Search

Your search keyword '"Batina, Lejla"' showing total 46 results

Search Constraints

Start Over You searched for: Author "Batina, Lejla" Remove constraint Author: "Batina, Lejla" Publication Type Electronic Resources Remove constraint Publication Type: Electronic Resources
46 results on '"Batina, Lejla"'

Search Results

1. CNN architecture extraction on edge GPU

2. SoK: Deep Learning-based Physical Side-channel Analysis

3. Label Correlation in Deep Learning-Based Side-Channel Analysis

4. SoK: Deep Learning-based Physical Side-channel Analysis

5. BarraCUDA: GPUs do Leak DNN Weights

6. Deep Neural Networks Aiding Cryptanalysis: A Case Study of the Speck Distinguisher

7. Playing with blocks: Toward re-usable deep learning models for side-channel profiled attacks

8. Breaking a fully Balanced ASIC Coprocessor Implementing Complete Addition Formulas on Weierstrass Elliptic Curves

9. Fake It Till You Make It: Data Augmentation Using Generative Adversarial Networks for All the Crypto You Need on Small Devices

10. SCA Strikes Back: Reverse Engineering Neural Network Architectures using Side Channels

12. Shortcut side-channel security evaluations : application to elliptic curve cryptography, masking and shuffling

13. Being Patient and Persistent: Optimizing An Early Stopping Strategy for Deep Learning in Profiled Attacks

14. Keep It Unbiased: A Comparison Between Estimation of Distribution Algorithms and Deep Learning for Human Interaction-Free Side-Channel Analysis

15. Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic Code

16. SoK: Design Tools for Side-Channel-Aware Implementations

17. Interactive Side-Channel Analysis

18. Distinguishing Attacks on Linearly Filtered NFSRs with Decimated Output

19. Keep it Unsupervised: Horizontal Attacks Meet Deep Learning

20. Systematic Side-Channel Analysis of Curve25519 with Machine Learning

21. Interactive Side-Channel Analysis

22. Systematic Side-Channel Analysis of Curve25519 with Machine Learning

23. Keep it Unsupervised: Horizontal Attacks Meet Deep Learning

24. The uncertainty of Side-Channel Analysis: A way to leverage from heuristics

25. Auto-tune POIs: Estimation of distribution algorithms for efficient side-channel analysis

26. Screen Gleaning: A Screen Reading TEMPEST Attack on Mobile Devices Exploiting an Electromagnetic Side Channel

27. Online template attacks

28. A Systematic Evaluation of Profiling Through Focused Feature Selection

29. CSI NN: Reverse engineering of neural network architectures through electromagnetic side channel

30. CSI NN: Reverse engineering of neural network architectures through electromagnetic side channel

31. A Systematic Evaluation of Profiling Through Focused Feature Selection

32. Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers

33. CSI Neural Network: Using Side-channels to Recover Your Artificial Neural Network Information

34. Foundations of Secure Scaling (Dagstuhl Seminar 16342)

35. Foundations of Secure Scaling (Dagstuhl Seminar 16342)

36. Use of simulators for side-channel analysis: Leakage detection and analysis of cryptographic systems in early stages of development

37. SPARTA: A scheduling policy for thwarting differential power analysis attacks

38. $\mu$Kummer: efficient hyperelliptic signatures and key exchange on microcontrollers

39. Smart Card Fault Injections with High Temperatures

40. Secure and Efficient RNS Approach for Elliptic Curve Cryptography

41. Robustness Analysis of Real-Time Scheduling Against Differential Power Analysis Attacks

42. Image-based physical unclonable functions for anti-counterfeiting

43. Optimization of parameter settings search for a successful Fault Injection

44. Optimization of parameter settings search for a successful Fault Injection

45. Optimization of parameter settings search for a successful Fault Injection

46. A very compact 'perfectly masked' S-Box for AES (corrected)

Catalog

Books, media, physical & digital resources