Barış Ege
Citée par
Citée par
Dismantling megamos crypto: Wirelessly lockpicking a vehicle immobilizer
R Verdult, FD Garcia, B Ege
Supplement to the Proceedings of 22nd {USENIX} Security Symposium …, 2015
Dietary recommendations for lightweight block ciphers: Power, energy and area analysis of recently developed architectures
L Batina, A Das, B Ege, EB Kavun, N Mentens, C Paar, I Verbauwhede, ...
International Workshop on Radio Frequency Identification: Security and …, 2013
Compact implementation and performance evaluation of hash functions in attiny devices
J Balasch, B Ege, T Eisenbarth, B Gérard, Z Gong, T Güneysu, S Heyse, ...
International Conference on Smart Card Research and Advanced Applications …, 2012
Cryptographic Randomness Testing of Block Ciphers and Hash Functions.
A Doganaksoy, B Ege, O Koçak, F Sulak
IACR Cryptol. ePrint Arch. 2010, 564, 2010
Confused by confusion: Systematic evaluation of DPA resistance of various s-boxes
S Picek, K Papagiannopoulos, B Ege, L Batina, D Jakobovic
International Conference on Cryptology in India, 374-390, 2014
Security analysis of industrial test compression schemes
A Das, B Ege, S Ghosh, L Batina, I Verbauwhede
IEEE transactions on computer-aided design of integrated circuits and …, 2013
On using genetic algorithms for intrinsic side-channel resistance: the case of AES s-box
S Picek, B Ege, L Batina, D Jakobovic, Ł Chmielewski, M Golub
Proceedings of the First Workshop on Cryptography and Security in Computing …, 2014
Evaluation of randomness test results for short sequences
F Sulak, A Doğanaksoy, B Ege, O Koçak
Sequences and Their Applications–SETA 2010, 309-319, 2010
S-box, SET, match: a toolbox for S-box analysis
S Picek, L Batina, D Jakobović, B Ege, M Golub
IFIP International Workshop on Information Security Theory and Practice, 140-149, 2014
Optimality and beyond: The case of 4× 4 S-boxes
S Picek, B Ege, K Papagiannopoulos, L Batina, D Jakobović
2014 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2014
Clock glitch attacks in the presence of heating
T Korak, M Hutter, B Ege, L Batina
2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, 104-114, 2014
Differential scan attack on AES with X-tolerant and X-masked test response compactor
B Ege, A Das, S Gosh, I Verbauwhede
2012 15th Euromicro Conference on Digital System Design, 545-552, 2012
Statistical Analysis of Reduced Round Compression Functions of SHA-3 Second Round Candidates.
A Doganaksoy, B Ege, O Koçak, F Sulak
IACR Cryptol. ePrint Arch. 2010, 611, 2010
Neural Network Model Assessment for Side-Channel Analysis.
G Perin, B Ege, L Chmielewski
IACR Cryptol. ePrint Arch. 2019, 722, 2019
Memory encryption for smart cards
B Ege, EB Kavun, T Yalçın
International Conference on Smart Card Research and Advanced Applications …, 2011
Lowering the Bar: Deep Learning for Side-Channel Analysis (White-Paper)
G Perin, B Ege, J van Woudenberg
Proc. BlackHat, 1-15, 2018
Improving DPA resistance of S-boxes: How far can we go?
B Ege, K Papagiannopoulos, L Batina, S Picek
2015 IEEE International Symposium on Circuits and Systems (ISCAS), 2013-2016, 2015
Extended results for independence and sensitivity of NIST randomness tests
A Doğnaksoy, B Ege, K Muş
Information Security and Cryptography Conference, ISC Turkey, 2008
Near collision side channel attacks
B Ege, T Eisenbarth, L Batina
International Conference on Selected Areas in Cryptography, 277-292, 2015
Security of countermeasures against state-of-the-art differential scan attacks
B Ege, A Das, L Batina, I Verbauwhede
[Sl]: COST, 2013
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20