A machine learning approach against a masked AES L Lerman, G Bontempi, O Markowitch Journal of Cryptographic Engineering 5 (2), 123-139, 2015 | 265 | 2015 |
Template attacks vs. machine learning revisited (and the curse of dimensionality in side-channel analysis) L Lerman, R Poussier, G Bontempi, O Markowitch, FX Standaert Constructive Side-Channel Analysis and Secure Design: 6th International …, 2015 | 178 | 2015 |
Side channel attack: an approach based on machine learning L Lerman, G Bontempi, O Markowitch Center for Advanced Security Research Darmstadt 29, 2011 | 178 | 2011 |
Power analysis attack: an approach based on machine learning L Lerman, G Bontempi, O Markowitch International Journal of Applied Cryptography 3 (2), 97-115, 2014 | 170 | 2014 |
Template attacks versus machine learning revisited and the curse of dimensionality in side-channel analysis: extended version L Lerman, R Poussier, O Markowitch, FX Standaert Journal of Cryptographic Engineering 8 (4), 301-313, 2018 | 63 | 2018 |
Semi-supervised template attack L Lerman, SF Medeiros, N Veshchikov, C Meuter, G Bontempi, ... Constructive Side-Channel Analysis and Secure Design: 4th International …, 2013 | 57 | 2013 |
A time series approach for profiling attack L Lerman, G Bontempi, S Ben Taieb, O Markowitch Security, Privacy, and Applied Cryptography Engineering: Third International …, 2013 | 28 | 2013 |
SAT-based cryptanalysis of ACORN F Lafitte, L Lerman, O Markowitch, D Van Heule Cryptology ePrint Archive, 2016 | 23 | 2016 |
The bias–variance decomposition in profiled attacks L Lerman, G Bontempi, O Markowitch Journal of Cryptographic Engineering 5, 255-267, 2015 | 23 | 2015 |
Efficient profiled attacks on masking schemes L Lerman, O Markowitch IEEE Transactions on Information Forensics and Security 14 (6), 1445-1454, 2018 | 21 | 2018 |
Location, location, location: Revisiting modeling and exploitation for location-based side channel leakages C Andrikos, L Batina, L Chmielewski, L Lerman, V Mavroudis, ... Advances in Cryptology–ASIACRYPT 2019: 25th International Conference on the …, 2019 | 16 | 2019 |
Start simple and then refine: Bias-variance decomposition as a diagnosis tool for leakage profiling L Lerman, N Veshchikov, O Markowitch, FX Standaert IEEE Transactions on Computers 67 (2), 268-283, 2017 | 15 | 2017 |
On the construction of side-channel attack resilient s-boxes L Lerman, N Veshchikov, S Picek, O Markowitch International Workshop on Constructive Side-Channel Analysis and Secure …, 2017 | 15 | 2017 |
Robust profiled attacks: should the adversary trust the dataset? L Lerman, Z Martinasek, O Markowitch IET Information Security 11 (4), 188-194, 2017 | 12 | 2017 |
Comparing sboxes of ciphers from the perspective of side-channel attacks L Lerman, O Markowitch, N Veshchikov 2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST), 1-6, 2016 | 9 | 2016 |
Modélisation et simulation G Bontempi, L Lerman Presses universitaires de Bruxelles, 2009 | 9 | 2009 |
Variety of scalable shuffling countermeasures against side channel attacks N Veshchikov, SF Medeiros, L Lerman Journal of Cyber Security and Mobility, 195-232, 2016 | 7 | 2016 |
Improving block cipher design by rearranging internal operations L Lerman, J Nakahara, N Veshchikov 2013 International Conference on Security and Cryptography (SECRYPT), 1-12, 2013 | 6 | 2013 |
Key Management as a Service. L Lerman, O Markowitch, J Nakahara Jr, PP Samarati SECRYPT, 276-281, 2012 | 6 | 2012 |
Les systemes de detection d’intrusion bases sur du machine learning L Lerman, O Markowitch, G Bontempi M. Coulibaly et al. M. Coulibaly et al, 2011 | 6 | 2011 |