Lejla Batina
Orcid: 0000-0003-0727-3573Affiliations:
- Radboud University Nijmegen, Digital Security Group
According to our database1,
Lejla Batina
authored at least 185 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Regularizers to the rescue: fighting overfitting in deep learning-based side-channel analysis.
J. Cryptogr. Eng., November, 2024
Keep it unbiased: a comparison between estimation of distribution algorithms and deep learning for human interaction-free side-channel analysis.
J. Cryptogr. Eng., September, 2024
An Algebraic Approach for Evaluating Random Probing Security With Application to AES.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024
Plan your defense: A comparative analysis of leakage detection methods on RISC-V cores.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 27th International Symposium on Design & Diagnostics of Electronic Circuits & Systems, 2024
Proceedings of the 27th International Symposium on Design & Diagnostics of Electronic Circuits & Systems, 2024
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
PROACT - Physical Attack Resistance of Cryptographic Algorithms and Circuits with Reduced Time to Market.
Proceedings of the Applied Reconfigurable Computing. Architectures, Tools, and Applications, 2024
Proceedings of the Applied Cryptography and Network Security Workshops, 2024
Proceedings of the Applied Cryptography and Network Security Workshops, 2024
2023
ACM Comput. Surv., November, 2023
IEEE Trans. Inf. Forensics Secur., 2023
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023
IACR Cryptol. ePrint Arch., 2023
BarraCUDA: Bringing Electromagnetic Side Channel Into Play to Steal the Weights of Neural Networks from NVIDIA GPUs.
CoRR, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
Security and Artificial Intelligence, 2022
IEEE Trans. Inf. Forensics Secur., 2022
Playing With Blocks: Toward Re-Usable Deep Learning Models for Side-Channel Profiled Attacks.
IEEE Trans. Inf. Forensics Secur., 2022
AGE Is Not Just a Number: Label Distribution in Deep Learning-based Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
SCA Strikes Back: Reverse-Engineering Neural Network Architectures Using Side Channels.
IEEE Des. Test, 2022
Machine-Learning Assisted Side-Channel Attacks on RNS ECC Implementations Using Hybrid Feature Engineering.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2022
2021
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021
ACM J. Emerg. Technol. Comput. Syst., 2021
IACR Cryptol. ePrint Arch., 2021
Fake it till you make it: Data Augmentation using Generative Adversarial Networks for all the crypto you need on small devices.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Being Patient and Persistent: Optimizing An Early Stopping Strategy for Deep Learning in Profiled Attacks.
CoRR, 2021
Auto-tune POIs: Estimation of distribution algorithms for efficient side-channel analysis.
Comput. Networks, 2021
Comput. Networks, 2021
Proceedings of the 29th IFIP/IEEE International Conference on Very Large Scale Integration, 2021
Proceedings of the Embedded Computer Systems: Architectures, Modeling, and Simulation, 2021
Screen Gleaning: A Screen Reading TEMPEST Attack on Mobile Devices Exploiting an Electromagnetic Side Channel.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the 22nd International Symposium on Quality Electronic Design, 2021
Invited: Security Beyond Bulk Silicon: Opportunities and Challenges of Emerging Devices.
Proceedings of the 58th ACM/IEEE Design Automation Conference, 2021
Proceedings of the Security of Ubiquitous Computing Systems, 2021
2020
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020
J. Hardw. Syst. Secur., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Machine-Learning assisted Side-Channel Attacks on RNS-based Elliptic Curve Implementations using Hybrid Feature Engineering.
IACR Cryptol. ePrint Arch., 2020
Breaking a fully Balanced ASIC Coprocessor Implementing Complete Addition Formulas on Weierstrass Elliptic Curves.
Proceedings of the 23rd Euromicro Conference on Digital System Design, 2020
Proceedings of the Progress in Cryptology - AFRICACRYPT 2020, 2020
Proceedings of the Progress in Cryptology - AFRICACRYPT 2020, 2020
2019
IEEE Trans. Very Large Scale Integr. Syst., 2019
Introduction to the Special Issue on Cryptographic Engineering for Internet of Things: Security Foundations, Lightweight Solutions, and Attacks.
ACM Trans. Embed. Comput. Syst., 2019
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019
Microprocess. Microsystems, 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Location, location, location: Revisiting modeling and exploitation for location-based side channel leakages.
IACR Cryptol. ePrint Arch., 2019
CSI NN: Reverse Engineering of Neural Network Architectures Through Electromagnetic Side Channel.
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 56th Annual Design Automation Conference 2019, 2019
Poster: Recovering the Input of Neural Networks via Single Shot Side-channel Attacks.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
CSI Neural Network: Using Side-channels to Recover Your Artificial Neural Network Information.
IACR Cryptol. ePrint Arch., 2018
Proceedings of the 2018 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2018
Design of a Fully Balanced ASIC Coprocessor Implementing Complete Addition Formulas on Weierstrass Elliptic Curves.
Proceedings of the 21st Euromicro Conference on Digital System Design, 2018
Proceedings of the Progress in Cryptology - AFRICACRYPT 2018, 2018
Proceedings of the Progress in Cryptology - AFRICACRYPT 2018, 2018
2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 2017 International Conference on Embedded Computer Systems: Architectures, 2017
Proceedings of the 27th International Conference on Field Programmable Logic and Applications, 2017
2016
\(\mu\)Kummer: efficient hyperelliptic signatures and key exchange on microcontrollers.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
CoRR, 2016
Appl. Soft Comput., 2016
Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust, 2016
Residue Number System as a side channel and fault injection attack countermeasure in elliptic curve cryptography.
Proceedings of the 2016 International Conference on Design and Technology of Integrated Systems in Nanoscale Era, 2016
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2016
Proceedings of the ACM International Conference on Computing Frontiers, CF'16, 2016
Proceedings of the 21st Asia and South Pacific Design Automation Conference, 2016
Proceedings of the Progress in Cryptology - AFRICACRYPT 2016, 2016
2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2015
Proceedings of the 2015 IEEE International Symposium on Circuits and Systems, 2015
Proceedings of the 2015 IEEE International Symposium on Circuits and Systems, 2015
Cartesian Genetic Programming Approach for Generating Substitution Boxes of Different Sizes.
Proceedings of the Genetic and Evolutionary Computation Conference, 2015
Proceedings of the Genetic and Evolutionary Computation Conference, 2015
Proceedings of the Genetic Programming - 18th European Conference, 2015
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2015
2014
S-box pipelining using genetic algorithms for high-throughput AES implementations: How fast can we go?
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Information Security Theory and Practice. Securing the Internet of Things, 2014
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2014
Combining Evolutionary Computation and Algebraic Constructions to Find Cryptography-Relevant Boolean Functions.
Proceedings of the Parallel Problem Solving from Nature - PPSN XIII, 2014
Proceedings of the Parallel Problem Solving from Nature - PPSN XIII, 2014
Proceedings of the 37th International Convention on Information and Communication Technology, 2014
Robustness Analysis of Real-Time Scheduling Against Differential Power Analysis Attacks.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2014
Proceedings of the Progress in Cryptology - INDOCRYPT 2014, 2014
Proceedings of the 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, 2014
On using genetic algorithms for intrinsic side-channel resistance: the case of AES S-box.
Proceedings of the First Workshop on Cryptography and Security in Computing Systems, 2014
Proceedings of the 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2014
An Elliptic Curve Cryptographic Processor Using Edwards Curves and the Number Theoretic Transform.
Proceedings of the Cryptography and Information Security in the Balkans, 2014
2013
Proceedings of the Handbook of Signal Processing Systems, 2013
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2013
Dietary Recommendations for Lightweight Block Ciphers: Power, Energy and Area Analysis of Recently Developed Architectures.
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Smart Card Research and Advanced Applications, 2013
2012
Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs.
Pers. Ubiquitous Comput., 2012
Proceedings of the Radio Frequency Identification. Security and Privacy Issues, 2012
PCA, Eigenvector Localization and Clustering for Side-Channel Attacks on Cryptographic Hardware Devices.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2012
Proceedings of the Measurement, Modelling, and Evaluation of Computing Systems and Dependability and Fault Tolerance, 2012
Getting More from PCA: First Results of Using Principal Component Analysis for Extensive Power Analysis.
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012
2011
Design and design methods for unified multiplier and inverter and its application for HECC.
Integr., 2011
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011
Proceedings of the RFID. Security and Privacy - 7th International Workshop, 2011
Proceedings of the Smart Card Research and Advanced Applications, 2011
2010
Anti-counterfeiting, Untraceability and Other Security Challenges for RFID Systems: Public-Key-Based Protocols and Hardware.
Proceedings of the Towards Hardware-Intrinsic Security - Foundations and Practice, 2010
Proceedings of the Third ACM Conference on Wireless Network Security, 2010
Proceedings of the Mobile Lightweight Wireless Systems, 2010
Proceedings of the Information Security - 13th International Conference, 2010
Proceedings of the 17th IEEE International Conference on Electronics, 2010
Proceedings of the International Conference on Field Programmable Logic and Applications, 2010
Proceedings of the Design, Automation and Test in Europe, 2010
Proceedings of the Smart Card Research and Advanced Application, 2010
Proceedings of the Secure Integrated Circuits and Systems, 2010
Proceedings of the Secure Integrated Circuits and Systems, 2010
Proceedings of the Handbook of Signal Processing Systems, 2010
2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2009), 2009
FPGA-based testing strategy for cryptographic chips: A case study on Elliptic Curve Processor for RFID tags.
Proceedings of the 15th IEEE International On-Line Testing Symposium (IOLTS 2009), 2009
Light-weight implementation options for curve-based cryptography: HECC is also ready for RFID.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009
2008
Hardware implementation of an elliptic curve processor over GF(p) with Montgomery modular multiplier.
Int. J. Embed. Syst., 2008
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008
Proceedings of the Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2008
Proceedings of the Information Security, 11th International Conference, 2008
Proceedings of the Design, Automation and Test in Europe, 2008
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008
Proceedings of the 19th IEEE International Conference on Application-Specific Systems, 2008
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008
2007
Multicore Curve-Based Cryptoprocessor with Reconfigurable Modular Arithmetic Logic Units over GF(2<sup>n</sup>).
IEEE Trans. Computers, 2007
Mob. Networks Appl., 2007
HW/SW co-design of a hyperelliptic curve cryptosystem using a microcode instruction set coprocessor.
Integr., 2007
IACR Cryptol. ePrint Arch., 2007
Comput. Electr. Eng., 2007
A Side-channel Attack Resistant Programmable PKC Coprocessor for Embedded Applications.
Proceedings of the 2007 International Conference on Embedded Computer Systems: Architectures, 2007
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2007), 2007
2006
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2006), 2006
Proceedings of the 2006 International Conference on Field Programmable Logic and Applications (FPL), 2006
Reconfigurable Architectures for Curve-Based Cryptography on Embedded Micro-Controllers.
Proceedings of the 2006 International Conference on Field Programmable Logic and Applications (FPL), 2006
Proceedings of the Security and Privacy in Ad-Hoc and Sensor Networks, 2006
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006
Reconfigurable Modular Arithmetic Logic Unit for High-Performance Public-Key Cryptosystems.
Proceedings of the Reconfigurable Computing: Architectures and Applications, 2006
Proceedings of the Reconfigurable Computing: Architectures and Applications, 2006
2005
Proceedings of the 11th IEEE International On-Line Testing Symposium (IOLTS 2005), 2005
Proceedings of the Topics in Cryptology, 2005
Hardware/Software Co-design for Hyperelliptic Curve Cryptography (HECC) on the 8051µP.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29, 2005
Side-channel aware design: Algorithms and Architectures for Elliptic Curve Cryptography over GF(2<sup>n</sup>).
Proceedings of the 16th IEEE International Conference on Application-Specific Systems, 2005
2004
Proceedings of the Topics in Cryptology, 2004
2003
Proceedings of the 17th International Parallel and Distributed Processing Symposium (IPDPS 2003), 2003
Proceedings of the 14th IEEE International Conference on Application-Specific Systems, 2003
2002
Proceedings of the Topics in Cryptology, 2002
2001
Efficient Implementation of Elliptic Curve Cryptosystems on an ARM7 with Hardware Accelerator.
Proceedings of the Information Security, 4th International Conference, 2001
Proceedings of the Cryptography and Coding, 2001