Liran Lerman
Liran Lerman
UniversitÚ libre de Bruxelles
Verified email at - Homepage
Cited by
Cited by
A machine learning approach against a masked AES
L Lerman, G Bontempi, O Markowitch
Journal of Cryptographic Engineering 5 (2), 123-139, 2015
Side channel attack: an approach based on machine learning
L Lerman, G Bontempi, O Markowitch
Center for Advanced Security Research Darmstadt 29, 2011
Template attacks vs. machine learning revisited (and the curse of dimensionality in side-channel analysis)
L Lerman, R Poussier, G Bontempi, O Markowitch, FX Standaert
Constructive Side-Channel Analysis and Secure Design: 6th Internationalá…, 2015
Power analysis attack: an approach based on machine learning
L Lerman, G Bontempi, O Markowitch
International Journal of Applied Cryptography 3 (2), 97-115, 2014
Semi-supervised template attack
L Lerman, SF Medeiros, N Veshchikov, C Meuter, G Bontempi, ...
Constructive Side-Channel Analysis and Secure Design: 4th Internationalá…, 2013
Template attacks versus machine learning revisited and the curse of dimensionality in side-channel analysis: extended version
L Lerman, R Poussier, O Markowitch, FX Standaert
Journal of Cryptographic Engineering 8 (4), 301-313, 2018
A time series approach for profiling attack
L Lerman, G Bontempi, S Ben Taieb, O Markowitch
Security, Privacy, and Applied Cryptography Engineering: Third Internationalá…, 2013
SAT-based cryptanalysis of ACORN
F Lafitte, L Lerman, O Markowitch, D Van Heule
Cryptology ePrint Archive, 2016
The bias–variance decomposition in profiled attacks
L Lerman, G Bontempi, O Markowitch
Journal of Cryptographic Engineering 5, 255-267, 2015
Efficient profiled attacks on masking schemes
L Lerman, O Markowitch
IEEE Transactions on Information Forensics and Security 14 (6), 1445-1454, 2018
Location, location, location: Revisiting modeling and exploitation for location-based side channel leakages
C Andrikos, L Batina, L Chmielewski, L Lerman, V Mavroudis, ...
Advances in Cryptology–ASIACRYPT 2019: 25th International Conference on theá…, 2019
Start simple and then refine: Bias-variance decomposition as a diagnosis tool for leakage profiling
L Lerman, N Veshchikov, O Markowitch, FX Standaert
IEEE Transactions on Computers 67 (2), 268-283, 2017
On the construction of side-channel attack resilient s-boxes
L Lerman, N Veshchikov, S Picek, O Markowitch
International Workshop on Constructive Side-Channel Analysis and Secureá…, 2017
Robust profiled attacks: should the adversary trust the dataset?
L Lerman, Z Martinasek, O Markowitch
IET Information Security 11 (4), 188-194, 2017
Comparing sboxes of ciphers from the perspective of side-channel attacks
L Lerman, O Markowitch, N Veshchikov
2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST), 1-6, 2016
ModÚlisation et simulation
G Bontempi, L Lerman
Presses universitaires de Bruxelles, 2009
Variety of Scalable Shuffling Countermeasures against Side Channel Attacks.
N Veshchikov, SF Medeiros, L Lerman
J. Cyber Secur. Mobil. 5 (3), 195-232, 2016
Improving block cipher design by rearranging internal operations
L Lerman, J Nakahara, N Veshchikov
2013 International Conference on Security and Cryptography (SECRYPT), 1-12, 2013
Key Management as a Service.
L Lerman, O Markowitch, J Nakahara Jr, PP Samarati
SECRYPT, 276-281, 2012
Les systemes de detection d’intrusion bases sur du machine learning
L Lerman, O Markowitch, G Bontempi
M. Coulibaly et al. M. Coulibaly et al, 2011
The system can't perform the operation now. Try again later.
Articles 1–20