Skip to content
- Asmita Adhikary, Ieana Buhan,
SoK: Assisted Fault Simulation, Existing Challenges and Opportunities Offered by AI,
ACNS 2023, LNCS vol 13907, Springer, Cham, Oct 2023, 10.1007/978-3-031-41181-6_10
- Suvadeep Hajra, Manaar Alam, Sayandeep Saha, Stjepan Picek, Debdeep Mukhopadhyay,
On the Instability of Softmax Attention-based Deep Learning Models in Side-channel Analysis,
IEEE Trans. on Information Forensics and Security, Vol.19, pp 514 – 528, Oct. 2023, 10.1109/TIFS.2023.3326667
- Nuša Zidarič, Guang Gong, Mark Aagaard, Aleksandar Jurišić, Olexandr Konovalov,
FFCSA – Finite Field Constructions, Search, and Algorithms,
ISSAC’23, ACM Communications in Computer Algebra, Vol.57, Issue 2, pp 57–64, Aug. 2023, 10.1145/3614408.3614416
- Solane El Hirch, Joan Daemen, Raghvendra Rohit, Rusydi H. Makarim,
Twin Column Parity Mixers and Gaston: A New Mixing Layer and Permutation,
Advances in Cryptology – CRYPTO 2023, LNCS vol 14083, Springer, Cham, Aug 2023, 10.1007/978-3-031-38548-3_16
- Stjepan Picek, Annelie Heuser, Alan Jovic, Shivam Bhasin, Francesco Regazzoni,
Tipping the Balance: Imbalanced Classes in Deep Learning Side-channel Analysis,
IEEE Design & Test, June 2023, 10.1109/MDAT.2023.3288808
- Lejla Batina, Łukasz Chmielewski, Björn Haase, Niels Samwel, Peter Schwabe,
SoK: SCA-secure ECC in software – mission impossible?,
IACR TCHES 2023(1), pp 557–589, Nov 2022, 10.46586/tches.v2023.i1.557-589
- Norica Băcuieti, Joan Daemen, Seth Hoffert, Gilles Van Assche, Ronny Van Keer,
Jammin’ on the Deck,
Advances in Cryptology – ASIACRYPT 2022, Proceedings, Part II, pp 555–584, Dec 2022, 10.1007/978-3-031-22966-4_19
- Lichao Wu, Guilherme Perin, Stjepan Picek,
The Best of Two Worlds: Deep Learning-assisted Template Attack,
IACR TCHES, 2022(3), pp 413–437, June 2022, 10.46586/tches.v2022.i3.413-437
- Guilherme Perin, Lichao Wu, Stjepan Picek,
Exploring Feature Selection Scenarios for Deep Learning-based Side-channel Analysis,
IACR TCHES 2022(4), pp 828–861, Aug. 2022, 10.46586/tches.v2022.i4.828-861
- Unai Rioja, Lejla Batina, Igor Armendariz, Jose Luis Flores,
Towards Human Dependency Elimination: AI Approach to SCA Robustness Assessment,
IEEE Trans. on Information Forensics and Security, Vol.17, pp 3906 – 3921, May 2022, 10.1109/TIFS.2022.3176189
- Arthur Beckers, Roel Uytterhoeven, Thomas Vandenabeele, Jo Vliegen, Lennert Wouters, Joan Daemen, Wim Dehaene, Benedikt Gierlichs, Nele Mentens,
Energy and side-channel security evaluation of near-threshold cryptographic circuits in 28nm FD-SOI technology,
CF ’22: Proceedings of the 19th ACM International Conference on Computing Frontiers, pp. 258–262, May 2022, 10.1145/3528416.3530992
- Lejla Batina, Thomas Bäck, Ileana Buhan, Stjepan Picek,
Security and Artificial Intelligence – A Crossdisciplinary Approach,
LNCS vol 13049, Springer, Cham, April 2022, 10.1007/978-3-030-98795-4_11
- Konstantina Miteloudi, Lejla Batina, Joan Daemen, Nele Mentens,
ROCKY: Rotation Countermeasure for the Protection of Keys and Other Sensitive Data,
SAMOS 2021, LNCS vol 13227, Springer, Cham, April 2022, 10.1007/978-3-031-04580-6_19
- Naila Mukhtar, Louiza Papachristodoulou, Apostolos P. Fournaris, Lejla Batina, Yinan Kong,
Machine-Learning Assisted Side-Channel Attacks on RNS ECC Implementations Using Hybrid Feature Engineering,
COSADE 2022, LNCS vol 13211. Springer, Cham, March 2022, 10.1007/978-3-030-99766-3_1
- Lichao Wu, Guilherme Perin, Stjepan Picek,
On the Evaluation of Deep Learning-Based Side-Channel Analysis,
COSADE 2022, LNCS vol 13211, Springer, Cham, March 2022, 10.1007/978-3-030-99766-3_3
- Maikel Kerkhof, Lichao Wu, Guilherme Perin, Stjepan Picek,
Focus is Key to Success: A Focal Loss Function for Deep Learning-Based Side-Channel Analysis,
COSADE 2022, LNCS vol 13211, Springer, Cham, March 2022, 10.1007/978-3-030-99766-3_2
- Guilherme Perin, Lichao Wu, Stjepan Picek,
Gambling for Success: The Lottery Ticket Hypothesis in Deep Learning-Based Side-Channel Analysis,
In Artificial Intelligence for Cybersecurity, Advances in Information Security, Vol.54, Springer, Cham, Feb 2022, 10.1007/978-3-030-97087-1_9
- Naila Mukhtar, Lejla Batina, Stjepan Picek, Yinan Kong,
Fake It Till You Make It: Data Augmentation Using Generative Adversarial Networks for All the Crypto You Need on Small Devices,
CT-RSA 2022, LNCS vol 13161, Springer, Cham, Jan. 2022, 10.1007/978-3-030-95312-6_13
- Lejla Batina, Nele Mentens, Markus Miettinen, Naila Mukhtar, Thien Duc Nguyen, Md Masoom Rabbani, Phillip Rieger, Ahmad-Reza Sadeghi,
Advanced Attacks and Protection Mechanisms in IoT Devices and Networks,
In Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications, Dec. 2021, 10.1002/9781119607755.ch1
- Konstantina Miteloudi, Łukasz Chmielewski, Lejla Batina, Nele Mentens,
Evaluating the ROCKY Countermeasure for Side-Channel Leakage,
VLSI-SoC’21, Nov 2021, 10.1109/VLSI-SoC53125.2021.9606973
- Madura A. Shelton, Łukasz Chmielewski, Niels Samwel, Markus Wagner, Lejla Batina, Yuval Yarom,
Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic Code,
CCS ’21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, pp 685–699, Nov 2021, 10.1145/3460120.3485380