CSI neural network: Using side-channels to recover your articial neural network information. Cryptology ePrint Archive, vol.477, 2018. ,
On the inherent intractability of certain coding problems, IEEE Transactions on Information Theory, vol.24, issue.3, pp.384-386, 1978. ,
Low rank parity check codes and their application to cryptography, pp.168-180, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00913719
Neural network based attack on a masked implementation of AES, 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp.106-111, 2015. ,
A new class of linear error-correcting codes, Problemy Peredachi Informatsii, vol.6, issue.3, pp.24-30, 1970. ,
Machine learning in side-channel analysis: a rst study, Journal of Cryptographic Engineering, vol.1, issue.4, p.293, 2011. ,
Reverse engineering convolutional neural networks through side-channel information leaks, Proceedings of the 55th Annual Design Automation Conference, DAC '18, 2018. ,
Support vector regression: Exploiting machine learning techniques for leakage modeling, Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy, HASP '15, vol.2, 2015. ,
Timing attacks on implementations of Die-Hellman, RSA, DSS, and other systems, Computer Science (LNCS), pages 104{113, vol.1109, 1996. ,
The investigation of neural networks performance in sidechannel attacks, Articial Intelligence Review, 2018. ,
Template attacks vs. machine learning revisited (and the curse of dimensionality in side-channel analysis), Constructive Side-Channel Analysis and Secure Design, pp.20-33, 2015. ,
Breaking cryptographic implementations using deep learning techniques, Security, Privacy, and Applied Cryptography Engineering, pp.3-26, 2016. ,
A public-key cryptosystem based on algebraic coding theory, California Inst. Technol, 1978. ,
MDPCMcEliece: New McEliece variants from moderate density parity-check codes, IEEE International Symposium on Information Theory Proceedings (ISIT 2013), pp.2069-2073, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00870929
, Post-quantum cryptography standardization
SCNN: An accelerator for compressed-sparse convolutional neural networks, SIGARCH Comput. Archit. News, vol.45, issue.2, pp.27-40, 2017. ,
Side-channel analysis and machine learning: A practical perspective, 2017 International Joint Conference on Neural Networks (IJCNN), pp.4095-4102, 2017. ,
DOI : 10.1109/ijcnn.2017.7966373
URL : https://hal.archives-ouvertes.fr/hal-01628681
Secure implementation of cryptographic protocols based on errorcorrecting codes (in French), 2016. ,
A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978. ,
DOI : 10.1145/357980.358017
URL : http://people.csail.mit.edu/rivest/pubs/RSA78.pdf
Algorithms for quantum computation: discrete logarithms and factoring, Proceedings of the 35th Annual Symposium on Foundations of Computer Science, pp.124-134, 1994. ,
Eciency and Implementation Security of Code-based Cryptosystems, 2013. ,
Ecient Implementation of Code-and Hash-Based Cryptography, 2016. ,
I know what you see: Power side-channel attack on convolutional neural network accelerators, Proceedings of the 34th Annual Computer Security Applications Conference, ACSAC '18, pp.393-406, 2018. ,