I joined the Computing Science
Department at the Radboud University
I am an assistant professor in the Digital Security (DS) group. My
new web page is here.
I am a post-doctoral researcher at the COSIC group, which is a part of
the Department of Electrical Engineering ESAT, at K.U.Leuven.
I am working mainly in the area of embedded security. My
research topics include efficient arithmetic for cryptographic algorithms (in
particular I like ECC/HECC), secure implementations of cryptographic
algorithms, side-channel security, lightweight cryptography e.g. crypto for
RFIDs, sensor networks etc.
My PhD thesis was Arithmetic
and Architectures for Secure Hardware Implementations of Public-Key
Cryptography. Currently, my research topics include side-channel attacks
(theoretical and practical aspects) and countermeasures and also protocols for
- PC member of The ACM Conference on Wireless Network
- PC member for session on secure embedded implementations of the DATE 2010
- PC member of FutureTech 2010,
Track 8. Security and Trust Computing
- PC member of RFIDSec
- Network of Excellence ECRYPT II (European Network of Excellence
in Cryptology II) (2008-2012)
- BCRYPT (Belgian
Fundamental Research on Cryptology an Information Security) (2007-2011)
- IBBT -
Interdisciplinary Institute for BroadBand Technology (NextGenITS) (2008-2010)
I was teaching a
part of the BCRYPT course on
embedded security and applications.
- Identification via Location-Profiling in GSM Networks,
Y. De Mulder, G.
Batina, and B. Preneel, In Workshop on
Privacy in the Electronic Society 2008 ACM, ACM, 8 pages, 2008.
- Untraceable RFID Authentication Protocols: Revision of
EC-RAC, Y. K.
Batina, and I. Verbauwhede, In IEEE
International Conference on RFID 2009, IEEE, pp. 178-185, 2009.
- HECC Goes Embedded: An Area-efficient Implementation
of HECC, J. Fan, L. Batina, and I. Verbauwhede,
In Proceedings of 15th Annual Workshop on Selected Areas in Cryptography
(SAC 2008), Lecture Notes in Computer
Science, R. Avanzi, L. Keliher and F. Sica (eds.), Springer-Verlag, 15
- Comparative Evaluation of Rank
Correlation based DPA on an AES prototype chip, L. Batina, B. Gierlichs, and K.
Lemke-Rust, In Proceedings of the 11th Information Security Conference (ISC
Notes in Computer Science, C. Lei, and T. Wu (eds.), Springer-Verlag, 15
- Mutual Information Analysis - A
Generic Side-Channel Distinguisher, B. Gierlichs, L. Batina, P.
Tuyls, and B.
Preneel, In Cryptographic Hardware and Embedded Systems - CHES
Notes in Computer Science, E. Oswald, and P. Rohatgi (eds.),
Springer-Verlag, 17 pages, 2008.
- A Very Compact "Perfectly Masked" S-Box for AES,
D. Canright and L. Batina, Applied Cryptography and Network Security,
ACNS 2008, June 3-6, New York. Corrected version here.
- Elliptic Curve Based Security
Processor for RFID, Y. K. Lee, K. Sakiyama, L. Batina, and I. Verbauwhede,
IEEE Transactions on Computers, 57(11), pp. 1514-1527, 2008.
Check also my DBLP
Theses I co(supervised)
Last update: 28.09.2009.