Author of the publication

Boosting Higher-Order Correlation Attacks by Dimensionality Reduction.

, , , , and . SPACE, volume 8804 of Lecture Notes in Computer Science, page 183-200. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attacking Suggest Boxes in Web Applications Over HTTPS Using Side-Channel Stochastic Algorithms., , , , , , , , and . CRiSIS, volume 8924 of Lecture Notes in Computer Science, page 116-130. Springer, (2014)Profiled Side-Channel Analysis in the Efficient Attacker Framework., , , and . CARDIS, volume 13173 of Lecture Notes in Computer Science, page 44-63. Springer, (2021)Trade-Offs for S-Boxes: Cryptographic Properties and Side-Channel Resilience., , and . ACNS, volume 10355 of Lecture Notes in Computer Science, page 393-414. Springer, (2017)On What to Learn: Train or Adapt a Deeply Learned Profile?, , and . IACR Cryptol. ePrint Arch., (2020)Side-channel Analysis of Lightweight Ciphers: Does Lightweight Equal Easy?, , , and . IACR Cryptology ePrint Archive, (2017)On the Performance of Convolutional Neural Networks for Side-Channel Analysis., , , , , and . SPACE, volume 11348 of Lecture Notes in Computer Science, page 157-176. Springer, (2018)ULTRA: Ultimate Rootkit Detection over the Air., , and . RAID, page 232-251. ACM, (2022)Physical Security Versus Masking Schemes., , , , and . Cyber-Physical Systems Security, Springer, (2018)Trace-to-Trace Translation for SCA., , and . CARDIS, volume 13173 of Lecture Notes in Computer Science, page 24-43. Springer, (2021)Detecting Hidden Leakages., , and . ACNS, volume 8479 of Lecture Notes in Computer Science, page 324-342. Springer, (2014)