BibTeX records: Annelie Heuser

download as .bib file

@article{DBLP:journals/dt/PicekHJB024,
  author       = {Stjepan Picek and
                  Annelie Heuser and
                  Alan Jovic and
                  Shivam Bhasin and
                  Francesco Regazzoni},
  title        = {Tipping the Balance: Imbalanced Classes in Deep-Learning Side-Channel
                  Analysis},
  journal      = {{IEEE} Des. Test},
  volume       = {41},
  number       = {2},
  pages        = {32--38},
  year         = {2024},
  url          = {https://doi.org/10.1109/MDAT.2023.3288808},
  doi          = {10.1109/MDAT.2023.3288808},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dt/PicekHJB024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cesar/0001PH23,
  author       = {Damien Marion and
                  Duy{-}Phuc Pham and
                  Annelie Heuser},
  editor       = {Gurvan Le Guernic},
  title        = {When Side-channel Meets Malware (short paper)},
  booktitle    = {Proceedings of the 30th Computer {\&} Electronics Security Application
                  Rendezvous Conference (C{\&}ESAR 2023) co-located with the 8th
                  European Cyber Week {(ECW} 2023), Rennes, France, November 21-22,
                  2023},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {3610},
  pages        = {71--77},
  publisher    = {CEUR-WS.org},
  year         = {2023},
  url          = {https://ceur-ws.org/Vol-3610/short-01.pdf},
  timestamp    = {Fri, 19 Jan 2024 15:08:28 +0100},
  biburl       = {https://dblp.org/rec/conf/cesar/0001PH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/Pham0H22,
  author       = {Duy{-}Phuc Pham and
                  Damien Marion and
                  Annelie Heuser},
  title        = {{ULTRA:} Ultimate Rootkit Detection over the Air},
  booktitle    = {25th International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022},
  pages        = {232--251},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3545948.3545962},
  doi          = {10.1145/3545948.3545962},
  timestamp    = {Thu, 20 Oct 2022 10:46:43 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/Pham0H22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/JovicJPH22,
  author       = {Alan Jovic and
                  Dirmanto Jap and
                  Louiza Papachristodoulou and
                  Annelie Heuser},
  title        = {Traditional Machine Learning Methods for Side-Channel Analysis},
  booktitle    = {Security and Artificial Intelligence},
  pages        = {25--47},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-98795-4\_2},
  doi          = {10.1007/978-3-030-98795-4\_2},
  timestamp    = {Mon, 02 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/JovicJPH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/PuodziusZHN21,
  author       = {Cassius Puodzius and
                  Olivier Zendra and
                  Annelie Heuser and
                  Lamine Noureddine},
  editor       = {Delphine Reinhardt and
                  Tilo M{\"{u}}ller},
  title        = {Accurate and Robust Malware Analysis through Similarity of External
                  Calls Dependency Graphs {(ECDG)}},
  booktitle    = {{ARES} 2021: The 16th International Conference on Availability, Reliability
                  and Security, Vienna, Austria, August 17-20, 2021},
  pages        = {57:1--57:12},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3465481.3470115},
  doi          = {10.1145/3465481.3470115},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/PuodziusZHN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Pham0MH21,
  author       = {Duy{-}Phuc Pham and
                  Damien Marion and
                  Matthieu Mastio and
                  Annelie Heuser},
  title        = {Obfuscation Revealed: Leveraging Electromagnetic Signals for Obfuscated
                  Malware Classification},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {706--719},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485894},
  doi          = {10.1145/3485832.3485894},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/Pham0MH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/Genevey-MetatHG21,
  author       = {Christophe Genevey{-}Metat and
                  Annelie Heuser and
                  Beno{\^{\i}}t G{\'{e}}rard},
  editor       = {Vincent Grosso and
                  Thomas P{\"{o}}ppelmann},
  title        = {Trace-to-Trace Translation for {SCA}},
  booktitle    = {Smart Card Research and Advanced Applications - 20th International
                  Conference, {CARDIS} 2021, L{\"{u}}beck, Germany, November 11-12,
                  2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13173},
  pages        = {24--43},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-97348-3\_2},
  doi          = {10.1007/978-3-030-97348-3\_2},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/Genevey-MetatHG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/PicekHPG21,
  author       = {Stjepan Picek and
                  Annelie Heuser and
                  Guilherme Perin and
                  Sylvain Guilley},
  editor       = {Vincent Grosso and
                  Thomas P{\"{o}}ppelmann},
  title        = {Profiled Side-Channel Analysis in the Efficient Attacker Framework},
  booktitle    = {Smart Card Research and Advanced Applications - 20th International
                  Conference, {CARDIS} 2021, L{\"{u}}beck, Germany, November 11-12,
                  2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13173},
  pages        = {44--63},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-97348-3\_3},
  doi          = {10.1007/978-3-030-97348-3\_3},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cardis/PicekHPG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/NoureddineHPZ21,
  author       = {Lamine Noureddine and
                  Annelie Heuser and
                  Cassius Puodzius and
                  Olivier Zendra},
  editor       = {Anupam Joshi and
                  Barbara Carminati and
                  Rakesh M. Verma},
  title        = {{SE-PAC:} {A} Self-Evolving PAcker Classifier against rapid packers
                  evolution},
  booktitle    = {{CODASPY} '21: Eleventh {ACM} Conference on Data and Application Security
                  and Privacy, Virtual Event, USA, April 26-28, 2021},
  pages        = {281--292},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3422337.3447848},
  doi          = {10.1145/3422337.3447848},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/NoureddineHPZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/PhamMH21,
  author       = {Duy{-}Phuc Pham and
                  Damien Marion and
                  Annelie Heuser},
  title        = {Poster: Obfuscation Revealed - Using Electromagnetic Emanation to
                  Identify and Classify Malware},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2021, Vienna, Austria, September 6-10, 2021},
  pages        = {710--712},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/EuroSP51992.2021.00055},
  doi          = {10.1109/EUROSP51992.2021.00055},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/PhamMH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincrypt/Genevey-MetatHG21,
  author       = {Christophe Genevey{-}Metat and
                  Annelie Heuser and
                  Beno{\^{\i}}t G{\'{e}}rard},
  editor       = {Patrick Longa and
                  Carla R{\`{a}}fols},
  title        = {Train or Adapt a Deeply Learned Profile?},
  booktitle    = {Progress in Cryptology - {LATINCRYPT} 2021 - 7th International Conference
                  on Cryptology and Information Security in Latin America, Bogot{\'{a}},
                  Colombia, October 6-8, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12912},
  pages        = {213--232},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-88238-9\_11},
  doi          = {10.1007/978-3-030-88238-9\_11},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/latincrypt/Genevey-MetatHG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/21/BatinaDHP21,
  author       = {Lejla Batina and
                  Milena Djukanovic and
                  Annelie Heuser and
                  Stjepan Picek},
  editor       = {Gildas Avoine and
                  Julio Hernandez{-}Castro},
  title        = {It Started with Templates: The Future of Profiling in Side-Channel
                  Analysis},
  booktitle    = {Security of Ubiquitous Computing Systems},
  pages        = {133--145},
  publisher    = {Springer International Publishing},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-10591-4\_8},
  doi          = {10.1007/978-3-030-10591-4\_8},
  timestamp    = {Tue, 04 Jul 2023 14:50:55 +0200},
  biburl       = {https://dblp.org/rec/books/sp/21/BatinaDHP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/HeuserPGM20,
  author       = {Annelie Heuser and
                  Stjepan Picek and
                  Sylvain Guilley and
                  Nele Mentens},
  title        = {Lightweight Ciphers and Their Side-Channel Resilience},
  journal      = {{IEEE} Trans. Computers},
  volume       = {69},
  number       = {10},
  pages        = {1434--1448},
  year         = {2020},
  url          = {https://doi.org/10.1109/TC.2017.2757921},
  doi          = {10.1109/TC.2017.2757921},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/HeuserPGM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/KnechtelK0HCMDF20,
  author       = {Johann Knechtel and
                  Elif Bilge Kavun and
                  Francesco Regazzoni and
                  Annelie Heuser and
                  Anupam Chattopadhyay and
                  Debdeep Mukhopadhyay and
                  Soumyajit Dey and
                  Yunsi Fei and
                  Yaacov Belenky and
                  Itamar Levi and
                  Tim G{\"{u}}neysu and
                  Patrick Schaumont and
                  Ilia Polian},
  title        = {Towards Secure Composition of Integrated Circuits and Electronic Systems:
                  On the Role of {EDA}},
  booktitle    = {2020 Design, Automation {\&} Test in Europe Conference {\&}
                  Exhibition, {DATE} 2020, Grenoble, France, March 9-13, 2020},
  pages        = {508--513},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.23919/DATE48585.2020.9116483},
  doi          = {10.23919/DATE48585.2020.9116483},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/date/KnechtelK0HCMDF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/BhasinCHJPS20,
  author       = {Shivam Bhasin and
                  Anupam Chattopadhyay and
                  Annelie Heuser and
                  Dirmanto Jap and
                  Stjepan Picek and
                  Ritu Ranjan Shrivastwa},
  title        = {Mind the Portability: {A} Warriors Guide through Realistic Profiled
                  Side-channel Analysis},
  booktitle    = {27th Annual Network and Distributed System Security Symposium, {NDSS}
                  2020, San Diego, California, USA, February 23-26, 2020},
  publisher    = {The Internet Society},
  year         = {2020},
  url          = {https://www.ndss-symposium.org/ndss-paper/mind-the-portability-a-warriors-guide-through-realistic-profiled-side-channel-analysis/},
  timestamp    = {Mon, 01 Feb 2021 08:42:10 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/BhasinCHJPS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2001-09672,
  author       = {Johann Knechtel and
                  Elif Bilge Kavun and
                  Francesco Regazzoni and
                  Annelie Heuser and
                  Anupam Chattopadhyay and
                  Debdeep Mukhopadhyay and
                  Soumyajit Dey and
                  Yunsi Fei and
                  Yaacov Belenky and
                  Itamar Levi and
                  Tim G{\"{u}}neysu and
                  Patrick Schaumont and
                  Ilia Polian},
  title        = {Towards Secure Composition of Integrated Circuits and Electronic Systems:
                  On the Role of {EDA}},
  journal      = {CoRR},
  volume       = {abs/2001.09672},
  year         = {2020},
  url          = {https://arxiv.org/abs/2001.09672},
  eprinttype    = {arXiv},
  eprint       = {2001.09672},
  timestamp    = {Tue, 31 Mar 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2001-09672.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Genevey-MetatGH20,
  author       = {Christophe Genevey{-}Metat and
                  Beno{\^{\i}}t G{\'{e}}rard and
                  Annelie Heuser},
  title        = {On What to Learn: Train or Adapt a Deeply Learned Profile?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {952},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/952},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Genevey-MetatGH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/Given-WilsonHJL19,
  author       = {Thomas Given{-}Wilson and
                  Annelie Heuser and
                  Nisrine Jafri and
                  Axel Legay},
  title        = {An automated and scalable formal process for detecting fault injection
                  vulnerabilities in binaries},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {31},
  number       = {23},
  year         = {2019},
  url          = {https://doi.org/10.1002/cpe.4794},
  doi          = {10.1002/CPE.4794},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/Given-WilsonHJL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/RoyBGHPM19,
  author       = {Debapriya Basu Roy and
                  Shivam Bhasin and
                  Sylvain Guilley and
                  Annelie Heuser and
                  Sikhar Patranabis and
                  Debdeep Mukhopadhyay},
  title        = {{CC} Meets {FIPS:} {A} Hybrid Test Methodology for First Order Side
                  Channel Analysis},
  journal      = {{IEEE} Trans. Computers},
  volume       = {68},
  number       = {3},
  pages        = {347--361},
  year         = {2019},
  url          = {https://doi.org/10.1109/TC.2018.2875746},
  doi          = {10.1109/TC.2018.2875746},
  timestamp    = {Wed, 27 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tc/RoyBGHPM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/PicekHJBR19,
  author       = {Stjepan Picek and
                  Annelie Heuser and
                  Alan Jovic and
                  Shivam Bhasin and
                  Francesco Regazzoni},
  title        = {The Curse of Class Imbalance and Conflicting Metrics with Machine
                  Learning for Side-channel Evaluations},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {1},
  pages        = {209--237},
  year         = {2019},
  url          = {https://doi.org/10.13154/tches.v2019.i1.209-237},
  doi          = {10.13154/TCHES.V2019.I1.209-237},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/PicekHJBR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/KimPHBH19,
  author       = {Jaehun Kim and
                  Stjepan Picek and
                  Annelie Heuser and
                  Shivam Bhasin and
                  Alan Hanjalic},
  title        = {Make Some Noise. Unleashing the Power of Convolutional Neural Networks
                  for Profiled Side-channel Analysis},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {3},
  pages        = {148--179},
  year         = {2019},
  url          = {https://doi.org/10.13154/tches.v2019.i3.148-179},
  doi          = {10.13154/TCHES.V2019.I3.148-179},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/KimPHBH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvlsi/PicekHJB19,
  author       = {Stjepan Picek and
                  Annelie Heuser and
                  Alan Jovic and
                  Lejla Batina},
  title        = {A Systematic Evaluation of Profiling Through Focused Feature Selection},
  journal      = {{IEEE} Trans. Very Large Scale Integr. Syst.},
  volume       = {27},
  number       = {12},
  pages        = {2802--2815},
  year         = {2019},
  url          = {https://doi.org/10.1109/TVLSI.2019.2937365},
  doi          = {10.1109/TVLSI.2019.2937365},
  timestamp    = {Wed, 11 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tvlsi/PicekHJB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PicekHG19,
  author       = {Stjepan Picek and
                  Annelie Heuser and
                  Sylvain Guilley},
  title        = {Profiling Side-channel Analysis in the Restricted Attacker Framework},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {168},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/168},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PicekHG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BhasinCHJPS19,
  author       = {Shivam Bhasin and
                  Anupam Chattopadhyay and
                  Annelie Heuser and
                  Dirmanto Jap and
                  Stjepan Picek and
                  Ritu Ranjan Shrivastwa},
  title        = {Mind the Portability: {A} Warriors Guide through Realistic Profiled
                  Side-channel Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {661},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/661},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BhasinCHJPS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/CheriseyGHR18,
  author       = {Eloi de Ch{\'{e}}risey and
                  Sylvain Guilley and
                  Annelie Heuser and
                  Olivier Rioul},
  title        = {On the optimality and practicability of mutual information analysis
                  in some scenarios},
  journal      = {Cryptogr. Commun.},
  volume       = {10},
  number       = {1},
  pages        = {101--121},
  year         = {2018},
  url          = {https://doi.org/10.1007/s12095-017-0241-x},
  doi          = {10.1007/S12095-017-0241-X},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/CheriseyGHR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/PicekHJKR18,
  author       = {Stjepan Picek and
                  Annelie Heuser and
                  Alan Jovic and
                  Karlo Knezevic and
                  Tania Richmond},
  editor       = {Beg{\"{u}}l Bilgin and
                  Jean{-}Bernard Fischer},
  title        = {Improving Side-Channel Analysis Through Semi-supervised Learning},
  booktitle    = {Smart Card Research and Advanced Applications, 17th International
                  Conference, {CARDIS} 2018, Montpellier, France, November 12-14, 2018,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11389},
  pages        = {35--50},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-15462-2\_3},
  doi          = {10.1007/978-3-030-15462-2\_3},
  timestamp    = {Sat, 30 Sep 2023 09:35:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/PicekHJKR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/space/PicekSKHBL18,
  author       = {Stjepan Picek and
                  Ioannis Petros Samiotis and
                  Jaehun Kim and
                  Annelie Heuser and
                  Shivam Bhasin and
                  Axel Legay},
  editor       = {Anupam Chattopadhyay and
                  Chester Rebeiro and
                  Yuval Yarom},
  title        = {On the Performance of Convolutional Neural Networks for Side-Channel
                  Analysis},
  booktitle    = {Security, Privacy, and Applied Cryptography Engineering - 8th International
                  Conference, {SPACE} 2018, Kanpur, India, December 15-19, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11348},
  pages        = {157--176},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-05072-6\_10},
  doi          = {10.1007/978-3-030-05072-6\_10},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/space/PicekSKHBL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vmcai/BiondiEHLMQ18,
  author       = {Fabrizio Biondi and
                  Michael A. Enescu and
                  Annelie Heuser and
                  Axel Legay and
                  Kuldeep S. Meel and
                  Jean Quilbeuf},
  editor       = {Isil Dillig and
                  Jens Palsberg},
  title        = {Scalable Approximation of Quantitative Information Flow in Programs},
  booktitle    = {Verification, Model Checking, and Abstract Interpretation - 19th International
                  Conference, {VMCAI} 2018, Los Angeles, CA, USA, January 7-9, 2018,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10747},
  pages        = {71--93},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-73721-8\_4},
  doi          = {10.1007/978-3-319-73721-8\_4},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/vmcai/BiondiEHLMQ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/18/DangerGHLT18,
  author       = {Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Annelie Heuser and
                  Axel Legay and
                  Ming Tang},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Physical Security Versus Masking Schemes},
  booktitle    = {Cyber-Physical Systems Security},
  pages        = {269--284},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98935-8\_13},
  doi          = {10.1007/978-3-319-98935-8\_13},
  timestamp    = {Fri, 13 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/18/DangerGHLT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PicekSHKBL18,
  author       = {Stjepan Picek and
                  Ioannis Petros Samiotis and
                  Annelie Heuser and
                  Jaehun Kim and
                  Shivam Bhasin and
                  Axel Legay},
  title        = {On the Performance of Deep Learning for Side-channel Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {4},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/004},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PicekSHKBL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PicekHJBR18,
  author       = {Stjepan Picek and
                  Annelie Heuser and
                  Alan Jovic and
                  Shivam Bhasin and
                  Francesco Regazzoni},
  title        = {The Curse of Class Imbalance and Conflicting Metrics with Machine
                  Learning for Side-channel Evaluations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {476},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/476},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PicekHJBR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimPHBH18,
  author       = {Jaehun Kim and
                  Stjepan Picek and
                  Annelie Heuser and
                  Shivam Bhasin and
                  Alan Hanjalic},
  title        = {Make Some Noise: Unleashing the Power of Convolutional Neural Networks
                  for Profiled Side-channel Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1023},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1023},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimPHBH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PicekHAR18,
  author       = {Stjepan Picek and
                  Annelie Heuser and
                  Cesare Alippi and
                  Francesco Regazzoni},
  title        = {When Theory Meets Practice: {A} Framework for Robust Profiled Side-channel
                  Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1123},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1123},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PicekHAR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BruneauGHMR17,
  author       = {Nicolas Bruneau and
                  Sylvain Guilley and
                  Annelie Heuser and
                  Damien Marion and
                  Olivier Rioul},
  title        = {Optimal side-channel attacks for multivariate leakages and multiple
                  models},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {4},
  pages        = {331--341},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-017-0170-9},
  doi          = {10.1007/S13389-017-0170-9},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BruneauGHMR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/PicekHG17,
  author       = {Stjepan Picek and
                  Annelie Heuser and
                  Sylvain Guilley},
  title        = {Template attack versus Bayes classifier},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {4},
  pages        = {343--351},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-017-0172-7},
  doi          = {10.1007/S13389-017-0172-7},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/PicekHG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcad/TangGHRLD17,
  author       = {Ming Tang and
                  Zhipeng Guo and
                  Annelie Heuser and
                  Yanzhen Ren and
                  Jie Li and
                  Jean{-}Luc Danger},
  title        = {{PFD} - {A} Flexible Higher-Order Masking Scheme},
  journal      = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.},
  volume       = {36},
  number       = {8},
  pages        = {1327--1339},
  year         = {2017},
  url          = {https://doi.org/10.1109/TCAD.2016.2629441},
  doi          = {10.1109/TCAD.2016.2629441},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcad/TangGHRLD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BruneauCGHPR17,
  author       = {Nicolas Bruneau and
                  Claude Carlet and
                  Sylvain Guilley and
                  Annelie Heuser and
                  Emmanuel Prouff and
                  Olivier Rioul},
  title        = {Stochastic Collision Attack},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {9},
  pages        = {2090--2104},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2697401},
  doi          = {10.1109/TIFS.2017.2697401},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BruneauCGHPR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/CarletHP17,
  author       = {Claude Carlet and
                  Annelie Heuser and
                  Stjepan Picek},
  editor       = {Dieter Gollmann and
                  Atsuko Miyaji and
                  Hiroaki Kikuchi},
  title        = {Trade-Offs for S-Boxes: Cryptographic Properties and Side-Channel
                  Resilience},
  booktitle    = {Applied Cryptography and Network Security - 15th International Conference,
                  {ACNS} 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10355},
  pages        = {393--414},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-61204-1\_20},
  doi          = {10.1007/978-3-319-61204-1\_20},
  timestamp    = {Tue, 07 May 2024 20:12:06 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/CarletHP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/PicekHJL17,
  author       = {Stjepan Picek and
                  Annelie Heuser and
                  Alan Jovic and
                  Axel Legay},
  editor       = {Marc Joye and
                  Abderrahmane Nitaj},
  title        = {Climbing Down the Hierarchy: Hierarchical Classification for Machine
                  Learning Side-Channel Attacks},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2017 - 9th International Conference
                  on Cryptology in Africa, Dakar, Senegal, May 24-26, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10239},
  pages        = {61--78},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-57339-7\_4},
  doi          = {10.1007/978-3-319-57339-7\_4},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/PicekHJL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/c2si/GuilleyHR17,
  author       = {Sylvain Guilley and
                  Annelie Heuser and
                  Olivier Rioul},
  editor       = {Said El Hajji and
                  Abderrahmane Nitaj and
                  El Mamoun Souidi},
  title        = {Codes for Side-Channel Attacks and Protections},
  booktitle    = {Codes, Cryptology and Information Security - Second International
                  Conference, {C2SI} 2017, Rabat, Morocco, April 10-12, 2017, Proceedings
                  - In Honor of Claude Carlet},
  series       = {Lecture Notes in Computer Science},
  volume       = {10194},
  pages        = {35--55},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-55589-8\_3},
  doi          = {10.1007/978-3-319-55589-8\_3},
  timestamp    = {Tue, 27 Aug 2019 17:49:45 +0200},
  biburl       = {https://dblp.org/rec/conf/c2si/GuilleyHR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cf/ContiNHPM17,
  author       = {Mauro Conti and
                  Giorgio Di Natale and
                  Annelie Heuser and
                  Thomas P{\"{o}}ppelmann and
                  Nele Mentens},
  title        = {Do we need a holistic approach for the design of secure IoT systems?},
  booktitle    = {Proceedings of the Computing Frontiers Conference, CF'17, Siena, Italy,
                  May 15-17, 2017},
  pages        = {425--430},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3075564.3079070},
  doi          = {10.1145/3075564.3079070},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cf/ContiNHPM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcnn/PicekHJLGJM17,
  author       = {Stjepan Picek and
                  Annelie Heuser and
                  Alan Jovic and
                  Simone A. Ludwig and
                  Sylvain Guilley and
                  Domagoj Jakobovic and
                  Nele Mentens},
  title        = {Side-channel analysis and machine learning: {A} practical perspective},
  booktitle    = {2017 International Joint Conference on Neural Networks, {IJCNN} 2017,
                  Anchorage, AK, USA, May 14-19, 2017},
  pages        = {4095--4102},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/IJCNN.2017.7966373},
  doi          = {10.1109/IJCNN.2017.7966373},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcnn/PicekHJLGJM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/GuilleyHTR17,
  author       = {Sylvain Guilley and
                  Annelie Heuser and
                  Ming Tang and
                  Olivier Rioul},
  editor       = {Pooya Farshim and
                  Emil Simion},
  title        = {Stochastic Side-Channel Leakage Analysis via Orthonormal Decomposition},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 10th International Conference, SecITC 2017, Bucharest, Romania,
                  June 8-9, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10543},
  pages        = {12--27},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-69284-5\_2},
  doi          = {10.1007/978-3-319-69284-5\_2},
  timestamp    = {Thu, 06 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/GuilleyHTR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeuserPGM17,
  author       = {Annelie Heuser and
                  Stjepan Picek and
                  Sylvain Guilley and
                  Nele Mentens},
  title        = {Side-channel Analysis of Lightweight Ciphers: Does Lightweight Equal
                  Easy?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {261},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/261},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HeuserPGM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PicekHG17,
  author       = {Stjepan Picek and
                  Annelie Heuser and
                  Sylvain Guilley},
  title        = {Template Attack vs Bayes Classifier},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {531},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/531},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PicekHG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PicekHJLK17,
  author       = {Stjepan Picek and
                  Annelie Heuser and
                  Alan Jovic and
                  Axel Legay and
                  Karlo Knezevic},
  title        = {Profiled {SCA} with a New Twist: Semi-supervised Learning},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1085},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1085},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PicekHJLK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PicekHJBL17,
  author       = {Stjepan Picek and
                  Annelie Heuser and
                  Alan Jovic and
                  Lejla Batina and
                  Axel Legay},
  title        = {The secrets of profiling for side-channel analysis: feature selection
                  matters},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1110},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1110},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PicekHJBL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BruneauGHRST16,
  author       = {Nicolas Bruneau and
                  Sylvain Guilley and
                  Annelie Heuser and
                  Olivier Rioul and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Yannick Teglia},
  editor       = {Jung Hee Cheon and
                  Tsuyoshi Takagi},
  title        = {Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled
                  Implementations},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10031},
  pages        = {573--601},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53887-6\_21},
  doi          = {10.1007/978-3-662-53887-6\_21},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BruneauGHRST16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/RioulHGD16,
  author       = {Olivier Rioul and
                  Annelie Heuser and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  title        = {Inter-class vs. mutual information as side-channel distinguishers},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2016,
                  Barcelona, Spain, July 10-15, 2016},
  pages        = {805--809},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISIT.2016.7541410},
  doi          = {10.1109/ISIT.2016.7541410},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/RioulHGD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/HeuserPGM16,
  author       = {Annelie Heuser and
                  Stjepan Picek and
                  Sylvain Guilley and
                  Nele Mentens},
  editor       = {Gerhard P. Hancke and
                  Konstantinos Markantonakis},
  title        = {Side-Channel Analysis of Lightweight Ciphers: Does Lightweight Equal
                  Easy?},
  booktitle    = {Radio Frequency Identification and IoT Security - 12th International
                  Workshop, RFIDSec 2016, Hong Kong, China, November 30 - December 2,
                  2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10155},
  pages        = {91--104},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62024-4\_7},
  doi          = {10.1007/978-3-319-62024-4\_7},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rfidsec/HeuserPGM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BruneauGHMR16,
  author       = {Nicolas Bruneau and
                  Sylvain Guilley and
                  Annelie Heuser and
                  Damien Marion and
                  Olivier Rioul},
  title        = {Less is More - Dimensionality Reduction from a Theoretical Perspective},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {359},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/359},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BruneauGHMR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BelgarricBBDDGH16,
  author       = {Pierre Belgarric and
                  Shivam Bhasin and
                  Nicolas Bruneau and
                  Jean{-}Luc Danger and
                  Nicolas Debande and
                  Sylvain Guilley and
                  Annelie Heuser and
                  Zakaria Najm and
                  Olivier Rioul},
  title        = {Time-Frequency Analysis for Second-Order Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {772},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/772},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BelgarricBBDDGH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuilleyHR16,
  author       = {Sylvain Guilley and
                  Annelie Heuser and
                  Olivier Rioul},
  title        = {A Key to Success - Success Exponents for Side-Channel Distinguishers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {987},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/987},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuilleyHR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BruneauGHMR15,
  author       = {Nicolas Bruneau and
                  Sylvain Guilley and
                  Annelie Heuser and
                  Damien Marion and
                  Olivier Rioul},
  editor       = {Tim G{\"{u}}neysu and
                  Helena Handschuh},
  title        = {Less is More - Dimensionality Reduction from a Theoretical Perspective},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International
                  Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9293},
  pages        = {22--41},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48324-4\_2},
  doi          = {10.1007/978-3-662-48324-4\_2},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/BruneauGHMR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/GuilleyHR15,
  author       = {Sylvain Guilley and
                  Annelie Heuser and
                  Olivier Rioul},
  editor       = {Alex Biryukov and
                  Vipul Goyal},
  title        = {A Key to Success - Success Exponents for Side-Channel Distinguishers},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2015 - 16th International Conference
                  on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9462},
  pages        = {270--290},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26617-6\_15},
  doi          = {10.1007/978-3-319-26617-6\_15},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/GuilleyHR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BruneauGHR15,
  author       = {Nicolas Bruneau and
                  Sylvain Guilley and
                  Annelie Heuser and
                  Olivier Rioul},
  title        = {Masks will Fall Off - Higher-Order Optimal Distinguishers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {452},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/452},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BruneauGHR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/ClavierDDEGGHKLLNOSSSSVWW14,
  author       = {Christophe Clavier and
                  Jean{-}Luc Danger and
                  Guillaume Duc and
                  M. Abdelaziz Elaabid and
                  Beno{\^{\i}}t G{\'{e}}rard and
                  Sylvain Guilley and
                  Annelie Heuser and
                  Michael Kasper and
                  Yang Li and
                  Victor Lomn{\'{e}} and
                  Daisuke Nakatsu and
                  Kazuo Ohta and
                  Kazuo Sakiyama and
                  Laurent Sauvage and
                  Werner Schindler and
                  Marc St{\"{o}}ttinger and
                  Nicolas Veyrat{-}Charvillon and
                  Matthieu Walle and
                  Antoine Wurcker},
  title        = {Practical improvements of side-channel attacks on {AES:} feedback
                  from the 2nd {DPA} contest},
  journal      = {J. Cryptogr. Eng.},
  volume       = {4},
  number       = {4},
  pages        = {259--274},
  year         = {2014},
  url          = {https://doi.org/10.1007/s13389-014-0075-9},
  doi          = {10.1007/S13389-014-0075-9},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/ClavierDDEGGHKLLNOSSSSVWW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/MoradiGH14,
  author       = {Amir Moradi and
                  Sylvain Guilley and
                  Annelie Heuser},
  editor       = {Ioana Boureanu and
                  Philippe Owesarski and
                  Serge Vaudenay},
  title        = {Detecting Hidden Leakages},
  booktitle    = {Applied Cryptography and Network Security - 12th International Conference,
                  {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8479},
  pages        = {324--342},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-07536-5\_20},
  doi          = {10.1007/978-3-319-07536-5\_20},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/MoradiGH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BruneauGHR14,
  author       = {Nicolas Bruneau and
                  Sylvain Guilley and
                  Annelie Heuser and
                  Olivier Rioul},
  editor       = {Palash Sarkar and
                  Tetsu Iwata},
  title        = {Masks Will Fall Off - Higher-Order Optimal Distinguishers},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8874},
  pages        = {344--365},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45608-8\_19},
  doi          = {10.1007/978-3-662-45608-8\_19},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BruneauGHR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/HeuserRG14,
  author       = {Annelie Heuser and
                  Olivier Rioul and
                  Sylvain Guilley},
  editor       = {Lejla Batina and
                  Matthew Robshaw},
  title        = {Good Is Not Good Enough - Deriving Optimal Distinguishers from Communication
                  Theory},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International
                  Workshop, Busan, South Korea, September 23-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8731},
  pages        = {55--74},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44709-3\_4},
  doi          = {10.1007/978-3-662-44709-3\_4},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/HeuserRG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/HeuserRG14,
  author       = {Annelie Heuser and
                  Olivier Rioul and
                  Sylvain Guilley},
  editor       = {Emmanuel Prouff},
  title        = {A Theoretical Study of Kolmogorov-Smirnov Distinguishers - Side-Channel
                  Analysis vs. Differential Cryptanalysis},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 5th International
                  Workshop, {COSADE} 2014, Paris, France, April 13-15, 2014. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8622},
  pages        = {9--28},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10175-0\_2},
  doi          = {10.1007/978-3-319-10175-0\_2},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/HeuserRG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/SchaubSHCJTHGR14,
  author       = {Alexander Schaub and
                  Emmanuel Schneider and
                  Alexandros Hollender and
                  Vinicius Calasans and
                  Laurent Jolie and
                  Robin Touillon and
                  Annelie Heuser and
                  Sylvain Guilley and
                  Olivier Rioul},
  editor       = {Javier L{\'{o}}pez and
                  Indrajit Ray and
                  Bruno Crispo},
  title        = {Attacking Suggest Boxes in Web Applications Over {HTTPS} Using Side-Channel
                  Stochastic Algorithms},
  booktitle    = {Risks and Security of Internet and Systems - 9th International Conference,
                  CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8924},
  pages        = {116--130},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-17127-2\_8},
  doi          = {10.1007/978-3-319-17127-2\_8},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crisis/SchaubSHCJTHGR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/space/BruneauDGHT14,
  author       = {Nicolas Bruneau and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Annelie Heuser and
                  Yannick Teglia},
  editor       = {Rajat Subhra Chakraborty and
                  Vashek Matyas and
                  Patrick Schaumont},
  title        = {Boosting Higher-Order Correlation Attacks by Dimensionality Reduction},
  booktitle    = {Security, Privacy, and Applied Cryptography Engineering - 4th International
                  Conference, {SPACE} 2014, Pune, India, October 18-22, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8804},
  pages        = {183--200},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12060-7\_13},
  doi          = {10.1007/978-3-319-12060-7\_13},
  timestamp    = {Mon, 15 Jun 2020 17:10:47 +0200},
  biburl       = {https://dblp.org/rec/conf/space/BruneauDGHT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeuserGR14,
  author       = {Annelie Heuser and
                  Sylvain Guilley and
                  Olivier Rioul},
  title        = {A Theoretical Study of Kolmogorov-Smirnov Distinguishers: Side-Channel
                  Analysis vs. Differential Cryptanalysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {8},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/008},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HeuserGR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeuserRG14,
  author       = {Annelie Heuser and
                  Olivier Rioul and
                  Sylvain Guilley},
  title        = {Good is Not Good Enough: Deriving Optimal Distinguishers from Communication
                  Theory},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {527},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/527},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HeuserRG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BruneauDGHT14,
  author       = {Nicolas Bruneau and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Annelie Heuser and
                  Yannick Teglia},
  title        = {Boosting Higher-Order Correlation Attacks by Dimensionality Reduction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {935},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/935},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BruneauDGHT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SchaubSHCJTHGR14,
  author       = {Alexander Schaub and
                  Emmanuel Schneider and
                  Alexandros Hollender and
                  Vinicius Calasans and
                  Laurent Jolie and
                  Robin Touillon and
                  Annelie Heuser and
                  Sylvain Guilley and
                  Olivier Rioul},
  title        = {Attacking Suggest Boxes in Web Applications Over {HTTPS} Using Side-Channel
                  Stochastic Algorithms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {959},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/959},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SchaubSHCJTHGR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/MohamedBZHWB13,
  author       = {Mohamed Saied Emam Mohamed and
                  Stanislav Bulygin and
                  Michael Zohner and
                  Annelie Heuser and
                  Michael Walter and
                  Johannes Buchmann},
  title        = {Improved algebraic side-channel attack on {AES}},
  journal      = {J. Cryptogr. Eng.},
  volume       = {3},
  number       = {3},
  pages        = {139--156},
  year         = {2013},
  url          = {https://doi.org/10.1007/s13389-013-0059-1},
  doi          = {10.1007/S13389-013-0059-1},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/MohamedBZHWB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BhasinGHD13,
  author       = {Shivam Bhasin and
                  Sylvain Guilley and
                  Annelie Heuser and
                  Jean{-}Luc Danger},
  title        = {From cryptography to hardware: analyzing and protecting embedded Xilinx
                  {BRAM} for cryptographic applications},
  journal      = {J. Cryptogr. Eng.},
  volume       = {3},
  number       = {4},
  pages        = {213--225},
  year         = {2013},
  url          = {https://doi.org/10.1007/s13389-013-0048-4},
  doi          = {10.1007/S13389-013-0048-4},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BhasinGHD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/BelgarricBBDDGHNR13,
  author       = {Pierre Belgarric and
                  Shivam Bhasin and
                  Nicolas Bruneau and
                  Jean{-}Luc Danger and
                  Nicolas Debande and
                  Sylvain Guilley and
                  Annelie Heuser and
                  Zakaria Najm and
                  Olivier Rioul},
  editor       = {Aur{\'{e}}lien Francillon and
                  Pankaj Rohatgi},
  title        = {Time-Frequency Analysis for Second-Order Attacks},
  booktitle    = {Smart Card Research and Advanced Applications - 12th International
                  Conference, {CARDIS} 2013, Berlin, Germany, November 27-29, 2013.
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8419},
  pages        = {108--122},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-08302-5\_8},
  doi          = {10.1007/978-3-319-08302-5\_8},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/BelgarricBBDDGHNR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MoradiGH13,
  author       = {Amir Moradi and
                  Sylvain Guilley and
                  Annelie Heuser},
  title        = {Detecting Hidden Leakages},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {842},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/842},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MoradiGH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/HeuserZ12,
  author       = {Annelie Heuser and
                  Michael Zohner},
  editor       = {Werner Schindler and
                  Sorin A. Huss},
  title        = {Intelligent Machine Homicide - Breaking Cryptographic Devices Using
                  Support Vector Machines},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - Third International
                  Workshop, {COSADE} 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7275},
  pages        = {249--264},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29912-4\_18},
  doi          = {10.1007/978-3-642-29912-4\_18},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/HeuserZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/HeuserKSS12,
  author       = {Annelie Heuser and
                  Michael Kasper and
                  Werner Schindler and
                  Marc St{\"{o}}ttinger},
  editor       = {Orr Dunkelman},
  title        = {A New Difference Method for Side-Channel Analysis with High-Dimensional
                  Leakage Models},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2012 - The Cryptographers' Track at
                  the {RSA} Conference 2012, San Francisco, CA, USA, February 27 - March
                  2, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7178},
  pages        = {365--382},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-27954-6\_23},
  doi          = {10.1007/978-3-642-27954-6\_23},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/HeuserKSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/HeuserSS12,
  author       = {Annelie Heuser and
                  Werner Schindler and
                  Marc St{\"{o}}ttinger},
  editor       = {Wolfgang Rosenstiel and
                  Lothar Thiele},
  title        = {Revealing side-channel issues of complex circuits by enhanced leakage
                  models},
  booktitle    = {2012 Design, Automation {\&} Test in Europe Conference {\&}
                  Exhibition, {DATE} 2012, Dresden, Germany, March 12-16, 2012},
  pages        = {1179--1184},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/DATE.2012.6176672},
  doi          = {10.1109/DATE.2012.6176672},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/date/HeuserSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/MohamedBZHWB12,
  author       = {Mohamed Saied Emam Mohamed and
                  Stanislav Bulygin and
                  Michael Zohner and
                  Annelie Heuser and
                  Michael Walter and
                  Johannes Buchmann},
  title        = {Improved algebraic side-channel attack on {AES}},
  booktitle    = {2012 {IEEE} International Symposium on Hardware-Oriented Security
                  and Trust, {HOST} 2012, San Francisco, CA, USA, June 3-4, 2012},
  pages        = {146--151},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/HST.2012.6224335},
  doi          = {10.1109/HST.2012.6224335},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/MohamedBZHWB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/TianHH12,
  author       = {Qizhi Tian and
                  Annelie Heuser and
                  Sorin A. Huss},
  editor       = {George A. Tsihrintzis and
                  Jeng{-}Shyang Pan and
                  Hsiang{-}Cheh Huang and
                  Maria Virvou and
                  Lakhmi C. Jain},
  title        = {A Novel Analysis Method for Assessing the Side-Channel Resistance
                  of Cryptosystems},
  booktitle    = {Eighth International Conference on Intelligent Information Hiding
                  and Multimedia Signal Processing, {IIH-MSP} 2012, Piraeus-Athens,
                  Greece, July 18-20, 2012},
  pages        = {480--485},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/IIH-MSP.2012.122},
  doi          = {10.1109/IIH-MSP.2012.122},
  timestamp    = {Mon, 06 Apr 2020 19:01:12 +0200},
  biburl       = {https://dblp.org/rec/conf/iih-msp/TianHH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MohamedBZHW12,
  author       = {Mohamed Saied Emam Mohamed and
                  Stanislav Bulygin and
                  Michael Zohner and
                  Annelie Heuser and
                  Michael Walter},
  title        = {Improved Algebraic Side-Channel Attack on {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {84},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/084},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MohamedBZHW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsd/HeuserKSS11,
  author       = {Annelie Heuser and
                  Michael Kasper and
                  Werner Schindler and
                  Marc St{\"{o}}ttinger},
  title        = {How a Symmetry Metric Assists Side-Channel Evaluation - {A} Novel
                  Model Verification Method for Power Analysis},
  booktitle    = {14th Euromicro Conference on Digital System Design, Architectures,
                  Methods and Tools, {DSD} 2011, August 31 - September 2, 2011, Oulu,
                  Finland},
  pages        = {674--681},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/DSD.2011.91},
  doi          = {10.1109/DSD.2011.91},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsd/HeuserKSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}