Author of the publication

Kernel Discriminant Analysis for Information Extraction in the Presence of Masking.

, , and . CARDIS, volume 10146 of Lecture Notes in Computer Science, page 1-22. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Study of Deep Learning Techniques for Side-Channel Analysis and Introduction to ASCAD Database., , , , and . IACR Cryptology ePrint Archive, (2018)Deep Learning to Evaluate Secure RSA Implementations., , , , , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019 (2): 132-161 (2019)Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures - Profiling Attacks Without Pre-processing., , and . CHES, volume 10529 of Lecture Notes in Computer Science, page 45-68. Springer, (2017)Deep Learning Side-Channel Analysis on Large-Scale Traces - A Case Study on a Polymorphic AES., , , , , , and . ESORICS (1), volume 12308 of Lecture Notes in Computer Science, page 440-460. Springer, (2020)Gradient Visualization for General Characterization in Profiling Attacks., , and . COSADE, volume 11421 of Lecture Notes in Computer Science, page 145-167. Springer, (2019)Kernel Discriminant Analysis for Information Extraction in the Presence of Masking., , and . CARDIS, volume 10146 of Lecture Notes in Computer Science, page 1-22. Springer, (2016)Enhancing Dimensionality Reduction Methods for Side-Channel Attacks., , and . CARDIS, volume 9514 of Lecture Notes in Computer Science, page 15-33. Springer, (2015)Gradient Visualization for General Characterization in Profiling Attacks., , and . IACR Cryptology ePrint Archive, (2018)A Comprehensive Study of Deep Learning for Side-Channel Analysis., , and . IACR Cryptology ePrint Archive, (2019)Deep learning for side-channel analysis and introduction to ASCAD database., , , , and . J. Cryptogr. Eng., 10 (2): 163-188 (2020)