Publications (most recent first)


Book chapters
1. Y. K. Lee, L. Batina, D. Singele, B. Preneel, and I. Verbauwhede, "Anti-counterfeiting, un-traceability and other security challenges for RFID systems: public-key based protocols and hardware", chapter in Towards Hardware-Intrinsic Security, Springer, A. -R. Sadeghi and D. Naccache (eds.), 1st edition, 2010, pages 237-258, ISBN: 978-3-642-14451-6.
2 M. Knezevic, L. Batina, E. De Mulder, J. Fan, B. Gierlichs, Y. K. Lee, R. Maes, and I. Verbauwhede, "Signal Processing for Cryptography and Security Applications," chapter in Handbook of Signal Processing Systems, Springer, 17 pages, 2010.
3. K.Sakiyama, L. Batina, "Arithmetic for Public Key Cryptography", chapter in Secure Integrated Circuits and Systems, ISBN 978-0-387-71827-9, I. Verbauwhede (ed.), Springer , 2010.
4. L. Batina, K.Sakiyama and I. Verbauwhede, "Compact Public Key implementations for RFID and sensor nodes", chapter in Secure Integrated Circuits and Systems, ISBN 978-0-387-71827-9, I. Verbauwhede (ed.), Springer , 2010.
5. L. Batina, J. Guajardo, B. Preneel, P. Tuyls and I. Verbauwhede, "Public-Key Cryptography for RFID Tags and Applications", chapter in RFID Security: Techniques, Protocols and System-On-Chip Design, edited by P. Kitsos and Y. Zhang, Springer-Verlag, 2008.
6. L. Batina, S. Seys, B. Preneel and I. Verbauwhede, "Public-Key Primitives", chapter in Cryptology & Information Security Series (CIS, IOS Press), volume on Wireless Sensors Networks (WSN) Security, IOS PRESS, 2008, J. Lopez , and J. Zhou (eds.), 2008.
7. L. Batina, K.Sakiyama and I. Verbauwhede, "Architectures for public-key cryptography", chapter in Digital systems and applications, edited by V. Oklobdzija, Taylor & Francis, 2007
8.

P. Tuyls, J. Guajardo, L. Batina and T. Kerins, Anti-Counterfeiting, chapter in Security with noisy data,  edited by P. Tuyls, B. Skoric, T. Kevenaar, Springer-Verlag, 2007.

 

Journal papers
1. L. Batina, Y. K. Lee, S. Seys, D. Singele, and I. Verbauwhede, "Extending ECC-Based RFID Authentication Protocols to Privacy-Preserving Multi-Party Grouping Proofs," Journal of Personal and Ubiquitous Computing 16(3), pp. 323-335, 2012.
2. J. Fan, L. Batina, and I. Verbauwhede, "Design and design methods for unified multiplier and inverter and its application for HECC," Integration, the VLSI Journal 44(4), pp. 280-289, 2011.
3. L. Batina, B. Gierlichs, E. Prouff, M. Rivain, F.-X. Standaert, N. Veyrat-Charvillon, Mutual Information Analysis: a Comprehensive Study, Journal of Cryptology 24(2), pp. 269-291, 2011.
4. B. Ors, L. Batina, B. Preneel, and J. Vandewalle, ''Hardware implementation of an elliptic curve processor over GF(p) with Montgomery modular multiplier", Int. J. Embedded Systems, Vol. 3, No. 4, pp. 229-240, 2009.
5. Y. K. Lee, K. Sakiyama, L. Batina, and I. Verbauwhede, "Elliptic Curve Based Security Processor for RFID", IEEE Transactions on Computers, 57(11), pp. 1514-1527, 2008.
6. K. Sakiyama, L. Batina, B. Preneel, and I. Verbauwhede, "High-performance Public-key Cryptoprocessor for Wireless Mobile Applications," Mobile Networks and Applications 99(99), pp. 245-258, 2007.
7. K. Sakiyama, L. Batina, B. Preneel, and I. Verbauwhede, "Multi-core Curve-based Cryptoprocessor with Reconfigurable Modular Arithmetic Logic Units over GF(2n)," IEEE Transactions on Computers 56(9), 1269-1282, 2007.
8. K. Sakiyama, N. Mentens, L. Batina, B. Preneel, and I. Verbauwhede, "Reconfigurable Modular Arithmetic Logic Unit Supporting High-performance RSA and ECC over GF(p)," International Journal of Electronics 94(5), pp. 501-514, 2007.
9. K. Sakiyama, L. Batina, B. Preneel, and I. Verbauwhede, "Hardware/software co-design for public-key cryptosystems on the 8051 micro-controller", Computers and Electrical Engineering 33(2007), pp. 324-332, 2007.
10. A. Hodjat, L. Batina, D. Hwang, and I. Verbauwhede, "HW/SW Co-Design of a Hyperelliptic Curve Cryptosystem using a Microcode Instruction Set Coprocessor," Elsevier Integration, the VLSI Journal, special issue on Embedded Cryptographic Hardware, 40/1 pp. 45-51, 2006.
11. L. Batina, N. Mentens, B. Preneel, and I. Verbauwhede, "Balanced point operations for side-channel protection of elliptic curve cryptography," IEE Proceedings - Information Security 152(1), pp. 57-65, 2005.
12.

 L. Batina, P. Buysschaert, E. De Mulder, N. Mentens, S. B. rs, B. Preneel, G. Vandenbosch, and I. Verbauwhede "Side channel attacks and fault attacks on cryptographic algorithms," Revue HF Tijdschrift 2004(4), pp. 36-45, 2004.

13. L. Batina, S. B. Ors, B. Preneel, and J. Vandewalle, "Hardware Architectures for Public Key Cryptography," Elsevier Integration, the VLSI Journal, special issue on Embedded Cryptographic Hardware 34(1-2), pp. 1-64, 2003.

 

Conference papers

2012
1.

D. Mavroeidis, L. Batina, T. van Laarhoven, and E. Marchiori, " PCA, Eigenvector Localization and Clustering for Side-Channel Attacks on Cryptographic Hardware Devices",ECML/KDD(1), pp. 253-268, 2012.

2.

Gergely Alpar, Lejla Batina, Wouter Lueks, "Designated Attribute-Based Proofs for RFID Applications", RFIDsec 2012, Nijmegen, The Netherlands, July 1-3, 2012, LNCS 7739, J.-H. Hoepman and I. Verbauwhede (eds.), 59-74 pp., 2012, Nijmegen, The Netherlands, July 1-3, 2012.

3.

Martijn Sprengers, Lejla Batina, "Speeding up GPU-based password cracking ", SHARCS 2012, Washington D.C., March 17-18, 2012.

4.

Gergely Alpar, Lejla Batina, Roel Verdult, "Using NFC phones for proving credentials", In Proceedings of Measurement, Modelling, and Evaluation of Computing Systems and Dependability and Fault Tolerance - 16th International GI/ITG Conference, MMB & DFT 2012, Kaiserslautern, Germany, March 19-21, 2012. LNCS 7201, Jens B. Schmitt (ed.), Springer, 317-330, 2012.

5.

Lejla Batina, Jip Hogenboom. Jasper Van Woudenberg, "Getting more from PCA: First results of using Principal Component Analysis for extensive power analysis", The Cryptographers' Track at the RSA Conference, Lecture Notes in Computer Science 7178, O. Dunkelman (ed.), Springer-Verlag, 383-397, 2012.

6.

Josep Balasch, Benedikt Gierlichs, Roel Verdult, Lejla Batina, Ingrid Verbauwhede, "Power analysis of Atmel Crypto Memory - Recovering keys from secure EEPROM", In Topics in Cryptology - CT-RSA 2012, The Cryptographers' Track at the RSA Conference, Lecture Notes in Computer Science 7178, O. Dunkelman (ed.), Springer-Verlag, 19-34, 2012. 

 

2011
1.

Ruben Muijrers, Jasper Van Woudenberg and Lejla Batina, "RAM: Rapid Alignment Method", Emmanuel Prouff (Ed.), Smart Card Research and Advanced Applications - 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, LNCS 7079. pp. 266-282, Sept. 14-16, Leuven, Belgium.

2. L. Batina, S. Seys, D. Singele, and I. Verbauwhede, "Hierarchical ECC-Based RFID Authentication Protocol", In Workshop on RFID Security 2011 Lecture Notes in Computer Science 7055, K. Fu, A. Juels, and C. Paar (eds.), pp. 183-201, 2011.
3. D. Singelee, S. Seys, L. Batina, and I. Verbauwhede, "The Communication and Computation Cost of Wireless Security - Extended Abstract," In Proceedings of the 4th ACM conference on Wireless network security (WiSec 2011), June 15-17, Hamburg, Germany, ACM, 3 pages, 2011.

 

2010
1.
L. Batina, J. Hogenboom, N. Mentens, J. Moelans and J. Vliegen, "Side-channel evaluation of FPGA implementations of binary Edwards curves", ICECS, in International Conference on Electronics, Circuits and Systems 2010, pp. 1255-1258, Athens, Greece, Dec. 12-15, 2010.
2. L. Batina, Y. K. Lee, S. Seys, D. Singele, and I. Verbauwhede, "Short Paper: Privacy-preserving ECC-based grouping proofs for RFID", In Information Security - 13th International Conference, ISC 2010, Lecture Notes in Computer Science 6531, M. Burmester, S. Magliveras, G. Tsudik and I. Ilic (eds.), Springer-Verlag, pp. 159-165, Boca Raton, Florida, Oct. 25-28, 2010.
3. J. Fan, D. V. Bailey, L. Batina, T. Guneysu, C. Paar and I. Verbauwhede, "Breaking Elliptic Curves Cryptosystems using Reconfigurable Hardware", 20th International Conference on Field Programmable Logic and Applications (FPL 2010) Milano, Italy, Aug. 31st - Sep. 2nd, 2010.
4. Y. K. Lee, L. Batina, D. Singele, and I. Verbauwhede, "WideWeak PrivacyPreserving RFID Authentication Protocols," In International Conference on Mobile Lightweight Wireless Systems, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 45, J. Alonso-Zarate, and O. Hoffmann (eds.), Springer-Verlag, pp. 254-267, 2010.
5. Lejla Batina, Jaap-Henk Hoepman, Bart Jacobs, Wojciech Mostowski, and Pim Vullers. Developing efficient blinded attribute certificates on smart cards via pairings, In Smart Card Research and Advanced Applications, 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Lecture Notes in Computer Science 6035, Dieter Gollmann and Jean-Louis Lanet, (eds.), Springer-Verlag, pp., 209-222, Passau, Germany, April 13-16, 2010.
6. Y. K. Lee, L. Batina, D. Singele, and I. Verbauwhede, "Low-Cost Untraceable Authentication Protocols for RFID", In Proceedings of the 2010th ACM conference on Wireless network security (WiSec 2010), C. Nita-Rotaru, and F. Stajano (eds.), ACM, 10 pages, March 22-24, 2010, Hoboken, USA.
7. Yang Li, Kazuo Sakiyama, Lejla Batina, Daisuke Nakatsu, and Kazuo Ohta,"Power Variance Analysis Breaks a Masked ASIC Implementations of AES", In Design, Automation and Test in Europe (DATE 2010), IEEE, 6 pages, 2010, March 8-12, 2010, Dresden, Germany.
8. B. Gierlichs, L. Batina, B. Preneel,  and I. Verbauwhede, "Revisiting Higher-Order DPA Attacks: Multivariate Mutual Information Analysis", In Topics in Cryptology - CT-RSA 2010, The Cryptographers' Track at the RSA ConferenceLecture Notes in Computer Science 5985, J. Pieprzyk (ed.), Springer-Verlag, pp. 221-234, March 1-5, 2010, San Francisco, CA.

 

2009
1. A. Van Herrewege, L. Batina, M. KnezevicI. Verbauwhede and B. Preneel, "Compact Implementations of Pairings", In 4th Benelux Workshop on Information and System Security - WISSec 2009, November 19-20, 2009, Louvain-la-Neuve, Belgium.
2. J. Fan, L. Batina, and I. Verbauwhede, "Light-weight implementation options for curve-based cryptography: HECC is also ready for RFID," In The 1st International workshop on RFID Security and Cryptography - RISC 2009, 6 pages, November 10, 2009, London, UK.
3. D. V. Bailey, B. Baldwin, L. Batina, D. J. Bernstein, P. Birkner, J. W. Bos, G. De Meulenaer, J. Fan, T. Guneysu, F. Gurkaynak, T. Kleinjung, T. Lange, N. Mentens, C. Paar, F. Regazzoni, P. Schwabe, L. Uhsadel, and G. Van Damme, "The Certicom Challenges ECC2-X," In ECRYPT Workshop, SHARCS - Special Purpose Hardware for Attacking Cryptographic Systems, 29 pages, September 09 -10, 2009, Lausanne, Switzerland.
4. L. Batina, B. Gierlichs, and K. Lemke-Rust, "Differential Cluster Analysis," In Cryptographic Hardware and Embedded Systems - CHES 2009, Lecture Notes in Computer Science 5747, C. Clavier, and K. Gaj (eds.), Springer-Verlag, pp. 112-127, Sept. 6-9, 2009.
5. Y. K. Lee, L. Batina, and I. Verbauwhede, "Privacy challenges in RFID systems," In 20th Tyrrhenian Workshop on Digital Communications: The Internet of things, Springer LLC2010, D. Giusto et al. (eds.) pp. 395-405, 2009, Pula, Sardinia, September 2-4, 2009.
6. J. Fan, M. Knezevic, D. Karaklajic, R. Maes, V. Rozic, L. Batina, and I. Verbauwhede, "FPGA-based Testing Strategy for Cryptographic Chips: A Case Study on Elliptic Curve Processor for RFID Tags," In IEEE international online testing symposium, IOLTS 2009, IEEE, pp. 189-191, Sesimbra-Lisbon, Portugal, June 24-27, 2009.
7. M. Knezevic, L. Batina, and I. Verbauwhede, "Modular Reduction without Precomputational Phase," In Proc. IEEE International Symposium on Circuits and Systems (ISCAS 2009), 4 pages, May 24-27, 2009, Taipei, Taiwan.
8. Y. K. Lee, L. Batina, and I. Verbauwhede, "Untraceable RFID Authentication Protocols: Revision of EC-RAC," In IEEE International Conference on RFID 2009, IEEE, pp. 178-185, April 27-28, 2009, Orlando.

 

2008
1. Y. De Mulder, G. Danezis, L. Batina, and B. Preneel, "Identification via Location-Profiling in GSM Networks", In Workshop on Privacy in the Electronic Society (WPES) 2008 ACM, 8 pages, October, 2008.
2. L. Batina, B. Gierlichs, and K. Lemke-Rust, "Comparative Evaluation of Rank Correlation based DPA on an AES prototype chip," In Proceedings of the 11th Information Security Conference (ISC 2008), Lecture Notes in Computer Science 5222, C. Lei, and T. Wu (eds.), Springer-Verlag, 341-354, 2008.
3. B. Gierlichs, L. Batina, P. Tuyls, and B. Preneel, "Mutual Information Analysis - A Generic Side-Channel Distinguisher", In Cryptographic Hardware and Embedded Systems - CHES 2008, Lecture Notes in Computer Science 5154, E. Oswald, and P. Rohatgi (eds.), Springer-Verlag, pp. 426-442, 2008.
4. J. Fan, L. Batina, and I. Verbauwhede, "HECC Goes Embedded: An Area-efficient Implementation of HECC", In Proceedings of 15th Annual Workshop on Selected Areas in Cryptography (SAC 2008),  Lecture Notes in Computer Science, R. Avanzi, L. Keliher and F. Sica (eds.), Springer-Verlag, 15 pages, 2008.
5. A. C. Atici, L. Batina, B. Gierlichs, and I. Verbauwhede, "Power analysis on NTRU implementations for RFIDs: First results," In Workshop on RFID Security 2008,  11 pages, July 9-11, 2008, Budapest, Hungary.
6. A. C. Atici, L. Batina, J. Fan, I. Verbauwhede, and S. B. rs, "Low-cost Implementations of NTRU for pervasive security," In Proceedings of the IEEE 19th International Conference on Application-specific Systems, Architectures and Processors (ASAP 2008), 6 pages, July 2-4, 2008, Leuven.
7. D. Canright and L. Batina, A Very Compact "Perfectly Masked" S-Box for AES, Applied Cryptography and Network Security, ACNS 2008, S. Bellovin and R. Gennaro (eds.), LNCS 5037, Springer-Verlag, pp. 446-459, June 3-6, New York.
8. Y. K. Lee, L. Batina, and I. Verbauwhede, EC-RAC (ECDLP Based Randomized Access Control): Provably Secure RFID authentication protocol, In IEEE International Conference on RFID 2008, pp. 97-104, April 16-17, 2008, Las Vegas.
9. J. Fan, L. Batina, K. Sakiyama, and I. Verbauwhede, "FPGA Design for Algebraic Torus-Based Public Key Cryptography," In Proc. of Design Automation and Test in Europe (DATE 2008), 6 pages, March 10-14, 2008, Munich.
10. B. Gierlichs, L. Batina, C. Clavier, T. Eisenbarth, A. Gouget, H. Handschuh, T. Kasper, K. Lemke-Rust, S. Mangard, A. Moradi, and E. Oswald, "Susceptibility of eSTREAM Candidates towards Side Channel Analysis," In ECRYPT Workshop, SASC - The State of the Art of Stream Ciphers, C. De Canniere, and O. Dunkelman (eds.), 28 pages, February, 2008.

 

2007
1. N. Mentens, K. Sakiyama, L. Batina, B. Preneel, and I. Verbauwhede, "A side-channel attack resistant programmable PKC coprocessor for embedded applications," In International Symposium on Systems, Architectures, MOdeling and Simulation (SAMOS), IEEE, 8 pages, July 16-19, 2007, Samos, Greece.
2. L. Batina, N. Mentens, K. Sakiyama, B. Preneel, and I. Verbauwhede, "Public-Key Cryptography on the Top of a Needle", In Proc. of IEEE International Symposium on Circuits and Systems (ISCAS 2007), Special Session: Novel Cryptographic Architectures for Low-Cost RFID, 4 pages, May 27-30, 2007, New Orleans.
3. L. Batina, J. Guajardo, T. Kerins, N. Mentens, P. Tuyls and I. Verbauwhede, "Public-Key Cryptography for RFID-Tags'', Fourth IEEE International Workshop on Pervasive Computing and Communication Security - PerSec 2007, 6 pages, March 19, 2007, New York.

 

2006
1. L. Batina, J. Guajardo, T. Kerins, N. Mentens, P. Tuyls, and I. Verbauwhede, "An Elliptic Curve Processor Suitable For RFID-Tags," In 1st Benelux Workshop on Information and System Security (WISSec 2006), 14 pages, Antwerpen, Belgium, November 8-9, 2006.
2. K. Sakiyama, L. Batina, B. Preneel, and I. Verbauwhede, "Superscalar Coprocessor for High-speed Curve-based Cryptography," In Cryptographic Hardware and Embedded Systems - CHES 2006, Lecture Notes in Computer Science, 4249/2006, L. Goubin and M. Matsui (eds.), Springer-Verlag, pp. 415-429, October 10-13, 2006, Yokohama, Japan.
3. L. Batina, N. Mentens, K. Sakiyama, B. Preneel, and I. Verbauwhede, "Low-cost Elliptic Curve Cryptography for wireless sensor networks", In Third European Workshop on Security and Privacy in Ad hoc and Sensor Networks, Lecture Notes in Computer Science 4357, Springer-Verlag, pp. 6-17, L. Buttyan, V. Gligor, and D. Westhoff (Eds.) September 20-21, 2006, Hamburg, Germany.
4. N. Mentens, K. Sakiyama, L. Batina, B. Prenel, and I. Verbauwhede, "FPGA-oriented Secure Data Path Design: Implementation of a Public Key Coprocessor", In proceedings of FPL 2006, 16th International Conference on Field Programmable Logic and Applications, 6 pages, August 28-30, 2006, Madrid, Spain.
5. L. Batina, A. Hodjat, D. Hwang, K. Sakiyama, and I. Verbauwhede, "Reconfigurable architectures for curve-based cryptography on embedded micro-controllers", In proceedings of FPL 2006, 16th International Conference on Field Programmable Logic and Applications, 4 pages, August 28-30, 2006, Madrid, Spain.
6. K. Sakiyama, L. Batina, B. Preneel, and I. Verbauwhede, "HW/SW Co-design for Accelerating Public-Key Cryptosystems over GF(p) on the 8051 -controller," In Proceedings of IFMIP - WAC 2006, Special Sessions on Information Security and Hardware Implementations, 6 pages, July 24-27, 2006, Budapest, Hungary.
7. K. Sakiyama, L. Batina, N. Mentens, B. Preneel, and I. Verbauwhede, "Small-footprint ALU for public-key processors for pervasive security," In Workshop on RFID Security 2006, 12 pages, July 12-14, 2006, Graz, Austria.
8. L. Batina, J. Guajardo, T. Kerins, N. Mentens, Pim Tuyls and I. Verbauwhede, "Public Key Cryptography for RFID-Tags",  In Workshop on RFID Security 2006, 16 pages, July 12-14, 2006, Graz, Austria.
9. L. Batina, N. Mentens, B. Preneel, and I. Verbauwhede, "Flexible Hardware Architectures for Curve-based Cryptography," In Proc. of IEEE International Symposium on Circuits and Systems (ISCAS 2006), 4 pages, May 21-24, 2006, Island of Kos, Greece.
10. K. Sakiyama, N. Mentens, L. Batina, B. Preneel, and I. Verbauwhede, "Reconfigurable Modular Logic Arithmetic Unit for High-performance Public-key Cryptosystems," In International Workshop on Applied Reconfigurable Computing (ARC2006), Lecture Notes in Computer Science 3985, Springer-Verlag, pp. 347-357, March 1-3, 2006, Delft, The Netherlands.
11. N. Mentens, L. Batina, B. Prenel, and I. Verbauwhede, "Time-memory trade-off attack on FPGA platforms: UNIX password cracking," In International Workshop on Applied Reconfigurable Computing (ARC2006), Lecture Notes in Computer Science, 3985, Springer-Verlag, pp. 323-334, March 1-3, 2006, Delft, The Netherlands.
12. P. Tuyls, and L. Batina, "RFID-Tags for Anti-Counterfeiting," In Topics in Cryptology - CT-RSA 2006, The Cryptographers' Track at the RSA Conference, Lecture Notes in Computer Science 3860, D. Pointcheval (ed.), Springer-Verlag, pp. 115-131, February, 13-17, 2006, San Jose, CA.
13. L. Batina, S. Kumar, J. Lano, K. Lemke, N. Mentens, C. Paar, B. Prenel, K. Sakiyama, and I. Verbauwhede, "Testing Framework for eSTREAM Profile II Candidates," In ECRYPT Workshop, SASC - The State of the Art of Stream Ciphers, 9 pages, February 2-3, 2006, Leuven, Belgium.

 

2005
1. A. Hodjat, L. Batina, D. Hwang, and I. Verbauwhede, "A Hyperelliptic Curve Crypto Coprocessor for an 8051 Microcontroller," In proceedings of the IEEE Workshop on Signal Processing Systems: Design and Implementation (SIPS 2005), IEEE, pp. 93-98, November 2-4, 2005, Athens, Greece.
2. K. Sakiyama, L. Batina, P. Schaumont, and I. Verbauwhede, "HW/SW Co-design for TA/SPA-resistant Public-Key Cryptosystems," In ECRYPT Workshop, CRASH - CRyptographic Advances in Secure Hardware, 8 pages, September 6-7, 2005, Leuven, Belgium.
3. L. Batina, D. Hwang, A. Hodjat, B. Preneel, and I. Verbauwhede, "Hardware/Software Co-design for Hyperelliptic Curve Cryptography (HECC) on the 8051 microprocessor," In Cryptographic Hardware and Embedded Systems - CHES 2005, Lecture Notes in Computer Science 3659, J. R. Rao, and B. Sunar (eds.), Springer-Verlag, pp. 106-118, August 29-September 1, 2005, Edinburgh, Scotland.
4. L. Batina, N. Mentens, B. Preneel, and I. Verbauwhede, "Algorithms and Architectures for Curve-based Cryptography over GF(2n)," In Proceedings of the IEEE 16th International Conference on Application-specific Systems, Architectures and Processors (ASAP 2005), pp. 350-355, July 23-25, Samos, Greece, 2005.
5. L. Batina, N. Mentens, and I. Verbauwhede, "Side-channel Issues for Designing Secure Hardware Implementations," In IEEE international online testing symposium, IOLTS 2005, special session on side-channel and fault attacks IEEE, 4 pages, July 6-8, 2005, Saint Raphael, France.
6. N. Mentens, L. Batina, B. Preneel, and I. Verbauwhede, "Cracking Unix Passwords using FPGA Platforms," In ECRYPT Workshop, SHARCS - Special Purpose Hardware for Attacking Cryptographic Systems, pp. 83-91, February 24-25, 2005, Paris, France.
7. N. Mentens, L. Batina, B. Preneel, and I. Verbauwhede, "A Systematic Evaluation of Compact Hardware Implementations for the Rijndael S-box," In Topics in Cryptology - CT-RSA 2005, The Cryptographers' Track at the RSA Conference, Lecture Notes in Computer Science LNCS 3376, A. Menezes (ed.), Springer-Verlag, pp. 323-333, February 14-18, 2005, San Francisco, CA.
 

2004

1. N. Mentens, L. Batina, B. Preneel, and I. Verbauwhede, "An FPGA Implementation of Rijndael: Trade-offs for side-channel security," In IFAC Workshop - PDS 2004, Programmable Devices and Systems, Elsevier, 6 pages, November, 2004.
2. L. Batina, N. Mentens, and B. Preneel, "A New Systolic Architecture for Multiplication in GF(2n)," In IFAC Workshop - PDS 2004, Programmable Devices and Systems, Elsevier, 6 pages, November, 2004.
3. L. Batina, J. Lano, N. Mentens, S. B. rs, B. Preneel, and I. Verbauwhede "Energy, Performance, Area versus Security Trade-offs for Stream Ciphers," In ECRYPT Workshop, SASC - The State of the Art of Stream Ciphers, pp. 302-310, October 14-15, 2004, Brugge, Belgium.
4. L. Batina, N. Mentens, B. Preneel, and S. B. rs, "Serial Multiplier Architectures over GF(2n) for Elliptic Curve Cryptosystems," In Proceedings of the 12th IEEE Mediterranean Electrotechnical Conference (MELECON 2004), 4 pages, May 12 - 15, 2004, Dubrovnik, Croatia.
5. L. Batina, G. Bruin-Muurling, and S. B. rs, "Flexible Hardware Design for RSA and Elliptic Curve Cryptosystems," In Topics in Cryptology - CT-RSA 2004, The Cryptographers' Track at the RSA Conference, Lecture Notes in Computer Science 2964, T. Okamoto (ed.), Springer-Verlag, pp. 250-263, February 23-27, 2004, San Francisco, CA.
 

2003

1. S. B. rs, L. Batina, B. Preneel, and J. Vandewalle, "Hardware Implementation of an Elliptic Curve Processor over GF(p)," In Proceedings of the IEEE 14th International Conference on Application-specific Systems, Architectures and Processors (ASAP 2003), pp. 433-443, June 24-26, 2003, The Hague, The Netherlands.
2. L. Batina, and C. J. Jansen, "Side-Channel Entropy for Modular Exponentiation Algorithms," In Proceedings of the 24th Symposium on Information Theory in the Benelux, Werkgemeenschap voor Informatie- en Communicatietheorie, pp. 37-44, May 22-23, Veldhoven, The Netherlands, 2003.
3. S. B. rs, L. Batina, B. Preneel, and J. Vandewalle, "Hardware Implementation of a Montgomery Modular Multiplier in a Systolic Array," In Proceedings of the 10th Reconfigurable Architectures Workshop (RAW 2003), 8 pages, April 22, Nice, France, 2003.
 

2002

1. L. Batina, G. Muurling, "Montgomery in practice: How to do it more efficiently in hardware", Topics in Cryptology - CT- RSA 2002 The Cryptographers' Track at the RSA Conference 2002, San Jose, CA, USA, February 2002,  Lecture Notes in Computer Science, LNCS 2271, Preneel, Bart (Ed.), pp. 40-52, February, 17-24, 2002, San Jose, CA.
2. L. Batina, C. J. Jansen, G. Muurling, and S. Xu, "Almost Montgomery' Base Multiplier in GF(2n)," In Proceedings of the 23rd Symposium on Information Theory in the Benelux, B. Macq, and J. Quisquater (eds.), Werkgemeenschap voor Informatie- en Communicatietheorie, pp. 61-68, May, 2002.
3. L. Batina, and C. J. Jansen, "Secret exponent information leakage for timing analyses," In Proceedings of the 23rd Symposium on Information Theory in the Benelux, B. Macq, and J. Quisquater (eds.), Werkgemeenschap voor Informatie- en Communicatietheorie, pp. 225-232, May, 2002.

 

2001
1. S. Xu, L. Batina, "Efficient Implementation of Elliptic Curve Cryptosystems on an ARM7 with Hardware Accelerator", Proceedings of 4th International Conference, ISC 2001, Lecture Notes in Computer Science, Davida, George I.; Frankel, Yair (Eds.), pp. 266-279, LNCS 2200, October 1-3, 2001, Malaga, Spain.
2. L. Batina, G. Muurling, "Another Way of Doing RSA Cryptography in Hardware", Cryptography and Coding 8th IMA International Conference, Lecture Notes in Computer Science, Honary, Bahram (Ed.), pp. 364-373, LNCS 2260, December 17-19, 2001, Cirencester, UK.

 

Theses
1. L. Batina, "Alexandrov-Fenchel inequality for mixed volumes and applications", M.Sc. thesis, University of Zagreb, Croatia, July, 1995.
2. L. Batina, "Power attacks on cryptographic algorithms'', PDEng thesis, TU Eindhoven,  April, 2001.
3. L. Batina, "Arithmetic and Architectures for Secure Hardware Implementations of Public-Key Cryptography," PhD thesis, Katholieke Universiteit Leuven, B. Preneel, and I. Verbauwhede (promotors), 247 pages, 2005.

 

Preprints
1. Y. De Mulder, G. Danezis, L. Batina, and B. Preneel, "Identification via Location-Profiling in GSM Networks," COSIC internal report, 19 pages, 2008.
2. L. Batina, J. Guajardo, T. Kerins, N. Mentens, P. Tuyls and I. Verbauwhede, "An Elliptic Curve Processor Suitable For RFID-Tags", IACR ePrint Archive, 2006/227.