Lejla Batina

From MaRDI portal
Person:656511

Available identifiers

zbMath Open batina.lejlaMaRDI QIDQ656511

List of research outcomes





PublicationDate of PublicationType
Online Template Attack on ECDSA:2022-11-09Paper
When Similarities Among Devices are Taken for Granted: Another Look at Portability2022-11-09Paper
Fake it till you make it: data augmentation using generative adversarial networks for all the crypto you need on small devices2022-07-06Paper
\textsc{Friet}: an authenticated encryption scheme with built-in fault detection2021-12-01Paper
Location, location, location: revisiting modeling and exploitation for location-based side channel leakages2020-05-11Paper
Breaking Ed25519 in WolfSSL2020-01-21Paper
Bitsliced Masking and ARM: Friends or Foes?2019-01-30Paper
Implementing complete formulas on Weierstrass curves in hardware2018-10-26Paper
Practical fault injection on deterministic signatures: the case of EdDSA2018-07-17Paper
Multicore Curve-Based Cryptoprocessor with Reconfigurable Modular Arithmetic Logic Units over GF(2^n)2018-06-12Paper
Elliptic-Curve-Based Security Processor for RFID2017-08-08Paper
Complete Addition Formulas for Prime Order Elliptic Curves2016-09-09Paper
Extreme Pipelining Towards the Best Area-Performance Trade-Off in Hardware2016-06-22Paper
Near Collision Side Channel Attacks2016-05-19Paper
An Elliptic Curve Cryptographic Processor Using Edwards Curves and the Number Theoretic Transform2015-09-21Paper
Confused by Confusion: Systematic Evaluation of DPA Resistance of Various S-boxes2015-09-10Paper
Online Template Attacks2015-09-10Paper
S-box Pipelining Using Genetic Algorithms for High-Throughput AES Implementations: How Fast Can We Go?2015-09-10Paper
Hierarchical ECC-Based RFID Authentication Protocol2012-08-20Paper
Power Analysis of Atmel CryptoMemory – Recovering Keys from Secure EEPROMs2012-06-08Paper
Getting More from PCA: First Results of Using Principal Component Analysis for Extensive Power Analysis2012-06-08Paper
Mutual information analysis: a comprehensive study2012-01-18Paper
Revisiting Higher-Order DPA Attacks:2010-03-16Paper
Differential Cluster Analysis2009-11-10Paper
HECC Goes Embedded: An Area-Efficient Implementation of HECC2009-11-03Paper
Topics in Cryptology – CT-RSA 20042009-05-07Paper
A Very Compact “Perfectly Masked” S-Box for AES2008-06-13Paper
HW/SW co-design for public-key cryptosystems on the 8051 micro-controller2007-10-10Paper
Topics in Cryptology – CT-RSA 20062007-02-12Paper
Topics in Cryptology – CT-RSA 20052005-12-08Paper
https://portal.mardi4nfdi.de/entity/Q44720642004-08-03Paper
https://portal.mardi4nfdi.de/entity/Q44484062004-02-18Paper
Another Way of Doing RSA Cryptography in Hardware2002-11-12Paper

Research outcomes over time

This page was built for person: Lejla Batina