Follow
Yuanyuan Zhou
Title
Cited by
Cited by
Year
Deep learning mitigates but does not annihilate the need of aligned traces and a generalized resnet model for side-channel attacks
Y Zhou, FX Standaert
Journal of Cryptographic Engineering 10 (1), 85-95, 2020
572020
On the need of physical security for small embedded devices: a case study with COMP128-1 implementations in SIM cards
Y Zhou, Y Yu, FX Standaert, JJ Quisquater
Financial Cryptography and Data Security: 17th International Conference, FC …, 2013
402013
A systematic approach to the side-channel analysis of ECC implementations with worst-case horizontal attacks
R Poussier, Y Zhou, FX Standaert
Cryptographic Hardware and Embedded Systems–CHES 2017: 19th International …, 2017
262017
A third is all you need: extended partial key exposure attack on CRT-RSA with additive exponent blinding
Y Zhou, J van de Pol, Y Yu, FX Standaert
International Conference on the Theory and Application of Cryptology and …, 2022
62022
Simplified single-trace side-channel attacks on elliptic curve scalar multiplication using fully convolutional networks
Y Zhou, FX Standaert
Adversarial Loss for Semantic Segmentation of Aerial Imagery, 139, 2019
52019
S-box pooling: towards more efficient side-channel security evaluations
Y Zhou, FX Standaert
International Conference on Applied Cryptography and Network Security, 146-164, 2022
32022
SPA-based security evaluation of RSA implementation in Internet banking USB token
Y Zhou, S Guo
2011 First International Conference on Instrumentation, Measurement …, 2011
32011
Scatter: a Missing Case?
Y Zhou, S Duval, FX Standaert
International Workshop on Constructive Side-Channel Analysis and Secure …, 2020
22020
Information extraction and exploitation for efficient side-channel security evaluations.
Y Zhou
Catholic University of Louvain, Louvain-la-Neuve, Belgium, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–9