Folgen
Annelie Heuser
Annelie Heuser
CNRS researcher
Bestätigte E-Mail-Adresse bei irisa.fr - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Make some noise. unleashing the power of convolutional neural networks for profiled side-channel analysis
J Kim, S Picek, A Heuser, S Bhasin, A Hanjalic
IACR Transactions on Cryptographic Hardware and Embedded Systems, 148-179, 2019
2552019
The curse of class imbalance and conflicting metrics with machine learning for side-channel evaluations
S Picek, A Heuser, A Jovic, S Bhasin, F Regazzoni
IACR Transactions on Cryptographic Hardware and Embedded Systems, 209-237, 2019
2442019
Intelligent machine homicide: Breaking cryptographic devices using support vector machines
A Heuser, M Zohner
International Workshop on Constructive Side-Channel Analysis and Secure …, 2012
2412012
Good is not good enough: Deriving optimal distinguishers from communication theory
A Heuser, O Rioul, S Guilley
Cryptographic Hardware and Embedded Systems–CHES 2014: 16th International …, 2014
1292014
On the performance of convolutional neural networks for side-channel analysis
S Picek, IP Samiotis, J Kim, A Heuser, S Bhasin, A Legay
Security, Privacy, and Applied Cryptography Engineering: 8th International …, 2018
1212018
Side-channel analysis and machine learning: A practical perspective
S Picek, A Heuser, A Jovic, SA Ludwig, S Guilley, D Jakobovic, ...
2017 International Joint Conference on Neural Networks (IJCNN), 4095-4102, 2017
1182017
Detecting hidden leakages
A Moradi, S Guilley, A Heuser
Applied Cryptography and Network Security: 12th International Conference …, 2014
722014
Mind the portability: A warriors guide through realistic profiled side-channel analysis
S Bhasin, A Chattopadhyay, A Heuser, D Jap, S Picek, R Ranjan
NDSS 2020-Network and Distributed System Security Symposium, 1-14, 2020
682020
Template attack versus Bayes classifier
S Picek, A Heuser, S Guilley
Journal of Cryptographic Engineering 7 (4), 343-351, 2017
602017
Side-channel analysis of lightweight ciphers: Does lightweight equal easy?
A Heuser, S Picek, S Guilley, N Mentens
International Workshop on Radio Frequency Identification: Security and …, 2016
582016
Less is more: dimensionality reduction from a theoretical perspective
N Bruneau, S Guilley, A Heuser, D Marion, O Rioul
Cryptographic Hardware and Embedded Systems--CHES 2015: 17th International …, 2015
532015
Scalable approximation of quantitative information flow in programs
F Biondi, MA Enescu, A Heuser, A Legay, KS Meel, J Quilbeuf
Verification, Model Checking, and Abstract Interpretation: 19th …, 2018
462018
Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest
C Clavier, JL Danger, G Duc, MA Elaabid, B Gérard, S Guilley, A Heuser, ...
Journal of Cryptographic Engineering 4, 259-274, 2014
462014
Masks Will Fall Off Higher-Order Optimal Distinguishers
N Bruneau, S Guilley, A Heuser, O Rioul
Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014
462014
Lightweight ciphers and their side-channel resilience
A Heuser, S Picek, S Guilley, N Mentens
IEEE Transactions on Computers 69 (10), 1434-1448, 2017
442017
A systematic evaluation of profiling through focused feature selection
S Picek, A Heuser, A Jovic, L Batina
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 27 (12 …, 2019
422019
A key to success: Success exponents for side-channel distinguishers
S Guilley, A Heuser, O Rioul
International Conference on Cryptology in India, 270-290, 2015
412015
A new difference method for side-channel analysis with high-dimensional leakage models
A Heuser, M Kasper, W Schindler, M Stöttinger
Topics in Cryptology–CT-RSA 2012: The Cryptographers’ Track at the RSA …, 2012
402012
Improved algebraic side-channel attack on AES
MSE Mohamed, S Bulygin, M Zohner, A Heuser, M Walter, J Buchmann
2012 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2012
372012
Time-frequency analysis for second-order attacks
P Belgarric, S Bhasin, N Bruneau, JL Danger, N Debande, S Guilley, ...
Smart Card Research and Advanced Applications: 12th International Conference …, 2014
362014
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20