Folgen
Barış Ege
Titel
Zitiert von
Zitiert von
Jahr
Dismantling megamos crypto: Wirelessly lockpicking a vehicle immobilizer
R Verdult, W Meng, FD Garcia, D Doozan, B Ege, W Enck, AC Snoeren, ...
22nd USENIX Security Symposium (USENIX Security 13), 687-702, 2013
1352013
Dietary recommendations for lightweight block ciphers: power, energy and area analysis of recently developed architectures
L Batina, A Das, B Ege, EB Kavun, N Mentens, C Paar, I Verbauwhede, ...
International Workshop on Radio Frequency Identification: Security and …, 2013
712013
Compact implementation and performance evaluation of hash functions in attiny devices
J Balasch, B Ege, T Eisenbarth, B Gérard, Z Gong, T Güneysu, S Heyse, ...
International Conference on Smart Card Research and Advanced Applications …, 2012
662012
Confused by confusion: Systematic evaluation of DPA resistance of various s-boxes
S Picek, K Papagiannopoulos, B Ege, L Batina, D Jakobovic
International Conference on Cryptology in India, 374-390, 2014
532014
Cryptographic randomness testing of block ciphers and hash functions
A Doğanaksoy, B Ege, O Koçak, F Sulak
Cryptology ePrint Archive, 2010
482010
S-box, SET, match: a toolbox for S-box analysis
S Picek, L Batina, D Jakobović, B Ege, M Golub
IFIP International Workshop on Information Security Theory and Practice, 140-149, 2014
472014
On using genetic algorithms for intrinsic side-channel resistance: the case of AES s-box
S Picek, B Ege, L Batina, D Jakobovic, Ł Chmielewski, M Golub
Proceedings of the First Workshop on Cryptography and Security in Computing …, 2014
402014
Security analysis of industrial test compression schemes
A Das, B Ege, S Ghosh, L Batina, I Verbauwhede
IEEE transactions on computer-aided design of integrated circuits and …, 2013
402013
Clock glitch attacks in the presence of heating
T Korak, M Hutter, B Ege, L Batina
2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, 104-114, 2014
382014
Evaluation of randomness test results for short sequences
F Sulak, A Doğanaksoy, B Ege, O Koçak
Sequences and Their Applications–SETA 2010, 309-319, 2010
372010
Optimality and beyond: The case of 4× 4 S-boxes
S Picek, B Ege, K Papagiannopoulos, L Batina, D Jakobović
2014 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2014
342014
Differential scan attack on AES with X-tolerant and X-masked test response compactor
B Ege, A Das, S Gosh, I Verbauwhede
2012 15th Euromicro Conference on Digital System Design, 545-552, 2012
252012
Neural network model assessment for side-channel analysis
G Perin, B Ege, L Chmielewski
Cryptology ePrint Archive, 2019
192019
Lowering the bar: Deep learning for side-channel analysis (white-paper)
G Perin, B Ege, J van Woudenberg
Proc. BlackHat, 1-15, 2018
182018
Statistical analysis of reduced round compression functions of SHA-3 second round candidates
A Doğanaksoy, B Ege, O Koçak, F Sulak
Cryptology ePrint Archive, 2010
182010
Extended results for independence and sensitivity of NIST randomness tests
A Doganaksoy, B Ege, K Mus
Information Security and Cryptography Conference, ISC Turkey, 25-27, 2008
132008
Architecture correlation analysis (ACA): identifying the source of side-channel leakage at gate-level
Y Yao, T Kathuria, B Ege, P Schaumont
2020 IEEE International Symposium on Hardware Oriented Security and Trust …, 2020
122020
Improving DPA resistance of S-boxes: How far can we go?
B Ege, K Papagiannopoulos, L Batina, S Picek
2015 IEEE International Symposium on Circuits and Systems (ISCAS), 2013-2016, 2015
112015
Memory encryption for smart cards
B Ege, EB Kavun, T Yalçın
International Conference on Smart Card Research and Advanced Applications …, 2011
112011
Near collision side channel attacks
B Ege, T Eisenbarth, L Batina
International Conference on Selected Areas in Cryptography, 277-292, 2015
72015
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20