Lejla Batina

From MaRDI portal
Person:656511

Available identifiers

zbMath Open batina.lejlaMaRDI QIDQ656511

List of research outcomes

PublicationDate of PublicationType
Online Template Attack on ECDSA:2022-11-09Paper
When Similarities Among Devices are Taken for Granted: Another Look at Portability2022-11-09Paper
Fake it till you make it: data augmentation using generative adversarial networks for all the crypto you need on small devices2022-07-06Paper
\textsc{Friet}: an authenticated encryption scheme with built-in fault detection2021-12-01Paper
Location, location, location: revisiting modeling and exploitation for location-based side channel leakages2020-05-11Paper
Breaking Ed25519 in WolfSSL2020-01-21Paper
Bitsliced Masking and ARM: Friends or Foes?2019-01-30Paper
Implementing complete formulas on Weierstrass curves in hardware2018-10-26Paper
Practical fault injection on deterministic signatures: the case of EdDSA2018-07-17Paper
Multicore Curve-Based Cryptoprocessor with Reconfigurable Modular Arithmetic Logic Units over GF(2^n)2018-06-12Paper
Elliptic-Curve-Based Security Processor for RFID2017-08-08Paper
Complete Addition Formulas for Prime Order Elliptic Curves2016-09-09Paper
Extreme Pipelining Towards the Best Area-Performance Trade-Off in Hardware2016-06-22Paper
Near Collision Side Channel Attacks2016-05-19Paper
An Elliptic Curve Cryptographic Processor Using Edwards Curves and the Number Theoretic Transform2015-09-21Paper
Online Template Attacks2015-09-10Paper
S-box Pipelining Using Genetic Algorithms for High-Throughput AES Implementations: How Fast Can We Go?2015-09-10Paper
Confused by Confusion: Systematic Evaluation of DPA Resistance of Various S-boxes2015-09-10Paper
Hierarchical ECC-Based RFID Authentication Protocol2012-08-20Paper
Power Analysis of Atmel CryptoMemory – Recovering Keys from Secure EEPROMs2012-06-08Paper
Getting More from PCA: First Results of Using Principal Component Analysis for Extensive Power Analysis2012-06-08Paper
Mutual information analysis: a comprehensive study2012-01-18Paper
Revisiting Higher-Order DPA Attacks:2010-03-16Paper
Differential Cluster Analysis2009-11-10Paper
HECC Goes Embedded: An Area-Efficient Implementation of HECC2009-11-03Paper
Topics in Cryptology – CT-RSA 20042009-05-07Paper
A Very Compact “Perfectly Masked” S-Box for AES2008-06-13Paper
HW/SW co-design for public-key cryptosystems on the 8051 micro-controller2007-10-10Paper
Topics in Cryptology – CT-RSA 20062007-02-12Paper
Topics in Cryptology – CT-RSA 20052005-12-08Paper
https://portal.mardi4nfdi.de/entity/Q44720642004-08-03Paper
https://portal.mardi4nfdi.de/entity/Q44484062004-02-18Paper
Another Way of Doing RSA Cryptography in Hardware2002-11-12Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Lejla Batina