Skip to content
- Abolfazl Sajadi, Nusa Zidaric, Todor Stefanov, Nele Mentens,
A Systematic Comparison of Side-channel Countermeasures for RISC-V-based SoCs,
2024 IEEE Nordic Circuits and Systems Conference (NorCAS), October 2024 10.1109/NorCAS64408.2024.10752477
- Lichao Wu, Sébastien Tiran, Guilherme Perin, Stjepan Picek,
Plaintext-based Side-channel Collision Attack,
IACR Communications in Cryptology, vol.1, no.3, October 2024 10.62056/a36cy7qiu
- Lichao Wu, Azade Rezaeezade, Amir Ali-pour, Guilherme Perin, Stjepan Picek,
Leakage Model-flexible Deep Learning-based Side-channel Analysis,
IACR Communications in Cryptology, vol.1, no.3, October 2024, 10.62056/ay4c3txol7
- Vahid Jahandideh, Bart Mennink, Lejla Batina,
An Algebraic Approach for Evaluating Random Probing Security With Application to AES,
IACR TCHES, 2024(4), 657-689, September 2024, 10.46586/tches.v2024.i4.657-689
- Péter Horváth, Dirk Lauret, Zhuoran Liu, and Lejla Batina,
SoK: Neural Network Extraction Through Physical Side Channels,
SEC ’24: Proc.33rd USENIX Security Symposium, pp.3403–3422, August 2024, 10.5555/3698900.3699091
- Azade Rezaeezade, Lejla Batina,
Regularizers to the Rescue: Fighting Overfitting in Deep Learning-based Side-channel Analysis,
J Cryptogr Eng 14, 609–629 (2024), July 2024, 10.1007/s13389-024-00361-5
- Mick G.D. Remmerswaal, Lichao Wu, Sébastien Tiran, Nele Mentens
AutoPOI: automated points of interest selection for side-channel analysis,
J Cryptogr Eng 14, 463–474 (2024), July 2023, 10.1007/s13389-023-00328-y
- Omid Bazangani, Alexandre Iooss, Ileana Buhan, Lejla Batina,
ABBY: Automating leakage modelling for side-channel analysis,
Proc. 19th ACM Asia Conf on Computer and Comm Security (ASIA CCS ’24), July 2024, 10.1145/3634737.3637665
- Lichao Wu, Guilherme Perin, Stjepan Picek,
I Choose You: Automated Hyperparameter Tuning for Deep Learning-Based Side-Channel Analysis,
IEEE Trans Emerging Topics in Computing, vol.12, no.2, pp.546-557, April-June 2024, 10.1109/TETC.2022.3218372
- Lichao Wu, Yoo-Seung Won, Dirmanto Jap, Guilherme Perin, Shivam Bhasin, Stjepan Picek,
Ablation Analysis for Multi-Device Deep Learning-Based Physical Side-Channel Analysis Attack,
IEEE Trans on Dependable and Secure Computing, vol.21, no.3, pp.1331-1341, May-June 2024, 10.1109/TDSC.2023.3278857
- Parisa Amiri Eliasi, Silvia Mella, Léo Weissbart, Lejla Batina, Stjepan Picek,
Xoodyak Under SCA Siege,
Proc. DDECS 2024, pp.61-66, April 2024, 10.1109/DDECS60919.2024.10508930
- Omid Bazangani, Parisa Amiri Eliasi, Stjepan Picek, Lejla Batina,
Can Machine Learn Pipeline Leakage?,
2024 Design, Automation & Test in Europe Conference & Exhibition (DATE), April 2024, 10.23919/DATE58400.2024.10546629
- Mahnaz Namazi Rizi, Nusa Zidaric, Lejla Batina, Nele Mentens
Optimised AES with RISC-V Vector Extensions,
2024 27th International Symposium on Design & Diagnostics of Electronic Circuits & Systems (DDECS), April 2024, 10.1109/DDECS60919.2024.10508919
- Asmita Adhikary, Abraham Basurto, Lejla Batina, Ileana Buhan, Joan Daemen, Silvia Mella, Nele Mentens, Stjepan Picek, Durga Lakshmi Ramachandran, Abolfazl Sajadi, Todor Stefanov, Dennis Vermoen, Nusa Zidaric ,
PROACT – Physical Attack Resistance of Cryptographic Algorithms and Circuits with Reduced Time to Market,
ARC 2024, LNCS vol.14553, March 2024, 10.1007/978-3-031-55673-9_18
- Asmita Adhikary, Ieana Buhan,
SoK: Assisted Fault Simulation, Existing Challenges and Opportunities Offered by AI,
ACNS 2023, LNCS vol 13907, Springer, Cham, Oct 2023, 10.1007/978-3-031-41181-6_10
- Suvadeep Hajra, Manaar Alam, Sayandeep Saha, Stjepan Picek, Debdeep Mukhopadhyay,
On the Instability of Softmax Attention-based Deep Learning Models in Side-channel Analysis,
IEEE Trans. on Information Forensics and Security, Vol.19, pp 514 – 528, Oct. 2023, 10.1109/TIFS.2023.3326667
- Nuša Zidarič, Guang Gong, Mark Aagaard, Aleksandar Jurišić, Olexandr Konovalov,
FFCSA – Finite Field Constructions, Search, and Algorithms,
ISSAC’23, ACM Communications in Computer Algebra, Vol.57, Issue 2, pp 57–64, Aug. 2023, 10.1145/3614408.3614416
- Solane El Hirch, Joan Daemen, Raghvendra Rohit, Rusydi H. Makarim,
Twin Column Parity Mixers and Gaston: A New Mixing Layer and Permutation,
Advances in Cryptology – CRYPTO 2023, LNCS vol 14083, Springer, Cham, Aug 2023, 10.1007/978-3-031-38548-3_16
- Stjepan Picek, Annelie Heuser, Alan Jovic, Shivam Bhasin, Francesco Regazzoni,
Tipping the Balance: Imbalanced Classes in Deep Learning Side-channel Analysis,
IEEE Design & Test, June 2023, 10.1109/MDAT.2023.3288808
- Lejla Batina, Łukasz Chmielewski, Björn Haase, Niels Samwel, Peter Schwabe,
SoK: SCA-secure ECC in software – mission impossible?,
IACR TCHES 2023(1), pp 557–589, Nov 2022, 10.46586/tches.v2023.i1.557-589
- Norica Băcuieti, Joan Daemen, Seth Hoffert, Gilles Van Assche, Ronny Van Keer,
Jammin’ on the Deck,
Advances in Cryptology – ASIACRYPT 2022, Proceedings, Part II, pp 555–584, Dec 2022, 10.1007/978-3-031-22966-4_19
- Lichao Wu, Guilherme Perin, Stjepan Picek,
The Best of Two Worlds: Deep Learning-assisted Template Attack,
IACR TCHES, 2022(3), pp 413–437, June 2022, 10.46586/tches.v2022.i3.413-437
- Guilherme Perin, Lichao Wu, Stjepan Picek,
Exploring Feature Selection Scenarios for Deep Learning-based Side-channel Analysis,
IACR TCHES 2022(4), pp 828–861, Aug. 2022, 10.46586/tches.v2022.i4.828-861
- Unai Rioja, Lejla Batina, Igor Armendariz, Jose Luis Flores,
Towards Human Dependency Elimination: AI Approach to SCA Robustness Assessment,
IEEE Trans. on Information Forensics and Security, Vol.17, pp 3906 – 3921, May 2022, 10.1109/TIFS.2022.3176189
- Arthur Beckers, Roel Uytterhoeven, Thomas Vandenabeele, Jo Vliegen, Lennert Wouters, Joan Daemen, Wim Dehaene, Benedikt Gierlichs, Nele Mentens,
Energy and side-channel security evaluation of near-threshold cryptographic circuits in 28nm FD-SOI technology,
CF ’22: Proceedings of the 19th ACM International Conference on Computing Frontiers, pp. 258–262, May 2022, 10.1145/3528416.3530992
- Lejla Batina, Thomas Bäck, Ileana Buhan, Stjepan Picek,
Security and Artificial Intelligence – A Crossdisciplinary Approach,
LNCS vol 13049, Springer, Cham, April 2022, 10.1007/978-3-030-98795-4_11
- Konstantina Miteloudi, Lejla Batina, Joan Daemen, Nele Mentens,
ROCKY: Rotation Countermeasure for the Protection of Keys and Other Sensitive Data,
SAMOS 2021, LNCS vol 13227, Springer, Cham, April 2022, 10.1007/978-3-031-04580-6_19
- Naila Mukhtar, Louiza Papachristodoulou, Apostolos P. Fournaris, Lejla Batina, Yinan Kong,
Machine-Learning Assisted Side-Channel Attacks on RNS ECC Implementations Using Hybrid Feature Engineering,
COSADE 2022, LNCS vol 13211. Springer, Cham, March 2022, 10.1007/978-3-030-99766-3_1
- Lichao Wu, Guilherme Perin, Stjepan Picek,
On the Evaluation of Deep Learning-Based Side-Channel Analysis,
COSADE 2022, LNCS vol 13211, Springer, Cham, March 2022, 10.1007/978-3-030-99766-3_3
- Maikel Kerkhof, Lichao Wu, Guilherme Perin, Stjepan Picek,
Focus is Key to Success: A Focal Loss Function for Deep Learning-Based Side-Channel Analysis,
COSADE 2022, LNCS vol 13211, Springer, Cham, March 2022, 10.1007/978-3-030-99766-3_2
- Guilherme Perin, Lichao Wu, Stjepan Picek,
Gambling for Success: The Lottery Ticket Hypothesis in Deep Learning-Based Side-Channel Analysis,
In Artificial Intelligence for Cybersecurity, Advances in Information Security, Vol.54, Springer, Cham, Feb 2022, 10.1007/978-3-030-97087-1_9
- Naila Mukhtar, Lejla Batina, Stjepan Picek, Yinan Kong,
Fake It Till You Make It: Data Augmentation Using Generative Adversarial Networks for All the Crypto You Need on Small Devices,
CT-RSA 2022, LNCS vol 13161, Springer, Cham, Jan. 2022, 10.1007/978-3-030-95312-6_13
- Lejla Batina, Nele Mentens, Markus Miettinen, Naila Mukhtar, Thien Duc Nguyen, Md Masoom Rabbani, Phillip Rieger, Ahmad-Reza Sadeghi,
Advanced Attacks and Protection Mechanisms in IoT Devices and Networks,
In Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications, Dec. 2021, 10.1002/9781119607755.ch1
- Konstantina Miteloudi, Łukasz Chmielewski, Lejla Batina, Nele Mentens,
Evaluating the ROCKY Countermeasure for Side-Channel Leakage,
VLSI-SoC’21, Nov 2021, 10.1109/VLSI-SoC53125.2021.9606973
- Madura A. Shelton, Łukasz Chmielewski, Niels Samwel, Markus Wagner, Lejla Batina, Yuval Yarom,
Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic Code,
CCS ’21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, pp 685–699, Nov 2021, 10.1145/3460120.3485380