• Asmita Adhikary, Ieana Buhan,
    SoK: Assisted Fault Simulation, Existing Challenges and Opportunities Offered by AI,
    ACNS 2023, LNCS vol 13907, Springer, Cham, Oct 2023, 10.1007/978-3-031-41181-6_10
  • Suvadeep Hajra, Manaar Alam, Sayandeep Saha, Stjepan Picek, Debdeep Mukhopadhyay,
    On the Instability of Softmax Attention-based Deep Learning Models in Side-channel Analysis,
    IEEE Trans. on Information Forensics and Security, Vol.19, pp 514 – 528, Oct. 2023, 10.1109/TIFS.2023.3326667
  • Nuša Zidarič, Guang Gong, Mark Aagaard, Aleksandar Jurišić, Olexandr Konovalov,
    FFCSA – Finite Field Constructions, Search, and Algorithms,
    ISSAC’23, ACM Communications in Computer Algebra, Vol.57, Issue 2, pp 57–64, Aug. 2023, 10.1145/3614408.3614416
  • Solane El Hirch, Joan Daemen, Raghvendra Rohit, Rusydi H. Makarim,
    Twin Column Parity Mixers and Gaston: A New Mixing Layer and Permutation,
    Advances in Cryptology – CRYPTO 2023, LNCS vol 14083, Springer, Cham, Aug 2023, 10.1007/978-3-031-38548-3_16
  • Stjepan Picek, Annelie Heuser, Alan Jovic, Shivam Bhasin, Francesco Regazzoni,
    Tipping the Balance: Imbalanced Classes in Deep Learning Side-channel Analysis,
    IEEE Design & Test, June 2023, 10.1109/MDAT.2023.3288808
  • Lejla Batina, Łukasz Chmielewski, Björn Haase, Niels Samwel, Peter Schwabe,
    SoK: SCA-secure ECC in software – mission impossible?,
    IACR TCHES 2023(1), pp 557–589, Nov 2022, 10.46586/tches.v2023.i1.557-589
  • Norica Băcuieti, Joan Daemen, Seth Hoffert, Gilles Van Assche, Ronny Van Keer,
    Jammin’ on the Deck,
    Advances in Cryptology – ASIACRYPT 2022, Proceedings, Part II, pp 555–584, Dec 2022, 10.1007/978-3-031-22966-4_19
  • Lichao Wu, Guilherme Perin, Stjepan Picek,
    The Best of Two Worlds: Deep Learning-assisted Template Attack,
    IACR TCHES, 2022(3), pp 413–437, June 2022, 10.46586/tches.v2022.i3.413-437
  • Guilherme Perin, Lichao Wu, Stjepan Picek,
    Exploring Feature Selection Scenarios for Deep Learning-based Side-channel Analysis,
    IACR TCHES 2022(4), pp 828–861, Aug. 2022, 10.46586/tches.v2022.i4.828-861
  • Unai Rioja, Lejla Batina, Igor Armendariz, Jose Luis Flores,
    Towards Human Dependency Elimination: AI Approach to SCA Robustness Assessment,
    IEEE Trans. on Information Forensics and Security, Vol.17, pp 3906 – 3921, May 2022, 10.1109/TIFS.2022.3176189
  • Arthur Beckers, Roel Uytterhoeven, Thomas Vandenabeele, Jo Vliegen, Lennert Wouters, Joan Daemen, Wim Dehaene, Benedikt Gierlichs, Nele Mentens,
    Energy and side-channel security evaluation of near-threshold cryptographic circuits in 28nm FD-SOI technology,
    CF ’22: Proceedings of the 19th ACM International Conference on Computing Frontiers, pp. 258–262, May 2022, 10.1145/3528416.3530992
  • Lejla Batina, Thomas Bäck, Ileana Buhan, Stjepan Picek,
    Security and Artificial Intelligence – A Crossdisciplinary Approach,
    LNCS vol 13049, Springer, Cham, April 2022, 10.1007/978-3-030-98795-4_11
  • Konstantina Miteloudi, Lejla Batina, Joan Daemen, Nele Mentens,
    ROCKY: Rotation Countermeasure for the Protection of Keys and Other Sensitive Data,
    SAMOS 2021, LNCS vol 13227, Springer, Cham, April 2022, 10.1007/978-3-031-04580-6_19
  • Naila Mukhtar, Louiza Papachristodoulou, Apostolos P. Fournaris, Lejla Batina, Yinan Kong,
    Machine-Learning Assisted Side-Channel Attacks on RNS ECC Implementations Using Hybrid Feature Engineering,
    COSADE 2022, LNCS vol 13211. Springer, Cham, March 2022, 10.1007/978-3-030-99766-3_1
  • Lichao Wu, Guilherme Perin, Stjepan Picek,
    On the Evaluation of Deep Learning-Based Side-Channel Analysis,
    COSADE 2022, LNCS vol 13211, Springer, Cham, March 2022, 10.1007/978-3-030-99766-3_3
  • Maikel Kerkhof, Lichao Wu, Guilherme Perin, Stjepan Picek,
    Focus is Key to Success: A Focal Loss Function for Deep Learning-Based Side-Channel Analysis,
    COSADE 2022, LNCS vol 13211, Springer, Cham, March 2022, 10.1007/978-3-030-99766-3_2
  • Guilherme Perin, Lichao Wu, Stjepan Picek,
    Gambling for Success: The Lottery Ticket Hypothesis in Deep Learning-Based Side-Channel Analysis,
    In Artificial Intelligence for Cybersecurity, Advances in Information Security, Vol.54, Springer, Cham, Feb 2022, 10.1007/978-3-030-97087-1_9
  • Naila Mukhtar, Lejla Batina, Stjepan Picek, Yinan Kong,
    Fake It Till You Make It: Data Augmentation Using Generative Adversarial Networks for All the Crypto You Need on Small Devices,
    CT-RSA 2022, LNCS vol 13161, Springer, Cham, Jan. 2022, 10.1007/978-3-030-95312-6_13
  • Lejla Batina, Nele Mentens, Markus Miettinen, Naila Mukhtar, Thien Duc Nguyen, Md Masoom Rabbani, Phillip Rieger, Ahmad-Reza Sadeghi,
    Advanced Attacks and Protection Mechanisms in IoT Devices and Networks,
    In Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications, Dec. 2021, 10.1002/9781119607755.ch1
  • Konstantina Miteloudi, Łukasz Chmielewski, Lejla Batina, Nele Mentens,
    Evaluating the ROCKY Countermeasure for Side-Channel Leakage,
    VLSI-SoC’21, Nov 2021, 10.1109/VLSI-SoC53125.2021.9606973
  • Madura A. Shelton, Łukasz Chmielewski, Niels Samwel, Markus Wagner, Lejla Batina, Yuval Yarom,
    Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic Code,
    CCS ’21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, pp 685–699, Nov 2021, 10.1145/3460120.3485380