D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 35 Citations 6,382 214 World Ranking 7548 National Ranking 122

Overview

What is she best known for?

The fields of study she is best known for:

  • Operating system
  • Cryptography
  • Algorithm

Lejla Batina focuses on Elliptic curve cryptography, Cryptography, Power analysis, Public-key cryptography and Authentication. Lejla Batina usually deals with Elliptic curve cryptography and limits it to topics linked to Modular arithmetic and Computer hardware, Parallel computing and Reconfigurable computing. The Cryptography study combines topics in areas such as Extension and Hardware implementations.

Lejla Batina combines subjects such as Adversary, Mutual information, Data mining and Key with her study of Power analysis. Her Public-key cryptography study combines topics in areas such as Cryptosystem and Authentication protocol. Her study in Authentication is interdisciplinary in nature, drawing from both Cryptographic protocol and Access control.

Her most cited work include:

  • Mutual Information Analysis (411 citations)
  • RFID-Tags for anti-counterfeiting (273 citations)
  • Elliptic-Curve-Based Security Processor for RFID (216 citations)

What are the main themes of her work throughout her whole career to date?

Her main research concerns Cryptography, Side channel attack, Elliptic curve cryptography, Embedded system and Public-key cryptography. Her Cryptography study improves the overall literature in Computer security. Her research in Side channel attack intersects with topics in Data mining, Computer engineering, Power analysis and Key, Advanced Encryption Standard.

Her Elliptic curve cryptography research includes elements of Field-programmable gate array, Modular arithmetic, Hardware architecture and Arithmetic. Lejla Batina interconnects Software and Elliptic curve cryptosystem in the investigation of issues within Embedded system. Her Public-key cryptography study integrates concerns from other disciplines, such as Cryptographic protocol, Multiplication and Distributed computing.

She most often published in these fields:

  • Cryptography (36.32%)
  • Side channel attack (22.65%)
  • Elliptic curve cryptography (22.65%)

What were the highlights of her more recent work (between 2018-2021)?

  • Side channel attack (22.65%)
  • Cryptography (36.32%)
  • Embedded system (19.66%)

In recent papers she was focusing on the following fields of study:

Lejla Batina mostly deals with Side channel attack, Cryptography, Embedded system, Computer engineering and Leakage. Her Side channel attack research is multidisciplinary, incorporating perspectives in Heuristics, Industrial engineering, Artificial intelligence and Implementation. Her Cryptography research is under the purview of Computer security.

Lejla Batina has included themes like Scalability, Hardware software, Code and Power analysis in her Embedded system study. Her research integrates issues of Brute-force search, Wearable computer, Reverse engineering, Fault injection and Rendering in her study of Computer engineering. Her study looks at the relationship between Deep learning and topics such as Cryptosystem, which overlap with Cryptanalysis, Attack model and Public-key cryptography.

Between 2018 and 2021, her most popular works were:

  • {CSI} {NN}: Reverse Engineering of Neural Network Architectures Through Electromagnetic Side Channel (49 citations)
  • Online Template Attacks (15 citations)
  • One Trace Is All It Takes: Machine Learning-Based Side-Channel Attack on EdDSA (9 citations)

In her most recent research, the most cited papers focused on:

  • Operating system
  • Cryptography
  • Algorithm

Side channel attack, Cryptography, Computer engineering, Artificial intelligence and Convolutional neural network are her primary areas of study. Her Side channel attack research incorporates themes from Artificial neural network, Multilayer perceptron and Leverage. Cryptography is a subfield of Algorithm that she tackles.

Her Computer engineering research includes themes of Fault injection, Software portability, Rendering and Brute-force search. Her Artificial intelligence study incorporates themes from Machine learning and Advanced Encryption Standard. Her work deals with themes such as Cryptosystem, Curve25519, Block cipher and Power analysis, which intersect with Deep learning.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Mutual Information Analysis

Benedikt Gierlichs;Lejla Batina;Pim Tuyls;Bart Preneel.
cryptographic hardware and embedded systems (2008)

712 Citations

Public Key Cryptography for RFID-Tags

Lejla Batina;Jorge Guajardo;Tim Kerins;Nele Mentens.
IEEE Transactions on Information Theory (2012)

336 Citations

Elliptic-Curve-Based Security Processor for RFID

Yong Ki Lee;K. Sakiyama;L. Batina;I. Verbauwhede.
IEEE Transactions on Computers (2008)

287 Citations

Mutual Information Analysis A Generic Side-Channel Distinguisher

Benedikt Gierlichs;Lejla Batina;Pim Tuyls;Bart Preneel.
Lecture Notes in Computer Science (2008)

278 Citations

Mutual Information Analysis: a Comprehensive Study

Lejla Batina;Benedikt Gierlichs;Emmanuel Prouff;Matthieu Rivain.
Journal of Cryptology (2011)

274 Citations

A very compact Perfectly masked S-box for AES

D. Canright;Lejla Batina.
applied cryptography and network security (2008)

197 Citations

Low-Cost elliptic curve cryptography for wireless sensor networks

Lejla Batina;Nele Mentens;Kazuo Sakiyama;Bart Preneel.
security of ad hoc and sensor networks (2006)

184 Citations

EC-RAC (ECDLP Based Randomized Access Control): Provably Secure RFID authentication protocol

Yong Ki Lee;L. Batina;I. Verbauwhede.
international conference on rfid (2008)

163 Citations

Hardware architectures for public key cryptography

Lejla Batina;Siddika Berna Örs;Bart Preneel;Joos Vandewalle.
Integration (2003)

163 Citations

A systematic evaluation of compact hardware implementations for the rijndael s-box

Nele Mentens;Lejla Batina;Bart Preneel;Ingrid Verbauwhede.
the cryptographers track at the rsa conference (2005)

157 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Lejla Batina

François-Xavier Standaert

François-Xavier Standaert

Université Catholique de Louvain

Publications: 71

Sylvain Guilley

Sylvain Guilley

Télécom ParisTech

Publications: 70

Ingrid Verbauwhede

Ingrid Verbauwhede

KU Leuven

Publications: 56

Christof Paar

Christof Paar

Max Planck Institute for Security and Privacy

Publications: 38

Tim Güneysu

Tim Güneysu

Ruhr University Bochum

Publications: 30

Patrick Schaumont

Patrick Schaumont

Worcester Polytechnic Institute

Publications: 28

Emmanuel Prouff

Emmanuel Prouff

Apple (France)

Publications: 26

Bart Preneel

Bart Preneel

KU Leuven

Publications: 26

Ahmad-Reza Sadeghi

Ahmad-Reza Sadeghi

Technical University of Darmstadt

Publications: 26

Debdeep Mukhopadhyay

Debdeep Mukhopadhyay

Indian Institute of Technology Kharagpur

Publications: 20

Elisabeth Oswald

Elisabeth Oswald

University of Klagenfurt

Publications: 17

Claude Carlet

Claude Carlet

Paris 8 University

Publications: 16

Thomas Eisenbarth

Thomas Eisenbarth

University of Lübeck

Publications: 12

Reza Shokri

Reza Shokri

National University of Singapore

Publications: 12

Andrey Bogdanov

Andrey Bogdanov

CYBERCRYPT

Publications: 12

Peter Schwabe

Peter Schwabe

Radboud University Nijmegen

Publications: 12

Trending Scientists

Klaus Moessner

Klaus Moessner

University of Surrey

Max C. Lemme

Max C. Lemme

RWTH Aachen University

Hua-Zhong Yu

Hua-Zhong Yu

Simon Fraser University

B. Franklin Pugh

B. Franklin Pugh

Cornell University

David Renaudeau

David Renaudeau

Institut Agro, France

Andrew Koff

Andrew Koff

Memorial Sloan Kettering Cancer Center

Mark W. Williams

Mark W. Williams

Institute of Arctic and Alpine Research

Arthur P. Cracknell

Arthur P. Cracknell

University of Dundee

Dardo Tomasi

Dardo Tomasi

National Institutes of Health

Damian Farrow

Damian Farrow

Victoria University

Nathan A. Kimbrel

Nathan A. Kimbrel

Duke University

Jackie Bosch

Jackie Bosch

Population Health Research Institute

Frederick A. Matsen

Frederick A. Matsen

University of Washington

Carolyn M. Hendriks

Carolyn M. Hendriks

Australian National University

Eugenio Carretta

Eugenio Carretta

National Institute for Astrophysics

Ian Affleck

Ian Affleck

University of British Columbia

Something went wrong. Please try again later.