Confused by confusion: Systematic evaluation of DPA resistance of various s-boxes S Picek, K Papagiannopoulos, B Ege, L Batina, D Jakobovic International Conference on Cryptology in India, 374-390, 2014 | 73 | 2014 |
Mind the gap: Towards secure 1st-order masking in software K Papagiannopoulos, N Veshchikov Constructive Side-Channel Analysis and Secure Design: 8th International …, 2017 | 65 | 2017 |
Friet: An Authenticated Encryption Scheme with Built-in Fault Detection T Simon, L Batina, J Daemen, V Grosso, PMC Massolino, ... Annual International Conference on the Theory and Applications of …, 2020 | 36 | 2020 |
Optimality and beyond: The case of 4× 4 S-boxes S Picek, B Ege, K Papagiannopoulos, L Batina, D Jakobović 2014 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2014 | 36 | 2014 |
Side-channel based intrusion detection for industrial control systems P Van Aubel, K Papagiannopoulos, Ł Chmielewski, C Doerr Critical Information Infrastructures Security: 12th International Conference …, 2018 | 26 | 2018 |
Instruction duplication: Leaky and not too fault-tolerant! L Cojocar, K Papagiannopoulos, N Timmers Smart Card Research and Advanced Applications: 16th International Conference …, 2018 | 23 | 2018 |
Bitsliced masking and ARM: Friends or foes? W de Groot, K Papagiannopoulos, A de La Piedra, E Schneider, L Batina Lightweight Cryptography for Security and Privacy: 5th International …, 2017 | 19 | 2017 |
Practical evaluation of protected residue number system scalar multiplication L Papachristodoulou, AP Fournaris, K Papagiannopoulos, L Batina | 18 | 2019 |
Vectorizing higher-order masking B Grégoire, K Papagiannopoulos, P Schwabe, K Stoffelen Constructive Side-Channel Analysis and Secure Design: 9th International …, 2018 | 18 | 2018 |
Location, location, location: Revisiting modeling and exploitation for location-based side channel leakages C Andrikos, L Batina, L Chmielewski, L Lerman, V Mavroudis, ... Advances in Cryptology–ASIACRYPT 2019: 25th International Conference on the …, 2019 | 16 | 2019 |
How old is your brain? Slow-wave activity in non-rapid-eye-movement sleep as a marker of brain rejuvenation after long-term exercise in mice M Panagiotou, K Papagiannopoulos, JHT Rohling, JH Meijer, T Deboer Frontiers in Aging Neuroscience 10, 233, 2018 | 15 | 2018 |
The side-channel metrics cheat sheet K Papagiannopoulos, O Glamočanin, M Azouaoui, D Ros, F Regazzoni, ... ACM Computing Surveys 55 (10), 1-38, 2023 | 14 | 2023 |
Towards lightweight cryptographic primitives with built-in fault-detection T Simon, L Batina, J Daemen, V Grosso, PMC Massolino, ... Cryptology ePrint Archive, 2018 | 14 | 2018 |
Bitslice masking and improved shuffling: How and when to mix them in software? M Azouaoui, O Bronchain, V Grosso, K Papagiannopoulos, FX Standaert IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022 | 12 | 2022 |
Improving DPA resistance of S-boxes: How far can we go? B Ege, K Papagiannopoulos, L Batina, S Picek 2015 IEEE International Symposium on Circuits and Systems (ISCAS), 2013-2016, 2015 | 12 | 2015 |
Blind side-channel SIFA M Azouaoui, K Papagiannopoulos, D Zürner 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE), 555-560, 2021 | 10 | 2021 |
Low randomness masking and shuffling: An evaluation using mutual information K Papagiannopoulos IACR Transactions on Cryptographic Hardware and Embedded Systems, 524-546, 2018 | 8 | 2018 |
On the worst-case side-channel security of ECC point randomization in embedded devices M Azouaoui, F Durvaux, R Poussier, FX Standaert, K Papagiannopoulos, ... Progress in Cryptology–INDOCRYPT 2020: 21st International Conference on …, 2020 | 7 | 2020 |
Boolean exponent splitting M Tunstall, L Papachristodoulou, K Papagiannopoulos Cryptology ePrint Archive, 2018 | 4 | 2018 |
Low-latency implementation of the GIFT cipher on RISC-V architectures G Pojoga, K Papagiannopoulos Proceedings of the 19th ACM International Conference on Computing Frontiers …, 2022 | 3 | 2022 |