SIoT 2014

Gabriel Ghiniță , Răzvan Rughiniș , Ahmad-Reza Sadeghi , Mihai BUCICOIU

Mutual Information Analysis : A Universal Differential Side-Channel Attack

Pim Tuyls , Benedikt Gierlichs , Lejla Batina
IACR Cryptology ePrint Archive 2007 198

16
2007
Cracking Unix Passwords using FPGA Platforms

Nele Mentens , Ingrid Verbauwhede , Lejla Batina , Bart Preneel
ECRYPT workshop SHARCS - Special Purpose Hardware for Attacking Cryptographic Systems 83 -91

21
2005
An elliptic curve processor suitable for RFID-tags

Nele Mentens , Tim Kerins , Pim Tuyls , Ingrid Verbauwhede
IACR Cryptology ePrint Archive 2006 227

102
2006
Side-Channel Entropy for Modular Exponentiation Algorithms

Lejla Batina , Cees Jansen
Proceedings of the 24th Symposium on Information Theory in the Benelux 37 -44

3
2003
Secret exponent information leakage for timing analyses

Lejla Batina , Cees Jansen
Proceedings of the 23rd Symposium on Information Theory in the Benelux 225 -232

3
2002
Power variance analysis breaks a masked ASIC implementation of AES

Daisuke Nakatsu , Lejla Batina , Kazuo Ohta , Yang Li
design, automation, and test in europe 1059 -1064

11
2010
A very compact "perfectly masked" S-Box for AES (corrected)

D. Canright , Lejla Batina
IACR Cryptology ePrint Archive 2009 11

12
2008
Mutual Information Analysis A Generic Side-Channel Distinguisher

Pim Tuyls , Benedikt Gierlichs , Lejla Batina , Bart Preneel
Lecture Notes in Computer Science 5154 426 -442

184
2008
The Energy Budget for Wireless Security: Extended Version.

Stefaan Seys , Ingrid Verbauwhede , Lejla Batina , Dave Singelée
IACR Cryptology ePrint Archive 2015 1029

1
2015
HECC Goes Embedded: An Area-efficient Implementation of HECC

Ingrid Verbauwhede , Lejla Batina , Junfeng Fan
Lecture Notes in Computer Science 5381 387 -400

1
2008
Design of Secure and Side-Channel Resistant Cryptographic Processors

Francesco Regazzoni , Vladimir Rozic , Nicolas Sklavos , Nele Mentens
international symposium on circuits and systems

2015
Smart Card Fault Injections with High Temperatures

Baris Ege , Lejla Batina , Pedro Maat C. Massolino

2016
Efficient Classification of Android Malware in the wild using Robust Static Features

Hossein Fereidooni , Lejla Batina , Veelasha Moonsamy , Mauro Conti
Weizhi, M. (ed.), Protecting Mobile Networks and Devices: Challenges and Solutions 179 -208

7
2016
Comparative Evaluation of Rank Correlation based DPA on an AES prototype chip

Kerstin Lemke-Rust , Benedikt Gierlichs , Lejla Batina
Lecture Notes in Computer Science 5222 341 -354

2008
A New Systolic Architecture for Multiplication in GF(2^n)

Nele Mentens , Lejla Batina , Bart Preneel
IFAC Workshop - PDS 2004, Programmable Devices and Systems 461 -466

1
2004
The secrets of profiling for side-channel analysis: feature selection matters.

Stjepan Picek , Lejla Batina , Axel Legay , Alan Jovic
IACR Cryptology ePrint Archive 2017 1110

6
2017
Towards Lightweight Cryptographic Primitives with Built-in Fault-Detection.

Francesco Regazzoni , Kostas Papagiannopoulos , Joan Daemen , Lejla Batina
IACR Cryptology ePrint Archive 2018 729

4
2018
ECRYPT D.VAM.15 Theoretical Models for Side-Channel Attacks

François Koeune , Benedikt Gierlichs , François-Xavier Standaert , Lejla Batina

2008