Publications

  Journal Papers
 [2]  B. Bilgin, B. Gierlichs, S. Nikova, V. Nikov, and V. Rijmen, "Trade-offs for Threshold Implementations Illustrated on AES", In IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 34(7):1188-1200, 2015.
[impact factor: 1.003]
 [1]  B. Bilgin, S. Nikova, V. Nikov, V. Rijmen, N. Tokareva, and V. Vitkup, "Threshold Implementations of Small S-boxes", In Cryptography and Communications - Discrete Structures, Boolean Functions and Sequences , 7(1):3-33, 2015.
[impact factor: 0.828]
  International Conferences and Workshops
 [15]  T. De Cnudde, O. Reparaz, B. Bilgin, S. Nikova, V. Nikov, and V. Rijmen, "Masking AES with d+1 Shares in Hardware,", In Cryptographic Hardware and Embedded Systems-CHES 2016, Lecture Notes in Computer Science 9813, B. Gierlichs, and A. Poschmann (eds.), Springer-Verlag, 21 pages, 2016.
 [14]  T. Beyne, and B. Bilgin, "Uniform First-Order Threshold Implementations,", In Selected Areas in Cryptography-SAC 2016, Lecture Notes in Computer Science, Springer-Verlag, 18 pages, 2016.
 [13]  D. Sijacic, A. B. Kidmose, B. Yang, S. Banik, B. Bilgin, A. Bogdanov, and I. Verbauwhede, "Hold Your Breath, PRIMATEs Are Lightweight,", In Selected Areas in Cryptography-SAC 2016, Lecture Notes in Computer Science, Springer-Verlag, 18 pages, 2016.
 [12]  B. Bilgin, M. Knezevic, V. Nikov, and S. Nikova, "Compact Implementations of Multi-Sbox Designs,", In Smart Card Research and Advanced Applications-CARDIS 2015, Lecture Notes in Computer Science 9514, N. Homma, and M. Medwed (eds.), Springer-Verlag, pp. 273-286, 2015.
 [11]  T. De Cnudde, B. Bilgin, O. Reparaz, V. Nikov, and S. Nikova, "Higher-Order Threshold Implementation of the AES S-box", In Smart Card Research and Advanced Applications-CARDIS 2015, Lecture Notes in Computer Science, 16 pages, Springer-Verlag, 2015.
 [10]  O. Reparaz, B. Bilgin, B. Gierlichs, S. Nikova, and I. Verbauwhede, "Consolidating Masking Schemes", In Advances in Cryptology-CRYPTO 2015, volume 9215 of Lecture Notes in Computer Science, pages 764-783, Springer-Verlag, 2015.
[acceptance rate 27%, 74 of 266]
 [9]  B. Bilgin, B. Gierlichs, V. Nikov, S. Nikova, and V. Rijmen, "Higher-Order Threshold Implementations", In Advances in Cryptology-ASIACRYPT 2014, volume 8873 of Lecture Notes in Computer Science, pages 326-343, Springer-Verlag, 2014.
[acceptance rate 22%, 55 of 255]
 [8]  T. De Cnudde, B. Bilgin, O. Reparaz, and S. Nikova, "Higher-Order Glitch Resistant Implementation of the PRESENT S-box", In BalkanCryptSec 2014, volume 9024 of Lecture Notes in Computer Science, pages 75-93, Springer-Verlag, 2014.
[acceptance rate 41%, 16 of 36]
 [7]  B. Bilgin, B. Gierlichs, V. Nikov, S. Nikova, and V. Rijmen, "A More Efficient AES Threshold Implementation", In 7th International Conference on Cryptology Africacrypt 2014, volume 8469 of Lecture Notes in Computer Science, pages 267-284, Springer-Verlag, 2014.
[acceptance rate 31%, 26 of 83]
 [6]  E. Andreeva, B. Bilgin, A. Bogdanov, A. Luykx, B. Mennink, N. Mouha, and K. Yasuda, "APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography", In 21st International Workshop on Fast Software Encryption FSE 2014, volume 8540 of Lecture Notes in Computer Science, pages 168-186, Springer-Verlag, 2015.
[acceptance rate 31%, 31 of 99]
 [5]  B. Bilgin, J. Daemen, V. Nikov, S. Nikova, V. Rijmen, and G. Van Assche, "Efficient and First-Order DPA Resistant Implementations of Keccak", In 12th Smart Card Research and Advanced Application Conference Cardis 2013, volume 8419 of Lecture Notes in Computer Science, pages 187-199. Springer International Publishing, 2013.
[acceptance rate 36%, 17 of 47]
 [4]  B. Bilgin, A. Bogdanov, M. Knežević, F. Mendel, and Q. Wang, "Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware", In Cryptographic Hardware and Embedded Systems CHES 2013, volume 8086 of Lecture Notes in Computer Science, pages 142-158. Springer Berlin Heidelberg, 2013.
[acceptance rate 20%, 27 of 132]
 [3]  B. Bilgin, V. Nikov, S. Nikova, V. Rijmen, and G. Stütz, "Threshold Implementations of all 3x3 and 4x4 S-boxes", In Cryptographic Hardware and Embedded Systems CHES 2012, volume 7428 of Lecture Notes in Computer Science, pages 76-91. Springer Berlin Heidelberg, 2012.
[acceptance rate 27%, 32 of 120]
 [2]  B. Bilgin, E. B. Kavun, and T. Yalcin, "Towards an Ultra Lightweight Crypto Processor", In Proceedings of the 2011 Workshop on Lightweight Security & Privacy: Devices, Protocols, and Applications LightSec 2011, pages 76-83. IEEE Computer Society, 2011.
[acceptance rate 37%, 10 of 27]
 [1]  B. Bilgin, N. Oztop, and E. Uyan, "A Survey on Rebound Attacks", In Proceedings of the 4th International Information Security Conference ISC Turkey 2010, pages 242-246.
  National Conferences and Workshops
 [1]  L. De Meyer, B. Bilgin, and B. Preneel, "Extended Analysis of DES S-boxes", In Proceedings of the 34th Symposium on Information Theory in the Benelux WIC 2013, pages 140-146.
  Thesis
 [2]  B. Bilgin, "Threshold Implementations: As Countermeasure Against Higher-Order Differential Power Analysis", PhD Thesis at KU Leuven, Leuven, Belgium and UTwente, Enschede, The Netherlands.
 [1]  B. Bilgin, "Generating Functions and Their Applications", Master Thesis at Middle East Technical University, Ankara, Turkey.
  Miscellaneous
 [7]  B. Bilgin, B. Gierlichs, V. Nikov, S. Nikova, and V. Rijmen, "Higher-Order Threshold Implementation", In Cryptology ePrint Archive, Report 2014/751, 19 pages.
 [6]  E. Andreeva, B. Bilgin, A. Bogdanov, A. Luykx, F. Mendel, B. Mennink, N. Mouha, Q. Wang, and K. Yasuda "PRIMATEs v1.02", Submission to the CAESAR Competition, 2014, 20 pages.
 [5]  B. Bilgin, B. Gierlichs, V. Nikov, S. Nikova, and V. Rijmen, "A More Efficient AES Threshold Implementation", In Cryptology ePrint Archive, Report 2013/697, 17 pages.
 [4]  L. De Meyer, B. Bilgin, and B. Preneel "Extended Analysis of DES S-boxes", KU Leuven COSIC Internal Report, August 2013, 15 pages.
 [3]  B. Bilgin, A. Bogdanov, M. Knežević, F. Mendel, and Q. Wang, "Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware", In Directions in Authenticated Ciphers DIAC 2013, 15 pages.
 [2]  B. Bilgin, V. Nikov, S. Nikova, V. Rijmen, and G. Stütz, "Threshold Implementations of All 3x3 and 4x4 S-boxes", In Cryptology ePrint Archive, Report 2012/300, 25 pages.
 [1]  E. B. Kavun, B. Bilgin, and T. Yalcin, "Serialized Keccak Architecture for Lightweight Applications", Presentation in 2nd SHA-3 Conference, 2010.