Articles dans des revues avec comité de lecture (69)

  1. 34. Cao, Z., Liu, L., & Markowitch, O. (2016). On Two Kinds of Flaws in Some Server-aided Verification Schemes. International journal of network security, 18(6), 6, 1054-1059.
  2. 35. Lerman, L., Bontempi, G., & Markowitch, O. (2015). The bias–variance decomposition in profiled attacks. Journal of Cryptographic Engineering, 5(4), 255-267. doi:10.1007/s13389-015-0106-1
  3. 36. Lerman, L., Poussier, R., Bontempi, G., Markowitch, O., & Standaert, F.-X. (2015). Template attacks vs Machine Learning Revisited. Lecture notes in computer science, 9064, 20-33.
  4. 37. Lafitte, F., Markowitch, O., & Van Heule, D. (2015). SAT based analysis of LTE stream cipher ZUC. Journal of Information Security and Applications, 22, 54-65. doi:10.1016/j.jisa.2014.09.004
  5. 38. Lerman, L., Bontempi, G., & Markowitch, O. (2015). A machine learning approach against a masked AES: Reaching the limit of side-channel attacks with a learning model. Journal of Cryptographic Engineering, 5(2), 123-139. doi:10.1007/s13389-014-0089-3
  6. 39. Lerman, L., Poussier, R., Bontempi, G., Markowitch, O., & Standaert, F.-X. (2015). Template attacks vs. Machine learning revisited (and the curse of dimensionality in side-channel analysis). Lecture notes in computer science, 9064, 20-33. doi:10.1007/978-3-319-21476-4_2
  7. 40. Lerman, L., Fernandes Medeiros, S., Bontempi, G., & Markowitch, O. (2014). A Machine Learning Approach Against a Masked AES. Lecture notes in computer science, 8419, 61-75.
  8. 41. Cao, Z., Lafitte, F., & Markowitch, O. (2014). A note on a signature building block and relevant security reduction in the green-hohenberger ot scheme. Lecture notes in computer science, 8567, 282-288. doi:10.1007/978-3-319-12087-4_18
  9. 42. Lerman, L., Bontempi, G., & Markowitch, O. (2014). Power analysis attack: an approach based on machine learning. International Journal of Applied Cryptography, 3(2), 97-115. doi:10.1504/IJACT.2014.062722
  10. 43. Qachri, N., Markowitch, O., & Dricot, J.-M. (2013). A formally verified protocol for secure vertical handovers in 4G heterogeneous networks. International Journal of Security and its Applications, 7(6), 309-326. doi:10.14257/ijsia.2013.7.6.32
  11. 44. Lerman, L., Fernandes Medeiros, S., Veshchikov, N., Meuter, C., Bontempi, G., & Markowitch, O. (2013). Semi-Supervised Template Attack. Lecture Notes in Computer Science, 7864, 184-199. doi:10.1007/978-3-642-40026-1_12
  12. 45. Lerman, L., Markowitch, O., Bontempi, G., & Ben Taieb, S. (2013). A time series approach for profiling attack. Lecture notes in computer science, 8204, 75-94. doi:10.1007/978-3-642-41224-0_7

  13. << Précédent 1 2 3 4 5 6 7 8 9 10 11 12 Suivant >>