Articles dans des revues avec comité de lecture (16)

  1. 13. Lerman, L., Fernandes Medeiros, S., Bontempi, G., & Markowitch, O. (2014). A Machine Learning Approach Against a Masked AES. Lecture notes in computer science, 8419, 61-75.
  2. 14. Lerman, L., Bontempi, G., & Markowitch, O. (2014). Power analysis attack: an approach based on machine learning. International Journal of Applied Cryptography, 3(2), 97-115. doi:10.1504/IJACT.2014.062722
  3. 15. Lerman, L., Fernandes Medeiros, S., Veshchikov, N., Meuter, C., Bontempi, G., & Markowitch, O. (2013). Semi-Supervised Template Attack. Lecture Notes in Computer Science, 7864, 184-199. doi:10.1007/978-3-642-40026-1_12
  4. 16. Lerman, L., Markowitch, O., Bontempi, G., & Ben Taieb, S. (2013). A time series approach for profiling attack. Lecture notes in computer science, 8204, 75-94. doi:10.1007/978-3-642-41224-0_7
  5.   Communications publiées lors de congrès ou colloques nationaux et internationaux (5)

  6. 1. Lerman, L., Veshchikov, N., Picek, S., & Markowitch, O. (2017). On the Construction of Side-Channel Attack Resilient S-boxes. In Constructive Side-Channel Analysis and Secure Design 2017: Vol. 10348 (pp. 102-119). (Lecture Notes in Computer Science). Springer.
  7. 2. Lerman, L., Markowitch, O., & Veshchikov, N. (2016). Comparing Sboxes of Ciphers from the Perspective of Side-Channel Attacks. In Proceedings of the IEEE Asian Hardware Oriented Security and Trust Symposium (AsianHOST 2016) (pp. 1-6) IEEE Press.
  8. 3. Lerman, L., Nakahara, J., & Veshchikov, N. (2013). Improving block cipher design by rearranging internal operations. Proceedings of the 10th International Conference on Security and Cryptography SECRYPT(2013: 29-31 July, 2013: Reykjavík, Iceland)
  9. 4. Lerman, L., Markowitch, O., Nakahara Jr, J. J., et al. (2012). Key Management as a Service. In P. P. Samarati (Ed.), International Conference on Security and Cryptography (SECRYPT): International joint Conference on E-business and Telecommunications (ICETE) (pp. 276-281) Rome, Italy: SciTe Press Digital Library.
  10. 5. Markowitch, O., Lerman, L., & Bontempi, G. (2011). Side channel attack: an approach based on machine learning. In Proceedings of 2nd International Workshop on Constructive Side-Channel Analysis and Security Design (pp. 29-41) Schindler and Huss.
  11.   Rapports de recherche, comptes rendus, lettres à l'éditeur, working papers (1)

  12. 1. Lafitte, F., Lerman, L., Markowitch, O., & Van Heule, D. (2016). SAT-based cryptanalysis of ACORN. In SAT-based cryptanalysis of ACORN.
  13.   Participations à des congrès et colloques internationaux (1)

  14. 1. Markowitch, O., Lerman, L., & Bontempi, G. (2011). Side channel attack: an approach based on machine learning. In Proceedings of 2nd International Workshop on Constructive Side-Channel Analysis and Security Design, COSADE 2011 (pp. 29-41) Schindler and Huss.
  15.   Thèses et mémoires (1)

  16. 1. Lerman, L. (2015). A machine learning approach for automatic and generic side-channel attacks (Thèse doctorale non-publiée). Université libre de Bruxelles, Faculté des Sciences – Informatique, Bruxelles.

  17. << Précédent 1 2 3 Suivant >>