-
1Report
المؤلفون: Puškáč, Leonard, Benovič, Marek, Breier, Jakub, Hou, Xiaolu
مصطلحات موضوعية: Computer Science - Cryptography and Security, Computer Science - Artificial Intelligence
URL الوصول: http://arxiv.org/abs/2501.00798
-
2Report
المؤلفون: Jap, Dirmanto, Breier, Jakub, Lehocký, Zdenko, Bhasin, Shivam, Hou, Xiaolu
مصطلحات موضوعية: Computer Science - Cryptography and Security, Computer Science - Artificial Intelligence
URL الوصول: http://arxiv.org/abs/2407.16467
-
3Report
المؤلفون: Schröder, Jan, Breier, Jakub
مصطلحات موضوعية: Computer Science - Cryptography and Security, Computer Science - Artificial Intelligence, Computer Science - Machine Learning
URL الوصول: http://arxiv.org/abs/2406.12929
-
4Report
المؤلفون: Velčický, Patrik, Breier, Jakub, Kovačević, Mladen, Hou, Xiaolu
مصطلحات موضوعية: Computer Science - Cryptography and Security, Computer Science - Artificial Intelligence
URL الوصول: http://arxiv.org/abs/2405.13891
-
5Report
المؤلفون: Breier, Jakub, Jap, Dirmanto, Hou, Xiaolu, Bhasin, Shivam
URL الوصول: http://arxiv.org/abs/2303.18132
-
6Report
المؤلفون: Breier, Jakub, Hou, Xiaolu, Ochoa, Martín, Solano, Jesus
مصطلحات موضوعية: Computer Science - Cryptography and Security, Computer Science - Artificial Intelligence, Computer Science - Machine Learning
URL الوصول: http://arxiv.org/abs/2109.11249
-
7Report
-
8Report
المؤلفون: Breier, Jakub, Jap, Dirmanto, Hou, Xiaolu, Bhasin, Shivam, Liu, Yang
URL الوصول: http://arxiv.org/abs/2002.11021
-
9Report
-
10Report
المؤلفون: Breier, Jakub, Hou, Xiaolu, Jap, Dirmanto, Ma, Lei, Bhasin, Shivam, Liu, Yang
URL الوصول: http://arxiv.org/abs/1806.05859
-
11Report
المؤلفون: Breier, Jakub, He, Wei
المصدر: Proceedings of the 2015 International Workshop on Secure Internet of Things (SIoT), pp. 58-64
مصطلحات موضوعية: Computer Science - Cryptography and Security
URL الوصول: http://arxiv.org/abs/1702.08208
-
12Academic Journal
المؤلفون: Baksi, Anubhab, Breier, Jakub, Dasu, Vishnu Asutosh, Hou, Xiaolu, Kim, Hyunji, Seo, Hwajeong
المساهمون: School of Computer Science and Engineering
مصطلحات موضوعية: Engineering::Computer science and engineering, Speck, Ascon
وصف الملف: application/pdf
Relation: IEEE Access; Baksi, A., Breier, J., Dasu, V. A., Hou, X., Kim, H. & Seo, H. (2023). New results on machine learning-based distinguishers. IEEE Access, 11, 54175-54187. https://dx.doi.org/10.1109/ACCESS.2023.3270396; https://hdl.handle.net/10356/169249; 2-s2.0-85159662417; 11; 54175; 54187
-
13Conference
المؤلفون: Kandi, Aneesh, Baksi, Anubhab, Gan, Peizhou, Guilley, Sylvain, Gerlich, Tomáš, Breier, Jakub, Chattopadhyay, Anupam, Shrivastwa, Ritu Ranjan, Martinásek, Zdeněk, Bhasin, Shivam
المساهمون: European Commission
المصدر: 2024 IEEE Computer Society Annual Symposium on VLSI (ISVLSI) ; page 307-312
-
14Academic Journal
المؤلفون: Kumar, Satyam, Dasu, Vishnu Asutosh, Baksi, Anubhab, Sarkar, Santanu, Jap, Dirmanto, Breier, Jakub, Bhasin, Shivam
المصدر: IACR Transactions on Cryptographic Hardware and Embedded Systems; Volume 2022, Issue 2; 166-191 ; 2569-2925
مصطلحات موضوعية: Stream Cipher, Side Channel Attack, Machine Learning, Mixed Integer Linear Programming, Satisfiability Modulo Theory, Feedback Shift Register
وصف الملف: application/pdf
-
15Academic Journal
المؤلفون: Breier, Jakub, Hou, Xiaolu
المصدر: IEEE Access ; volume 10, page 113122-113130 ; ISSN 2169-3536
-
16Academic Journal
المؤلفون: Hou, Xiaolu, Breier, Jakub, Kovačević, Mladen
المساهمون: European Union’s Horizon 2020 Research and Innovation Program under the Program SASPRO 2 COFUND Marie Sklodowska-Curie, Slovak Research and Development Agency, European Commission through the Horizon Europe aerOS Project, Czech Ministry of Interior, Secretariat for Higher Education and Scientific Research of the Autonomous Province of Vojvodina
المصدر: IEEE Transactions on Very Large Scale Integration (VLSI) Systems ; volume 32, issue 8, page 1559-1563 ; ISSN 1063-8210 1557-9999
-
17Academic Journal
المؤلفون: Berti, Francesco, Bhasin, Shivam, Breier, Jakub, Hou, Xiaolu, Poussier, Romain, Standaert, François-Xavier, Udvarhelyi, Balazs
المساهمون: UCL - SST/ICTM/ELEN - Pôle en ingénierie électrique
المصدر: IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2022, no.1, p. 461-481 (2022)
مصطلحات موضوعية: OCB, ·Side-channel attacks, ·Horizontal DPA, ·Worst-case, SPA, ·Leakage-resilience
Relation: boreal:260810; http://hdl.handle.net/2078.1/260810; urn:ISSN:2569-2925
-
18Academic Journal
المؤلفون: Berti, Francesco, Bhasin, Shivam, Breier, Jakub, Hou, Xiaolu, Poussier, Romain, Standaert, François-Xavier, Udvarhelyi, Balasz
المصدر: IACR Transactions on Cryptographic Hardware and Embedded Systems; Volume 2022, Issue 1; 461-481 ; 2569-2925
مصطلحات موضوعية: OCB, side-channel attacks, horizontal DPA, worst-case SPA, leakage-resilience
وصف الملف: application/pdf
-
19Academic Journal
المؤلفون: Bhasin, Shivam, Breier, Jakub, Hou, Xiaolu, Jap, Dirmanto, Poussier, Romain, Sim, Siang Meng
المصدر: IACR Transactions on Cryptographic Hardware and Embedded Systems; Volume 2020, Issue 1; 95-122 ; 2569-2925
مصطلحات موضوعية: Side-channel analysis, middle rounds attack, substitution-permutation, network (SPN), differential cryptanalysis
وصف الملف: application/pdf
-
20Academic Journal
المؤلفون: Hou, Xiaolu, Breier, Jakub, Zhang, Fuyuan, Liu, Yang
المصدر: IACR Transactions on Cryptographic Hardware and Embedded Systems; Volume 2019, Issue 3; 1-29 ; 2569-2925
مصطلحات موضوعية: differential fault analysis, fault attacks, automation, assembly
وصف الملف: application/pdf