Dismantling megamos crypto: Wirelessly lockpicking a vehicle immobilizer R Verdult, FD Garcia, B Ege Supplement to the Proceedings of 22nd {USENIX} Security Symposium …, 2015 | 110 | 2015 |
Dietary recommendations for lightweight block ciphers: Power, energy and area analysis of recently developed architectures L Batina, A Das, B Ege, EB Kavun, N Mentens, C Paar, I Verbauwhede, ... International Workshop on Radio Frequency Identification: Security and …, 2013 | 64 | 2013 |
Compact implementation and performance evaluation of hash functions in attiny devices J Balasch, B Ege, T Eisenbarth, B Gérard, Z Gong, T Güneysu, S Heyse, ... International Conference on Smart Card Research and Advanced Applications …, 2012 | 53 | 2012 |
Cryptographic Randomness Testing of Block Ciphers and Hash Functions. A Doganaksoy, B Ege, O Koçak, F Sulak IACR Cryptol. ePrint Arch. 2010, 564, 2010 | 41 | 2010 |
Confused by confusion: Systematic evaluation of DPA resistance of various s-boxes S Picek, K Papagiannopoulos, B Ege, L Batina, D Jakobovic International Conference on Cryptology in India, 374-390, 2014 | 39 | 2014 |
Security analysis of industrial test compression schemes A Das, B Ege, S Ghosh, L Batina, I Verbauwhede IEEE transactions on computer-aided design of integrated circuits and …, 2013 | 34 | 2013 |
On using genetic algorithms for intrinsic side-channel resistance: the case of AES s-box S Picek, B Ege, L Batina, D Jakobovic, Ł Chmielewski, M Golub Proceedings of the First Workshop on Cryptography and Security in Computing …, 2014 | 33 | 2014 |
Evaluation of randomness test results for short sequences F Sulak, A Doğanaksoy, B Ege, O Koçak Sequences and Their Applications–SETA 2010, 309-319, 2010 | 33 | 2010 |
S-box, SET, match: a toolbox for S-box analysis S Picek, L Batina, D Jakobović, B Ege, M Golub IFIP International Workshop on Information Security Theory and Practice, 140-149, 2014 | 29 | 2014 |
Optimality and beyond: The case of 4× 4 S-boxes S Picek, B Ege, K Papagiannopoulos, L Batina, D Jakobović 2014 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2014 | 28 | 2014 |
Differential scan attack on AES with X-tolerant and X-masked test response compactor B Ege, A Das, S Gosh, I Verbauwhede 2012 15th Euromicro Conference on Digital System Design, 545-552, 2012 | 23 | 2012 |
Clock glitch attacks in the presence of heating T Korak, M Hutter, B Ege, L Batina 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, 104-114, 2014 | 22 | 2014 |
Statistical Analysis of Reduced Round Compression Functions of SHA-3 Second Round Candidates. A Doganaksoy, B Ege, O Koçak, F Sulak IACR Cryptol. ePrint Arch. 2010, 611, 2010 | 16 | 2010 |
Neural Network Model Assessment for Side-Channel Analysis. G Perin, B Ege, L Chmielewski IACR Cryptol. ePrint Arch. 2019, 722, 2019 | 14 | 2019 |
Memory encryption for smart cards B Ege, EB Kavun, T Yalçın International Conference on Smart Card Research and Advanced Applications …, 2011 | 11 | 2011 |
Lowering the Bar: Deep Learning for Side-Channel Analysis (White-Paper) G Perin, B Ege, J van Woudenberg Proc. BlackHat, 1-15, 2018 | 10 | 2018 |
Improving DPA resistance of S-boxes: How far can we go? B Ege, K Papagiannopoulos, L Batina, S Picek 2015 IEEE International Symposium on Circuits and Systems (ISCAS), 2013-2016, 2015 | 9 | 2015 |
Extended results for independence and sensitivity of NIST randomness tests A Doğnaksoy, B Ege, K Muş Information Security and Cryptography Conference, ISC Turkey, 2008 | 8 | 2008 |
Near collision side channel attacks B Ege, T Eisenbarth, L Batina International Conference on Selected Areas in Cryptography, 277-292, 2015 | 6 | 2015 |
Security of countermeasures against state-of-the-art differential scan attacks B Ege, A Das, L Batina, I Verbauwhede [Sl]: COST, 2013 | 5 | 2013 |