Annelie Heuser
Annelie Heuser
CNRS researcher
Verified email at irisa.fr - Homepage
Title
Cited by
Cited by
Year
Intelligent machine homicide
A Heuser, M Zohner
International Workshop on Constructive Side-Channel Analysis and Secure …, 2012
1712012
Make some noise. unleashing the power of convolutional neural networks for profiled side-channel analysis
J Kim, S Picek, A Heuser, S Bhasin, A Hanjalic
IACR Transactions on Cryptographic Hardware and Embedded Systems, 148-179, 2019
1062019
The curse of class imbalance and conflicting metrics with machine learning for side-channel evaluations
S Picek, A Heuser, A Jovic, S Bhasin, F Regazzoni
IACR Transactions on Cryptographic Hardware and Embedded Systems 2019 (1), 1-29, 2019
1002019
Good is not good enough
A Heuser, O Rioul, S Guilley
International Workshop on Cryptographic Hardware and Embedded Systems, 55-74, 2014
742014
Side-channel analysis and machine learning: A practical perspective
S Picek, A Heuser, A Jovic, SA Ludwig, S Guilley, D Jakobovic, ...
2017 International Joint Conference on Neural Networks (IJCNN), 4095-4102, 2017
682017
On the performance of convolutional neural networks for side-channel analysis
S Picek, IP Samiotis, J Kim, A Heuser, S Bhasin, A Legay
International Conference on Security, Privacy, and Applied Cryptography …, 2018
662018
Detecting hidden leakages
A Moradi, S Guilley, A Heuser
International Conference on Applied Cryptography and Network Security, 324-342, 2014
602014
Side-channel analysis of lightweight ciphers: Does lightweight equal easy?
A Heuser, S Picek, S Guilley, N Mentens
International Workshop on Radio Frequency Identification: Security and …, 2016
372016
Less is more
N Bruneau, S Guilley, A Heuser, D Marion, O Rioul
International Workshop on Cryptographic Hardware and Embedded Systems, 22-41, 2015
362015
A theoretical study of Kolmogorov-Smirnov distinguishers
A Heuser, O Rioul, S Guilley
International Workshop on Constructive Side-Channel Analysis and Secure …, 2014
332014
Time-frequency analysis for second-order attacks
P Belgarric, S Bhasin, N Bruneau, JL Danger, N Debande, S Guilley, ...
International Conference on Smart Card Research and Advanced Applications …, 2013
332013
Template attack versus Bayes classifier
S Picek, A Heuser, S Guilley
Journal of Cryptographic Engineering 7 (4), 343-351, 2017
322017
Improved algebraic side-channel attack on AES
MSE Mohamed, S Bulygin, M Zohner, A Heuser, M Walter, J Buchmann
2012 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2012
322012
A new difference method for side-channel analysis with high-dimensional leakage models
A Heuser, M Kasper, W Schindler, M Stöttinger
Cryptographers’ Track at the RSA Conference, 365-382, 2012
322012
Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest
C Clavier, JL Danger, G Duc, MA Elaabid, B Gérard, S Guilley, A Heuser, ...
Journal of Cryptographic Engineering 4 (4), 259-274, 2014
312014
A key to success
S Guilley, A Heuser, O Rioul
International Conference on Cryptology in India, 270-290, 2015
282015
Revealing side-channel issues of complex circuits by enhanced leakage models
A Heuser, W Schindler, M Stöttinger
2012 Design, Automation & Test in Europe Conference & Exhibition (DATE …, 2012
282012
Mind the portability: A warriors guide through realistic profiled side-channel analysis
S Bhasin, A Chattopadhyay, A Heuser, D Jap, S Picek, R Ranjan
NDSS 2020, 2020
272020
Scalable Approximation of Quantitative Information Flow in Programs.
F Biondi, MA Enescu, A Heuser, A Legay, KS Meel, J Quilbeuf
VMCAI, 71-93, 2018
262018
Lightweight ciphers and their side-channel resilience
A Heuser, S Picek, S Guilley, N Mentens
IEEE Transactions on Computers, 2017
262017
The system can't perform the operation now. Try again later.
Articles 1–20