Search

Your search keyword '"Batina, Lejla"' showing total 748 results

Search Constraints

Start Over You searched for: Author "Batina, Lejla" Remove constraint Author: "Batina, Lejla"
748 results on '"Batina, Lejla"'

Search Results

1. Real-world Edge Neural Network Implementations Leak Private Interactions Through Physical Side Channel

2. Plan Your Defense: A Comparative Analysis of Leakage Detection Methods on RISC-V Cores

Catalog

Books, media, physical & digital resources

3. Side-Channel Attacks

6. CNN architecture extraction on edge GPU

7. BarraCUDA: Edge GPUs do Leak DNN Weights

8. Everything All at Once: Deep Learning Side-Channel Analysis Optimization Framework

9. PROACT - Physical Attack Resistance of Cryptographic Algorithms and Circuits with Reduced Time to Market

10. Playing with blocks: Toward re-usable deep learning models for side-channel profiled attacks

11. Breaking a fully Balanced ASIC Coprocessor Implementing Complete Addition Formulas on Weierstrass Elliptic Curves

12. Being Patient and Persistent: Optimizing An Early Stopping Strategy for Deep Learning in Profiled Attacks

13. Keep It Unbiased: A Comparison Between Estimation of Distribution Algorithms and Deep Learning for Human Interaction-Free Side-Channel Analysis

14. Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic Code

15. SoK: Design Tools for Side-Channel-Aware Implementations

16. Auto-tune POIs: Estimation of distribution algorithms for efficient side-channel analysis

17. Screen Gleaning: A Screen Reading TEMPEST Attack on Mobile Devices Exploiting an Electromagnetic Side Channel

18. The uncertainty of Side-Channel Analysis: A way to leverage from heuristics

19. On Implementation-Level Security of Edge-Based Machine Learning Models

20. Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers

22. ROCKY: Rotation Countermeasure for the Protection of Keys and Other Sensitive Data

23. Machine-Learning Assisted Side-Channel Attacks on RNS ECC Implementations Using Hybrid Feature Engineering

24. Fake It Till You Make It: Data Augmentation Using Generative Adversarial Networks for All the Crypto You Need on Small Devices

25. CSI Neural Network: Using Side-channels to Recover Your Artificial Neural Network Information

28. $\mu$Kummer: efficient hyperelliptic signatures and key exchange on microcontrollers

35. Online Template Attack on ECDSA : Extracting Keys via the Other Side

36. When Similarities Among Devices are Taken for Granted: Another Look at Portability

37. Friet: An Authenticated Encryption Scheme with Built-in Fault Detection

39. One Trace Is All It Takes: Machine Learning-Based Side-Channel Attack on EdDSA

40. Location, Location, Location: Revisiting Modeling and Exploitation for Location-Based Side Channel Leakages

43. SCA-Resistance for AES: How Cheap Can We Go?

44. Practical Fault Injection on Deterministic Signatures: The Case of EdDSA

45. Breaking Ed25519 in WolfSSL

48. LDA-Based Clustering as a Side-Channel Distinguisher

49. Bitsliced Masking and ARM: Friends or Foes?