What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Lejla Batina
Google Scholar
57
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tches
A5/3 make or break: A massively parallel FPGA architecture for exhaustive key search.
Konstantina Miteloudi
Lejla Batina
Nele Mentens
2025
journals/tches
Probing Secure Composability Without Fresh Randomness: Theory and Application to Ascon.
Vahid Jahandideh
Bart Mennink
Lejla Batina
2025
conf/uss
BarraCUDA: Edge GPUs do Leak DNN Weights.
Péter Horváth
Lukasz Chmielewski
Léo Weissbart
Lejla Batina
Yuval Yarom
2024
journals/tches
An Algebraic Approach for Evaluating Random Probing Security With Application to AES.
Vahid Jahandideh
Bart Mennink
Lejla Batina
2024
conf/ccs
ASHES '24: Workshop on Attacks and Solutions in Hardware Security.
Lejla Batina
Chip-Hong Chang
Ulrich Rührmair
Jakub Szefer
2024
conf/uss
SoK: Neural Network Extraction Through Physical Side Channels.
Péter Horváth
Dirk Lauret
Zhuoran Liu
Lejla Batina
2024
conf/acns
CNN Architecture Extraction on Edge GPU.
Péter Horváth
Lukasz Chmielewski
Leo Weissbart
Lejla Batina
Yuval Yarom
2024
conf/acns
Everything All at Once: Deep Learning Side-Channel Analysis Optimization Framework.
Gabriele Serafini
Léo Weissbart
Lejla Batina
2024
conf/asiaccs
ABBY: Automating leakage modelling for side-channel analysis.
Omid Bazangani
Alexandre Iooss
Ileana Buhan
Lejla Batina
2023
journals/tches
SoK: SCA-secure ECC in software - mission impossible?
Lejla Batina
Lukasz Chmielewski
Björn Haase
Niels Samwel
Peter Schwabe
2023
journals/tifs
Label Correlation in Deep Learning-Based Side-Channel Analysis.
Lichao Wu
Léo Weissbart
Marina Krcek
Huimin Li
Guilherme Perin
Lejla Batina
Stjepan Picek
2023
conf/ccs
ASHES '23: Workshop on Attacks and Solutions in Hardware Security.
Lejla Batina
Chip-Hong Chang
Domenic Forte
Ulrich Rührmair
2022
journals/tifs
Playing With Blocks: Toward Re-Usable Deep Learning Models for Side-Channel Profiled Attacks.
Servio Paguada
Lejla Batina
Ileana Buhan
Igor Armendariz
2022
journals/tifs
Towards Human Dependency Elimination: AI Approach to SCA Robustness Assessment.
Unai Rioja
Lejla Batina
Igor Armendariz
Jose Luis Flores
2022
conf/acns
Deep Neural Networks Aiding Cryptanalysis: A Case Study of the Speck Distinguisher.
Nicoleta-Norica Bacuieti
Lejla Batina
Stjepan Picek
2022
conf/asiaccs
SoK: Design Tools for Side-Channel-Aware Implementations.
Ileana Buhan
Lejla Batina
Yuval Yarom
Patrick Schaumont
2022
conf/ctrsa
Fake It Till You Make It: Data Augmentation Using Generative Adversarial Networks for All the Crypto You Need on Small Devices.
Naila Mukhtar
Lejla Batina
Stjepan Picek
Yinan Kong
2021
journals/tches
Keep it Unsupervised: Horizontal Attacks Meet Deep Learning.
Guilherme Perin
Lukasz Chmielewski
Lejla Batina
Stjepan Picek
2021
conf/ccs
Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic Code.
Madura A. Shelton
Lukasz Chmielewski
Niels Samwel
Markus Wagner
Lejla Batina
Yuval Yarom
2021
conf/ndss
Screen Gleaning: A Screen Reading TEMPEST Attack on Mobile Devices Exploiting an Electromagnetic Side Channel.
Zhuoran Liu
Niels Samwel
Leo Weissbart
Zhengyu Zhao
Dirk Lauret
Lejla Batina
Martha A. Larson
2021
conf/ndss
Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers.
Madura A. Shelton
Niels Samwel
Lejla Batina
Francesco Regazzoni
Markus Wagner
Yuval Yarom
2020
journals/tches
A Compact and Scalable Hardware/Software Co-design of SIKE.
Pedro Maat C. Massolino
Patrick Longa
Joost Renes
Lejla Batina
2020
conf/eurocrypt
Friet: An Authenticated Encryption Scheme with Built-in Fault Detection.
Thierry Simon
Lejla Batina
Joan Daemen
Vincent Grosso
Pedro Maat Costa Massolino
Kostas Papagiannopoulos
Francesco Regazzoni
Niels Samwel
2020
conf/africacrypt
Online Template Attack on ECDSA: - Extracting Keys via the Other Side.
Niels Roelofs
Niels Samwel
Lejla Batina
Joan Daemen
2020
conf/africacrypt
When Similarities Among Devices are Taken for Granted: Another Look at Portability.
Unai Rioja
Lejla Batina
Igor Armendariz
2019
journals/tches
Practical Evaluation of Protected Residue Number System Scalar Multiplication.
Louiza Papachristodoulou
Apostolos P. Fournaris
Kostas Papagiannopoulos
Lejla Batina
2019
conf/ccs
Poster: Recovering the Input of Neural Networks via Single Shot Side-channel Attacks.
Lejla Batina
Shivam Bhasin
Dirmanto Jap
Stjepan Picek
2019
conf/uss
CSI NN: Reverse Engineering of Neural Network Architectures Through Electromagnetic Side Channel.
Lejla Batina
Shivam Bhasin
Dirmanto Jap
Stjepan Picek
2019
conf/asiacrypt
Location, Location, Location: Revisiting Modeling and Exploitation for Location-Based Side Channel Leakages.
Christos Andrikos
Lejla Batina
Lukasz Chmielewski
Liran Lerman
Vasilios Mavroudis
Kostas Papagiannopoulos
Guilherme Perin
Giorgos Rassias
Alberto Sonnino
2018
conf/ctrsa
Breaking Ed25519 in WolfSSL.
Niels Samwel
Lejla Batina
Guido Bertoni
Joan Daemen
Ruggero Susella
2018
conf/fdtc
Genetic Algorithm-Based Electromagnetic Fault Injection.
Antun Maldini
Niels Samwel
Stjepan Picek
Lejla Batina
2018
conf/africacrypt
SCA-Resistance for AES: How Cheap Can We Go?
Ricardo Chaves
Lukasz Chmielewski
Francesco Regazzoni
Lejla Batina
2018
conf/africacrypt
Practical Fault Injection on Deterministic Signatures: The Case of EdDSA.
Niels Samwel
Lejla Batina
2016
conf/lightsec
Bitsliced Masking and ARM: Friends or Foes?
Wouter de Groot
Kostas Papagiannopoulos
Antonio de la Piedra
Erik Schneider
Lejla Batina
2016
conf/ches
\mu Kummer: Efficient Hyperelliptic Signatures and Key Exchange on Microcontrollers.
Joost Renes
Peter Schwabe
Benjamin Smith
Lejla Batina
2016
conf/host
Template attacks using classification algorithms.
Elif Ozgen
Louiza Papachristodoulou
Lejla Batina
2016
conf/eurocrypt
Complete Addition Formulas for Prime Order Elliptic Curves.
Joost Renes
Craig Costello
Lejla Batina
2016
conf/africacrypt
Extreme Pipelining Towards the Best Area-Performance Trade-Off in Hardware.
Stjepan Picek
Dominik Sisejkovic
Domagoj Jakobovic
Lejla Batina
Bohan Yang
Danilo Sijacic
Nele Mentens
2015
conf/sacrypt
Near Collision Side Channel Attacks.
Baris Ege
Thomas Eisenbarth
Lejla Batina
2014
conf/host
Optimality and beyond: The case of 4×4 S-boxes.
Stjepan Picek
Baris Ege
Kostas Papagiannopoulos
Lejla Batina
Domagoj Jakobovic
2014
conf/fdtc
Clock Glitch Attacks in the Presence of Heating.
Thomas Korak
Michael Hutter
Baris Ege
Lejla Batina
2012
conf/ctrsa
Power Analysis of Atmel CryptoMemory - Recovering Keys from Secure EEPROMs.
Josep Balasch
Benedikt Gierlichs
Roel Verdult
Lejla Batina
Ingrid Verbauwhede
2012
conf/ctrsa
Getting More from PCA: First Results of Using Principal Component Analysis for Extensive Power Analysis.
Lejla Batina
Jip Hogenboom
Jasper G. J. van Woudenberg
2011
journals/joc
Mutual Information Analysis: a Comprehensive Study.
Lejla Batina
Benedikt Gierlichs
Emmanuel Prouff
Matthieu Rivain
François-Xavier Standaert
Nicolas Veyrat-Charvillon
2011
conf/wisec
The communication and computation cost of wireless security: extended abstract.
Dave Singelée
Stefaan Seys
Lejla Batina
Ingrid Verbauwhede
2010
conf/ctrsa
Revisiting Higher-Order DPA Attacks: .
Benedikt Gierlichs
Lejla Batina
Bart Preneel
Ingrid Verbauwhede
2010
conf/wisec
Low-cost untraceable authentication protocols for RFID.
Yong Ki Lee
Lejla Batina
Dave Singelée
Ingrid Verbauwhede
2009
conf/ches
Differential Cluster Analysis.
Lejla Batina
Benedikt Gierlichs
Kerstin Lemke-Rust
2008
conf/acns
A Very Compact "Perfectly Masked" S-Box for AES.
David Canright
Lejla Batina
2008
conf/ches
Mutual Information Analysis.
Benedikt Gierlichs
Lejla Batina
Pim Tuyls
Bart Preneel
2008
conf/sacrypt
HECC Goes Embedded: An Area-Efficient Implementation of HECC.
Junfeng Fan
Lejla Batina
Ingrid Verbauwhede
2006
conf/ches
Superscalar Coprocessor for High-Speed Curve-Based Cryptography.
Kazuo Sakiyama
Lejla Batina
Bart Preneel
Ingrid Verbauwhede
2006
conf/ctrsa
RFID-Tags for Anti-counterfeiting.
Pim Tuyls
Lejla Batina
2005
conf/ches
Hardware/Software Co-design for Hyperelliptic Curve Cryptography (HECC) on the 8051µP.
Lejla Batina
David Hwang
Alireza Hodjat
Bart Preneel
Ingrid Verbauwhede
2005
conf/ctrsa
A Systematic Evaluation of Compact Hardware Implementations for the Rijndael S-Box.
Nele Mentens
Lejla Batina
Bart Preneel
Ingrid Verbauwhede
2004
conf/ctrsa
Flexible Hardware Design for RSA and Elliptic Curve Cryptosystems.
Lejla Batina
Geeke Bruin-Muurling
Siddika Berna Örs
2002
conf/ctrsa
Montgomery in Practice: How to Do It More Efficiently in Hardware.
Lejla Batina
Geeke Muurling
Coauthors
Alberto Sonnino
(1)
Alexandre Iooss
(1)
Alireza Hodjat
(1)
Antonio de la Piedra
(1)
Antun Maldini
(1)
Apostolos P. Fournaris
(1)
Baris Ege
(3)
Bart Mennink
(2)
Bart Preneel
(5)
Benedikt Gierlichs
(5)
Benjamin Smith
(1)
Björn Haase
(1)
Bohan Yang
(1)
Chip-Hong Chang
(2)
Christos Andrikos
(1)
Craig Costello
(1)
Danilo Sijacic
(1)
Dave Singelée
(2)
David Canright
(1)
David Hwang
(1)
Dirk Lauret
(2)
Dirmanto Jap
(2)
Domagoj Jakobovic
(2)
Domenic Forte
(1)
Dominik Sisejkovic
(1)
Elif Ozgen
(1)
Emmanuel Prouff
(1)
Erik Schneider
(1)
Francesco Regazzoni
(3)
François-Xavier Standaert
(1)
Gabriele Serafini
(1)
Geeke Bruin-Muurling
(1)
Geeke Muurling
(1)
Giorgos Rassias
(1)
Guido Bertoni
(1)
Guilherme Perin
(3)
Huimin Li
(1)
Igor Armendariz
(3)
Ileana Buhan
(3)
Ingrid Verbauwhede
(8)
Jakub Szefer
(1)
Jasper G. J. van Woudenberg
(1)
Jip Hogenboom
(1)
Joan Daemen
(3)
Joost Renes
(3)
Jose Luis Flores
(1)
Josep Balasch
(1)
Junfeng Fan
(1)
Kazuo Sakiyama
(1)
Kerstin Lemke-Rust
(1)
Konstantina Miteloudi
(1)
Kostas Papagiannopoulos
(5)
Lejla Batina
(57)
Léo Weissbart
(5)
Lichao Wu
(1)
Liran Lerman
(1)
Louiza Papachristodoulou
(2)
Lukasz Chmielewski
(7)
Madura A. Shelton
(2)
Marina Krcek
(1)
Markus Wagner
(2)
Martha A. Larson
(1)
Matthieu Rivain
(1)
Michael Hutter
(1)
Naila Mukhtar
(1)
Nele Mentens
(3)
Nicolas Veyrat-Charvillon
(1)
Nicoleta-Norica Bacuieti
(1)
Niels Roelofs
(1)
Niels Samwel
(9)
Omid Bazangani
(1)
Patrick Longa
(1)
Patrick Schaumont
(1)
Pedro Maat C. Massolino
(1)
Pedro Maat Costa Massolino
(1)
Péter Horváth
(3)
Peter Schwabe
(2)
Pim Tuyls
(2)
Ricardo Chaves
(1)
Roel Verdult
(1)
Ruggero Susella
(1)
Servio Paguada
(1)
Shivam Bhasin
(2)
Siddika Berna Örs
(1)
Stefaan Seys
(1)
Stjepan Picek
(9)
Thierry Simon
(1)
Thomas Eisenbarth
(1)
Thomas Korak
(1)
Ulrich Rührmair
(2)
Unai Rioja
(2)
Vahid Jahandideh
(2)
Vasilios Mavroudis
(1)
Vincent Grosso
(1)
Wouter de Groot
(1)
Yinan Kong
(1)
Yong Ki Lee
(1)
Yuval Yarom
(5)
Zhengyu Zhao
(1)
Zhuoran Liu
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to