Jakub Breier
Orcid: 0000-0002-7844-5267
According to our database1,
Jakub Breier
authored at least 81 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Very Large Scale Integr. Syst., August, 2024
Side-Channel and Fault Resistant ASCON Implementation: A Detailed Hardware Evaluation (Extended Version).
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
CoRR, 2024
Side-Channel and Fault Resistant ASCON Implementation: A Detailed Hardware Evaluation.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
IEEE Trans. Dependable Secur. Comput., 2023
A Desynchronization-Based Countermeasure Against Side-Channel Analysis of Neural Networks.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2023
2022
Security and Artificial Intelligence, 2022
IEEE Trans. Reliab., 2022
SBCMA: Semi-Blind Combined Middle-Round Attack on Bit-Permutation Ciphers With Application to AEAD Schemes.
IEEE Trans. Inf. Forensics Secur., 2022
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
IACR Cryptol. ePrint Arch., 2022
2021
Back to the Basics: Seamless Integration of Side-Channel Pre-Processing in Deep Neural Networks.
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IACR Cryptol. ePrint Arch., 2021
Feeding Three Birds With One Scone: A Generic Duplication Based Countermeasure To Fault Attacks.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2021
2020
IEEE Trans. Inf. Forensics Secur., 2020
SITM: See-In-The-Middle Side-Channel Assisted Middle Round Differential Cryptanalysis on SPN Block Ciphers.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020
IEEE Trans. Circuits Syst., 2020
Neural Network-based Inherently Fault-tolerant Hardware Cryptographic Primitives without Explicit Redundancy Checks.
ACM J. Emerg. Technol. Comput. Syst., 2020
DNFA: Differential No-Fault Analysis of Bit Permutation Based Ciphers Assisted by Side-Channel.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Feeding Three Birds With One Scone: A Generic Duplication Based Countermeasure To Fault Attacks (Extended Version).
IACR Cryptol. ePrint Arch., 2020
2019
Fully Automated Differential Fault Analysis on Software Implementations of Block Ciphers.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019
IEEE Trans. Computers, 2019
IACR Cryptol. ePrint Arch., 2019
Experimental Evaluation of Deep Neural Network Resistance Against Fault Injection Attacks.
IACR Cryptol. ePrint Arch., 2019
CoRR, 2019
2018
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018
Fully Automated Differential Fault Analysis on Software Implementations of Cryptographic Algorithms.
IACR Cryptol. ePrint Arch., 2018
On Side-Channel Vulnerabilities of Bit Permutations: Key Recovery and Reverse Engineering.
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Protecting Block Ciphers against Differential Fault Attacks without Re-keying (Extended Version).
IACR Cryptol. ePrint Arch., 2018
Proceedings of the 2018 IEEE Computer Society Annual Symposium on VLSI, 2018
Proceedings of the 2018 IEEE International Symposium on Hardware Oriented Security and Trust, 2018
Proceedings of the 2018 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2018
Proceedings of the 2018 Design, Automation & Test in Europe Conference & Exhibition, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
A Dynamic Rule Creation Based Anomaly Detection Method for Identifying Security Breaches in Log Records.
Wirel. Pers. Commun., 2017
Attacks in Reality: the Limits of Concurrent Error Detection Codes Against Laser Fault Injection.
J. Hardw. Syst. Secur., 2017
J. Hardw. Syst. Secur., 2017
A study on analyzing side-channel resistant encoding schemes with respect to fault attacks.
J. Cryptogr. Eng., 2017
One Plus One is More than Two: A Practical Combination of Power and Fault Analysis Attacks on PRESENT and PRESENT-like Block Ciphers.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
SCADPA: Side-Channel Assisted Differential-Plaintext Attack on Bit Permutation Based Ciphers.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 18th International Symposium on Quality Electronic Design, 2017
Proceedings of the 22nd Asia and South Pacific Design Automation Conference, 2017
2016
Mistakes Are Proof That You Are Trying: On Verifying Software Encoding Schemes' Resistance to Fault Injection Attacks.
IACR Cryptol. ePrint Arch., 2016
Feeding Two Cats with One Bowl: On Designing a Fault and Side-Channel Resistant Software Encoding Scheme.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Comprehensive Laser Sensitivity Profiling and Data Register Bit-Flips for Cryptographic Fault Attacks in 65 Nm FPGA.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2016
Cheap and Cheerful: A Low-Cost Digital Sensor for Detecting Laser Fault Injection Attacks.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2016
Proceedings of the International Symposium on Integrated Circuits, 2016
The other side of the coin: Analyzing software encoding schemes against fault injection attacks.
Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust, 2016
Ring Oscillator under Laser: Potential of PLL-based Countermeasure against Laser Fault Injection.
Proceedings of the 2016 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2016
Bypassing Parity Protected Cryptography using Laser Fault Injection in Cyber-Physical System.
Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security, 2016
2015
Proceedings of the 2015 International Workshop on Secure Internet of Things, 2015
Proceedings of the Information and Communication Technology, 2015
Proceedings of the 10th Workshop on Embedded Systems Security, 2015
Laser Profiling for the Back-Side Fault Attacks: With a Practical Laser Skip Instruction Attack on AES.
Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, 2015
2014
Proceedings of the 2014 International Symposium on Integrated Circuits (ISIC), 2014
Proceedings of the 2014 International Symposium on Integrated Circuits (ISIC), 2014
Proceedings of the Information and Communication Technology, 2014
Qualified Electronic Signature via SIM Card Using JavaCard 3 Connected Edition Platform.
Proceedings of the Ninth International Conference on Availability, 2014
2013
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
2012
Proceedings of the 2012 Conference on Computer Systems and Technologies, 2012
2011
Proceedings of the 12th International Conference on Computer Systems and Technologies, 2011