Liran Lerman

Orcid: 0000-0003-1523-6385

According to our database1, Liran Lerman authored at least 23 papers between 2012 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Efficient Profiled Attacks on Masking Schemes.
IEEE Trans. Inf. Forensics Secur., 2019

Location, location, location: Revisiting modeling and exploitation for location-based side channel leakages.
IACR Cryptol. ePrint Arch., 2019

2018
Start Simple and then Refine: Bias-Variance Decomposition as a Diagnosis Tool for Leakage Profiling.
IEEE Trans. Computers, 2018

Template attacks versus machine learning revisited and the curse of dimensionality in side-channel analysis: extended version.
J. Cryptogr. Eng., 2018

Higher Order Side-Channel Attacks Resilient S-boxes.
IACR Cryptol. ePrint Arch., 2018

Higher order side-channel attack resilient S-boxes.
Proceedings of the 15th ACM International Conference on Computing Frontiers, 2018

2017
Robust profiled attacks: should the adversary trust the dataset?
IET Inf. Secur., 2017

Bivariate attacks and confusion coefficients.
IACR Cryptol. ePrint Arch., 2017

Location-based leakages: New directions in modeling and exploiting.
Proceedings of the 2017 International Conference on Embedded Computer Systems: Architectures, 2017

On the Construction of Side-Channel Attack Resilient S-boxes.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2017

2016
Variety of Scalable Shuffling Countermeasures against Side Channel Attacks.
J. Cyber Secur. Mobil., 2016

Comparing Sboxes of Ciphers from the Perspective of Side-Channel Attacks.
IACR Cryptol. ePrint Arch., 2016

SAT-based cryptanalysis of ACORN.
IACR Cryptol. ePrint Arch., 2016

Breaking Kalyna 128/128 with Power Attacks.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2016

2015
The bias-variance decomposition in profiled attacks.
J. Cryptogr. Eng., 2015

A machine learning approach against a masked AES - Reaching the limit of side-channel attacks with a learning model.
J. Cryptogr. Eng., 2015

Template Attacks vs. Machine Learning Revisited (and the Curse of Dimensionality in Side-Channel Analysis).
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2015

2014
Power analysis attack: an approach based on machine learning.
Int. J. Appl. Cryptogr., 2014

2013
A Time Series Approach for Profiling Attack.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2013

Improving Block Cipher Design by Rearranging Internal Operations.
Proceedings of the SECRYPT 2013, 2013

A Machine Learning Approach Against a Masked AES.
Proceedings of the Smart Card Research and Advanced Applications, 2013

2012
Semi-Supervised Template Attack.
IACR Cryptol. ePrint Arch., 2012

Key Management as a Service.
Proceedings of the SECRYPT 2012, 2012


  Loading...