Begül Bilgin

Orcid: 0009-0001-8019-2924

According to our database1, Begül Bilgin authored at least 28 papers between 2012 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
Low AND Depth and Efficient Inverses: a Guide on S-boxes for Low-latency Masking.
IACR Trans. Symmetric Cryptol., 2020

Low-Latency Hardware Masking with Application to AES.
IACR Cryptol. ePrint Arch., 2020

2019
TIS'19: Theory of Implementation Security Workshop 2019.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Multiplicative Masking for AES in Hardware.
IACR Cryptol. ePrint Arch., 2018

Consolidating Security Notions in Hardware Masking.
IACR Cryptol. ePrint Arch., 2018

Classification of Balanced Quadratic Functions.
IACR Cryptol. ePrint Arch., 2018

CAPA: The Spirit of Beaver Against Physical Attacks.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

2017
A Note on 5-bit Quadratic Permutations' Classification.
IACR Trans. Symmetric Cryptol., 2017

Rhythmic Keccak: SCA Security and Low Latency in HW.
IACR Cryptol. ePrint Arch., 2017

Does Coupling Affect the Security of Masked Implementations?
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2017

2016
Hold Your Breath, PRIMATEs Are Lightweight.
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016

Uniform First-Order Threshold Implementations.
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016

Masking AES With d+1 Shares in Hardware.
Proceedings of the ACM Workshop on Theory of Implementation Security, 2016

Theory of Implementation Security Workshop (TIs 2016).
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Threshold implementations : as countermeasure against higher-order differential power analysis.
PhD thesis, 2015

Trade-Offs for Threshold Implementations Illustrated on AES.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2015

Threshold implementations of small S-boxes.
Cryptogr. Commun., 2015

Consolidating Masking Schemes.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

Higher-Order Threshold Implementation of the AES S-Box.
Proceedings of the Smart Card Research and Advanced Applications, 2015

Compact Implementations of Multi-Sbox Designs.
Proceedings of the Smart Card Research and Advanced Applications, 2015

2014
APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography.
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014

Higher-Order Glitch Resistant Implementation of the PRESENT S-Box.
Proceedings of the Cryptography and Information Security in the Balkans, 2014

Higher-Order Threshold Implementations.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

A More Efficient AES Threshold Implementation.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014

2013
Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2013, 2013

Efficient and First-Order DPA Resistant Implementations of Keccak.
Proceedings of the Smart Card Research and Advanced Applications, 2013

2012
Threshold Implementations of all 3x3 and 4x4 S-boxes.
IACR Cryptol. ePrint Arch., 2012

Threshold Implementations of All 3 ×3 and 4 ×4 S-Boxes.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012


  Loading...