Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Breaking Free: Leakage Model-free Deep Learning-based Side-channel Analysis., , , , and . IACR Cryptol. ePrint Arch., (2023)Not so Difficult in the End: Breaking the ASCADv2 Dataset., , and . IACR Cryptol. ePrint Arch., (2023)The Best of Two Worlds: Deep Learning-assisted Template Attack., , and . IACR Cryptol. ePrint Arch., (2021)Everything is Connected: From Model Learnability to Guessing Entropy., , , , , , and . IACR Cryptol. ePrint Arch., (2020)The Need for Speed: A Fast Guessing Entropy Calculation for Deep Learning-based SCA., , and . IACR Cryptol. ePrint Arch., (2021)Deep Learning on Side-Channel Analysis., , , , , , and . Security and Artificial Intelligence, (2022)Focus is Key to Success: A Focal Loss Function for Deep Learning-Based Side-Channel Analysis., , , and . COSADE, volume 13211 of Lecture Notes in Computer Science, page 29-48. Springer, (2022)A Fast Characterization Method for Semi-invasive Fault Injection Attacks., , , and . CT-RSA, volume 12006 of Lecture Notes in Computer Science, page 146-170. Springer, (2020)The Need for Speed: A Fast Guessing Entropy Calculation for Deep Learning-Based SCA., , and . Algorithms, 16 (3): 127 (March 2023)On the Evaluation of Deep Learning-Based Side-Channel Analysis., , and . COSADE, volume 13211 of Lecture Notes in Computer Science, page 49-71. Springer, (2022)