Остановите войну!
for scientists:
default search action
Annelie Heuser
- > Home > Persons > Annelie Heuser
Publications
- 2021
- [c33]Stjepan Picek, Annelie Heuser, Guilherme Perin, Sylvain Guilley:
Profiled Side-Channel Analysis in the Efficient Attacker Framework. CARDIS 2021: 44-63 - 2020
- [j14]Annelie Heuser, Stjepan Picek, Sylvain Guilley, Nele Mentens:
Lightweight Ciphers and Their Side-Channel Resilience. IEEE Trans. Computers 69(10): 1434-1448 (2020) - 2019
- [j12]Debapriya Basu Roy, Shivam Bhasin, Sylvain Guilley, Annelie Heuser, Sikhar Patranabis, Debdeep Mukhopadhyay:
CC Meets FIPS: A Hybrid Test Methodology for First Order Side Channel Analysis. IEEE Trans. Computers 68(3): 347-361 (2019) - [i20]Stjepan Picek, Annelie Heuser, Sylvain Guilley:
Profiling Side-channel Analysis in the Restricted Attacker Framework. IACR Cryptol. ePrint Arch. 2019: 168 (2019) - 2018
- [j8]Eloi de Chérisey, Sylvain Guilley, Annelie Heuser, Olivier Rioul:
On the optimality and practicability of mutual information analysis in some scenarios. Cryptogr. Commun. 10(1): 101-121 (2018) - [p1]Jean-Luc Danger, Sylvain Guilley, Annelie Heuser, Axel Legay, Ming Tang:
Physical Security Versus Masking Schemes. Cyber-Physical Systems Security 2018: 269-284 - 2017
- [j7]Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Damien Marion, Olivier Rioul:
Optimal side-channel attacks for multivariate leakages and multiple models. J. Cryptogr. Eng. 7(4): 331-341 (2017) - [j6]Stjepan Picek, Annelie Heuser, Sylvain Guilley:
Template attack versus Bayes classifier. J. Cryptogr. Eng. 7(4): 343-351 (2017) - [j4]Nicolas Bruneau, Claude Carlet, Sylvain Guilley, Annelie Heuser, Emmanuel Prouff, Olivier Rioul:
Stochastic Collision Attack. IEEE Trans. Inf. Forensics Secur. 12(9): 2090-2104 (2017) - [c22]Sylvain Guilley, Annelie Heuser, Olivier Rioul:
Codes for Side-Channel Attacks and Protections. C2SI 2017: 35-55 - [c20]Stjepan Picek, Annelie Heuser, Alan Jovic, Simone A. Ludwig, Sylvain Guilley, Domagoj Jakobovic, Nele Mentens:
Side-channel analysis and machine learning: A practical perspective. IJCNN 2017: 4095-4102 - [c19]Sylvain Guilley, Annelie Heuser, Ming Tang, Olivier Rioul:
Stochastic Side-Channel Leakage Analysis via Orthonormal Decomposition. SECITC 2017: 12-27 - [i14]Annelie Heuser, Stjepan Picek, Sylvain Guilley, Nele Mentens:
Side-channel Analysis of Lightweight Ciphers: Does Lightweight Equal Easy? IACR Cryptol. ePrint Arch. 2017: 261 (2017) - [i13]Stjepan Picek, Annelie Heuser, Sylvain Guilley:
Template Attack vs Bayes Classifier. IACR Cryptol. ePrint Arch. 2017: 531 (2017) - 2016
- [c18]Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Olivier Rioul, François-Xavier Standaert, Yannick Teglia:
Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations. ASIACRYPT (1) 2016: 573-601 - [c17]Olivier Rioul, Annelie Heuser, Sylvain Guilley, Jean-Luc Danger:
Inter-class vs. mutual information as side-channel distinguishers. ISIT 2016: 805-809 - [c16]Annelie Heuser, Stjepan Picek, Sylvain Guilley, Nele Mentens:
Side-Channel Analysis of Lightweight Ciphers: Does Lightweight Equal Easy? RFIDSec 2016: 91-104 - [i10]Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Damien Marion, Olivier Rioul:
Less is More - Dimensionality Reduction from a Theoretical Perspective. IACR Cryptol. ePrint Arch. 2016: 359 (2016) - [i9]Pierre Belgarric, Shivam Bhasin, Nicolas Bruneau, Jean-Luc Danger, Nicolas Debande, Sylvain Guilley, Annelie Heuser, Zakaria Najm, Olivier Rioul:
Time-Frequency Analysis for Second-Order Attacks. IACR Cryptol. ePrint Arch. 2016: 772 (2016) - [i8]Sylvain Guilley, Annelie Heuser, Olivier Rioul:
A Key to Success - Success Exponents for Side-Channel Distinguishers. IACR Cryptol. ePrint Arch. 2016: 987 (2016) - 2015
- [c15]Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Damien Marion, Olivier Rioul:
Less is More - Dimensionality Reduction from a Theoretical Perspective. CHES 2015: 22-41 - [c14]Sylvain Guilley, Annelie Heuser, Olivier Rioul:
A Key to Success - Success Exponents for Side-Channel Distinguishers. INDOCRYPT 2015: 270-290 - [i7]Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Olivier Rioul:
Masks will Fall Off - Higher-Order Optimal Distinguishers. IACR Cryptol. ePrint Arch. 2015: 452 (2015) - 2014
- [j3]Christophe Clavier, Jean-Luc Danger, Guillaume Duc, M. Abdelaziz Elaabid, Benoît Gérard, Sylvain Guilley, Annelie Heuser, Michael Kasper, Yang Li, Victor Lomné, Daisuke Nakatsu, Kazuo Ohta, Kazuo Sakiyama, Laurent Sauvage, Werner Schindler, Marc Stöttinger, Nicolas Veyrat-Charvillon, Matthieu Walle, Antoine Wurcker:
Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest. J. Cryptogr. Eng. 4(4): 259-274 (2014) - [c13]Amir Moradi, Sylvain Guilley, Annelie Heuser:
Detecting Hidden Leakages. ACNS 2014: 324-342 - [c12]Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Olivier Rioul:
Masks Will Fall Off - Higher-Order Optimal Distinguishers. ASIACRYPT (2) 2014: 344-365 - [c11]Annelie Heuser, Olivier Rioul, Sylvain Guilley:
Good Is Not Good Enough - Deriving Optimal Distinguishers from Communication Theory. CHES 2014: 55-74 - [c10]Annelie Heuser, Olivier Rioul, Sylvain Guilley:
A Theoretical Study of Kolmogorov-Smirnov Distinguishers - Side-Channel Analysis vs. Differential Cryptanalysis. COSADE 2014: 9-28 - [c9]Alexander Schaub, Emmanuel Schneider, Alexandros Hollender, Vinicius Calasans, Laurent Jolie, Robin Touillon, Annelie Heuser, Sylvain Guilley, Olivier Rioul:
Attacking Suggest Boxes in Web Applications Over HTTPS Using Side-Channel Stochastic Algorithms. CRiSIS 2014: 116-130 - [c8]Nicolas Bruneau, Jean-Luc Danger, Sylvain Guilley, Annelie Heuser, Yannick Teglia:
Boosting Higher-Order Correlation Attacks by Dimensionality Reduction. SPACE 2014: 183-200 - [i6]Annelie Heuser, Sylvain Guilley, Olivier Rioul:
A Theoretical Study of Kolmogorov-Smirnov Distinguishers: Side-Channel Analysis vs. Differential Cryptanalysis. IACR Cryptol. ePrint Arch. 2014: 8 (2014) - [i5]Annelie Heuser, Olivier Rioul, Sylvain Guilley:
Good is Not Good Enough: Deriving Optimal Distinguishers from Communication Theory. IACR Cryptol. ePrint Arch. 2014: 527 (2014) - [i4]Nicolas Bruneau, Jean-Luc Danger, Sylvain Guilley, Annelie Heuser, Yannick Teglia:
Boosting Higher-Order Correlation Attacks by Dimensionality Reduction. IACR Cryptol. ePrint Arch. 2014: 935 (2014) - [i3]Alexander Schaub, Emmanuel Schneider, Alexandros Hollender, Vinicius Calasans, Laurent Jolie, Robin Touillon, Annelie Heuser, Sylvain Guilley, Olivier Rioul:
Attacking Suggest Boxes in Web Applications Over HTTPS Using Side-Channel Stochastic Algorithms. IACR Cryptol. ePrint Arch. 2014: 959 (2014) - 2013
- [j1]Shivam Bhasin, Sylvain Guilley, Annelie Heuser, Jean-Luc Danger:
From cryptography to hardware: analyzing and protecting embedded Xilinx BRAM for cryptographic applications. J. Cryptogr. Eng. 3(4): 213-225 (2013) - [c7]Pierre Belgarric, Shivam Bhasin, Nicolas Bruneau, Jean-Luc Danger, Nicolas Debande, Sylvain Guilley, Annelie Heuser, Zakaria Najm, Olivier Rioul:
Time-Frequency Analysis for Second-Order Attacks. CARDIS 2013: 108-122 - [i2]Amir Moradi, Sylvain Guilley, Annelie Heuser:
Detecting Hidden Leakages. IACR Cryptol. ePrint Arch. 2013: 842 (2013)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 02:46 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint