On the Success Rate of Side-Channel Attacks on Masked Implementations: Information-Theoretical Bounds and Their Practical Usage. | 0 | 0.34 | 2022 |
Perceived Information Revisited New Metrics to Evaluate Success Rate of Side-Channel Attacks. | 0 | 0.34 | 2022 |
Multiple-Valued Plaintext-Checking Side-Channel Attacks on Post-Quantum KEMs. | 0 | 0.34 | 2022 |
Curse of Re-encryption: A Generic Power/EM Analysis on Post-Quantum KEMs. | 1 | 0.39 | 2022 |
On the Success Rate of Side-Channel Attacks on Masked Implementations: Information-Theoretical Bounds and Their Practical Usage | 0 | 0.34 | 2022 |
Extraction of Binarized Neural Network Architecture and Secret Parameters Using Side-Channel Information | 0 | 0.34 | 2021 |
Fault-Injection Attacks Against NIST's Post-Quantum Cryptography Round 3 KEM Candidates. | 1 | 0.35 | 2021 |
Practical Side-Channel Based Model Extraction Attack on Tree-Based Machine Learning Algorithm. | 0 | 0.34 | 2020 |
Machine Learning and Hardware security - Challenges and Opportunities -Invited Talk-. | 0 | 0.34 | 2020 |
A Non-Reversible Insertion Method for Hardware Trojans Based on Path Delay Faults. | 0 | 0.34 | 2018 |
Path-Bounded One-Way Multihead Finite Automata. | 0 | 0.34 | 2005 |
Three-Way Two-Dimensional Deterministic Finite Automata with Rotated Inputs. | 0 | 0.34 | 2005 |
Design and Construction of an Advisory Dialogue Database. | 0 | 0.34 | 1995 |
A Note on One-way Auxiliary Pushdown Automata. | 0 | 0.34 | 1995 |