Confused by confusion: Systematic evaluation of DPA resistance of various s-boxes S Picek, K Papagiannopoulos, B Ege, L Batina, D Jakobovic International Conference on Cryptology in India, 374-390, 2014 | 39 | 2014 |
Mind the gap: Towards secure 1st-order masking in software K Papagiannopoulos, N Veshchikov International Workshop on Constructive Side-Channel Analysis and Secure …, 2017 | 28 | 2017 |
Optimality and beyond: The case of 4× 4 S-boxes S Picek, B Ege, K Papagiannopoulos, L Batina, D Jakobović 2014 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2014 | 28 | 2014 |
Side-channel based intrusion detection for industrial control systems P Van Aubel, K Papagiannopoulos, Ł Chmielewski, C Doerr International Conference on Critical Information Infrastructures Security …, 2017 | 14 | 2017 |
Instruction duplication: Leaky and not too fault-tolerant! L Cojocar, K Papagiannopoulos, N Timmers International Conference on Smart Card Research and Advanced Applications …, 2017 | 12 | 2017 |
Towards Lightweight Cryptographic Primitives with Built-in Fault-Detection. T Simon, L Batina, J Daemen, V Grosso, PMC Massolino, ... IACR Cryptol. ePrint Arch. 2018, 729, 2018 | 11 | 2018 |
Bitsliced Masking and ARM: Friends or Foes? W de Groot, K Papagiannopoulos, A de La Piedra, E Schneider, L Batina International Workshop on Lightweight Cryptography for Security and Privacy …, 2016 | 11 | 2016 |
Improving DPA resistance of S-boxes: How far can we go? B Ege, K Papagiannopoulos, L Batina, S Picek 2015 IEEE International Symposium on Circuits and Systems (ISCAS), 2013-2016, 2015 | 9 | 2015 |
Vectorizing higher-order masking B Grégoire, K Papagiannopoulos, P Schwabe, K Stoffelen International Workshop on Constructive Side-Channel Analysis and Secure …, 2018 | 7 | 2018 |
Location, location, location: Revisiting modeling and exploitation for location-based side channel leakages C Andrikos, L Batina, L Chmielewski, L Lerman, V Mavroudis, ... International Conference on the Theory and Application of Cryptology and …, 2019 | 6 | 2019 |
Practical evaluation of protected residue number system scalar multiplication L Papachristodoulou, AP Fournaris, K Papagiannopoulos, L Batina | 6 | 2019 |
How old is your brain? Slow-wave activity in non-rapid-eye-movement sleep as a marker of brain rejuvenation after long-term exercise in mice M Panagiotou, K Papagiannopoulos, JHT Rohling, JH Meijer, T Deboer Frontiers in aging neuroscience 10, 233, 2018 | 5 | 2018 |
Barıs Ege, Lejla Batina, and Domagoj Jakobovic. Confused by confusion: Systematic evaluation of dpa resistance of various s-boxes S Picek, K Papagiannopoulos International Conference on Cryptology in India, 374-390, 0 | 5 | |
Low randomness masking and shuffling: An evaluation using mutual information K Papagiannopoulos IACR Transactions on Cryptographic Hardware and Embedded Systems, 524-546, 2018 | 3 | 2018 |
Location-based leakages: New directions in modeling and exploiting C Andrikos, G Rassias, L Lerman, K Papagiannopoulos, L Batina 2017 International Conference on Embedded Computer Systems: Architectures …, 2017 | 2 | 2017 |
Friet: An Authenticated Encryption Scheme with Built-in Fault Detection T Simon, L Batina, J Daemen, V Grosso, PMC Massolino, ... Annual International Conference on the Theory and Applications of …, 2020 | 1 | 2020 |
Designated Attribute Proofs with the Camenisch–Lysyanskaya Signature K Papagiannopoulos, G Alpár, W Lueks Proceedings of the 34rd WIC Symposium on Information Theory in the Benelux …, 2013 | 1 | 2013 |
On the Worst-Case Side-Channel Security of ECC Point Randomization in Embedded Devices M Azouaoui, F Durvaux, R Poussier, FX Standaert, K Papagiannopoulos, ... International Conference on Cryptology in India, 205-227, 2020 | | 2020 |
Boolean Exponent Splitting. M Tunstall, L Papachristodoulou, K Papagiannopoulos IACR Cryptol. ePrint Arch. 2018, 1226, 2018 | | 2018 |
A high-performance threshold implementation of a BaseKing variant on an ARM architecture T van Dijk, J Daemen, K Papagiannopoulos, L Batina | | 2017 |