ML and Network Traces to M.A.R.S.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023
A comprehensive tolerant algebraic side-channel attack over modern ciphers using constraint programming.
J. Cryptogr. Eng., 2022
A Counting-Based Approach to Scalable Micro-service Deployment.
Proceedings of the Integration of Constraint Programming, Artificial Intelligence, and Operations Research, 2019
A Complete Tolerant Algebraic Side-Channel Attack for AES with CP.
Proceedings of the Principles and Practice of Constraint Programming, 2018
Securely and Automatically Deploying Micro-services in an Hybrid Cloud Infrastructure.
Proceedings of the Principles and Practice of Constraint Programming, 2018
A Tolerant Algebraic Side-Channel Attack on AES Using CP.
Proceedings of the Principles and Practice of Constraint Programming, 2017
Influence of Error on Hamming Weights for ASCA.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017