default search action
Baris Ege
Person information
- unicode name: Bariş Ege
- affiliation: Radboud University Nijmegen, Digital Security Group
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c16]Baris Ege, Bob Swinkels, Dilara Toprakhisar, Praveen Kumar Vadnala:
Practical Improvements to Statistical Ineffective Fault Attacks. COSADE 2024: 59-75 - [i9]Baris Ege, Bob Swinkels, Dilara Toprakhisar, Praveen Kumar Vadnala:
Practical Improvements to Statistical Ineffective Fault Attacks. IACR Cryptol. ePrint Arch. 2024: 284 (2024) - 2021
- [i8]Yuan Yao, Tuna B. Tufan, Tarun Kathuria, Baris Ege, Ulkuhan Guler, Patrick Schaumont:
Pre-silicon Architecture Correlation Analysis (PACA): Identifying and Mitigating the Source of Side-channel Leakage at Gate-level. IACR Cryptol. ePrint Arch. 2021: 530 (2021) - 2020
- [c15]Yuan Yao, Tarun Kathuria, Baris Ege, Patrick Schaumont:
Architecture Correlation Analysis (ACA): Identifying the Source of Side-channel Leakage at Gate-level. HOST 2020: 188-196 - [i7]Yuan Yao, Tarun Kathuria, Baris Ege, Patrick Schaumont:
Architecture Correlation Analysis (ACA): Identifying the Source of Side-channel Leakage at Gate-level. IACR Cryptol. ePrint Arch. 2020: 1192 (2020)
2010 – 2019
- 2019
- [i6]Guilherme Perin, Baris Ege, Lukasz Chmielewski:
Neural Network Model Assessment for Side-Channel Analysis. IACR Cryptol. ePrint Arch. 2019: 722 (2019) - 2015
- [c14]Ricardo Chaves, Giorgio Di Natale, Lejla Batina, Shivam Bhasin, Baris Ege, Apostolos P. Fournaris, Nele Mentens, Stjepan Picek, Francesco Regazzoni, Vladimir Rozic, Nicolas Sklavos, Bohan Yang:
Challenges in designing trustworthy cryptographic co-processors. ISCAS 2015: 2009-2012 - [c13]Baris Ege, Kostas Papagiannopoulos, Lejla Batina, Stjepan Picek:
Improving DPA resistance of S-boxes: How far can we go? ISCAS 2015: 2013-2016 - [c12]Baris Ege, Thomas Eisenbarth, Lejla Batina:
Near Collision Side Channel Attacks. SAC 2015: 277-292 - [i5]Baris Ege, Thomas Eisenbarth, Lejla Batina:
Near Collision Side Channel Attacks. IACR Cryptol. ePrint Arch. 2015: 511 (2015) - 2014
- [c11]Thomas Korak, Michael Hutter, Baris Ege, Lejla Batina:
Clock Glitch Attacks in the Presence of Heating. FDTC 2014: 104-114 - [c10]Stjepan Picek, Baris Ege, Lejla Batina, Domagoj Jakobovic, Lukasz Chmielewski, Marin Golub:
On using genetic algorithms for intrinsic side-channel resistance: the case of AES S-box. CS2@HiPEAC 2014: 13-18 - [c9]Stjepan Picek, Baris Ege, Kostas Papagiannopoulos, Lejla Batina, Domagoj Jakobovic:
Optimality and beyond: The case of 4×4 S-boxes. HOST 2014: 80-83 - [c8]Stjepan Picek, Kostas Papagiannopoulos, Baris Ege, Lejla Batina, Domagoj Jakobovic:
Confused by Confusion: Systematic Evaluation of DPA Resistance of Various S-boxes. INDOCRYPT 2014: 374-390 - [c7]Stjepan Picek, Lejla Batina, Domagoj Jakobovic, Baris Ege, Marin Golub:
S-box, SET, Match: A Toolbox for S-box Analysis. WISTP 2014: 140-149 - 2013
- [j1]Amitabh Das, Baris Ege, Santosh Ghosh, Lejla Batina, Ingrid Verbauwhede:
Security Analysis of Industrial Test Compression Schemes. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 32(12): 1966-1977 (2013) - [c6]Lejla Batina, Amitabh Das, Baris Ege, Elif Bilge Kavun, Nele Mentens, Christof Paar, Ingrid Verbauwhede, Tolga Yalçin:
Dietary Recommendations for Lightweight Block Ciphers: Power, Energy and Area Analysis of Recently Developed Architectures. RFIDSec 2013: 103-112 - [c5]Roel Verdult, Flavio D. Garcia, Baris Ege:
Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer. USENIX Security Symposium 2013: 703-718 - [i4]Lejla Batina, Amitabh Das, Baris Ege, Elif Bilge Kavun, Nele Mentens, Christof Paar, Ingrid Verbauwhede, Tolga Yalçin:
Dietary Recommendations for Lightweight Block Ciphers: Power, Energy and Area Analysis of Recently Developed Architectures. IACR Cryptol. ePrint Arch. 2013: 753 (2013) - 2012
- [c4]Josep Balasch, Baris Ege, Thomas Eisenbarth, Benoît Gérard, Zheng Gong, Tim Güneysu, Stefan Heyse, Stéphanie Kerckhof, François Koeune, Thomas Plos, Thomas Pöppelmann, Francesco Regazzoni, François-Xavier Standaert, Gilles Van Assche, Ronny Van Keer, Loïc van Oldeneel tot Oldenzeel, Ingo von Maurich:
Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices. CARDIS 2012: 158-172 - [c3]Baris Ege, Amitabh Das, Santosh Ghosh, Ingrid Verbauwhede:
Differential Scan Attack on AES with X-tolerant and X-masked Test Response Compactor. DSD 2012: 545-552 - [i3]Josep Balasch, Baris Ege, Thomas Eisenbarth, Benoît Gérard, Zheng Gong, Tim Güneysu, Stefan Heyse, Stéphanie Kerckhof, François Koeune, Thomas Plos, Thomas Pöppelmann, Francesco Regazzoni, François-Xavier Standaert, Gilles Van Assche, Ronny Van Keer, Loïc van Oldeneel tot Oldenzeel, Ingo von Maurich:
Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices. IACR Cryptol. ePrint Arch. 2012: 507 (2012) - 2011
- [c2]Baris Ege, Elif Bilge Kavun, Tolga Yalçin:
Memory Encryption for Smart Cards. CARDIS 2011: 199-216 - 2010
- [c1]Fatih Sulak, Ali Doganaksoy, Baris Ege, Onur Koçak:
Evaluation of Randomness Test Results for Short Sequences. SETA 2010: 309-319 - [i2]Ali Doganaksoy, Baris Ege, Onur Koçak, Fatih Sulak:
Cryptographic Randomness Testing of Block Ciphers and Hash Functions. IACR Cryptol. ePrint Arch. 2010: 564 (2010) - [i1]Ali Doganaksoy, Baris Ege, Onur Koçak, Fatih Sulak:
Statistical Analysis of Reduced Round Compression Functions of SHA-3 Second Round Candidates. IACR Cryptol. ePrint Arch. 2010: 611 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-19 00:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint