[go: up one dir, main page]

Follow
Lejla Batina,
Lejla Batina,
Professor, applied cryptography and embedded systems security, Radboud University, The Netherlands
Verified email at cs.ru.nl - Homepage
Title
Cited by
Cited by
Year
Mutual information analysis: A generic side-channel distinguisher
B Gierlichs, L Batina, P Tuyls, B Preneel
International Workshop on Cryptographic Hardware and Embedded Systems, 426-442, 2008
9742008
RFID-tags for anti-counterfeiting
P Tuyls, L Batina
Cryptographers’ track at the RSA conference, 115-131, 2006
5802006
CSI NN: Reverse engineering of neural network architectures through electromagnetic side channel
L Batina, SP Bhasin, Shivam, Dirmanto Jap
USENIX Security Symposium, 515-532, 2019
492*2019
Mutual information analysis: a comprehensive study
L Batina, B Gierlichs, E Prouff, M Rivain, FX Standaert, ...
Journal of Cryptology 24 (2), 269-291, 2011
4442011
Public-key cryptography for RFID-tags
L Batina, J Guajardo, T Kerins, N Mentens, P Tuyls, I Verbauwhede
Fifth Annual IEEE International Conference on Pervasive Computing and …, 2007
3382007
Elliptic-curve-based security processor for RFID
YK Lee, K Sakiyama, L Batina, I Verbauwhede
IEEE Transactions on Computers 57 (11), 1514-1527, 2008
3072008
A very compact “perfectly masked” S-box for AES
D Canright, L Batina
International Conference on Applied Cryptography and Network Security, 446-459, 2008
2332008
Sok: Deep learning-based physical side-channel analysis
S Picek, G Perin, L Mariot, L Wu, L Batina
ACM Computing Surveys 55 (11), 1-35, 2023
2082023
SmartCards and RFID
L Batina, E Poll
Course PowerPoint Presentation for IPA Security Course, Digital Security at …, 2019
1982019
Low-cost elliptic curve cryptography for wireless sensor networks
L Batina, N Mentens, K Sakiyama, B Preneel, I Verbauwhede
European workshop on security in ad-hoc and sensor networks, 6-17, 2006
1882006
EC-RAC (ECDLP based randomized access control): Provably secure RFID authentication protocol
YK Lee, L Batina, I Verbauwhede
2008 IEEE international conference on RFID, 97-104, 2008
1772008
A systematic evaluation of compact hardware implementations for the Rijndael S-box
N Mentens, L Batina, B Preneel, I Verbauwhede
Cryptographers’ Track at the RSA Conference, 323-333, 2005
1742005
Hardware architectures for public key cryptography
L Batina, SB Örs, B Preneel, J Vandewalle
Integration 34 (1-2), 1-64, 2003
1742003
Identification via location-profiling in GSM networks
Y De Mulder, G Danezis, L Batina, B Preneel
Proceedings of the 7th ACM workshop on Privacy in the electronic society, 23-32, 2008
1562008
Hardware implementation of an elliptic curve processor over GF (p)
SB Ors, L Batina, B Preneel, J Vandewalle
Proceedings IEEE International Conference on Application-Specific Systems …, 2003
1442003
An elliptic curve processor suitable for RFID-tags
L Batina, J Guajardo, T Kerins, N Mentens, P Tuyls, I Verbauwhede
Cryptology EPrint Archive, 2006
1422006
Complete addition formulas for prime order elliptic curves
J Renes, C Costello, L Batina
Annual International Conference on the Theory and Applications of …, 2016
1352016
Revisiting higher-order DPA attacks: Multivariate mutual information analysis
B Gierlichs, L Batina, B Preneel, I Verbauwhede
Cryptographers’ Track at the RSA Conference, 221-234, 2010
1272010
Low-cost untraceable authentication protocols for RFID
YK Lee, L Batina, D Singelée, I Verbauwhede
Proceedings of the third ACM conference on Wireless network security, 55-64, 2010
1262010
Getting more from PCA: first results of using principal component analysis for extensive power analysis
L Batina, J Hogenboom, JGJ Van Woudenberg
Cryptographers’ track at the RSA conference, 383-397, 2012
1242012
The system can't perform the operation now. Try again later.
Articles 1–20