From post

One Trace Is All It Takes: Machine Learning-Based Side-Channel Attack on EdDSA.

, , и . SPACE, том 11947 из Lecture Notes in Computer Science, стр. 86-105. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Improving DPA resistance of S-boxes: How far can we go?, , , и . ISCAS, стр. 2013-2016. IEEE, (2015)Deep Neural Networks Aiding Cryptanalysis: A Case Study of the Speck Distinguisher., , и . ACNS, том 13269 из Lecture Notes in Computer Science, стр. 809-829. Springer, (2022)Kilroy Was Here: The First Step Towards Explainability of Neural Networks in Profiled Side-Channel Analysis., , и . COSADE, том 12244 из Lecture Notes in Computer Science, стр. 175-199. Springer, (2020)On the Importance of Initial Solutions Selection in Fault Injection., , и . FDTC, стр. 1-12. IEEE, (2021)PROACT - Physical Attack Resistance of Cryptographic Algorithms and Circuits with Reduced Time to Market., , , , , , , , , и 3 other автор(ы). ARC, том 14553 из Lecture Notes in Computer Science, стр. 255-266. Springer, (2024)Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand., , , , , и . USENIX Security Symposium, стр. 1687-1704. USENIX Association, (2022)The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption., , , , , , и . NDSS, The Internet Society, (2023)Evolving Cryptographic Pseudorandom Number Generators., , , , , и . PPSN, том 9921 из Lecture Notes in Computer Science, стр. 613-622. Springer, (2016)On using genetic algorithms for intrinsic side-channel resistance: the case of AES S-box., , , , , и . CS2@HiPEAC, стр. 13-18. ACM, (2014)Analyzing gene expression data: Fuzzy decision tree algorithm applied to the classification of cancer data., , и . FUZZ-IEEE, стр. 1-8. IEEE, (2015)