-
1تسجيل فيديو
المساهمون: UCL Crypto Group, Université Catholique de Louvain = Catholic University of Louvain (UCL), Institut Fourier (IF ), Centre National de la Recherche Scientifique (CNRS)-Université Grenoble Alpes 2016-2019 (UGA 2016-2019 )
المصدر: https://hal.science/medihal-01346009Test ; 2014.
مصطلحات موضوعية: coding and cryptography days 2014, template, machine learning, journées codage et cryptographie 2014, grenoble, évalutation, attaques, canaux cachés, [MATH]Mathematics [math], [MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT]
العلاقة: medihal-01346009; https://hal.science/medihal-01346009Test; https://hal.science/medihal-01346009/documentTest; https://hal.science/medihal-01346009/file/poussier.mp4Test
-
2دورية أكاديمية
المساهمون: The Pennsylvania State University CiteSeerX Archives
مصطلحات موضوعية: Depends R (>, = 2.10, MASS, corpcor, mmap, ade4, infotheo Description This package has many purposes, first, it gives to the
وصف الملف: application/pdf
-
3دورية أكاديمية
المساهمون: The Pennsylvania State University CiteSeerX Archives
مصطلحات موضوعية: Depends R (>, = 2.10, MASS, corpcor, mmap, ade4, infotheo Description This package has many purposes, first, it gives to the
وصف الملف: application/pdf
-
4
المؤلفون: Liran Lerman, Zdenek Martinasek, Olivier Markowitch
المصدر: IET Information Security. 11:188-194
مصطلحات موضوعية: Computer Networks and Communications, business.industry, Computer science, Robust random early detection, 020206 networking & telecommunications, Cryptography, 02 engineering and technology, Trusted Computing, Adversary, Computer security, computer.software_genre, 020202 computer hardware & architecture, 0202 electrical engineering, electronic engineering, information engineering, Side channel attack, High dimensionality, business, computer, Software, Information Systems, Parametric statistics
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::7bc80c8d250ca93ec418932ead072441Test
https://doi.org/10.1049/iet-ifs.2015.0574Test -
5
المؤلفون: Stephane Fernandes Medeiros, Liran Lerman, Nikita Veshchikov
المصدر: Journal of Cyber Security and Mobility, 5 (3
مصطلحات موضوعية: Engineering, AES, Microcontroller, Shuffling, Computer Networks and Communications, business.industry, Généralités, Lightweight shuffling, Computer security, computer.software_genre, Variety (cybernetics), Countermeasures, Hiding techniques, Hardware and Architecture, Scalability, Side channel attack, Shuffling countermeasure, Side channel analysis, business, computer
وصف الملف: 2 full-text file(s): application/pdf; application/pdf
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::136ea0026d6e5e4d90c9191d4c53da30Test
https://doi.org/10.13052/jcsm2245-1439.532Test -
6
المؤلفون: Liran Lerman, Olivier Markowitch
المصدر: IEEE transactions on information forensics and security, 14 (6
مصطلحات موضوعية: random forests, Téléinformatique interconnexion ordinateurs, Computer Networks and Communications, Random number generation, business.industry, Computer science, Side-channel analysis, template attacks, Cryptography, masking, Computer security, computer.software_genre, kernel density, Masking (Electronic Health Record), Software, Common Criteria, Technologie de la sécurité, Side channel attack, Safety, Risk, Reliability and Quality, business, Resilience (network), computer
وصف الملف: 1 full-text file(s): application/pdf
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b49a01b964253b512127ad5dd00acaafTest
http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/284954Test -
7
المؤلفون: Kostas Papagiannopoulos, Vasilios Mavroudis, Guilherme Perin, Christos Andrikos, Giorgos Rassias, Lejla Batina, Alberto Sonnino, Lukasz Chmielewski, Liran Lerman
المصدر: Advances in Cryptology – ASIACRYPT 2019-25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part III
Lecture Notes in Computer Science ISBN: 9783030346171
ASIACRYPT (3)
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – ASIACRYPT 2019مصطلحات موضوعية: Exploit, business.industry, Computer science, Real-time computing, 0202 electrical engineering, electronic engineering, information engineering, Byte, 020201 artificial intelligence & image processing, Cryptography, 02 engineering and technology, Side channel attack, Security level, business, 020202 computer hardware & architecture
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b356993e266cc668e86937c52e2290b6Test
-
8
المصدر: Journal of Cryptographic Engineering, 8 (4
مصطلحات موضوعية: Theoretical computer science, Bias–variance decomposition, Computer Networks and Communications, Computer science, Word error rate, Context (language use), Cryptography, 02 engineering and technology, Side-channel attacks, Machine learning, computer.software_genre, 0202 electrical engineering, electronic engineering, information engineering, Side channel attack, Profiling (computer programming), Curse of dimensionality, Téléinformatique interconnexion ordinateurs, business.industry, Template attacks, Neurosciences cognitives, 020202 computer hardware & architecture, Random forest, 020201 artificial intelligence & image processing, Artificial intelligence, business, Focus (optics), computer, Software
وصف الملف: 1 full-text file(s): application/pdf
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::405e8a650a559bc2df67cafecb937cb2Test
http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/283173Test -
9
المؤلفون: Stjepan Picek, Nikita Veshchikov, Olivier Markowitch, Liran Lerman
المصدر: CF
مصطلحات موضوعية: Computer science, 0102 computer and information sciences, 02 engineering and technology, Adversary, First order, Computer security, computer.software_genre, 01 natural sciences, Masking (Electronic Health Record), 010201 computation theory & mathematics, Order (business), Power consumption, 0202 electrical engineering, electronic engineering, information engineering, 020201 artificial intelligence & image processing, Correlation power analysis, Side channel attack, Resilience (network), computer
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::3412bc7523872ed361c6ecf75c24b263Test
https://doi.org/10.1145/3203217.3206428Test -
10
المؤلفون: Gianluca Bontempi, Olivier Markowitch, Liran Lerman
المصدر: Journal of Cryptographic Engineering. 5:255-267
مصطلحات موضوعية: Computer Networks and Communications, Computer science, business.industry, Word error rate, Worst-case scenario, Cryptography, Adversary, Computer security, computer.software_genre, Information sensitivity, Pre-play attack, Variance decomposition of forecast errors, Side channel attack, Data mining, business, computer, Software
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::18ccb0afdf5a32a152f326d7d3f52a11Test
https://doi.org/10.1007/s13389-015-0106-1Test