marina Krcek, Huimin Li, Guilherme Perin, Lejla Batina, Stjepan Picek:
Everything is Connected: From Model Learnability to Guessing Entropy. IACR Cryptol. ePrint Arch. 2020: 899 (2020) - [i30]Naila Mukhtar, Louiza Papachristodoulou, Apostolos P. Fournaris, Lejla Batina, Yinan Kong:
Machine-Learning assisted Side-Channel Attacks on RNS-based Elliptic Curve Implementations using Hybrid Feature Engineering. IACR Cryptol. ePrint Arch. 2020: 1065 (2020) - [i29]Unai Rioja, Lejla Batina, Jose Luis Flores, Igor Armendariz:
Auto-tune POIs: Estimation of distribution algorithms for efficient side-channel analysis. IACR Cryptol. ePrint Arch. 2020: 1600 (2020)
2010 – 2019
- 2019
- [j18]Lejla Batina, Lukasz Chmielewski
, Louiza Papachristodoulou, Peter Schwabe, Michael Tunstall
:
Online template attacks. J. Cryptogr. Eng. 9(1): 21-36 (2019) - [j17]Niels Pirotte, Jo Vliegen, Lejla Batina, Nele Mentens
:
Balancing elliptic curve coprocessors from bottom to top. Microprocess. Microsystems 71 (2019) - [j16]Louiza Papachristodoulou, Apostolos P. Fournaris, Kostas Papagiannopoulos, Lejla Batina:
Practical Evaluation of Protected Residue Number System Scalar Multiplication. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(1): 259-282 (2019) - [j15]Lejla Batina, Sherman S. M. Chow
, Gerhard P. Hancke
, Zhe Liu:
Introduction to the Special Issue on Cryptographic Engineering for Internet of Things: Security Foundations, Lightweight Solutions, and Attacks. ACM Trans. Embed. Comput. Syst. 18(3): 22:1-22:3 (2019) - [j14]Stjepan Picek, Annelie Heuser
, Alan Jovic
, Lejla Batina:
A Systematic Evaluation of Profiling Through Focused Feature Selection. IEEE Trans. Very Large Scale Integr. Syst. 27(12): 2802-2815 (2019) - [c94]Christos Andrikos, Lejla Batina, Lukasz Chmielewski, Liran Lerman, Vasilios Mavroudis, Kostas Papagiannopoulos, Guilherme Perin, Giorgos Rassias, Alberto Sonnino:
Location, Location, Location: Revisiting Modeling and Exploitation for Location-Based Side Channel Leakages. ASIACRYPT (3) 2019: 285-314 - [c93]Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek:
Poster: Recovering the Input of Neural Networks via Single Shot Side-channel Attacks. CCS 2019: 2657-2659 - [c92]Lejla Batina, Patrick Jauernig, Nele Mentens
, Ahmad-Reza Sadeghi, Emmanuel Stapf:
In Hardware We Trust: Gains and Pains of Hardware-assisted Security. DAC 2019: 44 - [c91]Leo Weissbart, Stjepan Picek, Lejla Batina:
One Trace Is All It Takes: Machine Learning-Based Side-Channel Attack on EdDSA. SPACE 2019: 86-105 - [c90]Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek:
CSI NN: Reverse Engineering of Neural Network Architectures Through Electromagnetic Side Channel. USENIX Security Symposium 2019: 515-532 - [i28]Madura A. Shelton, Niels Samwel, Lejla Batina, Francesco Regazzoni, Markus Wagner, Yuval Yarom:
Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers. CoRR abs/1912.05183 (2019) - [i27]Christos Andrikos, Lejla Batina, Lukasz Chmielewski, Liran Lerman, Vasilios Mavroudis, Kostas Papagiannopoulos, Guilherme Perin, Giorgos Rassias, Alberto Sonnino:
Location, location, location: Revisiting modeling and exploitation for location-based side channel leakages. IACR Cryptol. ePrint Arch. 2019: 230 (2019) - [i26]Leo Weissbart, Stjepan Picek, Lejla Batina:
One trace is all it takes: Machine Learning-based Side-channel Attack on EdDSA. IACR Cryptol. ePrint Arch. 2019: 358 (2019) - [i25]Madura A. Shelton, Niels Samwel, Lejla Batina, Francesco Regazzoni, Markus Wagner
, Yuval Yarom:
Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers. IACR Cryptol. ePrint Arch. 2019: 1445 (2019) - [i24]Leo Weissbart, Stjepan Picek, Lejla Batina:
On the Performance of Multilayer Perceptron in Profiling Side-channel Analysis. IACR Cryptol. ePrint Arch. 2019: 1476 (2019) - 2018
- [c89]Ricardo Chaves
, Lukasz Chmielewski, Francesco Regazzoni, Lejla Batina:
SCA-Resistance for AES: How Cheap Can We Go? AFRICACRYPT 2018: 107-123 - [c88]Niels Samwel
, Lejla Batina:
Practical Fault Injection on Deterministic Signatures: The Case of EdDSA. AFRICACRYPT 2018: 306-321 - [c87]Niels Samwel
, Lejla Batina, Guido Bertoni
, Joan Daemen, Ruggero Susella:
Breaking Ed25519 in WolfSSL. CT-RSA 2018: 1-20 - [c86]Niels Pirotte, Jo Vliegen, Lejla Batina, Nele Mentens
:
Design of a Fully Balanced ASIC Coprocessor Implementing Complete Addition Formulas on Weierstrass Elliptic Curves. DSD 2018: 545-552 - [c85]Antun Maldini, Niels Samwel
, Stjepan Picek, Lejla Batina:
Genetic Algorithm-Based Electromagnetic Fault Injection. FDTC 2018: 35-42 - [e2]Lejla Batina, Ulrich Kühne, Nele Mentens:
PROOFS 2018, 7th International Workshop on Security Proofs for Embedded Systems, colocated with CHES 2018, Amsterdam, The Netherlands, September 13, 2018. Kalpa Publications in Computing 7, EasyChair 2018 [contents] - [i23]Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek:
CSI Neural Network: Using Side-channels to Recover Your Artificial Neural Network Information. CoRR abs/1810.09076 (2018) - [i22]Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek:
CSI Neural Network: Using Side-channels to Recover Your Artificial Neural Network Information. IACR Cryptol. ePrint Arch. 2018: 477 (2018) - 2017
- [c84]Pedro Maat C. Massolino, Lejla Batina, Ricardo Chaves
, Nele Mentens
:
Area-optimized montgomery multiplication on IGLOO 2 FPGAs. FPL 2017: 1-4 - [c83]Christos Andrikos, Giorgos Rassias, Liran Lerman, Kostas Papagiannopoulos, Lejla Batina:
Location-based leakages: New directions in modeling and exploiting. SAMOS 2017: 246-252 - [i21]Niels Samwel, Lejla Batina, Guido Bertoni, Joan Daemen, Ruggero Susella:
Breaking Ed25519 in WolfSSL. IACR Cryptol. ePrint Arch. 2017: 985 (2017) - [i20]Stjepan Picek, Annelie Heuser, Alan Jovic, Lejla Batina, Axel Legay:
The secrets of profiling for side-channel analysis: feature selection matters. IACR Cryptol. ePrint Arch. 2017: 1110 (2017) - 2016
- [j13]Stjepan Picek, Domagoj Jakobovic
, Julian F. Miller, Lejla Batina, Marko Cupic:
Cryptographic Boolean functions: One output, many design criteria. Appl. Soft Comput. 40: 635-653 (2016) - [c82]Stjepan Picek, Dominik Sisejkovic, Domagoj Jakobovic
, Lejla Batina, Bohan Yang, Danilo Sijacic, Nele Mentens
:
Extreme Pipelining Towards the Best Area-Performance Trade-Off in Hardware. AFRICACRYPT 2016: 147-166 - [c81]Ke Jiang, Petru Eles, Zebo Peng, Sudipta Chattopadhyay
, Lejla Batina:
SPARTA: A scheduling policy for thwarting differential power analysis attacks. ASP-DAC 2016: 667-672 - [c80]Gergely Alpár, Lejla Batina, Lynn Margaret Batten, Veelasha Moonsamy, Anna Krasnova, Antoine Guellier, Iynkaran Natgunanathan:
New directions in IoT privacy using attribute-based authentication. Conf. Computing Frontiers 2016: 461-466 - [c79]Joost Renes
, Peter Schwabe, Benjamin Smith
, Lejla Batina:
\mu Kummer: Efficient Hyperelliptic Signatures and Key Exchange on Microcontrollers. CHES 2016: 301-320 - [c78]Margaux Dugardin, Louiza Papachristodoulou, Zakaria Najm, Lejla Batina, Jean-Luc Danger, Sylvain Guilley:
Dismantling Real-World ECC with Horizontal and Vertical Template Attacks. COSADE 2016: 88-108 - [c77]Apostolos P. Fournaris, Louiza Papachristodoulou, Lejla Batina, Nicolas Sklavos
:
Residue Number System as a side channel and fault injection attack countermeasure in elliptic curve cryptography. DTIS 2016: 1-4 - [c76]Joost Renes, Craig Costello
, Lejla Batina:
Complete Addition Formulas for Prime Order Elliptic Curves. EUROCRYPT (1) 2016: 403-428 - [c75]Elif Ozgen, Louiza Papachristodoulou, Lejla Batina:
Template attacks using classification algorithms. HOST 2016: 242-247 - [c74]Wouter de Groot, Kostas Papagiannopoulos, Antonio de la Piedra