Leo Weissbart

Orcid: 0000-0003-0288-9686

According to our database1, Leo Weissbart authored at least 16 papers between 2018 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Train Wisely: Multifidelity Bayesian Optimization Hyperparameter Tuning in Side-Channel Analysis.
IACR Cryptol. ePrint Arch., 2024

CNN architecture extraction on edge GPU.
CoRR, 2024

2023
Label Correlation in Deep Learning-Based Side-Channel Analysis.
IEEE Trans. Inf. Forensics Secur., 2023

Lightweight but Not Easy: Side-channel Analysis of the Ascon Authenticated Cipher on a 32-bit Microcontroller.
IACR Cryptol. ePrint Arch., 2023

One for All, All for Ascon: Ensemble-based Deep Learning Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2023

BarraCUDA: Bringing Electromagnetic Side Channel Into Play to Steal the Weights of Neural Networks from NVIDIA GPUs.
CoRR, 2023

2022
AGE Is Not Just a Number: Label Distribution in Deep Learning-based Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2022

2021
On Reverse Engineering Neural Network Implementation on GPU.
IACR Cryptol. ePrint Arch., 2021

Screen Gleaning: A Screen Reading TEMPEST Attack on Mobile Devices Exploiting an Electromagnetic Side Channel.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

2020
Systematic Side-Channel Analysis of Curve25519 with Machine Learning.
J. Hardw. Syst. Secur., 2020

Everything is Connected: From Model Learnability to Guessing Entropy.
IACR Cryptol. ePrint Arch., 2020

Performance Analysis of Multilayer Perceptron in Profiling Side-Channel Analysis.
Proceedings of the Applied Cryptography and Network Security Workshops, 2020

2019
On the Performance of Multilayer Perceptron in Profiling Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2019

One trace is all it takes: Machine Learning-based Side-channel Attack on EdDSA.
IACR Cryptol. ePrint Arch., 2019

A Side-Channel Attack Using Order 8 Rational Points against Curve25519 on an 8-Bit Microcontroller.
Proceedings of the 2019 Seventh International Symposium on Computing and Networking, 2019

2018
Side-Channel Attack using Order 4 Element against Curve25519 on ATmega328P.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018


  Loading...