Trevor Yap

Orcid: 0000-0001-8651-574X

According to our database1, Trevor Yap authored at least 14 papers between 2022 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Kyber Reference pair-pointwise multiplication SCA dataset.
Dataset, May, 2025

Neural Leakage Model: Correlation Power Analysis with Profiled Leakage Model using Deep Neural Networks.
IACR Cryptol. ePrint Arch., 2025

Side-Channel Power Trace Dataset for Kyber Pair-Pointwise Multiplication on Cortex-M4.
IACR Cryptol. ePrint Arch., 2025

Breaking the Blindfold: Deep Learning-based Blind Side-channel Analysis.
Proceedings of the 34th USENIX Security Symposium, 2025

Avenger Ensemble: Genetic Algorithm-Driven Ensemble Selection for Deep Learning-Based Side-Channel Analysis.
Proceedings of the Constructive Approaches for Security Analysis and Design of Embedded Systems, 2025

Attacking Single-Cycle Ciphers on Modern FPGAs - Featuring Explainable Deep Learning.
Proceedings of the Applied Cryptography and Network Security Workshops, 2025

2024
Perfect Monomial Prediction for Modular Addition.
IACR Cryptol. ePrint Arch., 2024

Train Wisely: Multifidelity Bayesian Optimization Hyperparameter Tuning in Deep Learning-Based Side-Channel Analysis.
Proceedings of the Selected Areas in Cryptography - SAC 2024, 2024

OccPoIs: Points of Interest Based on Neural Network's Key Recovery in Side-Channel Analysis Through Occlusion.
Proceedings of the Progress in Cryptology - INDOCRYPT 2024, 2024

Truth Table Net: Scalable, Compact & Verifiable Neural Networks with a Dual Convolutional Small Boolean Circuit Networks Form.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024

Creating from Noise: Trace Generations Using Diffusion Model for Side-Channel Attack.
Proceedings of the Applied Cryptography and Network Security Workshops, 2024

2023
Revisiting Higher-Order Differential-Linear Attacks from an Algebraic Perspective.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

Beyond the Last Layer: Deep Feature Loss Functions in Side-channel Analysis.
Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware Security, 2023

2022
Peek into the Black-Box: Interpretable Neural Network using SAT Equations in Side-Channel Analysis.
IACR Cryptol. ePrint Arch., 2022


  Loading...