default search action
Lejla Batina
Person information
- affiliation: Radboud University Nijmegen, Digital Security Group
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j33]Unai Rioja, Lejla Batina, Igor Armendariz, Jose Luis Flores:
Keep it unbiased: a comparison between estimation of distribution algorithms and deep learning for human interaction-free side-channel analysis. J. Cryptogr. Eng. 14(3): 499-511 (2024) - [j32]Vahid Jahandideh, Bart Mennink, Lejla Batina:
An Algebraic Approach for Evaluating Random Probing Security With Application to AES. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(4): 657-689 (2024) - [c118]Péter Horváth, Lukasz Chmielewski, Leo Weissbart, Lejla Batina, Yuval Yarom:
CNN Architecture Extraction on Edge GPU. ACNS Workshops (1) 2024: 158-175 - [c117]Gabriele Serafini, Léo Weissbart, Lejla Batina:
Everything All at Once: Deep Learning Side-Channel Analysis Optimization Framework. ACNS Workshops (1) 2024: 195-212 - [c116]Asmita Adhikary, Abraham Basurto, Lejla Batina, Ileana Buhan, Joan Daemen, Silvia Mella, Nele Mentens, Stjepan Picek, Durga Lakshmi Ramachandran, Abolfazl Sajadi, Todor Stefanov, Dennis Vermoen, Nusa Zidaric:
PROACT - Physical Attack Resistance of Cryptographic Algorithms and Circuits with Reduced Time to Market. ARC 2024: 255-266 - [c115]Omid Bazangani, Alexandre Iooss, Ileana Buhan, Lejla Batina:
ABBY: Automating leakage modelling for side-channel analysis. AsiaCCS 2024 - [c114]Omid Bazangani, Parisa Amiri-Eliasi, Stjepan Picek, Lejla Batina:
Can Machine Learn Pipeline Leakage? DATE 2024: 1-6 - [c113]Mahnaz Namazi Rizi, Nusa Zidaric, Lejla Batina, Nele Mentens:
Optimised AES with RISC-V Vector Extensions. DDECS 2024: 57-60 - [c112]Parisa Amiri-Eliasi, Silvia Mella, Léo Weissbart, Lejla Batina, Stjepan Picek:
Xoodyak Under SCA Siege. DDECS 2024: 61-66 - [c111]Péter Horváth, Dirk Lauret, Zhuoran Liu, Lejla Batina:
SoK: Neural Network Extraction Through Physical Side Channels. USENIX Security Symposium 2024 - [e17]Christina Pöpper, Lejla Batina:
Applied Cryptography and Network Security - 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part I. Lecture Notes in Computer Science 14583, Springer 2024, ISBN 978-3-031-54769-0 [contents] - [e16]Christina Pöpper, Lejla Batina:
Applied Cryptography and Network Security - 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part II. Lecture Notes in Computer Science 14584, Springer 2024, ISBN 978-3-031-54772-0 [contents] - [e15]Christina Pöpper, Lejla Batina:
Applied Cryptography and Network Security - 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part III. Lecture Notes in Computer Science 14585, Springer 2024, ISBN 978-3-031-54775-1 [contents] - [i60]Péter Horváth, Lukasz Chmielewski, Leo Weissbart, Lejla Batina, Yuval Yarom:
CNN architecture extraction on edge GPU. CoRR abs/2401.13575 (2024) - [i59]Konstantina Miteloudi, Asmita Adhikary, Niels van Drueten, Lejla Batina, Ileana Buhan:
Plan your defense: A comparative analysis of leakage detection methods on RISC-V cores. IACR Cryptol. ePrint Arch. 2024: 423 (2024) - 2023
- [j31]Stjepan Picek, Guilherme Perin, Luca Mariot, Lichao Wu, Lejla Batina:
SoK: Deep Learning-based Physical Side-channel Analysis. ACM Comput. Surv. 55(11): 227:1-227:35 (2023) - [j30]Lejla Batina, Lukasz Chmielewski, Björn Haase, Niels Samwel, Peter Schwabe:
SoK: SCA-secure ECC in software - mission impossible? IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(1): 557-589 (2023) - [j29]Lichao Wu, Léo Weissbart, Marina Krcek, Huimin Li, Guilherme Perin, Lejla Batina, Stjepan Picek:
Label Correlation in Deep Learning-Based Side-Channel Analysis. IEEE Trans. Inf. Forensics Secur. 18: 3849-3861 (2023) - [c110]Lejla Batina, Chip-Hong Chang, Domenic Forte, Ulrich Rührmair:
ASHES '23: Workshop on Attacks and Solutions in Hardware Security. CCS 2023: 3664-3665 - [e14]Jianying Zhou, Lejla Batina, Zengpeng Li, Jingqiang Lin, Eleonora Losiouk, Suryadipta Majumdar, Daisuke Mashima, Weizhi Meng, Stjepan Picek, Mohammad Ashiqur Rahman, Jun Shao, Masaki Shimaoka, Ezekiel O. Soremekun, Chunhua Su, Je Sen Teh, Aleksei Udovenko, Cong Wang, Leo Yu Zhang, Yury Zhauniarovich:
Applied Cryptography and Network Security Workshops - ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings. Lecture Notes in Computer Science 13907, Springer 2023, ISBN 978-3-031-41180-9 [contents] - [e13]Chip-Hong Chang, Ulrich Rührmair, Lejla Batina, Domenic Forte:
Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware Security, ASHES 2023, Copenhagen, Denmark, 30 November 2023. ACM 2023 [contents] - [i58]Péter Horváth, Lukasz Chmielewski, Leo Weissbart, Lejla Batina, Yuval Yarom:
BarraCUDA: Bringing Electromagnetic Side Channel Into Play to Steal the Weights of Neural Networks from NVIDIA GPUs. CoRR abs/2312.07783 (2023) - [i57]Praveen Kulkarni, Vincent Verneuil, Stjepan Picek, Lejla Batina:
Order vs. Chaos: A Language Model Approach for Side-channel Attacks. IACR Cryptol. ePrint Arch. 2023: 1615 (2023) - 2022
- [j28]Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek:
SCA Strikes Back: Reverse-Engineering Neural Network Architectures Using Side Channels. IEEE Des. Test 39(4): 7-14 (2022) - [j27]Servio Paguada, Lejla Batina, Ileana Buhan, Igor Armendariz:
Playing With Blocks: Toward Re-Usable Deep Learning Models for Side-Channel Profiled Attacks. IEEE Trans. Inf. Forensics Secur. 17: 2835-2847 (2022) - [j26]Unai Rioja, Lejla Batina, Igor Armendariz, Jose Luis Flores:
Towards Human Dependency Elimination: AI Approach to SCA Robustness Assessment. IEEE Trans. Inf. Forensics Secur. 17: 3906-3921 (2022) - [c109]Nicoleta-Norica Bacuieti, Lejla Batina, Stjepan Picek:
Deep Neural Networks Aiding Cryptanalysis: A Case Study of the Speck Distinguisher. ACNS 2022: 809-829 - [c108]Ileana Buhan, Lejla Batina, Yuval Yarom, Patrick Schaumont:
SoK: Design Tools for Side-Channel-Aware Implementations. AsiaCCS 2022: 756-770 - [c107]Naila Mukhtar, Louiza Papachristodoulou, Apostolos P. Fournaris, Lejla Batina, Yinan Kong:
Machine-Learning Assisted Side-Channel Attacks on RNS ECC Implementations Using Hybrid Feature Engineering. COSADE 2022: 3-28 - [c106]Naila Mukhtar, Lejla Batina, Stjepan Picek, Yinan Kong:
Fake It Till You Make It: Data Augmentation Using Generative Adversarial Networks for All the Crypto You Need on Small Devices. CT-RSA 2022: 297-321 - [p7]Lejla Batina, Shivam Bhasin, Jakub Breier, Xiaolu Hou, Dirmanto Jap:
On Implementation-Level Security of Edge-Based Machine Learning Models. Security and Artificial Intelligence 2022: 335-359 - [e12]Jianying Zhou, Sridhar Adepu, Cristina Alcaraz, Lejla Batina, Emiliano Casalicchio, Sudipta Chattopadhyay, Chenglu Jin, Jingqiang Lin, Eleonora Losiouk, Suryadipta Majumdar, Weizhi Meng, Stjepan Picek, Jun Shao, Chunhua Su, Cong Wang, Yury Zhauniarovich, Saman A. Zonouz:
Applied Cryptography and Network Security Workshops - ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings. Lecture Notes in Computer Science 13285, Springer 2022, ISBN 978-3-031-16814-7 [contents] - [e11]Lejla Batina, Joan Daemen:
Progress in Cryptology - AFRICACRYPT 2022: 13th International Conference on Cryptology in Africa, AFRICACRYPT 2022, Fes, Morocco, July 18-20, 2022, Proceedings. Lecture Notes in Computer Science 13503, Springer Nature Switzerland 2022, ISBN 978-3-031-17433-9 - [e10]Lejla Batina, Stjepan Picek, Mainack Mondal:
Security, Privacy, and Applied Cryptography Engineering - 11th International Conference, SPACE 2021, Kolkata, India, December 10-13, 2021, Proceedings. Lecture Notes in Computer Science 13162, Springer 2022, ISBN 978-3-030-95084-2 [contents] - [e9]Lejla Batina, Stjepan Picek, Mainack Mondal:
Security, Privacy, and Applied Cryptography Engineering - 12th International Conference, SPACE 2022, Jaipur, India, December 9-12, 2022, Proceedings. Lecture Notes in Computer Science 13783, Springer 2022, ISBN 978-3-031-22828-5 [contents] - [e8]Lejla Batina, Thomas Bäck, Ileana Buhan, Stjepan Picek:
Security and Artificial Intelligence - A Crossdisciplinary Approach. Lecture Notes in Computer Science 13049, Springer 2022, ISBN 978-3-030-98794-7 [contents] - [i56]Ievgen Kabin, Zoya Dyka, Dan Klann, Nele Mentens, Lejla Batina, Peter Langendoerfer:
Breaking a fully Balanced ASIC Coprocessor Implementing Complete Addition Formulas on Weierstrass Elliptic Curves. CoRR abs/2201.01158 (2022) - [i55]Servio Paguada, Lejla Batina, Ileana Buhan, Igor Armendariz:
Playing with blocks: Toward re-usable deep learning models for side-channel profiled attacks. CoRR abs/2203.08448 (2022) - [i54]Nicoleta-Norica Bacuieti, Lejla Batina, Stjepan Picek:
Deep neural networks aiding cryptanalysis: A case study of the Speck distinguisher. IACR Cryptol. ePrint Arch. 2022: 341 (2022) - [i53]Lichao Wu, Leo Weissbart, Marina Krcek, Huimin Li, Guilherme Perin, Lejla Batina, Stjepan Picek:
AGE Is Not Just a Number: Label Distribution in Deep Learning-based Side-channel Analysis. IACR Cryptol. ePrint Arch. 2022: 1507 (2022) - [i52]Azade Rezaeezade, Lejla Batina:
Regularizers to the Rescue: Fighting Overfitting in Deep Learning-based Side-channel Analysis. IACR Cryptol. ePrint Arch. 2022: 1737 (2022) - 2021
- [j25]Servio Paguada, Lejla Batina, Igor Armendariz:
Toward practical autoencoder-based side-channel analysis evaluations. Comput. Networks 196: 108230 (2021) - [j24]Unai Rioja, Lejla Batina, Jose Luis Flores, Igor Armendariz:
Auto-tune POIs: Estimation of distribution algorithms for efficient side-channel analysis. Comput. Networks 198: 108405 (2021) - [j23]Unai Rioja, Servio Paguada, Lejla Batina, Igor Armendariz:
The Uncertainty of Side-channel Analysis: A Way to Leverage from Heuristics. ACM J. Emerg. Technol. Comput. Syst. 17(3): 40:1-40:27 (2021) - [j22]Guilherme Perin, Lukasz Chmielewski, Lejla Batina, Stjepan Picek:
Keep it Unsupervised: Horizontal Attacks Meet Deep Learning. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(1): 343-372 (2021) - [c105]Madura A. Shelton, Lukasz Chmielewski, Niels Samwel, Markus Wagner, Lejla Batina, Yuval Yarom:
Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic Code. CCS 2021: 685-699 - [c104]Lejla Batina, Rosario Cammarota, Nele Mentens, Ahmad-Reza Sadeghi, Johanna Sepúlveda, Shaza Zeitouni:
Invited: Security Beyond Bulk Silicon: Opportunities and Challenges of Emerging Devices. DAC 2021: 1-4 - [c103]Unai Rioja, Lejla Batina, Jose Luis Flores, Igor Armendariz:
Towards Automatic and Portable Data Loading Template Attacks on Microcontrollers. ISQED 2021: 437-443 - [c102]Zhuoran Liu, Niels Samwel, Leo Weissbart, Zhengyu Zhao, Dirk Lauret, Lejla Batina, Martha A. Larson:
Screen Gleaning: A Screen Reading TEMPEST Attack on Mobile Devices Exploiting an Electromagnetic Side Channel. NDSS 2021 - [c101]Madura A. Shelton, Niels Samwel, Lejla Batina, Francesco Regazzoni, Markus Wagner, Yuval Yarom:
Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers. NDSS 2021 - [c100]Konstantina Miteloudi, Lejla Batina, Joan Daemen, Nele Mentens:
ROCKY: Rotation Countermeasure for the Protection of Keys and Other Sensitive Data. SAMOS 2021: 288-299 - [c99]Konstantina Miteloudi, Lukasz Chmielewski, Lejla Batina, Nele Mentens:
Evaluating the ROCKY Countermeasure for Side-Channel Leakage. VLSI-SoC 2021: 1-6 - [p6]Lejla Batina, Milena Djukanovic, Annelie Heuser, Stjepan Picek:
It Started with Templates: The Future of Profiling in Side-Channel Analysis. Security of Ubiquitous Computing Systems 2021: 133-145 - [e7]Jianying Zhou, Chuadhry Mujeeb Ahmed, Lejla Batina, Sudipta Chattopadhyay, Olga Gadyatskaya, Chenglu Jin, Jingqiang Lin, Eleonora Losiouk, Bo Luo, Suryadipta Majumdar, Mihalis Maniatakos, Daisuke Mashima, Weizhi Meng, Stjepan Picek, Masaki Shimaoka, Chunhua Su, Cong Wang:
Applied Cryptography and Network Security Workshops - ACNS 2021 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, and SiMLA, Kamakura, Japan, June 21-24, 2021, Proceedings. Lecture Notes in Computer Science 12809, Springer 2021, ISBN 978-3-030-81644-5 [contents] - [e6]Christina Pöpper, Mathy Vanhoef, Lejla Batina, René Mayrhofer:
WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021. ACM 2021, ISBN 978-1-4503-8349-3 [contents] - [i51]Ileana Buhan, Lejla Batina, Yuval Yarom, Patrick Schaumont:
SoK: Design Tools for Side-Channel-Aware Implementions. CoRR abs/2104.08593 (2021) - [i50]Madura A. Shelton, Lukasz Chmielewski, Niels Samwel, Markus Wagner, Lejla Batina, Yuval Yarom:
Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic Code. CoRR abs/2109.11741 (2021) - [i49]Unai Rioja, Lejla Batina, Igor Armendariz, Jose Luis Flores:
Keep It Unbiased: A Comparison Between Estimation of Distribution Algorithms and Deep Learning for Human Interaction-Free Side-Channel Analysis. CoRR abs/2111.13425 (2021) - [i48]Servio Paguada, Lejla Batina, Ileana Buhan, Igor Armendariz:
Being Patient and Persistent: Optimizing An Early Stopping Strategy for Deep Learning in Profiled Attacks. CoRR abs/2111.14416 (2021) - [i47]Servio Paguada, Lejla Batina, Igor Armendariz:
Toward Practical Autoencoder-based Side-Channel Analysis Evaluations. IACR Cryptol. ePrint Arch. 2021: 72 (2021) - [i46]Ileana Buhan, Lejla Batina, Yuval Yarom, Patrick Schaumont:
SoK: Design Tools for Side-Channel-Aware Implementations. IACR Cryptol. ePrint Arch. 2021: 497 (2021) - [i45]Leo Weissbart, Lukasz Chmielewski, Stjepan Picek, Lejla Batina:
Systematic Side-channel Analysis of Curve25519 with Machine Learning. IACR Cryptol. ePrint Arch. 2021: 944 (2021) - [i44]Naila Mukhtar, Lejla Batina, Stjepan Picek, Yinan Kong:
Fake it till you make it: Data Augmentation using Generative Adversarial Networks for all the crypto you need on small devices. IACR Cryptol. ePrint Arch. 2021: 991 (2021) - [i43]Lejla Batina, Lukasz Chmielewski, Björn Haase, Niels Samwel, Peter Schwabe:
SCA-secure ECC in software - mission impossible? IACR Cryptol. ePrint Arch. 2021: 1003 (2021) - [i42]Stjepan Picek, Guilherme Perin, Luca Mariot, Lichao Wu, Lejla Batina:
SoK: Deep Learning-based Physical Side-channel Analysis. IACR Cryptol. ePrint Arch. 2021: 1092 (2021) - [i41]Madura A. Shelton, Lukasz Chmielewski, Niels Samwel, Markus Wagner, Lejla Batina, Yuval Yarom:
Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic Code. IACR Cryptol. ePrint Arch. 2021: 1181 (2021) - [i40]Unai Rioja, Lejla Batina, Igor Armendariz, Jose Luis Flores:
Towards Human Dependency Elimination: AI Approach to SCA Robustness Assessment. IACR Cryptol. ePrint Arch. 2021: 1316 (2021) - [i39]Omid Bazangani, Alexandre Iooss, Ileana Buhan, Lejla Batina:
ABBY: Automating the creation of fine-grained leakage models. IACR Cryptol. ePrint Arch. 2021: 1569 (2021) - 2020
- [j21]Lejla Batina, Nele Mentens:
PROOFS 2018 Editorial. J. Cryptogr. Eng. 10(4): 287 (2020) - [j20]Leo Weissbart, Lukasz Chmielewski, Stjepan Picek, Lejla Batina:
Systematic Side-Channel Analysis of Curve25519 with Machine Learning. J. Hardw. Syst. Secur. 4(4): 314-328 (2020) - [j19]Pedro Maat C. Massolino, Patrick Longa, Joost Renes, Lejla Batina:
A Compact and Scalable Hardware/Software Co-design of SIKE. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(2): 245-271 (2020) - [c98]Niels Roelofs, Niels Samwel, Lejla Batina, Joan Daemen:
Online Template Attack on ECDSA: - Extracting Keys via the Other Side. AFRICACRYPT 2020: 323-336 - [c97]Unai Rioja, Lejla Batina, Igor Armendariz:
When Similarities Among Devices are Taken for Granted: Another Look at Portability. AFRICACRYPT 2020: 337-357 - [c96]Ievgen Kabin, Zoya Dyka, Dan Klann, Nele Mentens, Lejla Batina, Peter Langendörfer:
Breaking a fully Balanced ASIC Coprocessor Implementing Complete Addition Formulas on Weierstrass Elliptic Curves. DSD 2020: 270-276 - [c95]Thierry Simon, Lejla Batina, Joan Daemen, Vincent Grosso, Pedro Maat Costa Massolino, Kostas Papagiannopoulos, Francesco Regazzoni, Niels Samwel:
Friet: An Authenticated Encryption Scheme with Built-in Fault Detection. EUROCRYPT (1) 2020: 581-611 - [e5]Jianying Zhou, Mauro Conti, Chuadhry Mujeeb Ahmed, Man Ho Au, Lejla Batina, Zhou Li, Jingqiang Lin, Eleonora Losiouk, Bo Luo, Suryadipta Majumdar, Weizhi Meng, Martín Ochoa, Stjepan Picek, Georgios Portokalidis, Cong Wang, Kehuan Zhang:
Applied Cryptography and Network Security Workshops - ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings. Lecture Notes in Computer Science 12418, Springer 2020, ISBN 978-3-030-61637-3 [contents] - [e4]Lejla Batina, Gang Li:
Applications and Techniques in Information Security - 11th International Conference, ATIS 2020, Brisbane, QLD, Australia, November 12-13, 2020, Proceedings. Communications in Computer and Information Science 1338, Springer 2020, ISBN 978-981-33-4705-2 [contents] - [e3]Lejla Batina, Stjepan Picek, Mainack Mondal:
Security, Privacy, and Applied Cryptography Engineering - 10th International Conference, SPACE 2020, Kolkata, India, December 17-21, 2020, Proceedings. Lecture Notes in Computer Science 12586, Springer 2020, ISBN 978-3-030-66625-5 [contents] - [i38]Unai Rioja, Servio Paguada, Lejla Batina, Igor Armendariz:
The uncertainty of Side-Channel Analysis: A way to leverage from heuristics. CoRR abs/2006.12810 (2020) - [i37]Zhuoran Liu, Niels Samwel, Leo Weissbart, Zhengyu Zhao, Dirk Lauret, Lejla Batina, Martha A. Larson:
Screen Gleaning: A Screen Reading TEMPEST Attack on Mobile Devices Exploiting an Electromagnetic Side Channel. CoRR abs/2011.09877 (2020) - [i36]Unai Rioja, Lejla Batina, Jose Luis Flores, Igor Armendariz:
Auto-tune POIs: Estimation of distribution algorithms for efficient side-channel analysis. CoRR abs/2012.13225 (2020) - [i35]Pedro Maat C. Massolino, Patrick Longa, Joost Renes, Lejla Batina:
A Compact and Scalable Hardware/Software Co-design of SIKE. IACR Cryptol. ePrint Arch. 2020: 40 (2020) - [i34]Thierry Simon, Lejla Batina, Joan Daemen, Vincent Grosso, Pedro Maat Costa Massolino, Kostas Papagiannopoulos, Francesco Regazzoni, Niels Samwel:
Friet: An Authenticated Encryption Scheme with Built-in Fault Detection. IACR Cryptol. ePrint Arch. 2020: 425 (2020) - [i33]Unai Rioja, Servio Paguada, Lejla Batina, Igor Armendariz:
The uncertainty of Side-Channel Analysis: A way to leverage from heuristics. IACR Cryptol. ePrint Arch. 2020: 766 (2020) - [i32]Guilherme Perin, Lukasz Chmielewski, Lejla Batina, Stjepan Picek:
Keep it Unsupervised: Horizontal Attacks Meet Deep Learning. IACR Cryptol. ePrint Arch. 2020: 891 (2020) - [i31]Lichao Wu, Leo Weissbart, Marina Krcek, Huimin Li, Guilherme Perin, Lejla Batina, Stjepan Picek:
Everything is Connected: From Model Learnability to Guessing Entropy. IACR Cryptol. ePrint Arch. 2020: 899 (2020) - [i30]Naila Mukhtar, Louiza Papachristodoulou, Apostolos P. Fournaris, Lejla Batina, Yinan Kong:
Machine-Learning assisted Side-Channel Attacks on RNS-based Elliptic Curve Implementations using Hybrid Feature Engineering. IACR Cryptol. ePrint Arch. 2020: 1065 (2020) - [i29]Unai Rioja, Lejla Batina, Jose Luis Flores, Igor Armendariz:
Auto-tune POIs: Estimation of distribution algorithms for efficient side-channel analysis. IACR Cryptol. ePrint Arch. 2020: 1600 (2020)
2010 – 2019
- 2019
- [j18]Lejla Batina, Lukasz Chmielewski, Louiza Papachristodoulou, Peter Schwabe, Michael Tunstall:
Online template attacks. J. Cryptogr. Eng. 9(1): 21-36 (2019) - [j17]Niels Pirotte, Jo Vliegen, Lejla Batina, Nele Mentens:
Balancing elliptic curve coprocessors from bottom to top. Microprocess. Microsystems 71 (2019) - [j16]Louiza Papachristodoulou, Apostolos P. Fournaris, Kostas Papagiannopoulos, Lejla Batina:
Practical Evaluation of Protected Residue Number System Scalar Multiplication. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(1): 259-282 (2019) - [j15]Lejla Batina, Sherman S. M. Chow, Gerhard P. Hancke, Zhe Liu:
Introduction to the Special Issue on Cryptographic Engineering for Internet of Things: Security Foundations, Lightweight Solutions, and Attacks. ACM Trans. Embed. Comput. Syst. 18(3): 22:1-22:3 (2019) - [j14]Stjepan Picek, Annelie Heuser, Alan Jovic, Lejla Batina:
A Systematic Evaluation of Profiling Through Focused Feature Selection. IEEE Trans. Very Large Scale Integr. Syst. 27(12): 2802-2815 (2019) - [c94]Christos Andrikos, Lejla Batina, Lukasz Chmielewski, Liran Lerman, Vasilios Mavroudis, Kostas Papagiannopoulos, Guilherme Perin, Giorgos Rassias, Alberto Sonnino:
Location, Location, Location: Revisiting Modeling and Exploitation for Location-Based Side Channel Leakages. ASIACRYPT (3) 2019: 285-314 - [c93]Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek:
Poster: Recovering the Input of Neural Networks via Single Shot Side-channel Attacks. CCS 2019: 2657-2659 - [c92]Lejla Batina, Patrick Jauernig, Nele Mentens, Ahmad-Reza Sadeghi, Emmanuel Stapf:
In Hardware We Trust: Gains and Pains of Hardware-assisted Security. DAC 2019: 44 - [c91]Leo Weissbart, Stjepan Picek, Lejla Batina:
One Trace Is All It Takes: Machine Learning-Based Side-Channel Attack on EdDSA. SPACE 2019: 86-105 - [c90]Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek:
CSI NN: Reverse Engineering of Neural Network Architectures Through Electromagnetic Side Channel. USENIX Security Symposium 2019: 515-532 - [i28]Madura A. Shelton, Niels Samwel, Lejla Batina, Francesco Regazzoni, Markus Wagner, Yuval Yarom:
Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers. CoRR abs/1912.05183 (2019) - [i27]Christos Andrikos, Lejla Batina, Lukasz Chmielewski, Liran Lerman, Vasilios Mavroudis, Kostas Papagiannopoulos, Guilherme Perin, Giorgos Rassias, Alberto Sonnino:
Location, location, location: Revisiting modeling and exploitation for location-based side channel leakages. IACR Cryptol. ePrint Arch. 2019: 230 (2019) - [i26]Leo Weissbart, Stjepan Picek, Lejla Batina:
One trace is all it takes: Machine Learning-based Side-channel Attack on EdDSA. IACR Cryptol. ePrint Arch. 2019: 358 (2019) - [i25]Madura A. Shelton, Niels Samwel, Lejla Batina, Francesco Regazzoni, Markus Wagner, Yuval Yarom:
Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers. IACR Cryptol. ePrint Arch. 2019: 1445 (2019) - [i24]Leo Weissbart, Stjepan Picek, Lejla Batina:
On the Performance of Multilayer Perceptron in Profiling Side-channel Analysis. IACR Cryptol. ePrint Arch. 2019: 1476 (2019) - 2018
- [c89]Ricardo Chaves, Lukasz Chmielewski, Francesco Regazzoni, Lejla Batina:
SCA-Resistance for AES: How Cheap Can We Go? AFRICACRYPT 2018: 107-123 - [c88]Niels Samwel, Lejla Batina:
Practical Fault Injection on Deterministic Signatures: The Case of EdDSA. AFRICACRYPT 2018: 306-321 - [c87]Niels Samwel, Lejla Batina, Guido Bertoni, Joan Daemen, Ruggero Susella:
Breaking Ed25519 in WolfSSL. CT-RSA 2018: 1-20 - [c86]Niels Pirotte, Jo Vliegen, Lejla Batina, Nele Mentens:
Design of a Fully Balanced ASIC Coprocessor Implementing Complete Addition Formulas on Weierstrass Elliptic Curves. DSD 2018: 545-552 - [c85]Antun Maldini, Niels Samwel, Stjepan Picek, Lejla Batina:
Genetic Algorithm-Based Electromagnetic Fault Injection. FDTC 2018: 35-42 - [e2]Lejla Batina, Ulrich Kühne, Nele Mentens:
PROOFS 2018, 7th International Workshop on Security Proofs for Embedded Systems, colocated with CHES 2018, Amsterdam, The Netherlands, September 13, 2018. Kalpa Publications in Computing 7, EasyChair 2018 [contents] - [i23]