Lejla Batina

From MaRDI portal
Person:656511

Available identifiers

zbMath Open batina.lejlaMaRDI QIDQ656511

List of research outcomes





PublicationDate of PublicationType
Online template attack on ECDSA: extracting keys via the other side2022-11-09Paper
When Similarities Among Devices are Taken for Granted: Another Look at Portability2022-11-09Paper
Fake it till you make it: data augmentation using generative adversarial networks for all the crypto you need on small devices2022-07-06Paper
\textsc{Friet}: an authenticated encryption scheme with built-in fault detection2021-12-01Paper
Location, location, location: revisiting modeling and exploitation for location-based side channel leakages2020-05-11Paper
Breaking Ed25519 in WolfSSL2020-01-21Paper
Bitsliced masking and ARM: friends or foes?2019-01-30Paper
Implementing complete formulas on Weierstrass curves in hardware2018-10-26Paper
Practical fault injection on deterministic signatures: the case of EdDSA2018-07-17Paper
Multicore Curve-Based Cryptoprocessor with Reconfigurable Modular Arithmetic Logic Units over GF(2^n)2018-06-12Paper
Elliptic-Curve-Based Security Processor for RFID2017-08-08Paper
Complete addition formulas for prime order elliptic curves2016-09-09Paper
Extreme pipelining towards the best area-performance trade-off in hardware2016-06-22Paper
Near collision side channel attacks2016-05-19Paper
An elliptic curve cryptographic processor using Edwards curves and the number theoretic transform2015-09-21Paper
Confused by Confusion: Systematic Evaluation of DPA Resistance of Various S-boxes2015-09-10Paper
Online template attacks2015-09-10Paper
S-box pipelining using genetic algorithms for high-throughput AES implementations: how fast can we go?2015-09-10Paper
Hierarchical ECC-based RFID authentication protocol2012-08-20Paper
Power analysis of atmel cryptomemory -- recovering keys from secure eeproms2012-06-08Paper
Getting more from PCA: First results of using principal component analysis for extensive power analysis2012-06-08Paper
Mutual information analysis: a comprehensive study2012-01-18Paper
Revisiting Higher-Order DPA Attacks:2010-03-16Paper
Differential Cluster Analysis2009-11-10Paper
HECC Goes Embedded: An Area-Efficient Implementation of HECC2009-11-03Paper
Topics in Cryptology – CT-RSA 20042009-05-07Paper
A Very Compact “Perfectly Masked” S-Box for AES2008-06-13Paper
HW/SW co-design for public-key cryptosystems on the 8051 micro-controller2007-10-10Paper
Topics in Cryptology – CT-RSA 20062007-02-12Paper
Topics in Cryptology – CT-RSA 20052005-12-08Paper
https://portal.mardi4nfdi.de/entity/Q44720642004-08-03Paper
https://portal.mardi4nfdi.de/entity/Q44484062004-02-18Paper
Another Way of Doing RSA Cryptography in Hardware2002-11-12Paper

Research outcomes over time

This page was built for person: Lejla Batina