Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: M. Abdelaziz Elaabid
@inproceedings{DBLP:conf/wistp/KarrayDGE18, author = {Khaled Karray and Jean{-}Luc Danger and Sylvain Guilley and Moulay Abdelaziz Elaabid}, editor = {Olivier Blazy and Chan Yeob Yeun}, title = {Prediction-Based Intrusion Detection System for In-Vehicle Networks Using Supervised Learning and Outlier-Detection}, booktitle = {Information Security Theory and Practice - 12th {IFIP} {WG} 11.2 International Conference, {WISTP} 2018, Brussels, Belgium, December 10-11, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11469}, pages = {109--128}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-20074-9\_9}, doi = {10.1007/978-3-030-20074-9\_9}, timestamp = {Tue, 14 May 2019 14:17:01 +0200}, biburl = {https://dblp.org/rec/conf/wistp/KarrayDGE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/18/KarrayDGE18, author = {Khaled Karray and Jean{-}Luc Danger and Sylvain Guilley and M. Abdelaziz Elaabid}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Attack Tree Construction and Its Application to the Connected Vehicle}, booktitle = {Cyber-Physical Systems Security}, pages = {175--190}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98935-8\_9}, doi = {10.1007/978-3-319-98935-8\_9}, timestamp = {Fri, 08 Mar 2019 12:57:04 +0100}, biburl = {https://dblp.org/rec/books/sp/18/KarrayDGE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/18/KarrayDGE18a, author = {Khaled Karray and Jean{-}Luc Danger and Sylvain Guilley and M. Abdelaziz Elaabid}, editor = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Identifier Randomization: An Efficient Protection Against CAN-Bus Attacks}, booktitle = {Cyber-Physical Systems Security}, pages = {219--254}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98935-8\_11}, doi = {10.1007/978-3-319-98935-8\_11}, timestamp = {Fri, 08 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/18/KarrayDGE18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/ClavierDDEGGHKLLNOSSSSVWW14, author = {Christophe Clavier and Jean{-}Luc Danger and Guillaume Duc and M. Abdelaziz Elaabid and Beno{\^{\i}}t G{\'{e}}rard and Sylvain Guilley and Annelie Heuser and Michael Kasper and Yang Li and Victor Lomn{\'{e}} and Daisuke Nakatsu and Kazuo Ohta and Kazuo Sakiyama and Laurent Sauvage and Werner Schindler and Marc St{\"{o}}ttinger and Nicolas Veyrat{-}Charvillon and Matthieu Walle and Antoine Wurcker}, title = {Practical improvements of side-channel attacks on {AES:} feedback from the 2nd {DPA} contest}, journal = {J. Cryptogr. Eng.}, volume = {4}, number = {4}, pages = {259--274}, year = {2014}, url = {https://doi.org/10.1007/s13389-014-0075-9}, doi = {10.1007/S13389-014-0075-9}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/ClavierDDEGGHKLLNOSSSSVWW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/ElaabidG12, author = {M. Abdelaziz Elaabid and Sylvain Guilley}, title = {Portability of templates}, journal = {J. Cryptogr. Eng.}, volume = {2}, number = {1}, pages = {63--74}, year = {2012}, url = {https://doi.org/10.1007/s13389-012-0030-6}, doi = {10.1007/S13389-012-0030-6}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/ElaabidG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/micro/DebandeSEGD12, author = {Nicolas Debande and Youssef Souissi and M. Abdelaziz Elaabid and Sylvain Guilley and Jean{-}Luc Danger}, title = {Wavelet transform based pre-processing for side channel analysis}, booktitle = {45th Annual {IEEE/ACM} International Symposium on Microarchitecture, {MICRO} 2012, Workshops Proceedings, Vancouver, BC, Canada, December 1-5, 2012}, pages = {32--38}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/MICROW.2012.15}, doi = {10.1109/MICROW.2012.15}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/micro/DebandeSEGD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/hal/Elaabid11, author = {M. Abdelaziz Elaabid}, title = {Attaques par canaux cach{\'{e}}s : exp{\'{e}}rimentations avanc{\'{e}}es sur les attaques template. (Side channel attacks: advanced experimentions on template attacks)}, school = {T{\'{e}}l{\'{e}}com ParisTech, France}, year = {2011}, url = {https://tel.archives-ouvertes.fr/tel-00937136}, timestamp = {Tue, 21 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/hal/Elaabid11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/ElaabidG10, author = {M. Abdelaziz Elaabid and Sylvain Guilley}, editor = {Daniel J. Bernstein and Tanja Lange}, title = {Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6055}, pages = {243--260}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12678-9\_15}, doi = {10.1007/978-3-642-12678-9\_15}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/ElaabidG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ElaabidMGD10, author = {M. Abdelaziz Elaabid and Olivier Meynard and Sylvain Guilley and Jean{-}Luc Danger}, editor = {Yongwha Chung and Moti Yung}, title = {Combined Side-Channel Attacks}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {175--190}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_13}, doi = {10.1007/978-3-642-17955-6\_13}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ElaabidMGD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ElaabidG10, author = {M. Abdelaziz Elaabid and Sylvain Guilley}, title = {Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {116}, year = {2010}, url = {http://eprint.iacr.org/2010/116}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ElaabidG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AabidGH07, author = {M. Abdelaziz Elaabid and Sylvain Guilley and Philippe Hoogvorst}, title = {Template Attacks with a Power Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {443}, year = {2007}, url = {http://eprint.iacr.org/2007/443}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AabidGH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.