Mutual information analysis: A generic side-channel distinguisher B Gierlichs, L Batina, P Tuyls, B Preneel International Workshop on Cryptographic Hardware and Embedded Systems, 426-442, 2008 | 869 | 2008 |
RFID-tags for anti-counterfeiting P Tuyls, L Batina Cryptographers’ track at the RSA conference, 115-131, 2006 | 558 | 2006 |
Mutual information analysis: a comprehensive study L Batina, B Gierlichs, E Prouff, M Rivain, FX Standaert, ... Journal of Cryptology 24 (2), 269-291, 2011 | 358 | 2011 |
Public-key cryptography for RFID-tags L Batina, J Guajardo, T Kerins, N Mentens, P Tuyls, I Verbauwhede Fifth Annual IEEE International Conference on Pervasive Computing and …, 2007 | 330 | 2007 |
{CSI}{NN}: Reverse engineering of neural network architectures through electromagnetic side channel L Batina, S Bhasin, D Jap, S Picek 28th USENIX Security Symposium (USENIX Security 19), 515-532, 2019 | 302* | 2019 |
Elliptic-curve-based security processor for RFID YK Lee, K Sakiyama, L Batina, I Verbauwhede IEEE Transactions on Computers 57 (11), 1514-1527, 2008 | 297 | 2008 |
A very compact “perfectly masked” S-box for AES D Canright, L Batina Applied Cryptography and Network Security: 6th International Conference …, 2008 | 223 | 2008 |
Low-cost elliptic curve cryptography for wireless sensor networks L Batina, N Mentens, K Sakiyama, B Preneel, I Verbauwhede European Workshop on Security in Ad-hoc and Sensor Networks, 6-17, 2006 | 190 | 2006 |
EC-RAC (ECDLP based randomized access control): Provably secure RFID authentication protocol YK Lee, L Batina, I Verbauwhede 2008 IEEE international conference on RFID, 97-104, 2008 | 172 | 2008 |
A systematic evaluation of compact hardware implementations for the Rijndael S-box N Mentens, L Batina, B Preneel, I Verbauwhede Topics in Cryptology–CT-RSA 2005: The Cryptographers’ Track at the RSA …, 2005 | 166 | 2005 |
Hardware architectures for public key cryptography L Batina, SB Örs, B Preneel, J Vandewalle Integration 34 (1-2), 1-64, 2003 | 165 | 2003 |
Identification via location-profiling in GSM networks Y De Mulder, G Danezis, L Batina, B Preneel Proceedings of the 7th ACM workshop on Privacy in the electronic society, 23-32, 2008 | 152 | 2008 |
Hardware implementation of an elliptic curve processor over GF (p) SB Ors, L Batina, B Preneel, J Vandewalle Proceedings IEEE International Conference on Application-Specific Systems …, 2003 | 147 | 2003 |
SmartCards and RFID L Batina, E Poll Course PowerPoint Presentation for IPA Security Course, Digital Security at …, 2019 | 143 | 2019 |
An elliptic curve processor suitable for RFID-tags L Batina, J Guajardo, T Kerins, N Mentens, P Tuyls, I Verbauwhede Cryptology EPrint Archive, 2006 | 141 | 2006 |
Revisiting higher-order DPA attacks: Multivariate mutual information analysis B Gierlichs, L Batina, B Preneel, I Verbauwhede Topics in Cryptology-CT-RSA 2010: The Cryptographers’ Track at the RSA …, 2010 | 123 | 2010 |
Low-cost untraceable authentication protocols for RFID YK Lee, L Batina, D Singelée, I Verbauwhede Proceedings of the third ACM conference on Wireless network security, 55-64, 2010 | 119 | 2010 |
Complete addition formulas for prime order elliptic curves J Renes, C Costello, L Batina Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016 | 114 | 2016 |
Getting more from PCA: first results of using principal component analysis for extensive power analysis L Batina, J Hogenboom, JGJ van Woudenberg Topics in Cryptology–CT-RSA 2012: The Cryptographers’ Track at the RSA …, 2012 | 105 | 2012 |
Hardware implementation of a Montgomery modular multiplier in a systolic array SB Ors, L Batina, B Preneel, J Vandewalle Proceedings International Parallel and Distributed Processing Symposium, 8 pp., 2003 | 101 | 2003 |