Skip to main content

previous disabled Page of 5
and
  1. No Access

    Chapter and Conference Paper

    PROACT - Physical Attack Resistance of Cryptographic Algorithms and Circuits with Reduced Time to Market

    Electronic devices that populate the Internet of Things play increasingly important roles in our everyday lives. When these devices process, store, or communicate personal or company-critical data, digital sec...

    Asmita Adhikary, Abraham Basurto in Applied Reconfigurable Computing. Architec… (2024)

  2. No Access

    Book and Conference Proceedings

    Applied Cryptography and Network Security

    22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part I

    Christina Pöpper, Lejla Batina in Lecture Notes in Computer Science (2024)

  3. No Access

    Book and Conference Proceedings

    Applied Cryptography and Network Security

    22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part II

    Christina Pöpper, Lejla Batina in Lecture Notes in Computer Science (2024)

  4. No Access

    Book and Conference Proceedings

    Applied Cryptography and Network Security

    22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part III

    Christina Pöpper, Lejla Batina in Lecture Notes in Computer Science (2024)

  5. No Access

    Chapter and Conference Paper

    CNN Architecture Extraction on Edge GPU

    Neural networks have become popular due to their versatility and state-of-the-art results in many applications, such as image classification, natural language processing, speech recognition, forecasting, etc. ...

    Péter Horváth, Lukasz Chmielewski in Applied Cryptography and Network Security … (2024)

  6. No Access

    Chapter and Conference Paper

    Everything All at Once: Deep Learning Side-Channel Analysis Optimization Framework

    Deep learning is becoming an increasingly proficient tool for side-channel analysis. While deep learning has been evolving around the tasks of image and speech recognition for decades, it is still lacking matu...

    Gabriele Serafini, Léo Weissbart in Applied Cryptography and Network Security … (2024)

  7. No Access

    Article

    Keep it unbiased: a comparison between estimation of distribution algorithms and deep learning for human interaction-free side-channel analysis

    Evaluating side-channel analysis (SCA) security is a complex process, involving applying several techniques whose success depends on human engineering. Therefore, it is crucial to avoid a false sense of confid...

    Unai Rioja, Lejla Batina, Igor Armendariz in Journal of Cryptographic Engineering (2023)

  8. No Access

    Living Reference Work Entry In depth

    Side-Channel Attacks

    Lejla Batina, Ileana Buhan in Encyclopedia of Cryptography, Security and Privacy

  9. No Access

    Book and Conference Proceedings

    Applied Cryptography and Network Security Workshops

    ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19–22, 2023, Proceedings

    Jianying Zhou, Lejla Batina in Lecture Notes in Computer Science (2023)

  10. No Access

    Chapter and Conference Paper

    ROCKY: Rotation Countermeasure for the Protection of Keys and Other Sensitive Data

    Fault attacks exploit the possibility to inject a fault in an electronic device, during the execution of a cryptographic algorithm, leading the device to erroneous operation(s). An adversary can exploit these...

    Konstantina Miteloudi, Lejla Batina in Embedded Computer Systems: Architectures, … (2022)

  11. No Access

    Book and Conference Proceedings

    Applied Cryptography and Network Security Workshops

    ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Rome, Italy, June 20–23, 2022, Proceedings

    Jianying Zhou, Sridhar Adepu in Lecture Notes in Computer Science (2022)

  12. No Access

    Book and Conference Proceedings

    Security, Privacy, and Applied Cryptography Engineering

    12th International Conference, SPACE 2022, Jaipur, India, December 9–12, 2022, Proceedings

    Lejla Batina, Stjepan Picek in Lecture Notes in Computer Science (2022)

  13. No Access

    Chapter

    On Implementation-Level Security of Edge-Based Machine Learning Models

    In this chapter, we are considering the physical security of Machine Learning (ML) implementations on Edge Devices. We list the state-of-the-art known physical attacks, with the main attack objectives to rever...

    Lejla Batina, Shivam Bhasin, Jakub Breier in Security and Artificial Intelligence (2022)

  14. No Access

    Chapter and Conference Paper

    Fake It Till You Make It: Data Augmentation Using Generative Adversarial Networks for All the Crypto You Need on Small Devices

    Deep learning-based side-channel analysis performance heavily depends on the dataset size and the number of instances in each target class. Both small and imbalanced datasets might lead to unsuccessful side-ch...

    Naila Mukhtar, Lejla Batina, Stjepan Picek in Topics in Cryptology – CT-RSA 2022 (2022)

  15. No Access

    Book and Conference Proceedings

    Progress in Cryptology - AFRICACRYPT 2022

    13th International Conference on Cryptology in Africa, AFRICACRYPT 2022, Fes, Morocco, July 18–20, 2022, Proceedings

    Lejla Batina, Joan Daemen in Lecture Notes in Computer Science (2022)

  16. No Access

    Chapter and Conference Paper

    Machine-Learning Assisted Side-Channel Attacks on RNS ECC Implementations Using Hybrid Feature Engineering

    Machine learning-based side-channel attacks have recently been introduced to recover the secret information from protected software and hardware implementations. Limited research exists for public-key algorith...

    Naila Mukhtar, Louiza Papachristodoulou in Constructive Side-Channel Analysis and Sec… (2022)

  17. No Access

    Chapter and Conference Paper

    Deep Neural Networks Aiding Cryptanalysis: A Case Study of the Speck Distinguisher

    At CRYPTO’19, A. Gohr proposed neural distinguishers for the lightweight block cipher Speck32/64, achieving better results than the state-of-the-art at that point. However, the motivation for using that partic...

    Norica Băcuieți, Lejla Batina, Stjepan Picek in Applied Cryptography and Network Security (2022)

  18. Chapter

    It Started with Templates: The Future of Profiling in Side-Channel Analysis

    Side-channel attacks (SCAs) are powerful attacks based on the information obtained from the implementation of cryptographic devices. Profiling side-channel attacks has received a lot of attention in recent yea...

    Lejla Batina, Milena Djukanovic, Annelie Heuser in Security of Ubiquitous Computing Systems (2021)

  19. Article

    Open Access

    Systematic Side-Channel Analysis of Curve25519 with Machine Learning

    Profiling attacks, especially those based on machine learning, proved to be very successful techniques in recent years when considering the side-channel analysis of symmetric-key crypto implementations. At the...

    Léo Weissbart, Łukasz Chmielewski in Journal of Hardware and Systems Security (2020)

  20. Article

    PROOFS 2018 Editorial

    Lejla Batina, Nele Mentens in Journal of Cryptographic Engineering (2020)

previous disabled Page of 5