Author of the publication

It Started with Templates: The Future of Profiling in Side-Channel Analysis.

, , , and . Security of Ubiquitous Computing Systems, Springer International Publishing, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the optimality and practicability of mutual information analysis in some scenarios., , , and . Cryptogr. Commun., 10 (1): 101-121 (2018)Side-channel Analysis of Lightweight Ciphers: Does Lightweight Equal Easy?, , , and . IACR Cryptology ePrint Archive, (2017)Profiled SCA with a New Twist: Semi-supervised Learning., , , , and . IACR Cryptology ePrint Archive, (2017)When Theory Meets Practice: A Framework for Robust Profiled Side-channel Analysis., , , and . IACR Cryptology ePrint Archive, (2018)CC Meets FIPS: A Hybrid Test Methodology for First Order Side Channel Analysis., , , , , and . IEEE Trans. Computers, 68 (3): 347-361 (2019)On What to Learn: Train or Adapt a Deeply Learned Profile?, , and . IACR Cryptol. ePrint Arch., (2020)On the Performance of Convolutional Neural Networks for Side-Channel Analysis., , , , , and . SPACE, volume 11348 of Lecture Notes in Computer Science, page 157-176. Springer, (2018)Detecting Hidden Leakages., , and . ACNS, volume 8479 of Lecture Notes in Computer Science, page 324-342. Springer, (2014)ULTRA: Ultimate Rootkit Detection over the Air., , and . RAID, page 232-251. ACM, (2022)Trace-to-Trace Translation for SCA., , and . CARDIS, volume 13173 of Lecture Notes in Computer Science, page 24-43. Springer, (2021)