Begül Bilgin

According to our database1, Begül Bilgin authored at least 27 papers between 2012 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Low-Latency Hardware Masking with Application to AES.
IACR Cryptology ePrint Archive, 2020

2019
Consolidating Security Notions in Hardware Masking.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

TIS'19: Theory of Implementation Security Workshop 2019.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Multiplicative Masking for AES in Hardware.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Rhythmic Keccak: SCA Security and Low Latency in HW.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Classification of Balanced Quadratic Functions.
IACR Cryptology ePrint Archive, 2018

2017
A Note on 5-bit Quadratic Permutations' Classification.
IACR Trans. Symmetric Cryptol., 2017

CAPA: The Spirit of Beaver against Physical Attacks.
IACR Cryptology ePrint Archive, 2017

2016
Masking AES with d+1 Shares in Hardware.
IACR Cryptology ePrint Archive, 2016

Does Coupling Affect the Security of Masked Implementations?
IACR Cryptology ePrint Archive, 2016

Uniform First-Order Threshold Implementations.
IACR Cryptology ePrint Archive, 2016

Hold Your Breath, PRIMATEs Are Lightweight.
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016

Theory of Implementation Security Workshop (TIs 2016).
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Threshold implementations : as countermeasure against higher-order differential power analysis.
PhD thesis, 2015

Trade-Offs for Threshold Implementations Illustrated on AES.
IEEE Trans. on CAD of Integrated Circuits and Systems, 2015

Consolidating masking schemes.
IACR Cryptology ePrint Archive, 2015

FIDES: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware.
IACR Cryptology ePrint Archive, 2015

Threshold implementations of small S-boxes.
Cryptography and Communications, 2015

Higher-Order Threshold Implementation of the AES S-Box.
Proceedings of the Smart Card Research and Advanced Applications, 2015

Compact Implementations of Multi-Sbox Designs.
Proceedings of the Smart Card Research and Advanced Applications, 2015

2014
Higher-Order Threshold Implementations.
IACR Cryptology ePrint Archive, 2014

Higher-Order Glitch Resistant Implementation of the PRESENT S-Box.
Proceedings of the Cryptography and Information Security in the Balkans, 2014

2013
A More Efficient AES Threshold Implementation.
IACR Cryptology ePrint Archive, 2013

APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography.
IACR Cryptology ePrint Archive, 2013

Efficient and First-Order DPA Resistant Implementations of Keccak.
Proceedings of the Smart Card Research and Advanced Applications, 2013

2012
Threshold Implementations of all 3x3 and 4x4 S-boxes.
IACR Cryptology ePrint Archive, 2012

Threshold Implementations of All 3 ×3 and 4 ×4 S-Boxes.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012


  Loading...