Barış Ege
Cited by
Cited by
Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer.
R Verdult, FD Garcia, B Ege
USENIX Security Symposium, 703-718, 2013
Dietary recommendations for lightweight block ciphers: power, energy and area analysis of recently developed architectures
L Batina, A Das, B Ege, EB Kavun, N Mentens, C Paar, I Verbauwhede, ...
Radio Frequency Identification: Security and Privacy Issues 9th …, 2013
Compact implementation and performance evaluation of hash functions in attiny devices
J Balasch, B Ege, T Eisenbarth, B Gérard, Z Gong, T Güneysu, S Heyse, ...
Smart Card Research and Advanced Applications: 11th International Conference …, 2013
Confused by confusion: Systematic evaluation of DPA resistance of various s-boxes
S Picek, K Papagiannopoulos, B Ege, L Batina, D Jakobovic
Progress in Cryptology--INDOCRYPT 2014: 15th International Conference on …, 2014
S-box, SET, match: a toolbox for S-box analysis
S Picek, L Batina, D Jakobović, B Ege, M Golub
Information Security Theory and Practice. Securing the Internet of Things …, 2014
Cryptographic randomness testing of block ciphers and hash functions
A Doğanaksoy, B Ege, O Koçak, F Sulak
Cryptology ePrint Archive, 2010
Security analysis of industrial test compression schemes
A Das, B Ege, S Ghosh, L Batina, I Verbauwhede
IEEE transactions on computer-aided design of integrated circuits and …, 2013
Clock glitch attacks in the presence of heating
T Korak, M Hutter, B Ege, L Batina
2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, 104-114, 2014
On using genetic algorithms for intrinsic side-channel resistance: the case of AES s-box
S Picek, B Ege, L Batina, D Jakobovic, Ł Chmielewski, M Golub
Proceedings of the First Workshop on Cryptography and Security in Computing …, 2014
Evaluation of randomness test results for short sequences
F Sulak, A Doğanaksoy, B Ege, O Koçak
Sequences and Their Applications–SETA 2010, 309-319, 2010
Optimality and beyond: The case of 4× 4 S-boxes
S Picek, B Ege, K Papagiannopoulos, L Batina, D Jakobović
2014 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2014
Differential scan attack on AES with X-tolerant and X-masked test response compactor
B Ege, A Das, S Gosh, I Verbauwhede
2012 15th Euromicro Conference on Digital System Design, 545-552, 2012
Neural network model assessment for side-channel analysis
G Perin, B Ege, L Chmielewski
Cryptology ePrint Archive, 2019
Lowering the bar: Deep learning for side-channel analysis (white-paper)
G Perin, B Ege, J van Woudenberg
Proc. BlackHat, 1-15, 2018
Statistical analysis of reduced round compression functions of SHA-3 second round candidates
A Doğanaksoy, B Ege, O Koçak, F Sulak
Cryptology ePrint Archive, 2010
Architecture correlation analysis (ACA): identifying the source of side-channel leakage at gate-level
Y Yao, T Kathuria, B Ege, P Schaumont
2020 IEEE International Symposium on Hardware Oriented Security and Trust …, 2020
Extended results for independence and sensitivity of NIST randomness tests
A Doganaksoy, B Ege, K Mus
Information Security and Cryptography Conference, ISC Turkey, 25-27, 2008
Improving DPA resistance of S-boxes: How far can we go?
B Ege, K Papagiannopoulos, L Batina, S Picek
2015 IEEE International Symposium on Circuits and Systems (ISCAS), 2013-2016, 2015
Memory encryption for smart cards
B Ege, EB Kavun, T Yalçın
Smart Card Research and Advanced Applications: 10th IFIP WG 8.8/11.2 …, 2011
Near collision side channel attacks
B Ege, T Eisenbarth, L Batina
Selected Areas in Cryptography–SAC 2015: 22nd International Conference …, 2016
The system can't perform the operation now. Try again later.
Articles 1–20