Lejla Batina focuses on Elliptic curve cryptography, Cryptography, Power analysis, Public-key cryptography and Authentication. Lejla Batina usually deals with Elliptic curve cryptography and limits it to topics linked to Modular arithmetic and Computer hardware, Parallel computing and Reconfigurable computing. The Cryptography study combines topics in areas such as Extension and Hardware implementations.
Lejla Batina combines subjects such as Adversary, Mutual information, Data mining and Key with her study of Power analysis. Her Public-key cryptography study combines topics in areas such as Cryptosystem and Authentication protocol. Her study in Authentication is interdisciplinary in nature, drawing from both Cryptographic protocol and Access control.
Her main research concerns Cryptography, Side channel attack, Elliptic curve cryptography, Embedded system and Public-key cryptography. Her Cryptography study improves the overall literature in Computer security. Her research in Side channel attack intersects with topics in Data mining, Computer engineering, Power analysis and Key, Advanced Encryption Standard.
Her Elliptic curve cryptography research includes elements of Field-programmable gate array, Modular arithmetic, Hardware architecture and Arithmetic. Lejla Batina interconnects Software and Elliptic curve cryptosystem in the investigation of issues within Embedded system. Her Public-key cryptography study integrates concerns from other disciplines, such as Cryptographic protocol, Multiplication and Distributed computing.
Lejla Batina mostly deals with Side channel attack, Cryptography, Embedded system, Computer engineering and Leakage. Her Side channel attack research is multidisciplinary, incorporating perspectives in Heuristics, Industrial engineering, Artificial intelligence and Implementation. Her Cryptography research is under the purview of Computer security.
Lejla Batina has included themes like Scalability, Hardware software, Code and Power analysis in her Embedded system study. Her research integrates issues of Brute-force search, Wearable computer, Reverse engineering, Fault injection and Rendering in her study of Computer engineering. Her study looks at the relationship between Deep learning and topics such as Cryptosystem, which overlap with Cryptanalysis, Attack model and Public-key cryptography.
Side channel attack, Cryptography, Computer engineering, Artificial intelligence and Convolutional neural network are her primary areas of study. Her Side channel attack research incorporates themes from Artificial neural network, Multilayer perceptron and Leverage. Cryptography is a subfield of Algorithm that she tackles.
Her Computer engineering research includes themes of Fault injection, Software portability, Rendering and Brute-force search. Her Artificial intelligence study incorporates themes from Machine learning and Advanced Encryption Standard. Her work deals with themes such as Cryptosystem, Curve25519, Block cipher and Power analysis, which intersect with Deep learning.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Mutual Information Analysis
Benedikt Gierlichs;Lejla Batina;Pim Tuyls;Bart Preneel.
cryptographic hardware and embedded systems (2008)
Public Key Cryptography for RFID-Tags
Lejla Batina;Jorge Guajardo;Tim Kerins;Nele Mentens.
IEEE Transactions on Information Theory (2012)
Elliptic-Curve-Based Security Processor for RFID
Yong Ki Lee;K. Sakiyama;L. Batina;I. Verbauwhede.
IEEE Transactions on Computers (2008)
Mutual Information Analysis A Generic Side-Channel Distinguisher
Benedikt Gierlichs;Lejla Batina;Pim Tuyls;Bart Preneel.
Lecture Notes in Computer Science (2008)
Mutual Information Analysis: a Comprehensive Study
Lejla Batina;Benedikt Gierlichs;Emmanuel Prouff;Matthieu Rivain.
Journal of Cryptology (2011)
A very compact Perfectly masked S-box for AES
D. Canright;Lejla Batina.
applied cryptography and network security (2008)
Low-Cost elliptic curve cryptography for wireless sensor networks
Lejla Batina;Nele Mentens;Kazuo Sakiyama;Bart Preneel.
security of ad hoc and sensor networks (2006)
EC-RAC (ECDLP Based Randomized Access Control): Provably Secure RFID authentication protocol
Yong Ki Lee;L. Batina;I. Verbauwhede.
international conference on rfid (2008)
Hardware architectures for public key cryptography
Lejla Batina;Siddika Berna Örs;Bart Preneel;Joos Vandewalle.
Integration (2003)
A systematic evaluation of compact hardware implementations for the rijndael s-box
Nele Mentens;Lejla Batina;Bart Preneel;Ingrid Verbauwhede.
the cryptographers track at the rsa conference (2005)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
KU Leuven
KU Leuven
University of Adelaide
Radboud University Nijmegen
Philips (Finland)
KU Leuven
University of York
Max Planck Institute for Security and Privacy
Radboud University Nijmegen
Ruhr University Bochum
University of Surrey
RWTH Aachen University
Simon Fraser University
Cornell University
Institut Agro, France
Memorial Sloan Kettering Cancer Center
Institute of Arctic and Alpine Research
University of Dundee
National Institutes of Health
Victoria University
Duke University
Population Health Research Institute
University of Washington
Australian National University
National Institute for Astrophysics
University of British Columbia