Alexandre Venelli

According to our database1, Alexandre Venelli authored at least 17 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Conditional Variational AutoEncoder based on Stochastic Attacks.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

2022
Conditional Variational AutoEncoder based on Stochastic Attack.
IACR Cryptol. ePrint Arch., 2022

2021
Efficiency through Diversity in Ensemble Models applied to Side-Channel Attacks - A Case Study on Public-Key Algorithms -.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

Ranking Loss: Maximizing the Success Rate in Deep Learning Side-Channel Analysis.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

2020
Methodology for Efficient CNN Architectures in Profiling Attacks.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

Understanding Methodology for Efficient CNN Architectures in Profiling Attacks.
IACR Cryptol. ePrint Arch., 2020

2019
Deep Learning to Evaluate Secure RSA Implementations.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

2014
Side-Channel Analysis on Blinded Regular Scalar Multiplications.
IACR Cryptol. ePrint Arch., 2014

2013
AES side-channel countermeasure using random tower field constructions.
Des. Codes Cryptogr., 2013

Defeating with Fault Injection a Combined Attack Resistant Exponentiation.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2013

2012
Combined Attacks on the AES Key Schedule.
IACR Cryptol. ePrint Arch., 2012

Combined Fault and Side-Channel Attacks on the AES Key Schedule.
Proceedings of the 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2012

2011
Techniques d'estimation d'entropie efficaces pour l'attaque par analyse d'information mutuelle.
Tech. Sci. Informatiques, 2011

Scalar multiplication on Weierstraß elliptic curves from Co-<i>Z</i> arithmetic.
J. Cryptogr. Eng., 2011

Redundant Modular Reduction Algorithms.
Proceedings of the Smart Card Research and Advanced Applications, 2011

2010
Efficient Entropy Estimation for Mutual Information Analysis Using B-Splines.
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010

Analysis of Nonparametric Estimation Methods for Mutual Information Analysis.
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010


  Loading...