Houssem Maghrebi

According to our database1, Houssem Maghrebi authored at least 26 papers between 2010 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Deep Learning based Side-Channel Attack: a New Profiling Methodology based on Multi-Label Classification.
IACR Cryptol. ePrint Arch., 2020

2019
Revisiting Higher-Order Computational Attacks against White-Box Implementations.
IACR Cryptol. ePrint Arch., 2019

Deep Learning based Side Channel Attacks in Practice.
IACR Cryptol. ePrint Arch., 2019

On the Bright Side of Darkness: Side-Channel Based Authentication Protocol Against Relay Attacks.
IACR Cryptol. ePrint Arch., 2019

Assessment of Common Side Channel Countermeasures With Respect To Deep Learning Based Profiled Attacks.
Proceedings of the 31st International Conference on Microelectronics, 2019

Another Look on Bucketing Attack to Defeat White-Box Implementations.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2019

2018
Linear Repairing Codes and Side-Channel Attacks.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

On the Use of Independent Component Analysis to Denoise Side-Channel Measurements.
IACR Cryptol. ePrint Arch., 2018

2016
There is Wisdom in Harnessing the Strengths of your Enemy: Customized Encoding to Thwart Side-Channel Attacks - Extended Version -.
IACR Cryptol. ePrint Arch., 2016

Breaking Cryptographic Implementations Using Deep Learning Techniques.
IACR Cryptol. ePrint Arch., 2016

There Is Wisdom in Harnessing the Strengths of Your Enemy: Customized Encoding to Thwart Side-Channel Attacks.
Proceedings of the Fast Software Encryption - 23rd International Conference, 2016

Side-Channel Analysis of the TUAK Algorithm Used for Authentication and Key Agreement in 3G/4G Networks.
Proceedings of the Smart Card Research and Advanced Applications, 2016

2014
Leakage squeezing: Optimal implementation and security evaluation.
J. Math. Cryptol., 2014

Achieving side-channel high-order correlation immunity with leakage squeezing.
J. Cryptogr. Eng., 2014

Orthogonal Direct Sum Masking: A Smartcard Friendly Computation Paradigm in a Code, with Builtin Protection against Side-Channel and Fault Attacks.
IACR Cryptol. ePrint Arch., 2014

Study of a Novel Software Constant Weight Implementation.
Proceedings of the Smart Card Research and Advanced Applications, 2014

2012
Masking countermeasures against HO-DPA : security evaluation and enhancement by specific mask encodings. (Les contre-mesures par masquage contre les attaques HO-DPA : évaluation et amélioration de la sécurité en utilisant des encodages spécifiques).
PhD thesis, 2012

A First-Order Leak-Free Masking Countermeasure.
IACR Cryptol. ePrint Arch., 2012

Optimal First-Order Masking with Linear and Non-Linear Bijections.
IACR Cryptol. ePrint Arch., 2012

Leakage Squeezing of Order Two.
IACR Cryptol. ePrint Arch., 2012

Comparison between Side-Channel Analysis Distinguishers.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

Register leakage masking using Gray code.
Proceedings of the 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, 2012

2011
Classification of High-Order Boolean Masking Schemes and Improvements of their Efficiency.
IACR Cryptol. ePrint Arch., 2011

Leakage Squeezing Countermeasure against High-Order Attacks.
Proceedings of the Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, 2011

Formal security evaluation of hardware Boolean masking against second-order attacks.
Proceedings of the HOST 2011, 2011

2010
Entropy-based Power Attack.
Proceedings of the HOST 2010, 2010


  Loading...