From post

Fake It Till You Make It: Data Augmentation Using Generative Adversarial Networks for All the Crypto You Need on Small Devices.

, , , и . CT-RSA, том 13161 из Lecture Notes in Computer Science, стр. 297-321. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Improving DPA resistance of S-boxes: How far can we go?, , , и . ISCAS, стр. 2013-2016. IEEE, (2015)On the exponents of APN power functions and Sidon sets, sum-free sets, and Dickson polynomials., и . IACR Cryptology ePrint Archive, (2017)Side-channel Analysis of Lightweight Ciphers: Does Lightweight Equal Easy?, , , и . IACR Cryptology ePrint Archive, (2017)Amplitude-oriented mixed-type CGP classification., , и . GECCO (Companion), стр. 1415-1418. ACM, (2017)On the Construction of Side-Channel Attack Resilient S-boxes., , , и . COSADE, том 10348 из Lecture Notes in Computer Science, стр. 102-119. Springer, (2017)Combining Evolutionary Computation and Algebraic Constructions to Find Cryptography-Relevant Boolean Functions., , , и . PPSN, том 8672 из Lecture Notes in Computer Science, стр. 822-831. Springer, (2014)Applications of Soft Computing in Cryptology.. WISA, том 10144 из Lecture Notes in Computer Science, стр. 305-317. (2016)On the Performance of Convolutional Neural Networks for Side-Channel Analysis., , , , , и . SPACE, том 11348 из Lecture Notes in Computer Science, стр. 157-176. Springer, (2018)On using genetic algorithms for intrinsic side-channel resistance: the case of AES S-box., , , , , и . CS2@HiPEAC, стр. 13-18. ACM, (2014)Analyzing gene expression data: Fuzzy decision tree algorithm applied to the classification of cancer data., , и . FUZZ-IEEE, стр. 1-8. IEEE, (2015)