Lejla Batina,
Lejla Batina,
Professor, applied cryptography and embedded systems security, Radboud University, The Netherlands
Verified email at - Homepage
Cited by
Cited by
Mutual information analysis: A generic side-channel distinguisher
B Gierlichs, L Batina, P Tuyls, B Preneel
International Workshop on Cryptographic Hardware and Embedded Systems, 426-442, 2008
RFID-tags for anti-counterfeiting
P Tuyls, L Batina
Cryptographers’ track at the RSA conference, 115-131, 2006
Mutual information analysis: a comprehensive study
L Batina, B Gierlichs, E Prouff, M Rivain, FX Standaert, ...
Journal of Cryptology 24 (2), 269-291, 2011
Public-key cryptography for RFID-tags
L Batina, J Guajardo, T Kerins, N Mentens, P Tuyls, I Verbauwhede
Fifth Annual IEEE International Conference on Pervasive Computing and …, 2007
{CSI}{NN}: Reverse engineering of neural network architectures through electromagnetic side channel
L Batina, S Bhasin, D Jap, S Picek
28th USENIX Security Symposium (USENIX Security 19), 515-532, 2019
Elliptic-curve-based security processor for RFID
YK Lee, K Sakiyama, L Batina, I Verbauwhede
IEEE Transactions on Computers 57 (11), 1514-1527, 2008
A very compact “perfectly masked” S-box for AES
D Canright, L Batina
Applied Cryptography and Network Security: 6th International Conference …, 2008
Low-cost elliptic curve cryptography for wireless sensor networks
L Batina, N Mentens, K Sakiyama, B Preneel, I Verbauwhede
European Workshop on Security in Ad-hoc and Sensor Networks, 6-17, 2006
EC-RAC (ECDLP based randomized access control): Provably secure RFID authentication protocol
YK Lee, L Batina, I Verbauwhede
2008 IEEE international conference on RFID, 97-104, 2008
A systematic evaluation of compact hardware implementations for the Rijndael S-box
N Mentens, L Batina, B Preneel, I Verbauwhede
Topics in Cryptology–CT-RSA 2005: The Cryptographers’ Track at the RSA …, 2005
Hardware architectures for public key cryptography
L Batina, SB Örs, B Preneel, J Vandewalle
Integration 34 (1-2), 1-64, 2003
Identification via location-profiling in GSM networks
Y De Mulder, G Danezis, L Batina, B Preneel
Proceedings of the 7th ACM workshop on Privacy in the electronic society, 23-32, 2008
Hardware implementation of an elliptic curve processor over GF (p)
SB Ors, L Batina, B Preneel, J Vandewalle
Proceedings IEEE International Conference on Application-Specific Systems …, 2003
SmartCards and RFID
L Batina, E Poll
Course PowerPoint Presentation for IPA Security Course, Digital Security at …, 2019
An elliptic curve processor suitable for RFID-tags
L Batina, J Guajardo, T Kerins, N Mentens, P Tuyls, I Verbauwhede
Cryptology EPrint Archive, 2006
Revisiting higher-order DPA attacks: Multivariate mutual information analysis
B Gierlichs, L Batina, B Preneel, I Verbauwhede
Topics in Cryptology-CT-RSA 2010: The Cryptographers’ Track at the RSA …, 2010
Low-cost untraceable authentication protocols for RFID
YK Lee, L Batina, D Singelée, I Verbauwhede
Proceedings of the third ACM conference on Wireless network security, 55-64, 2010
Complete addition formulas for prime order elliptic curves
J Renes, C Costello, L Batina
Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016
Getting more from PCA: first results of using principal component analysis for extensive power analysis
L Batina, J Hogenboom, JGJ van Woudenberg
Topics in Cryptology–CT-RSA 2012: The Cryptographers’ Track at the RSA …, 2012
Hardware implementation of a Montgomery modular multiplier in a systolic array
SB Ors, L Batina, B Preneel, J Vandewalle
Proceedings International Parallel and Distributed Processing Symposium, 8 pp., 2003
The system can't perform the operation now. Try again later.
Articles 1–20