Dismantling megamos crypto: Wirelessly lockpicking a vehicle immobilizer R Verdult, FD Garcia, B Ege Supplement to the Proceedings of 22nd USENIX Security Symposium (Supplement …, 2015 | 163 | 2015 |
Dietary recommendations for lightweight block ciphers: power, energy and area analysis of recently developed architectures L Batina, A Das, B Ege, EB Kavun, N Mentens, C Paar, I Verbauwhede, ... Radio Frequency Identification: Security and Privacy Issues 9th …, 2013 | 79 | 2013 |
Confused by confusion: Systematic evaluation of DPA resistance of various s-boxes S Picek, K Papagiannopoulos, B Ege, L Batina, D Jakobovic International Conference on Cryptology in India, 374-390, 2014 | 73 | 2014 |
Compact implementation and performance evaluation of hash functions in attiny devices J Balasch, B Ege, T Eisenbarth, B Gérard, Z Gong, T Güneysu, S Heyse, ... Smart Card Research and Advanced Applications: 11th International Conference …, 2013 | 71 | 2013 |
S-box, SET, match: a toolbox for S-box analysis S Picek, L Batina, D Jakobović, B Ege, M Golub Information Security Theory and Practice. Securing the Internet of Things …, 2014 | 68 | 2014 |
Cryptographic randomness testing of block ciphers and hash functions A Doğanaksoy, B Ege, O Koçak, F Sulak Cryptology ePrint Archive, 2010 | 53 | 2010 |
Clock glitch attacks in the presence of heating T Korak, M Hutter, B Ege, L Batina 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, 104-114, 2014 | 50 | 2014 |
Security analysis of industrial test compression schemes A Das, B Ege, S Ghosh, L Batina, I Verbauwhede IEEE transactions on computer-aided design of integrated circuits and …, 2013 | 46 | 2013 |
On using genetic algorithms for intrinsic side-channel resistance: the case of AES s-box S Picek, B Ege, L Batina, D Jakobovic, Ł Chmielewski, M Golub Proceedings of the First Workshop on Cryptography and Security in Computing …, 2014 | 45 | 2014 |
Evaluation of randomness test results for short sequences F Sulak, A Doğanaksoy, B Ege, O Koçak Sequences and Their Applications–SETA 2010, 309-319, 2010 | 44 | 2010 |
Optimality and beyond: The case of 4× 4 S-boxes S Picek, B Ege, K Papagiannopoulos, L Batina, D Jakobović 2014 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2014 | 36 | 2014 |
Differential scan attack on AES with X-tolerant and X-masked test response compactor B Ege, A Das, S Gosh, I Verbauwhede 2012 15th Euromicro Conference on Digital System Design, 545-552, 2012 | 30 | 2012 |
Architecture correlation analysis (ACA): Identifying the source of side-channel leakage at gate-level Y Yao, T Kathuria, B Ege, P Schaumont 2020 IEEE International Symposium on Hardware Oriented Security and Trust …, 2020 | 25 | 2020 |
Neural network model assessment for side-channel analysis G Perin, B Ege, L Chmielewski Cryptology ePrint Archive, 2019 | 23 | 2019 |
Lowering the bar: Deep learning for side-channel analysis (white-paper) G Perin, B Ege, J van Woudenberg Proc. BlackHat, 1-15, 2018 | 20 | 2018 |
Statistical analysis of reduced round compression functions of SHA-3 second round candidates A Doğanaksoy, B Ege, O Koçak, F Sulak Cryptology ePrint Archive, 2010 | 20 | 2010 |
Extended results for independence and sensitivity of NIST randomness tests A Doganaksoy, B Ege, K Mus Information Security and Cryptography Conference, ISC Turkey, 25-27, 2008 | 17 | 2008 |
Improving DPA resistance of S-boxes: How far can we go? B Ege, K Papagiannopoulos, L Batina, S Picek 2015 IEEE International Symposium on Circuits and Systems (ISCAS), 2013-2016, 2015 | 12 | 2015 |
Memory encryption for smart cards B Ege, EB Kavun, T Yalçın Smart Card Research and Advanced Applications: 10th IFIP WG 8.8/11.2 …, 2011 | 12 | 2011 |
Pre-silicon architecture correlation analysis (PACA): Identifying and mitigating the source of side-channel leakage at gate-level Y Yao, T Tufan, T Kathuria, B Ege, U Guler, P Schaumont Cryptology ePrint Archive, 2021 | 8 | 2021 |