Follow
Yuanyuan Zhou
Title
Cited by
Cited by
Year
Deep learning mitigates but does not annihilate the need of aligned traces and a generalized resnet model for side-channel attacks
Y Zhou, FX Standaert
Journal of Cryptographic Engineering 10 (1), 85-95, 2020
532020
On the need of physical security for small embedded devices: a case study with COMP128-1 implementations in SIM cards
Y Zhou, Y Yu, FX Standaert, JJ Quisquater
Financial Cryptography and Data Security: 17th International Conference, FC …, 2013
392013
A systematic approach to the side-channel analysis of ECC implementations with worst-case horizontal attacks
R Poussier, Y Zhou, FX Standaert
Cryptographic Hardware and Embedded Systems–CHES 2017: 19th International …, 2017
242017
Simplified single-trace side-channel attacks on elliptic curve scalar multiplication using fully convolutional networks
Y Zhou, FX Standaert
40th WIC symposium on information theory in the benelux, 2019
42019
A Third is All You Need: Extended Partial Key Exposure Attack on CRT-RSA with Additive Exponent Blinding
Y Zhou, J van de Pol, Y Yu, FX Standaert
International Conference on the Theory and Application of Cryptology and …, 2022
32022
SPA-based security evaluation of RSA implementation in Internet banking USB token
Y Zhou, S Guo
2011 First International Conference on Instrumentation, Measurement …, 2011
32011
S-box pooling: towards more efficient side-channel security evaluations
Y Zhou, FX Standaert
International Conference on Applied Cryptography and Network Security, 146-164, 2022
22022
Scatter: a Missing Case?
Y Zhou, S Duval, FX Standaert
International Workshop on Constructive Side-Channel Analysis and Secure …, 2020
12020
Information Extraction and Exploitation for Efficient Side-Channel Security Evaluations
Y Zhou
UCL-Université Catholique de Louvain, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–9