Intelligent machine homicide A Heuser, M Zohner International Workshop on Constructive Side-Channel Analysis and Secure …, 2012 | 199 | 2012 |
Make some noise. unleashing the power of convolutional neural networks for profiled side-channel analysis J Kim, S Picek, A Heuser, S Bhasin, A Hanjalic IACR Transactions on Cryptographic Hardware and Embedded Systems, 148-179, 2019 | 161 | 2019 |
The curse of class imbalance and conflicting metrics with machine learning for side-channel evaluations S Picek, A Heuser, A Jovic, S Bhasin, F Regazzoni IACR Transactions on Cryptographic Hardware and Embedded Systems 2019 (1), 1-29, 2019 | 140 | 2019 |
Good is not good enough A Heuser, O Rioul, S Guilley International Workshop on Cryptographic Hardware and Embedded Systems, 55-74, 2014 | 90 | 2014 |
Side-channel analysis and machine learning: A practical perspective S Picek, A Heuser, A Jovic, SA Ludwig, S Guilley, D Jakobovic, ... 2017 International Joint Conference on Neural Networks (IJCNN), 4095-4102, 2017 | 84 | 2017 |
On the performance of convolutional neural networks for side-channel analysis S Picek, IP Samiotis, J Kim, A Heuser, S Bhasin, A Legay International Conference on Security, Privacy, and Applied Cryptography …, 2018 | 83 | 2018 |
Detecting hidden leakages A Moradi, S Guilley, A Heuser International Conference on Applied Cryptography and Network Security, 324-342, 2014 | 66 | 2014 |
Mind the portability: A warriors guide through realistic profiled side-channel analysis S Bhasin, A Chattopadhyay, A Heuser, D Jap, S Picek, R Ranjan NDSS 2020-Network and Distributed System Security Symposium, 1-14, 2020 | 53 | 2020 |
Less is more N Bruneau, S Guilley, A Heuser, D Marion, O Rioul International Workshop on Cryptographic Hardware and Embedded Systems, 22-41, 2015 | 47 | 2015 |
Side-channel analysis of lightweight ciphers: Does lightweight equal easy? A Heuser, S Picek, S Guilley, N Mentens International Workshop on Radio Frequency Identification: Security and …, 2016 | 46 | 2016 |
Template attack versus Bayes classifier S Picek, A Heuser, S Guilley Journal of Cryptographic Engineering 7 (4), 343-351, 2017 | 45 | 2017 |
Masks will fall off N Bruneau, S Guilley, A Heuser, O Rioul International Conference on the Theory and Application of Cryptology and …, 2014 | 39 | 2014 |
Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest C Clavier, JL Danger, G Duc, MA Elaabid, B Gérard, S Guilley, A Heuser, ... Journal of Cryptographic Engineering 4 (4), 259-274, 2014 | 37 | 2014 |
A theoretical study of Kolmogorov-Smirnov distinguishers A Heuser, O Rioul, S Guilley International Workshop on Constructive Side-Channel Analysis and Secure …, 2014 | 36 | 2014 |
A new difference method for side-channel analysis with high-dimensional leakage models A Heuser, M Kasper, W Schindler, M Stöttinger Cryptographers’ Track at the RSA Conference, 365-382, 2012 | 35 | 2012 |
Scalable approximation of quantitative information flow in programs F Biondi, MA Enescu, A Heuser, A Legay, KS Meel, J Quilbeuf International Conference on Verification, Model Checking, and Abstract …, 2018 | 34 | 2018 |
A key to success S Guilley, A Heuser, O Rioul International Conference on Cryptology in India, 270-290, 2015 | 34 | 2015 |
Improved algebraic side-channel attack on AES MSE Mohamed, S Bulygin, M Zohner, A Heuser, M Walter, J Buchmann 2012 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2012 | 34 | 2012 |
Lightweight ciphers and their side-channel resilience A Heuser, S Picek, S Guilley, N Mentens IEEE Transactions on Computers 69 (10), 1434-1448, 2017 | 30 | 2017 |
Time-frequency analysis for second-order attacks P Belgarric, S Bhasin, N Bruneau, JL Danger, N Debande, S Guilley, ... International Conference on Smart Card Research and Advanced Applications …, 2013 | 30 | 2013 |