• Abolfazl Sajadi, Nusa Zidaric, Todor Stefanov, Nele Mentens,
    A Systematic Comparison of Side-channel Countermeasures for RISC-V-based SoCs,
    2024 IEEE Nordic Circuits and Systems Conference (NorCAS), October 2024 10.1109/NorCAS64408.2024.10752477
  • Lichao Wu, Sébastien Tiran, Guilherme Perin, Stjepan Picek,
    Plaintext-based Side-channel Collision Attack,
    IACR Communications in Cryptology, vol.1, no.3, October 2024 10.62056/a36cy7qiu
  • Lichao Wu, Azade Rezaeezade, Amir Ali-pour, Guilherme Perin, Stjepan Picek,
    Leakage Model-flexible Deep Learning-based Side-channel Analysis,
    IACR Communications in Cryptology, vol.1, no.3, October 2024, 10.62056/ay4c3txol7
  • Vahid Jahandideh, Bart Mennink, Lejla Batina,
    An Algebraic Approach for Evaluating Random Probing Security With Application to AES,
    IACR TCHES, 2024(4), 657-689, September 2024, 10.46586/tches.v2024.i4.657-689
  • Péter Horváth, Dirk Lauret, Zhuoran Liu, and Lejla Batina,
    SoK: Neural Network Extraction Through Physical Side Channels,
    SEC ’24: Proc.33rd USENIX Security Symposium, pp.3403–3422, August 2024, 10.5555/3698900.3699091
  • Azade Rezaeezade, Lejla Batina,
    Regularizers to the Rescue: Fighting Overfitting in Deep Learning-based Side-channel Analysis,
    J Cryptogr Eng 14, 609–629 (2024), July 2024, 10.1007/s13389-024-00361-5
  • Mick G.D. Remmerswaal, Lichao Wu, Sébastien Tiran, Nele Mentens
    AutoPOI: automated points of interest selection for side-channel analysis,
    J Cryptogr Eng 14, 463–474 (2024), July 2023, 10.1007/s13389-023-00328-y
  • Omid Bazangani, Alexandre Iooss, Ileana Buhan, Lejla Batina,
    ABBY: Automating leakage modelling for side-channel analysis,
    Proc. 19th ACM Asia Conf on Computer and Comm Security (ASIA CCS ’24), July 2024, 10.1145/3634737.3637665
  • Lichao Wu, Guilherme Perin, Stjepan Picek,
    I Choose You: Automated Hyperparameter Tuning for Deep Learning-Based Side-Channel Analysis,
    IEEE Trans Emerging Topics in Computing, vol.12, no.2, pp.546-557, April-June 2024, 10.1109/TETC.2022.3218372
  • Lichao Wu, Yoo-Seung Won, Dirmanto Jap, Guilherme Perin, Shivam Bhasin, Stjepan Picek,
    Ablation Analysis for Multi-Device Deep Learning-Based Physical Side-Channel Analysis Attack,
    IEEE Trans on Dependable and Secure Computing, vol.21, no.3, pp.1331-1341, May-June 2024, 10.1109/TDSC.2023.3278857
  • Parisa Amiri Eliasi, Silvia Mella, Léo Weissbart, Lejla Batina, Stjepan Picek,
    Xoodyak Under SCA Siege,
    Proc. DDECS 2024, pp.61-66, April 2024, 10.1109/DDECS60919.2024.10508930
  • Omid Bazangani, Parisa Amiri Eliasi, Stjepan Picek, Lejla Batina,
    Can Machine Learn Pipeline Leakage?,
    2024 Design, Automation & Test in Europe Conference & Exhibition (DATE), April 2024, 10.23919/DATE58400.2024.10546629
  • Mahnaz Namazi Rizi, Nusa Zidaric, Lejla Batina, Nele Mentens
    Optimised AES with RISC-V Vector Extensions,
    2024 27th International Symposium on Design & Diagnostics of Electronic Circuits & Systems (DDECS), April 2024, 10.1109/DDECS60919.2024.10508919
  • Asmita Adhikary, Abraham Basurto, Lejla Batina, Ileana Buhan, Joan Daemen, Silvia Mella, Nele Mentens, Stjepan Picek, Durga Lakshmi Ramachandran, Abolfazl Sajadi, Todor Stefanov, Dennis Vermoen, Nusa Zidaric ,
    PROACT – Physical Attack Resistance of Cryptographic Algorithms and Circuits with Reduced Time to Market,
    ARC 2024, LNCS vol.14553, March 2024, 10.1007/978-3-031-55673-9_18
  • Asmita Adhikary, Ieana Buhan,
    SoK: Assisted Fault Simulation, Existing Challenges and Opportunities Offered by AI,
    ACNS 2023, LNCS vol 13907, Springer, Cham, Oct 2023, 10.1007/978-3-031-41181-6_10
  • Suvadeep Hajra, Manaar Alam, Sayandeep Saha, Stjepan Picek, Debdeep Mukhopadhyay,
    On the Instability of Softmax Attention-based Deep Learning Models in Side-channel Analysis,
    IEEE Trans. on Information Forensics and Security, Vol.19, pp 514 – 528, Oct. 2023, 10.1109/TIFS.2023.3326667
  • Nuša Zidarič, Guang Gong, Mark Aagaard, Aleksandar Jurišić, Olexandr Konovalov,
    FFCSA – Finite Field Constructions, Search, and Algorithms,
    ISSAC’23, ACM Communications in Computer Algebra, Vol.57, Issue 2, pp 57–64, Aug. 2023, 10.1145/3614408.3614416
  • Solane El Hirch, Joan Daemen, Raghvendra Rohit, Rusydi H. Makarim,
    Twin Column Parity Mixers and Gaston: A New Mixing Layer and Permutation,
    Advances in Cryptology – CRYPTO 2023, LNCS vol 14083, Springer, Cham, Aug 2023, 10.1007/978-3-031-38548-3_16
  • Stjepan Picek, Annelie Heuser, Alan Jovic, Shivam Bhasin, Francesco Regazzoni,
    Tipping the Balance: Imbalanced Classes in Deep Learning Side-channel Analysis,
    IEEE Design & Test, June 2023, 10.1109/MDAT.2023.3288808
  • Lejla Batina, Łukasz Chmielewski, Björn Haase, Niels Samwel, Peter Schwabe,
    SoK: SCA-secure ECC in software – mission impossible?,
    IACR TCHES 2023(1), pp 557–589, Nov 2022, 10.46586/tches.v2023.i1.557-589
  • Norica Băcuieti, Joan Daemen, Seth Hoffert, Gilles Van Assche, Ronny Van Keer,
    Jammin’ on the Deck,
    Advances in Cryptology – ASIACRYPT 2022, Proceedings, Part II, pp 555–584, Dec 2022, 10.1007/978-3-031-22966-4_19
  • Lichao Wu, Guilherme Perin, Stjepan Picek,
    The Best of Two Worlds: Deep Learning-assisted Template Attack,
    IACR TCHES, 2022(3), pp 413–437, June 2022, 10.46586/tches.v2022.i3.413-437
  • Guilherme Perin, Lichao Wu, Stjepan Picek,
    Exploring Feature Selection Scenarios for Deep Learning-based Side-channel Analysis,
    IACR TCHES 2022(4), pp 828–861, Aug. 2022, 10.46586/tches.v2022.i4.828-861
  • Unai Rioja, Lejla Batina, Igor Armendariz, Jose Luis Flores,
    Towards Human Dependency Elimination: AI Approach to SCA Robustness Assessment,
    IEEE Trans. on Information Forensics and Security, Vol.17, pp 3906 – 3921, May 2022, 10.1109/TIFS.2022.3176189
  • Arthur Beckers, Roel Uytterhoeven, Thomas Vandenabeele, Jo Vliegen, Lennert Wouters, Joan Daemen, Wim Dehaene, Benedikt Gierlichs, Nele Mentens,
    Energy and side-channel security evaluation of near-threshold cryptographic circuits in 28nm FD-SOI technology,
    CF ’22: Proceedings of the 19th ACM International Conference on Computing Frontiers, pp. 258–262, May 2022, 10.1145/3528416.3530992
  • Lejla Batina, Thomas Bäck, Ileana Buhan, Stjepan Picek,
    Security and Artificial Intelligence – A Crossdisciplinary Approach,
    LNCS vol 13049, Springer, Cham, April 2022, 10.1007/978-3-030-98795-4_11
  • Konstantina Miteloudi, Lejla Batina, Joan Daemen, Nele Mentens,
    ROCKY: Rotation Countermeasure for the Protection of Keys and Other Sensitive Data,
    SAMOS 2021, LNCS vol 13227, Springer, Cham, April 2022, 10.1007/978-3-031-04580-6_19
  • Naila Mukhtar, Louiza Papachristodoulou, Apostolos P. Fournaris, Lejla Batina, Yinan Kong,
    Machine-Learning Assisted Side-Channel Attacks on RNS ECC Implementations Using Hybrid Feature Engineering,
    COSADE 2022, LNCS vol 13211. Springer, Cham, March 2022, 10.1007/978-3-030-99766-3_1
  • Lichao Wu, Guilherme Perin, Stjepan Picek,
    On the Evaluation of Deep Learning-Based Side-Channel Analysis,
    COSADE 2022, LNCS vol 13211, Springer, Cham, March 2022, 10.1007/978-3-030-99766-3_3
  • Maikel Kerkhof, Lichao Wu, Guilherme Perin, Stjepan Picek,
    Focus is Key to Success: A Focal Loss Function for Deep Learning-Based Side-Channel Analysis,
    COSADE 2022, LNCS vol 13211, Springer, Cham, March 2022, 10.1007/978-3-030-99766-3_2
  • Guilherme Perin, Lichao Wu, Stjepan Picek,
    Gambling for Success: The Lottery Ticket Hypothesis in Deep Learning-Based Side-Channel Analysis,
    In Artificial Intelligence for Cybersecurity, Advances in Information Security, Vol.54, Springer, Cham, Feb 2022, 10.1007/978-3-030-97087-1_9
  • Naila Mukhtar, Lejla Batina, Stjepan Picek, Yinan Kong,
    Fake It Till You Make It: Data Augmentation Using Generative Adversarial Networks for All the Crypto You Need on Small Devices,
    CT-RSA 2022, LNCS vol 13161, Springer, Cham, Jan. 2022, 10.1007/978-3-030-95312-6_13
  • Lejla Batina, Nele Mentens, Markus Miettinen, Naila Mukhtar, Thien Duc Nguyen, Md Masoom Rabbani, Phillip Rieger, Ahmad-Reza Sadeghi,
    Advanced Attacks and Protection Mechanisms in IoT Devices and Networks,
    In Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications, Dec. 2021, 10.1002/9781119607755.ch1
  • Konstantina Miteloudi, Łukasz Chmielewski, Lejla Batina, Nele Mentens,
    Evaluating the ROCKY Countermeasure for Side-Channel Leakage,
    VLSI-SoC’21, Nov 2021, 10.1109/VLSI-SoC53125.2021.9606973
  • Madura A. Shelton, Łukasz Chmielewski, Niels Samwel, Markus Wagner, Lejla Batina, Yuval Yarom,
    Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic Code,
    CCS ’21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, pp 685–699, Nov 2021, 10.1145/3460120.3485380