BibTeX records: M. Abdelaziz Elaabid

download as .bib file

@inproceedings{DBLP:conf/wistp/KarrayDGE18,
  author       = {Khaled Karray and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Moulay Abdelaziz Elaabid},
  editor       = {Olivier Blazy and
                  Chan Yeob Yeun},
  title        = {Prediction-Based Intrusion Detection System for In-Vehicle Networks
                  Using Supervised Learning and Outlier-Detection},
  booktitle    = {Information Security Theory and Practice - 12th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2018, Brussels, Belgium, December 10-11, 2018,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11469},
  pages        = {109--128},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-20074-9\_9},
  doi          = {10.1007/978-3-030-20074-9\_9},
  timestamp    = {Tue, 14 May 2019 14:17:01 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/KarrayDGE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/18/KarrayDGE18,
  author       = {Khaled Karray and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  M. Abdelaziz Elaabid},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Attack Tree Construction and Its Application to the Connected Vehicle},
  booktitle    = {Cyber-Physical Systems Security},
  pages        = {175--190},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98935-8\_9},
  doi          = {10.1007/978-3-319-98935-8\_9},
  timestamp    = {Fri, 08 Mar 2019 12:57:04 +0100},
  biburl       = {https://dblp.org/rec/books/sp/18/KarrayDGE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/18/KarrayDGE18a,
  author       = {Khaled Karray and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  M. Abdelaziz Elaabid},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Identifier Randomization: An Efficient Protection Against CAN-Bus
                  Attacks},
  booktitle    = {Cyber-Physical Systems Security},
  pages        = {219--254},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98935-8\_11},
  doi          = {10.1007/978-3-319-98935-8\_11},
  timestamp    = {Fri, 08 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/sp/18/KarrayDGE18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/ClavierDDEGGHKLLNOSSSSVWW14,
  author       = {Christophe Clavier and
                  Jean{-}Luc Danger and
                  Guillaume Duc and
                  M. Abdelaziz Elaabid and
                  Beno{\^{\i}}t G{\'{e}}rard and
                  Sylvain Guilley and
                  Annelie Heuser and
                  Michael Kasper and
                  Yang Li and
                  Victor Lomn{\'{e}} and
                  Daisuke Nakatsu and
                  Kazuo Ohta and
                  Kazuo Sakiyama and
                  Laurent Sauvage and
                  Werner Schindler and
                  Marc St{\"{o}}ttinger and
                  Nicolas Veyrat{-}Charvillon and
                  Matthieu Walle and
                  Antoine Wurcker},
  title        = {Practical improvements of side-channel attacks on {AES:} feedback
                  from the 2nd {DPA} contest},
  journal      = {J. Cryptogr. Eng.},
  volume       = {4},
  number       = {4},
  pages        = {259--274},
  year         = {2014},
  url          = {https://doi.org/10.1007/s13389-014-0075-9},
  doi          = {10.1007/S13389-014-0075-9},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/ClavierDDEGGHKLLNOSSSSVWW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/ElaabidG12,
  author       = {M. Abdelaziz Elaabid and
                  Sylvain Guilley},
  title        = {Portability of templates},
  journal      = {J. Cryptogr. Eng.},
  volume       = {2},
  number       = {1},
  pages        = {63--74},
  year         = {2012},
  url          = {https://doi.org/10.1007/s13389-012-0030-6},
  doi          = {10.1007/S13389-012-0030-6},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/ElaabidG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/micro/DebandeSEGD12,
  author       = {Nicolas Debande and
                  Youssef Souissi and
                  M. Abdelaziz Elaabid and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  title        = {Wavelet transform based pre-processing for side channel analysis},
  booktitle    = {45th Annual {IEEE/ACM} International Symposium on Microarchitecture,
                  {MICRO} 2012, Workshops Proceedings, Vancouver, BC, Canada, December
                  1-5, 2012},
  pages        = {32--38},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/MICROW.2012.15},
  doi          = {10.1109/MICROW.2012.15},
  timestamp    = {Tue, 31 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/micro/DebandeSEGD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Elaabid11,
  author       = {M. Abdelaziz Elaabid},
  title        = {Attaques par canaux cach{\'{e}}s : exp{\'{e}}rimentations
                  avanc{\'{e}}es sur les attaques template. (Side channel attacks:
                  advanced experimentions on template attacks)},
  school       = {T{\'{e}}l{\'{e}}com ParisTech, France},
  year         = {2011},
  url          = {https://tel.archives-ouvertes.fr/tel-00937136},
  timestamp    = {Tue, 21 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/hal/Elaabid11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/ElaabidG10,
  author       = {M. Abdelaziz Elaabid and
                  Sylvain Guilley},
  editor       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {Practical Improvements of Profiled Side-Channel Attacks on a Hardware
                  Crypto-Accelerator},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference
                  on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6055},
  pages        = {243--260},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12678-9\_15},
  doi          = {10.1007/978-3-642-12678-9\_15},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/ElaabidG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ElaabidMGD10,
  author       = {M. Abdelaziz Elaabid and
                  Olivier Meynard and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Combined Side-Channel Attacks},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {175--190},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_13},
  doi          = {10.1007/978-3-642-17955-6\_13},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ElaabidMGD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ElaabidG10,
  author       = {M. Abdelaziz Elaabid and
                  Sylvain Guilley},
  title        = {Practical Improvements of Profiled Side-Channel Attacks on a Hardware
                  Crypto-Accelerator},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {116},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/116},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ElaabidG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AabidGH07,
  author       = {M. Abdelaziz Elaabid and
                  Sylvain Guilley and
                  Philippe Hoogvorst},
  title        = {Template Attacks with a Power Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {443},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/443},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AabidGH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics