Liran Lerman
Liran Lerman
Thales Communications Belgium & Université libre de Bruxelles
Verifierad e-postadress på lerman.be - Startsida
Titel
Citeras av
Citeras av
År
A machine learning approach against a masked AES
L Lerman, G Bontempi, O Markowitch
Journal of Cryptographic Engineering 5 (2), 123-139, 2015
1592015
Side channel attack: an approach based on machine learning
L Lerman, G Bontempi, O Markowitch
Center for Advanced Security Research Darmstadt 29, 2011
1252011
Template attacks vs. machine learning revisited (and the curse of dimensionality in side-channel analysis)
L Lerman, R Poussier, G Bontempi, O Markowitch, FX Standaert
International Workshop on Constructive Side-Channel Analysis and Secure …, 2015
1182015
Power analysis attack: an approach based on machine learning
L Lerman, G Bontempi, O Markowitch
International Journal of Applied Cryptography 3 (2), 97-115, 2014
1012014
Semi-supervised template attack
L Lerman, SF Medeiros, N Veshchikov, C Meuter, G Bontempi, ...
International Workshop on Constructive Side-Channel Analysis and Secure …, 2013
422013
Template attacks versus machine learning revisited and the curse of dimensionality in side-channel analysis: extended version
L Lerman, R Poussier, O Markowitch, FX Standaert
Journal of Cryptographic Engineering 8 (4), 301-313, 2018
222018
SAT-based cryptanalysis of ACORN.
F Lafitte, L Lerman, O Markowitch, D Van Heule
IACR Cryptol. ePrint Arch. 2016, 521, 2016
192016
A time series approach for profiling attack
L Lerman, G Bontempi, SB Taieb, O Markowitch
International Conference on Security, Privacy, and Applied Cryptography …, 2013
192013
The bias–variance decomposition in profiled attacks
L Lerman, G Bontempi, O Markowitch
Journal of Cryptographic Engineering 5 (4), 255-267, 2015
142015
Start simple and then refine: Bias-variance decomposition as a diagnosis tool for leakage profiling
L Lerman, N Veshchikov, O Markowitch, FX Standaert
IEEE Transactions on Computers 67 (2), 268-283, 2017
102017
Robust profiled attacks: should the adversary trust the dataset?
L Lerman, Z Martinasek, O Markowitch
IET Information Security 11 (4), 188-194, 2017
102017
On the construction of side-channel attack resilient s-boxes
L Lerman, N Veshchikov, S Picek, O Markowitch
International Workshop on Constructive Side-Channel Analysis and Secure …, 2017
92017
Modélisation et simulation
G Bontempi
Département d’informatique, 2015
82015
Location, location, location: Revisiting modeling and exploitation for location-based side channel leakages
C Andrikos, L Batina, L Chmielewski, L Lerman, V Mavroudis, ...
International Conference on the Theory and Application of Cryptology and …, 2019
72019
Comparing sboxes of ciphers from the perspective of side-channel attacks
L Lerman, O Markowitch, N Veshchikov
2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST), 1-6, 2016
72016
Key Management as a Service.
L Lerman, O Markowitch, J Nakahara Jr, PP Samarati
SECRYPT, 276-281, 2012
52012
Efficient profiled attacks on masking schemes
L Lerman, O Markowitch
IEEE Transactions on Information Forensics and Security 14 (6), 1445-1454, 2018
42018
Les systèmes de détection d'intrusion basés sur du machine learning
L Lerman, O Markowitch, G Bontempi
42011
Variety of scalable shuffling countermeasures against side channel attacks
N Veshchikov, SF Medeiros, L Lerman
Journal of Cyber Security and Mobility 5 (3), 195-232, 2016
32016
Improving block cipher design by rearranging internal operations
L Lerman, J Nakahara, N Veshchikov
2013 International Conference on Security and Cryptography (SECRYPT), 1-12, 2013
32013
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20