The following pages link to Lejla Batina (Q656511):
Displayed 33 items.
- Mutual information analysis: a comprehensive study (Q656515) (← links)
- Practical fault injection on deterministic signatures: the case of EdDSA (Q1653250) (← links)
- Implementing complete formulas on Weierstrass curves in hardware (Q1989612) (← links)
- \textsc{Friet}: an authenticated encryption scheme with built-in fault detection (Q2055626) (← links)
- Fake it till you make it: data augmentation using generative adversarial networks for all the crypto you need on small devices (Q2152167) (← links)
- Location, location, location: revisiting modeling and exploitation for location-based side channel leakages (Q2178859) (← links)
- Breaking Ed25519 in WolfSSL (Q2287502) (← links)
- HW/SW co-design for public-key cryptosystems on the 8051 micro-controller (Q2384544) (← links)
- Near Collision Side Channel Attacks (Q2807214) (← links)
- Extreme Pipelining Towards the Best Area-Performance Trade-Off in Hardware (Q2814705) (← links)
- Complete Addition Formulas for Prime Order Elliptic Curves (Q2820491) (← links)
- Power Analysis of Atmel CryptoMemory – Recovering Keys from Secure EEPROMs (Q2889992) (← links)
- Getting More from PCA: First Results of Using Principal Component Analysis for Extensive Power Analysis (Q2890021) (← links)
- Hierarchical ECC-Based RFID Authentication Protocol (Q2902487) (← links)
- Online Template Attacks (Q2945368) (← links)
- S-box Pipelining Using Genetic Algorithms for High-Throughput AES Implementations: How Fast Can We Go? (Q2945394) (← links)
- Confused by Confusion: Systematic Evaluation of DPA Resistance of Various S-boxes (Q2945397) (← links)
- An Elliptic Curve Cryptographic Processor Using Edwards Curves and the Number Theoretic Transform (Q2947104) (← links)
- A Very Compact “Perfectly Masked” S-Box for AES (Q3506414) (← links)
- Differential Cluster Analysis (Q3642923) (← links)
- HECC Goes Embedded: An Area-Efficient Implementation of HECC (Q3644216) (← links)
- (Q4448406) (← links)
- (Q4472064) (← links)
- Another Way of Doing RSA Cryptography in Hardware (Q4550286) (← links)
- Multicore Curve-Based Cryptoprocessor with Reconfigurable Modular Arithmetic Logic Units over GF(2^n) (Q4564207) (← links)
- Bitsliced Masking and ARM: Friends or Foes? (Q4614180) (← links)
- Elliptic-Curve-Based Security Processor for RFID (Q4975071) (← links)
- Online Template Attack on ECDSA: (Q5048978) (← links)
- When Similarities Among Devices are Taken for Granted: Another Look at Portability (Q5048981) (← links)
- Revisiting Higher-Order DPA Attacks: (Q5189452) (← links)
- Topics in Cryptology – CT-RSA 2005 (Q5710841) (← links)
- Topics in Cryptology – CT-RSA 2006 (Q5898559) (← links)
- Topics in Cryptology – CT-RSA 2004 (Q5901699) (← links)