The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications of "Lejla Batina" ( http://dblp.L3S.de/Authors/Lejla_Batina )

URL (Homepage):  https://www.cs.ru.nl/~lejla/  Author page on DBLP  Author page in RDF  Community of Lejla Batina in ASPL-2

Publication years (Num. hits)
2001-2006 (20) 2007-2008 (17) 2009-2010 (20) 2011-2013 (16) 2014 (15) 2015-2016 (32) 2017-2019 (17)
Publication types (Num. hits)
article(41) incollection(5) inproceedings(89) proceedings(2)
Venues (Conferences, Journals, ...)
IACR Cryptology ePrint Archive(23) CT-RSA(8) CHES(6) ISCAS(5) RFIDSec(5) FPL(4) AFRICACRYPT(3) ASAP(3) CARDIS(3) INDOCRYPT(3) Integration(3) ISC(3) ARC(2) CoRR(2) COSADE(2) DATE(2) More (+10 of total 66)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 84 occurrences of 55 keywords

Results
Found 138 publication records. Showing 137 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Louiza Papachristodoulou, Apostolos P. Fournaris, Kostas Papagiannopoulos, Lejla Batina Practical Evaluation of Protected Residue Number System Scalar Multiplication. Search on Bibsonomy IACR Trans. Cryptogr. Hardw. Embed. Syst. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Leo Weissbart, Stjepan Picek, Lejla Batina One trace is all it takes: Machine Learning-based Side-channel Attack on EdDSA. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2019 DBLP  BibTeX  RDF
1Christos Andrikos, Lejla Batina, Lukasz Chmielewski, Liran Lerman, Vasilios Mavroudis, Kostas Papagiannopoulos, Guilherme Perin, Giorgos Rassias, Alberto Sonnino Location, location, location: Revisiting modeling and exploitation for location-based side channel leakages. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2019 DBLP  BibTeX  RDF
1Lejla Batina, Lukasz Chmielewski, Louiza Papachristodoulou, Peter Schwabe, Michael Tunstall Online template attacks. Search on Bibsonomy J. Cryptographic Engineering The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek CSI Neural Network: Using Side-channels to Recover Your Artificial Neural Network Information. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2018 DBLP  BibTeX  RDF
1Thierry Simon, Lejla Batina, Joan Daemen, Vincent Grosso, Pedro Maat Costa Massolino, Kostas Papagiannopoulos, Francesco Regazzoni, Niels Samwel Towards Lightweight Cryptographic Primitives with Built-in Fault-Detection. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2018 DBLP  BibTeX  RDF
1Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek CSI Neural Network: Using Side-channels to Recover Your Artificial Neural Network Information. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
1Niels Samwel, Lejla Batina Practical Fault Injection on Deterministic Signatures: The Case of EdDSA. Search on Bibsonomy AFRICACRYPT The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ricardo Chaves, Lukasz Chmielewski, Francesco Regazzoni, Lejla Batina SCA-Resistance for AES: How Cheap Can We Go? Search on Bibsonomy AFRICACRYPT The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Antun Maldini, Niels Samwel, Stjepan Picek, Lejla Batina Genetic Algorithm-Based Electromagnetic Fault Injection. Search on Bibsonomy FDTC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Niels Pirotte, Jo Vliegen, Lejla Batina, Nele Mentens Design of a Fully Balanced ASIC Coprocessor Implementing Complete Addition Formulas on Weierstrass Elliptic Curves. Search on Bibsonomy DSD The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Lejla Batina, Ulrich Kühne, Nele Mentens (eds.) PROOFS 2018, 7th International Workshop on Security Proofs for Embedded Systems, colocated with CHES 2018, Amsterdam, The Netherlands, September 13, 2018 Search on Bibsonomy PROOFS@CHES The full citation details ... 2018 DBLP  BibTeX  RDF
1Niels Samwel, Lejla Batina, Guido Bertoni, Joan Daemen, Ruggero Susella Breaking Ed25519 in WolfSSL. Search on Bibsonomy CT-RSA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Niels Samwel, Lejla Batina, Guido Bertoni, Joan Daemen, Ruggero Susella Breaking Ed25519 in WolfSSL. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2017 DBLP  BibTeX  RDF
1Stjepan Picek, Annelie Heuser, Alan Jovic, Lejla Batina, Axel Legay The secrets of profiling for side-channel analysis: feature selection matters. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2017 DBLP  BibTeX  RDF
1Pedro Maat C. Massolino, Lejla Batina, Ricardo Chaves, Nele Mentens Area-optimized montgomery multiplication on IGLOO 2 FPGAs. Search on Bibsonomy FPL The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Christos Andrikos, Giorgos Rassias, Liran Lerman, Kostas Papagiannopoulos, Lejla Batina Location-based leakages: New directions in modeling and exploiting. Search on Bibsonomy SAMOS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Rauf Mahmudlu, Valentina Banciu, Lejla Batina, Ileana Buhan LDA-Based Clustering as a Side-Channel Distinguisher. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2016 DBLP  BibTeX  RDF
1Wouter de Groot, Kostas Papagiannopoulos, Antonio de la Piedra, Erik Schneider, Lejla Batina Bitsliced Masking and ARM: Friends or Foes? Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2016 DBLP  BibTeX  RDF
1Pedro Maat C. Massolino, Joost Renes, Lejla Batina Implementing Complete Formulas on Weierstrass Curves in Hardware. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2016 DBLP  BibTeX  RDF
1Joost Renes, Peter Schwabe, Benjamin Smith 0003, Lejla Batina \(\mu\)Kummer: efficient hyperelliptic signatures and key exchange on microcontrollers. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2016 DBLP  BibTeX  RDF
1Pedro Maat C. Massolino, Lejla Batina, Ricardo Chaves, Nele Mentens Low Power Montgomery Modular Multiplication on Reconfigurable Systems. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2016 DBLP  BibTeX  RDF
1Lejla Batina, Swarup Bhunia, Patrick Schaumont, Jean-Pierre Seifert Foundations of Secure Scaling (Dagstuhl Seminar 16342). Search on Bibsonomy Dagstuhl Reports The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Joost Renes, Peter Schwabe, Benjamin Smith 0003, Lejla Batina $μ$Kummer: efficient hyperelliptic signatures and key exchange on microcontrollers. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
1Stjepan Picek, Domagoj Jakobovic, Julian F. Miller, Lejla Batina, Marko Cupic Cryptographic Boolean functions: One output, many design criteria. Search on Bibsonomy Appl. Soft Comput. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Gergely Alpár, Lejla Batina, Lynn Margaret Batten, Veelasha Moonsamy, Anna Krasnova, Antoine Guellier, Iynkaran Natgunanathan New directions in IoT privacy using attribute-based authentication. Search on Bibsonomy Conf. Computing Frontiers The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Stjepan Picek, Dominik Sisejkovic, Domagoj Jakobovic, Lejla Batina, Bohan Yang 0001, Danilo Sijacic, Nele Mentens Extreme Pipelining Towards the Best Area-Performance Trade-Off in Hardware. Search on Bibsonomy AFRICACRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Elif Ozgen, Louiza Papachristodoulou, Lejla Batina Template attacks using classification algorithms. Search on Bibsonomy HOST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Rauf Mahmudlu, Valentina Banciu, Lejla Batina, Ileana Buhan LDA-Based Clustering as a Side-Channel Distinguisher. Search on Bibsonomy RFIDSec The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ke Jiang, Petru Eles, Zebo Peng, Sudipta Chattopadhyay 0001, Lejla Batina SPARTA: A scheduling policy for thwarting differential power analysis attacks. Search on Bibsonomy ASP-DAC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Joost Renes, Peter Schwabe, Benjamin Smith 0003, Lejla Batina \mu Kummer: Efficient Hyperelliptic Signatures and Key Exchange on Microcontrollers. Search on Bibsonomy CHES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Pedro Maat C. Massolino, Joost Renes, Lejla Batina Implementing Complete Formulas on Weierstrass Curves in Hardware. Search on Bibsonomy SPACE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Margaux Dugardin, Louiza Papachristodoulou, Zakaria Najm, Lejla Batina, Jean-Luc Danger, Sylvain Guilley Dismantling Real-World ECC with Horizontal and Vertical Template Attacks. Search on Bibsonomy COSADE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Joost Renes, Craig Costello, Lejla Batina Complete Addition Formulas for Prime Order Elliptic Curves. Search on Bibsonomy EUROCRYPT (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Wouter de Groot, Kostas Papagiannopoulos, Antonio de la Piedra, Erik Schneider, Lejla Batina Bitsliced Masking and ARM: Friends or Foes? Search on Bibsonomy LightSec The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Apostolos P. Fournaris, Louiza Papachristodoulou, Lejla Batina, Nicolas Sklavos Residue Number System as a side channel and fault injection attack countermeasure in elliptic curve cryptography. Search on Bibsonomy DTIS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Baris Ege, Thomas Eisenbarth 0001, Lejla Batina Near Collision Side Channel Attacks. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2015 DBLP  BibTeX  RDF
1Margaux Dugardin, Louiza Papachristodoulou, Zakaria Najm, Lejla Batina, Jean-Luc Danger, Sylvain Guilley, Jean-Christophe Courrège, Carine Therond Dismantling real-world ECC with Horizontal and Vertical Template Attacks. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2015 DBLP  BibTeX  RDF
1Dave Singelée, Stefaan Seys, Lejla Batina, Ingrid Verbauwhede The Energy Budget for Wireless Security: Extended Version. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2015 DBLP  BibTeX  RDF
1Joost Renes, Craig Costello, Lejla Batina Complete addition formulas for prime order elliptic curves. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2015 DBLP  BibTeX  RDF
1Lejla Batina, Matthew J. B. Robshaw Introduction to the CHES 2014 special issue. Search on Bibsonomy J. Cryptographic Engineering The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Baris Ege, Kostas Papagiannopoulos, Lejla Batina, Stjepan Picek Improving DPA resistance of S-boxes: How far can we go? Search on Bibsonomy ISCAS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ricardo Graves, Giorgio Di Natale, Lejla Batina, Shivam Bhasin, Baris Ege, Apostolos P. Fournaris, Nele Mentens, Stjepan Picek, Francesco Regazzoni, Vladimir Rozic, Nicolas Sklavos, Bohan Yang 0001 Challenges in designing trustworthy cryptographic co-processors. Search on Bibsonomy ISCAS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Stjepan Picek, Bodhisatwa Mazumdar, Debdeep Mukhopadhyay, Lejla Batina Modified Transparency Order Property: Solution or Just Another Attempt. Search on Bibsonomy SPACE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Stjepan Picek, Domagoj Jakobovic, Julian F. Miller, Elena Marchiori, Lejla Batina Evolutionary Methods for the Construction of Cryptographic Boolean Functions. Search on Bibsonomy EuroGP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Baris Ege, Thomas Eisenbarth 0001, Lejla Batina Near Collision Side Channel Attacks. Search on Bibsonomy SAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Stjepan Picek, Lejla Batina, Pieter Buzing, Domagoj Jakobovic Fault Injection with a New Flavor: Memetic Algorithms Make a Difference. Search on Bibsonomy COSADE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Stjepan Picek, Claude Carlet, Domagoj Jakobovic, Julian F. Miller, Lejla Batina Correlation Immunity of Boolean Functions: An Evolutionary Algorithms Perspective. Search on Bibsonomy GECCO The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Stjepan Picek, Julian F. Miller, Domagoj Jakobovic, Lejla Batina Cartesian Genetic Programming Approach for Generating Substitution Boxes of Different Sizes. Search on Bibsonomy GECCO (Companion) The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Lejla Batina, Domagoj Jakobovic, Nele Mentens, Stjepan Picek, Antonio de la Piedra, Dominik Sisejkovic S-box pipelining using genetic algorithms for high-throughput AES implementations: How fast can we go? Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2014 DBLP  BibTeX  RDF
1Stjepan Picek, Baris Ege, Kostas Papagiannopoulos, Lejla Batina, Domagoj Jakobovic Optimality and beyond: The case of 4×4 S-boxes. Search on Bibsonomy HOST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Thomas Korak, Michael Hutter, Baris Ege, Lejla Batina Clock Glitch Attacks in the Presence of Heating. Search on Bibsonomy FDTC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Stjepan Picek, Lejla Batina, Domagoj Jakobovic, Rafael Boix Carpi Evolving genetic algorithms for fault injection attacks. Search on Bibsonomy MIPRO The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Lejla Batina, Jens Hermans, Jaap-Henk Hoepman, Anna Krasnova High-Speed Dating Privacy-Preserving Attribute Matching for RFID. Search on Bibsonomy RFIDSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ke Jiang, Lejla Batina, Petru Eles, Zebo Peng Robustness Analysis of Real-Time Scheduling Against Differential Power Analysis Attacks. Search on Bibsonomy ISVLSI The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Lejla Batina, Matthew Robshaw (eds.) Cryptographic Hardware and Embedded Systems - CHES 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings Search on Bibsonomy CHES The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Stjepan Picek, Baris Ege, Lejla Batina, Domagoj Jakobovic, Lukasz Chmielewski, Marin Golub On using genetic algorithms for intrinsic side-channel resistance: the case of AES S-box. Search on Bibsonomy CS2@HiPEAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Stjepan Picek, Elena Marchiori, Lejla Batina, Domagoj Jakobovic Combining Evolutionary Computation and Algebraic Constructions to Find Cryptography-Relevant Boolean Functions. Search on Bibsonomy PPSN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Stjepan Picek, Lejla Batina, Domagoj Jakobovic Evolving DPA-Resistant Boolean Functions. Search on Bibsonomy PPSN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Lejla Batina, Lukasz Chmielewski, Louiza Papachristodoulou, Peter Schwabe, Michael Tunstall Online Template Attacks. Search on Bibsonomy INDOCRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Lejla Batina, Domagoj Jakobovic, Nele Mentens, Stjepan Picek, Antonio de la Piedra, Dominik Sisejkovic S-box Pipelining Using Genetic Algorithms for High-Throughput AES Implementations: How Fast Can We Go? Search on Bibsonomy INDOCRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Stjepan Picek, Kostas Papagiannopoulos, Baris Ege, Lejla Batina, Domagoj Jakobovic Confused by Confusion: Systematic Evaluation of DPA Resistance of Various S-boxes. Search on Bibsonomy INDOCRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Nele Mentens, Lejla Batina, Selçuk Baktir An Elliptic Curve Cryptographic Processor Using Edwards Curves and the Number Theoretic Transform. Search on Bibsonomy BalkanCryptSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Stjepan Picek, Lejla Batina, Domagoj Jakobovic, Baris Ege, Marin Golub S-box, SET, Match: A Toolbox for S-box Analysis. Search on Bibsonomy WISTP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Lejla Batina, Amitabh Das, Baris Ege, Elif Bilge Kavun, Nele Mentens, Christof Paar, Ingrid Verbauwhede, Tolga Yalçin Dietary Recommendations for Lightweight Block Ciphers: Power, Energy and Area Analysis of Recently Developed Architectures. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2013 DBLP  BibTeX  RDF
1Amitabh Das, Baris Ege, Santosh Ghosh, Lejla Batina, Ingrid Verbauwhede Security Analysis of Industrial Test Compression Schemes. Search on Bibsonomy IEEE Trans. on CAD of Integrated Circuits and Systems The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Miroslav Knezevic, Lejla Batina, Elke De Mulder, Junfeng Fan, Benedikt Gierlichs, Yong Ki Lee, Roel Maes, Ingrid Verbauwhede Signal Processing for Cryptography and Security Applications. Search on Bibsonomy Handbook of Signal Processing Systems The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Lejla Batina, Amitabh Das, Baris Ege, Elif Bilge Kavun, Nele Mentens, Christof Paar, Ingrid Verbauwhede, Tolga Yalçin Dietary Recommendations for Lightweight Block Ciphers: Power, Energy and Area Analysis of Recently Developed Architectures. Search on Bibsonomy RFIDSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Rafael Boix Carpi, Stjepan Picek, Lejla Batina, Federico Menarini, Domagoj Jakobovic, Marin Golub Glitch It If You Can: Parameter Search Strategies for Successful Fault Injection. Search on Bibsonomy CARDIS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Lejla Batina, Yong Ki Lee, Stefaan Seys, Dave Singelée, Ingrid Verbauwhede Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs. Search on Bibsonomy Personal and Ubiquitous Computing The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Dimitrios Mavroeidis, Lejla Batina, Twan van Laarhoven, Elena Marchiori PCA, Eigenvector Localization and Clustering for Side-Channel Attacks on Cryptographic Hardware Devices. Search on Bibsonomy ECML/PKDD (1) The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Gergely Alpár, Lejla Batina, Wouter Lueks Designated Attribute-Based Proofs for RFID Applications. Search on Bibsonomy RFIDSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Lejla Batina, Jip Hogenboom, Jasper G. J. van Woudenberg Getting More from PCA: First Results of Using Principal Component Analysis for Extensive Power Analysis. Search on Bibsonomy CT-RSA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Josep Balasch, Benedikt Gierlichs, Roel Verdult, Lejla Batina, Ingrid Verbauwhede Power Analysis of Atmel CryptoMemory - Recovering Keys from Secure EEPROMs. Search on Bibsonomy CT-RSA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Gergely Alpár, Lejla Batina, Roel Verdult Using NFC Phones for Proving Credentials. Search on Bibsonomy MMB/DFT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Lejla Batina, Benedikt Gierlichs, Emmanuel Prouff, Matthieu Rivain, François-Xavier Standaert, Nicolas Veyrat-Charvillon Mutual Information Analysis: a Comprehensive Study. Search on Bibsonomy J. Cryptology The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Junfeng Fan, Lejla Batina, Ingrid Verbauwhede Design and design methods for unified multiplier and inverter and its application for HECC. Search on Bibsonomy Integration The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Lejla Batina, Stefaan Seys, Dave Singelée, Ingrid Verbauwhede Hierarchical ECC-Based RFID Authentication Protocol. Search on Bibsonomy RFIDSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ruben A. Muijrers, Jasper G. J. van Woudenberg, Lejla Batina RAM: Rapid Alignment Method. Search on Bibsonomy CARDIS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Dave Singelée, Stefaan Seys, Lejla Batina, Ingrid Verbauwhede The communication and computation cost of wireless security: extended abstract. Search on Bibsonomy WISEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Miroslav Knezevic, Lejla Batina, Elke De Mulder, Junfeng Fan, Benedikt Gierlichs, Yong Ki Lee, Roel Maes, Ingrid Verbauwhede Signal Processing for Cryptography and Security Applications. Search on Bibsonomy Handbook of Signal Processing Systems The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Kazuo Sakiyama, Lejla Batina Arithmetic for Public-Key Cryptography. Search on Bibsonomy Secure Integrated Circuits and Systems The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Lejla Batina, Kazuo Sakiyama, Ingrid M. R. Verbauwhede Compact Public-Key Implementations for RFID and Sensor Nodes. Search on Bibsonomy Secure Integrated Circuits and Systems The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Lejla Batina, Jip Hogenboom, Nele Mentens, Joren Moelans, Jo Vliegen Side-channel evaluation of FPGA implementations of binary Edwards curves. Search on Bibsonomy ICECS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Yang Li 0001, Kazuo Sakiyama, Lejla Batina, Daisuke Nakatsu, Kazuo Ohta Power Variance Analysis breaks a masked ASIC implementation of AES. Search on Bibsonomy DATE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Yong Ki Lee, Lejla Batina, Dave Singelée, Ingrid Verbauwhede Wide-Weak Privacy-Preserving RFID Authentication Protocols. Search on Bibsonomy MOBILIGHT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Junfeng Fan, Daniel V. Bailey, Lejla Batina, Tim Güneysu, Christof Paar, Ingrid Verbauwhede Breaking Elliptic Curve Cryptosystems Using Reconfigurable Hardware. Search on Bibsonomy FPL The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Benedikt Gierlichs, Lejla Batina, Bart Preneel, Ingrid Verbauwhede Revisiting Higher-Order DPA Attacks: . Search on Bibsonomy CT-RSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Lejla Batina, Yong Ki Lee, Stefaan Seys, Dave Singelée, Ingrid Verbauwhede Privacy-Preserving ECC-Based Grouping Proofs for RFID. Search on Bibsonomy ISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Lejla Batina, Jaap-Henk Hoepman, Bart Jacobs 0001, Wojciech Mostowski, Pim Vullers Developing Efficient Blinded Attribute Certificates on Smart Cards via Pairings. Search on Bibsonomy CARDIS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Yong Ki Lee, Lejla Batina, Dave Singelée, Ingrid Verbauwhede Low-cost untraceable authentication protocols for RFID. Search on Bibsonomy WISEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF search protocol, tracking attack, privacy, elliptic curve cryptography, authentication protocol, rfid
1Yong Ki Lee, Lejla Batina, Dave Singelée, Bart Preneel, Ingrid Verbauwhede Anti-counterfeiting, Untraceability and Other Security Challenges for RFID Systems: Public-Key-Based Protocols and Hardware. Search on Bibsonomy Towards Hardware-Intrinsic Security The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Daniel V. Bailey, Lejla Batina, Daniel J. Bernstein, Peter Birkner, Joppe W. Bos, Hsieh-Chung Chen, Chen-Mou Cheng, Gauthier Van Damme, Giacomo de Meulenaer, Luis J. Dominguez Perez, Junfeng Fan, Tim Güneysu, Frank K. Gürkaynak, Thorsten Kleinjung, Tanja Lange 0001, Nele Mentens, Ruben Niederhagen, Christof Paar, Francesco Regazzoni, Peter Schwabe, Leif Uhsadel, Anthony Van Herrewege, Bo-Yin Yang Breaking ECC2K-130. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2009 DBLP  BibTeX  RDF
1Benedikt Gierlichs, Lejla Batina, Bart Preneel, Ingrid Verbauwhede Revisiting Higher-Order DPA Attacks: Multivariate Mutual Information Analysis. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2009 DBLP  BibTeX  RDF
1Daniel V. Bailey, Brian Baldwin, Lejla Batina, Daniel J. Bernstein, Peter Birkner, Joppe W. Bos, Gauthier Van Damme, Giacomo de Meulenaer, Junfeng Fan, Tim Güneysu, Frank K. Gürkaynak, Thorsten Kleinjung, Tanja Lange 0001, Nele Mentens, Christof Paar, Francesco Regazzoni, Peter Schwabe, Leif Uhsadel The Certicom Challenges ECC2-X. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2009 DBLP  BibTeX  RDF
1D. Canright, Lejla Batina A Very Compact "Perfectly Masked" S-Box for AES (corrected). Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2009 DBLP  BibTeX  RDF
1Junfeng Fan, Lejla Batina, Ingrid Verbauwhede Light-weight implementation options for curve-based cryptography: HECC is also ready for RFID. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Miroslav Knezevic, Lejla Batina, Ingrid Verbauwhede Modular Reduction without Precomputational Phase. Search on Bibsonomy ISCAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Lejla Batina, Benedikt Gierlichs, Kerstin Lemke-Rust Differential Cluster Analysis. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Differential Cluster Analysis, AES Hardware, Differential Power Analysis, Collision Attacks, Side-channel Cryptanalysis
1Junfeng Fan, Miroslav Knezevic, Dusko Karaklajic, Roel Maes, Vladimir Rozic, Lejla Batina, Ingrid Verbauwhede FPGA-based testing strategy for cryptographic chips: A case study on Elliptic Curve Processor for RFID tags. Search on Bibsonomy IOLTS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 137 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license