Begül Bilgin

Orcid: 0009-0001-8019-2924

According to our database1, Begül Bilgin authored at least 28 papers between 2012 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
Low AND Depth and Efficient Inverses: a Guide on S-boxes for Low-latency Masking.
IACR Trans. Symmetric Cryptol., 2020

Low-Latency Hardware Masking with Application to AES.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

2019
Consolidating Security Notions in Hardware Masking.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

TIS'19: Theory of Implementation Security Workshop 2019.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Multiplicative Masking for AES in Hardware.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Rhythmic Keccak: SCA Security and Low Latency in HW.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Classification of Balanced Quadratic Functions.
IACR Cryptol. ePrint Arch., 2018

2017
A Note on 5-bit Quadratic Permutations' Classification.
IACR Trans. Symmetric Cryptol., 2017

CAPA: The Spirit of Beaver against Physical Attacks.
IACR Cryptol. ePrint Arch., 2017

2016
Masking AES with d+1 Shares in Hardware.
IACR Cryptol. ePrint Arch., 2016

Does Coupling Affect the Security of Masked Implementations?
IACR Cryptol. ePrint Arch., 2016

Uniform First-Order Threshold Implementations.
IACR Cryptol. ePrint Arch., 2016

Hold Your Breath, PRIMATEs Are Lightweight.
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016

Theory of Implementation Security Workshop (TIs 2016).
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Threshold implementations : as countermeasure against higher-order differential power analysis.
PhD thesis, 2015

Trade-Offs for Threshold Implementations Illustrated on AES.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2015

Consolidating masking schemes.
IACR Cryptol. ePrint Arch., 2015

FIDES: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware.
IACR Cryptol. ePrint Arch., 2015

Threshold implementations of small S-boxes.
Cryptogr. Commun., 2015

Higher-Order Threshold Implementation of the AES S-Box.
Proceedings of the Smart Card Research and Advanced Applications, 2015

Compact Implementations of Multi-Sbox Designs.
Proceedings of the Smart Card Research and Advanced Applications, 2015

2014
Higher-Order Threshold Implementations.
IACR Cryptol. ePrint Arch., 2014

Higher-Order Glitch Resistant Implementation of the PRESENT S-Box.
Proceedings of the Cryptography and Information Security in the Balkans, 2014

2013
A More Efficient AES Threshold Implementation.
IACR Cryptol. ePrint Arch., 2013

APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography.
IACR Cryptol. ePrint Arch., 2013

Efficient and First-Order DPA Resistant Implementations of Keccak.
Proceedings of the Smart Card Research and Advanced Applications, 2013

2012
Threshold Implementations of all 3x3 and 4x4 S-boxes.
IACR Cryptol. ePrint Arch., 2012

Threshold Implementations of All 3 ×3 and 4 ×4 S-Boxes.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012


  Loading...