Liran Lerman
Liran Lerman
Thales Communications Belgium & Université libre de Bruxelles
Zweryfikowany adres z lerman.be - Strona główna
Tytuł
Cytowane przez
Cytowane przez
Rok
A machine learning approach against a masked AES
L Lerman, G Bontempi, O Markowitch
Journal of Cryptographic Engineering 5 (2), 123-139, 2015
1282015
Side channel attack: an approach based on machine learning
L Lerman, G Bontempi, O Markowitch
Center for Advanced Security Research Darmstadt, 29-41, 2011
1132011
Template attacks vs. machine learning revisited (and the curse of dimensionality in side-channel analysis)
L Lerman, R Poussier, G Bontempi, O Markowitch, FX Standaert
International Workshop on Constructive Side-Channel Analysis and Secure …, 2015
972015
Power analysis attack: an approach based on machine learning
L Lerman, G Bontempi, O Markowitch
International Journal of Applied Cryptography 3 (2), 97-115, 2014
872014
Semi-supervised template attack
L Lerman, SF Medeiros, N Veshchikov, C Meuter, G Bontempi, ...
International Workshop on Constructive Side-Channel Analysis and Secure …, 2013
342013
A time series approach for profiling attack
L Lerman, G Bontempi, SB Taieb, O Markowitch
International Conference on Security, Privacy, and Applied Cryptography …, 2013
192013
SAT-based cryptanalysis of ACORN.
F Lafitte, L Lerman, O Markowitch, D Van Heule
IACR Cryptol. ePrint Arch. 2016, 521, 2016
162016
Template attacks versus machine learning revisited and the curse of dimensionality in side-channel analysis: extended version
L Lerman, R Poussier, O Markowitch, FX Standaert
Journal of Cryptographic Engineering 8 (4), 301-313, 2018
142018
The bias–variance decomposition in profiled attacks
L Lerman, G Bontempi, O Markowitch
Journal of Cryptographic Engineering 5 (4), 255-267, 2015
112015
Robust profiled attacks: should the adversary trust the dataset?
L Lerman, Z Martinasek, O Markowitch
IET Information Security 11 (4), 188-194, 2016
92016
Start simple and then refine: Bias-variance decomposition as a diagnosis tool for leakage profiling
L Lerman, N Veshchikov, O Markowitch, FX Standaert
IEEE Transactions on Computers 67 (2), 268-283, 2017
72017
On the construction of side-channel attack resilient s-boxes
L Lerman, N Veshchikov, S Picek, O Markowitch
International Workshop on Constructive Side-Channel Analysis and Secure …, 2017
72017
Comparing sboxes of ciphers from the perspective of side-channel attacks
L Lerman, O Markowitch, N Veshchikov
2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST), 1-6, 2016
52016
Key Management as a Service.
L Lerman, O Markowitch, J Nakahara Jr, PP Samarati
SECRYPT, 276-281, 2012
52012
Location, location, location: Revisiting modeling and exploitation for location-based side channel leakages
C Andrikos, L Batina, L Chmielewski, L Lerman, V Mavroudis, ...
International Conference on the Theory and Application of Cryptology and …, 2019
42019
Modélisation et simulation
G Bontempi
Département d’informatique, 2015
42015
Efficient profiled attacks on masking schemes
L Lerman, O Markowitch
IEEE Transactions on Information Forensics and Security 14 (6), 1445-1454, 2018
32018
Improving block cipher design by rearranging internal operations
L Lerman, J Nakahara, N Veshchikov
2013 International Conference on Security and Cryptography (SECRYPT), 1-12, 2013
32013
Les systèmes de détection d'intrusion basés sur du machine learning
L Lerman, O Markowitch, G Bontempi
32011
Higher order side-channel attack resilient S-boxes
L Lerman, N Veshchikov, S Picek, O Markowitch
Proceedings of the 15th ACM International Conference on Computing Frontiers …, 2018
22018
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20