Articles dans des revues avec comité de lecture (16)

  1. 1. Lerman, L., & Markowitch, O. (2019). Efficient Profiled Attacks on Masking Schemes. IEEE transactions on information forensics and security, 14(6), 8519754, 1445-1454. doi:10.1109/TIFS.2018.2879295
  2. 2. Lerman, L., Poussier, R., Markowitch, O., & Standaert, F.-X. (2018). Template attacks versus machine learning revisited and the curse of dimensionality in side-channel analysis: extended version. Journal of Cryptographic Engineering, 8(4), 301-313. doi:10.1007/s13389-017-0162-9
  3. 3. Lerman, L., Veshchikov, N., Markowitch, O., & Standaert, F.-X. (2017). Start Simple and then Refine: Bias-Variance Decomposition as a Diagnosis Tool for Leakage Profiling. I.E.E.E. transactions on computers, 1-16. doi:10.1109/TC.2017.2731342
  4. 4. Lerman, L., Markowitch, O., Poussier, R., & Standaert, F.-X. (2017). Template attacks versus machine learning revisited and the curse of dimensionality in side-channel analysis (extended version). Journal of Cryptographic Engineering, 1-13.
  5. 5. Lerman, L., Veshchikov, N., Picek, S., & Markowitch, O. (2017). On the Construction of Side-Channel Attack Resilient S-boxes. Lecture notes in computer science, 10348 LNCS, 102-119. doi:10.1007/978-3-319-64647-3_7
  6. 6. Fernandes Medeiros, S., Gerard, F., Veshchikov, N., Lerman, L., & Markowitch, O. (2016). Breaking Kalyna 128/128 with Power Attacks. Lecture notes in computer science, 10076, 402-414. doi:10.1007/978-3-319-49445-6_23
  7. 7. Lerman, L., Martinasek, Z., & Markowitch, O. (2016). Robust profiled attacks: should the adversary trust the dataset? I E T Information Security, 11(4), 188-194. doi:10.1049/iet-ifs.2015.0574
  8. 8. Veshchikov, N., Medeiros, S. F., & Lerman, L. (2016). Variety of scalable shuffling countermeasures against side channel attacks. Journal of Cyber Security and Mobility, 5(3), 195-232. doi:10.13052/jcsm2245-1439.532
  9. 9. Lerman, L., Bontempi, G., & Markowitch, O. (2015). The bias–variance decomposition in profiled attacks. Journal of Cryptographic Engineering, 5(4), 255-267. doi:10.1007/s13389-015-0106-1
  10. 10. Lerman, L., Poussier, R., Bontempi, G., Markowitch, O., & Standaert, F.-X. (2015). Template attacks vs Machine Learning Revisited. Lecture notes in computer science, 9064, 20-33.
  11. 11. Lerman, L., Bontempi, G., & Markowitch, O. (2015). A machine learning approach against a masked AES: Reaching the limit of side-channel attacks with a learning model. Journal of Cryptographic Engineering, 5(2), 123-139. doi:10.1007/s13389-014-0089-3
  12. 12. Lerman, L., Poussier, R., Bontempi, G., Markowitch, O., & Standaert, F.-X. (2015). Template attacks vs. Machine learning revisited (and the curse of dimensionality in side-channel analysis). Lecture notes in computer science, 9064, 20-33. doi:10.1007/978-3-319-21476-4_2

  13. << Précédent 1 2 3 Suivant >>