Lejla Batina

From MaRDI portal
(Redirected from Person:656511)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Online template attack on ECDSA: extracting keys via the other side
Progress in Cryptology - AFRICACRYPT 2020
2022-11-09Paper
When Similarities Among Devices are Taken for Granted: Another Look at Portability
Progress in Cryptology - AFRICACRYPT 2020
2022-11-09Paper
Fake it till you make it: data augmentation using generative adversarial networks for all the crypto you need on small devices2022-07-06Paper
\textsc{Friet}: an authenticated encryption scheme with built-in fault detection2021-12-01Paper
Location, location, location: revisiting modeling and exploitation for location-based side channel leakages2020-05-11Paper
Breaking Ed25519 in WolfSSL2020-01-21Paper
Bitsliced masking and ARM: friends or foes?
Lecture Notes in Computer Science
2019-01-30Paper
Implementing complete formulas on Weierstrass curves in hardware2018-10-26Paper
Practical fault injection on deterministic signatures: the case of EdDSA2018-07-17Paper
Multicore Curve-Based Cryptoprocessor with Reconfigurable Modular Arithmetic Logic Units over GF(2^n)
IEEE Transactions on Computers
2018-06-12Paper
Elliptic-Curve-Based Security Processor for RFID
IEEE Transactions on Computers
2017-08-08Paper
Complete addition formulas for prime order elliptic curves
Advances in Cryptology – EUROCRYPT 2016
2016-09-09Paper
Extreme pipelining towards the best area-performance trade-off in hardware
Progress in Cryptology – AFRICACRYPT 2016
2016-06-22Paper
Near collision side channel attacks
Lecture Notes in Computer Science
2016-05-19Paper
An elliptic curve cryptographic processor using Edwards curves and the number theoretic transform
Cryptography and Information Security in the Balkans
2015-09-21Paper
Confused by Confusion: Systematic Evaluation of DPA Resistance of Various S-boxes
Progress in Cryptology -- INDOCRYPT 2014
2015-09-10Paper
Online template attacks
Progress in Cryptology -- INDOCRYPT 2014
2015-09-10Paper
S-box pipelining using genetic algorithms for high-throughput AES implementations: how fast can we go?
Progress in Cryptology -- INDOCRYPT 2014
2015-09-10Paper
Hierarchical ECC-based RFID authentication protocol
RFID. Security and Privacy
2012-08-20Paper
Power analysis of atmel cryptomemory -- recovering keys from secure eeproms
Lecture Notes in Computer Science
2012-06-08Paper
Getting more from PCA: First results of using principal component analysis for extensive power analysis
Lecture Notes in Computer Science
2012-06-08Paper
Mutual information analysis: a comprehensive study
Journal of Cryptology
2012-01-18Paper
Revisiting Higher-Order DPA Attacks:
Topics in Cryptology - CT-RSA 2010
2010-03-16Paper
Differential Cluster Analysis
Lecture Notes in Computer Science
2009-11-10Paper
HECC Goes Embedded: An Area-Efficient Implementation of HECC
Selected Areas in Cryptography
2009-11-03Paper
Topics in Cryptology – CT-RSA 2004
Lecture Notes in Computer Science
2009-05-07Paper
A Very Compact “Perfectly Masked” S-Box for AES
Applied Cryptography and Network Security
2008-06-13Paper
HW/SW co-design for public-key cryptosystems on the 8051 micro-controller
Computers and Electrical Engineering
2007-10-10Paper
Topics in Cryptology – CT-RSA 2006
Lecture Notes in Computer Science
2007-02-12Paper
Topics in Cryptology – CT-RSA 2005
Lecture Notes in Computer Science
2005-12-08Paper
scientific article; zbMATH DE number 2079919 (Why is no real title available?)2004-08-03Paper
scientific article; zbMATH DE number 2044537 (Why is no real title available?)2004-02-18Paper
Another Way of Doing RSA Cryptography in Hardware
Cryptography and Coding
2002-11-12Paper


Research outcomes over time


This page was built for person: Lejla Batina