H-Index & Metrics Top Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 33 Citations 6,441 156 World Ranking 6625 National Ranking 104

Overview

What is she best known for?

The fields of study she is best known for:

  • Operating system
  • Cryptography
  • Algorithm

Lejla Batina focuses on Elliptic curve cryptography, Cryptography, Power analysis, Public-key cryptography and Authentication. Lejla Batina usually deals with Elliptic curve cryptography and limits it to topics linked to Modular arithmetic and Computer hardware, Parallel computing and Reconfigurable computing. The Cryptography study combines topics in areas such as Extension and Hardware implementations.

Lejla Batina combines subjects such as Adversary, Mutual information, Data mining and Key with her study of Power analysis. Her Public-key cryptography study combines topics in areas such as Cryptosystem and Authentication protocol. Her study in Authentication is interdisciplinary in nature, drawing from both Cryptographic protocol and Access control.

Her most cited work include:

  • Mutual Information Analysis (411 citations)
  • RFID-Tags for anti-counterfeiting (273 citations)
  • Elliptic-Curve-Based Security Processor for RFID (216 citations)

What are the main themes of her work throughout her whole career to date?

Her main research concerns Cryptography, Side channel attack, Elliptic curve cryptography, Embedded system and Public-key cryptography. Her Cryptography study improves the overall literature in Computer security. Her research in Side channel attack intersects with topics in Data mining, Computer engineering, Power analysis and Key, Advanced Encryption Standard.

Her Elliptic curve cryptography research includes elements of Field-programmable gate array, Modular arithmetic, Hardware architecture and Arithmetic. Lejla Batina interconnects Software and Elliptic curve cryptosystem in the investigation of issues within Embedded system. Her Public-key cryptography study integrates concerns from other disciplines, such as Cryptographic protocol, Multiplication and Distributed computing.

She most often published in these fields:

  • Cryptography (36.32%)
  • Side channel attack (22.65%)
  • Elliptic curve cryptography (22.65%)

What were the highlights of her more recent work (between 2018-2021)?

  • Side channel attack (22.65%)
  • Cryptography (36.32%)
  • Embedded system (19.66%)

In recent papers she was focusing on the following fields of study:

Lejla Batina mostly deals with Side channel attack, Cryptography, Embedded system, Computer engineering and Leakage. Her Side channel attack research is multidisciplinary, incorporating perspectives in Heuristics, Industrial engineering, Artificial intelligence and Implementation. Her Cryptography research is under the purview of Computer security.

Lejla Batina has included themes like Scalability, Hardware software, Code and Power analysis in her Embedded system study. Her research integrates issues of Brute-force search, Wearable computer, Reverse engineering, Fault injection and Rendering in her study of Computer engineering. Her study looks at the relationship between Deep learning and topics such as Cryptosystem, which overlap with Cryptanalysis, Attack model and Public-key cryptography.

Between 2018 and 2021, her most popular works were:

  • {CSI} {NN}: Reverse Engineering of Neural Network Architectures Through Electromagnetic Side Channel (49 citations)
  • Online Template Attacks (15 citations)
  • One Trace Is All It Takes: Machine Learning-Based Side-Channel Attack on EdDSA (9 citations)

In her most recent research, the most cited papers focused on:

  • Operating system
  • Cryptography
  • Algorithm

Side channel attack, Cryptography, Computer engineering, Artificial intelligence and Convolutional neural network are her primary areas of study. Her Side channel attack research incorporates themes from Artificial neural network, Multilayer perceptron and Leverage. Cryptography is a subfield of Algorithm that she tackles.

Her Computer engineering research includes themes of Fault injection, Software portability, Rendering and Brute-force search. Her Artificial intelligence study incorporates themes from Machine learning and Advanced Encryption Standard. Her work deals with themes such as Cryptosystem, Curve25519, Block cipher and Power analysis, which intersect with Deep learning.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

Mutual Information Analysis

Benedikt Gierlichs;Lejla Batina;Pim Tuyls;Bart Preneel.
cryptographic hardware and embedded systems (2008)

586 Citations

RFID-Tags for anti-counterfeiting

Pim Tuyls;Lejla Batina.
the cryptographers track at the rsa conference (2006)

488 Citations

Public-Key Cryptography for RFID-Tags

Lejla Batina;Jorge Guajardo;Tim Kerins;Nele Mentens.
pervasive computing and communications (2007)

293 Citations

Elliptic-Curve-Based Security Processor for RFID

Yong Ki Lee;K. Sakiyama;L. Batina;I. Verbauwhede.
IEEE Transactions on Computers (2008)

269 Citations

Mutual Information Analysis A Generic Side-Channel Distinguisher

Benedikt Gierlichs;Lejla Batina;Pim Tuyls;Bart Preneel.
Lecture Notes in Computer Science (2008)

267 Citations

Mutual Information Analysis: a Comprehensive Study

Lejla Batina;Benedikt Gierlichs;Emmanuel Prouff;Matthieu Rivain.
Journal of Cryptology (2011)

242 Citations

A very compact Perfectly masked S-box for AES

D. Canright;Lejla Batina.
applied cryptography and network security (2008)

190 Citations

Low-Cost elliptic curve cryptography for wireless sensor networks

Lejla Batina;Nele Mentens;Kazuo Sakiyama;Bart Preneel.
security of ad hoc and sensor networks (2006)

175 Citations

Hardware architectures for public key cryptography

Lejla Batina;Siddika Berna Örs;Bart Preneel;Joos Vandewalle.
Integration (2003)

158 Citations

A systematic evaluation of compact hardware implementations for the rijndael s-box

Nele Mentens;Lejla Batina;Bart Preneel;Ingrid Verbauwhede.
the cryptographers track at the rsa conference (2005)

156 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing Lejla Batina

François-Xavier Standaert

François-Xavier Standaert

Université Catholique de Louvain

Publications: 71

Sylvain Guilley

Sylvain Guilley

Télécom ParisTech

Publications: 70

Ingrid Verbauwhede

Ingrid Verbauwhede

KU Leuven

Publications: 56

Christof Paar

Christof Paar

Max Planck Society

Publications: 38

Tim Güneysu

Tim Güneysu

Ruhr University Bochum

Publications: 30

Patrick Schaumont

Patrick Schaumont

Worcester Polytechnic Institute

Publications: 28

Emmanuel Prouff

Emmanuel Prouff

Université Paris Cité

Publications: 26

Bart Preneel

Bart Preneel

KU Leuven

Publications: 26

Ahmad-Reza Sadeghi

Ahmad-Reza Sadeghi

TU Darmstadt

Publications: 26

Debdeep Mukhopadhyay

Debdeep Mukhopadhyay

Indian Institute of Technology Kharagpur

Publications: 20

Elisabeth Oswald

Elisabeth Oswald

University of Klagenfurt

Publications: 17

Claude Carlet

Claude Carlet

Paris 8 University

Publications: 16

Thomas Eisenbarth

Thomas Eisenbarth

University of Lübeck

Publications: 12

Reza Shokri

Reza Shokri

National University of Singapore

Publications: 12

Andrey Bogdanov

Andrey Bogdanov

CYBERCRYPT

Publications: 12

Something went wrong. Please try again later.