Guilherme Perin

Orcid: 0000-0003-3799-7636

According to our database1, Guilherme Perin authored at least 57 papers between 2009 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
SoK: Deep Learning-based Physical Side-channel Analysis.
ACM Comput. Surv., November, 2023

No (good) loss no gain: systematic evaluation of loss functions in deep learning-based side-channel analysis.
J. Cryptogr. Eng., September, 2023

Label Correlation in Deep Learning-Based Side-Channel Analysis.
IEEE Trans. Inf. Forensics Secur., 2023

An End-to-end Plaintext-based Side-channel Collision Attack without Trace Segmentation.
IACR Cryptol. ePrint Arch., 2023

Not so Difficult in the End: Breaking the ASCADv2 Dataset.
IACR Cryptol. ePrint Arch., 2023

Hiding in Plain Sight: Non-profiling Deep Learning-based Side-channel Analysis with Plaintext/Ciphertext.
IACR Cryptol. ePrint Arch., 2023

Breaking Free: Leakage Model-free Deep Learning-based Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2023

The Need for MORE: Unsupervised Side-channel Analysis with Single Network Training and Multi-output Regression.
IACR Cryptol. ePrint Arch., 2023

One for All, All for Ascon: Ensemble-based Deep Learning Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2023

Shift-invariance Robustness of Convolutional Neural Networks in Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2023

Autoencoder-enabled Model Portability for Reducing Hyperparameter Tuning Efforts in Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2023

It's a Kind of Magic: A Novel Conditional GAN Framework for Efficient Profiling Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2023

A Systematic Study of Data Augmentation for Protected AES Implementations.
IACR Cryptol. ePrint Arch., 2023

Not so Difficult in the End: Breaking the Lookup Table-Based Affine Masking Scheme.
Proceedings of the Selected Areas in Cryptography - SAC 2023, 2023

IB-RAR: Information Bottleneck as Regularizer for Adversarial Robustness.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2023

2022
Deep Learning on Side-Channel Analysis.
Security and Artificial Intelligence, 2022

The Best of Two Worlds: Deep Learning-assisted Template Attack.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

Exploring Feature Selection Scenarios for Deep Learning-based Side-channel Analysis.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

AGE Is Not Just a Number: Label Distribution in Deep Learning-based Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2022

To Overfit, Or Not to Overfit: Improving the Performance of Deep Learning-based SCA.
IACR Cryptol. ePrint Arch., 2022

I Know What Your Layers Did: Layer-wise Explainability of Deep Learning Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2022

Pruning-based Neural Network Reduction for Faster Profiling Side-Channel Attacks.
Proceedings of the 29th IEEE International Conference on Electronics, Circuits and Systems, 2022

2021
Reinforcement Learning for Hyperparameter Tuning in Deep Learning-based Side-channel Analysis.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

Keep it Unsupervised: Horizontal Attacks Meet Deep Learning.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

Explain Some Noise: Ablation Analysis for Deep Learning-based Physical Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2021

On the Evaluation of Deep Learning-based Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2021

On the Importance of Pooling Layer Tuning for Profiling Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2021

Deep Learning-based Side-channel Analysis against AES Inner Rounds.
IACR Cryptol. ePrint Arch., 2021

Reinforcement Learning-based Design of Side-channel Countermeasures.
IACR Cryptol. ePrint Arch., 2021

The Need for Speed: A Fast Guessing Entropy Calculation for Deep Learning-based SCA.
IACR Cryptol. ePrint Arch., 2021

AISY - Deep Learning-based Framework for Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2021

Gambling for Success: The Lottery Ticket Hypothesis in Deep Learning-based SCA.
IACR Cryptol. ePrint Arch., 2021

Focus is Key to Success: A Focal Loss Function for Deep Learning-based Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2021

A Tale of Two Boards: On the Influence of Microarchitecture on Side-Channel Leakage.
IACR Cryptol. ePrint Arch., 2021

Reinforcement Learning-Based Design of Side-Channel Countermeasures.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2021

Learning When to Stop: A Mutual Information Approach to Prevent Overfitting in Profiled Side-Channel Analysis.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2021

Profiled Side-Channel Analysis in the Efficient Attacker Framework.
Proceedings of the Smart Card Research and Advanced Applications, 2021

2020
Strength in Numbers: Improving Generalization with Ensembles in Machine Learning-based Profiled Side-channel Analysis.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

Everything is Connected: From Model Learnability to Guessing Entropy.
IACR Cryptol. ePrint Arch., 2020

I Choose You: Automated Hyperparameter Tuning for Deep Learning-based Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2020

On the Influence of Optimizers in Deep Learning-based Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2020

Learning when to stop: a mutual information approach to fight overfitting in profiled side-channel analysis.
IACR Cryptol. ePrint Arch., 2020

A Comparison of Weight Initializers in Deep Learning-based Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2020

2019
Neural Network Model Assessment for Side-Channel Analysis.
IACR Cryptol. ePrint Arch., 2019

Deep Learning Model Generalization in Side-Channel Analysis.
IACR Cryptol. ePrint Arch., 2019

Location, location, location: Revisiting modeling and exploitation for location-based side channel leakages.
IACR Cryptol. ePrint Arch., 2019

2015
Vertical and horizontal correlation attacks on RNS-based exponentiations.
J. Cryptogr. Eng., 2015

A Semi-Parametric Approach for Side-Channel Attacks on Protected RSA Implementations.
Proceedings of the Smart Card Research and Advanced Applications, 2015

Trade-Off Approaches for Leak Resistant Modular Arithmetic in RNS.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

2014
Attacking Randomized Exponentiations Using Unsupervised Learning.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2014

2013
Filtragem Wavelet de Sinais Cardíacos através de Algoritmos Adaptativos.
RITA, 2013

Electromagnetic Analysis on RSA Algorithm Based on RNS.
Proceedings of the 2013 Euromicro Conference on Digital System Design, 2013

Practical Analysis of RSA Countermeasures Against Side-Channel Electromagnetic Attacks.
Proceedings of the Smart Card Research and Advanced Applications, 2013

2012
Amplitude demodulation-based EM analysis of different RSA implementations.
Proceedings of the 2012 Design, Automation & Test in Europe Conference & Exhibition, 2012

2011
Montgomery Modular Multiplication on Reconfigurable Hardware: Systolic versus Multiplexed Implementation.
Int. J. Reconfigurable Comput., 2011

2010
An efficient implementation of montgomery powering ladder in reconfigurable hardware.
Proceedings of the 23rd Annual Symposium on Integrated Circuits and Systems Design, 2010

2009
A Gigabit UDP/IP network stack in FPGA.
Proceedings of the 16th IEEE International Conference on Electronics, 2009


  Loading...