Liran Lerman

Orcid: 0000-0002-7153-8890

According to our database1, Liran Lerman authored at least 23 papers between 2012 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Efficient Profiled Attacks on Masking Schemes.
IEEE Trans. Inf. Forensics Secur., 2019

Location, Location, Location: Revisiting Modeling and Exploitation for Location-Based Side Channel Leakages.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
Start Simple and then Refine: Bias-Variance Decomposition as a Diagnosis Tool for Leakage Profiling.
IEEE Trans. Computers, 2018

Template attacks versus machine learning revisited and the curse of dimensionality in side-channel analysis: extended version.
J. Cryptogr. Eng., 2018

Higher Order Side-Channel Attacks Resilient S-boxes.
IACR Cryptol. ePrint Arch., 2018

Higher order side-channel attack resilient S-boxes.
Proceedings of the 15th ACM International Conference on Computing Frontiers, 2018

2017
Robust profiled attacks: should the adversary trust the dataset?
IET Inf. Secur., 2017

Bivariate attacks and confusion coefficients.
IACR Cryptol. ePrint Arch., 2017

Location-based leakages: New directions in modeling and exploiting.
Proceedings of the 2017 International Conference on Embedded Computer Systems: Architectures, 2017

On the Construction of Side-Channel Attack Resilient S-boxes.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2017

2016
Variety of Scalable Shuffling Countermeasures against Side Channel Attacks.
J. Cyber Secur. Mobil., 2016

SAT-based cryptanalysis of ACORN.
IACR Cryptol. ePrint Arch., 2016

Breaking Kalyna 128/128 with Power Attacks.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2016

Comparing Sboxes of ciphers from the perspective of side-channel attacks.
Proceedings of the 2016 IEEE Asian Hardware-Oriented Security and Trust, 2016

2015
The bias-variance decomposition in profiled attacks.
J. Cryptogr. Eng., 2015

A machine learning approach against a masked AES - Reaching the limit of side-channel attacks with a learning model.
J. Cryptogr. Eng., 2015

Template Attacks vs. Machine Learning Revisited (and the Curse of Dimensionality in Side-Channel Analysis).
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2015

2014
Power analysis attack: an approach based on machine learning.
Int. J. Appl. Cryptogr., 2014

2013
A Time Series Approach for Profiling Attack.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2013

Improving Block Cipher Design by Rearranging Internal Operations.
Proceedings of the SECRYPT 2013, 2013

Semi-Supervised Template Attack.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2013

A Machine Learning Approach Against a Masked AES.
Proceedings of the Smart Card Research and Advanced Applications, 2013

2012
Key Management as a Service.
Proceedings of the SECRYPT 2012, 2012


  Loading...