Volgen
Barış Ege
Titel
Geciteerd door
Geciteerd door
Jaar
Dismantling megamos crypto: Wirelessly lockpicking a vehicle immobilizer
R Verdult, FD Garcia, B Ege
Supplement to the Proceedings of 22nd USENIX Security Symposium (Supplement …, 2015
1652015
Dietary recommendations for lightweight block ciphers: power, energy and area analysis of recently developed architectures
L Batina, A Das, B Ege, EB Kavun, N Mentens, C Paar, I Verbauwhede, ...
Radio Frequency Identification: Security and Privacy Issues 9th …, 2013
812013
Confused by confusion: Systematic evaluation of DPA resistance of various s-boxes
S Picek, K Papagiannopoulos, B Ege, L Batina, D Jakobovic
International Conference on Cryptology in India, 374-390, 2014
752014
Compact implementation and performance evaluation of hash functions in attiny devices
J Balasch, B Ege, T Eisenbarth, B Gérard, Z Gong, T Güneysu, S Heyse, ...
Smart Card Research and Advanced Applications: 11th International Conference …, 2013
722013
S-box, SET, match: a toolbox for S-box analysis
S Picek, L Batina, D Jakobović, B Ege, M Golub
Information Security Theory and Practice. Securing the Internet of Things …, 2014
682014
Cryptographic randomness testing of block ciphers and hash functions
A Doğanaksoy, B Ege, O Koçak, F Sulak
Cryptology ePrint Archive, 2010
562010
Clock glitch attacks in the presence of heating
T Korak, M Hutter, B Ege, L Batina
2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, 104-114, 2014
512014
Security analysis of industrial test compression schemes
A Das, B Ege, S Ghosh, L Batina, I Verbauwhede
IEEE transactions on computer-aided design of integrated circuits and …, 2013
462013
Evaluation of randomness test results for short sequences
F Sulak, A Doğanaksoy, B Ege, O Koçak
Sequences and Their Applications–SETA 2010, 309-319, 2010
462010
On using genetic algorithms for intrinsic side-channel resistance: the case of AES s-box
S Picek, B Ege, L Batina, D Jakobovic, Ł Chmielewski, M Golub
Proceedings of the First Workshop on Cryptography and Security in Computing …, 2014
452014
Optimality and beyond: The case of 4× 4 S-boxes
S Picek, B Ege, K Papagiannopoulos, L Batina, D Jakobović
2014 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2014
392014
Differential scan attack on AES with X-tolerant and X-masked test response compactor
B Ege, A Das, S Gosh, I Verbauwhede
2012 15th Euromicro Conference on Digital System Design, 545-552, 2012
322012
Architecture correlation analysis (ACA): Identifying the source of side-channel leakage at gate-level
Y Yao, T Kathuria, B Ege, P Schaumont
2020 IEEE International Symposium on Hardware Oriented Security and Trust …, 2020
272020
Neural network model assessment for side-channel analysis
G Perin, B Ege, L Chmielewski
Cryptology ePrint Archive, 2019
242019
Statistical analysis of reduced round compression functions of SHA-3 second round candidates
A Doğanaksoy, B Ege, O Koçak, F Sulak
Cryptology ePrint Archive, 2010
212010
Lowering the bar: Deep learning for side-channel analysis (white-paper)
G Perin, B Ege, J van Woudenberg
Proc. BlackHat, 1-15, 2018
202018
Extended results for independence and sensitivity of NIST randomness tests
A Doganaksoy, B Ege, K Mus
Information Security and Cryptography Conference, ISC Turkey, 25-27, 2008
172008
Improving DPA resistance of S-boxes: How far can we go?
B Ege, K Papagiannopoulos, L Batina, S Picek
2015 IEEE International Symposium on Circuits and Systems (ISCAS), 2013-2016, 2015
122015
Memory encryption for smart cards
B Ege, EB Kavun, T Yalçın
Smart Card Research and Advanced Applications: 10th IFIP WG 8.8/11.2 …, 2011
122011
Pre-silicon architecture correlation analysis (PACA): Identifying and mitigating the source of side-channel leakage at gate-level
Y Yao, T Tufan, T Kathuria, B Ege, U Guler, P Schaumont
Cryptology ePrint Archive, 2021
82021
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20