Showing 1 - 20 results of 62 for search 'Bhasin Shivam', query time: 0.03s
Refine Results
-
1
Practical reverse engineering of secret Sboxes by side-channel analysis by Jap, Dirmanto, Bhasin, Shivam
Published 2021
Journal Article -
2
Using model optimization as countermeasure against model recovery attacks by Jap, Dirmanto, Bhasin, Shivam
Published 2024
Conference Paper -
3
Fault Injection Attacks: Attack Methodologies, Injection Techniques and Protection Mechanisms by Bhasin, Shivam, Mukhopadhyay, Debdeep
Published 2017
Get full text
Conference Paper -
4
-
5
Special session on attacking and protecting Artificial Intelligence by Bhasin, Shivam, Garg, Siddarth, Regazzoni, Francesco
Published 2021
Journal Article -
6
On (in)security of edge-based machine learning against electromagnetic side-channels by Bhasin, Shivam, Jap, Dirmanto, Picek, Stjepan
Published 2023
Conference Paper -
7
The Other Side of The Coin: Analyzing Software Encoding Schemes Against Fault Injection Attacks by Breier, Jakub, Jap, Dirmanto, Bhasin, Shivam
Published 2016
Get full text
Conference Paper -
8
Supervised and unsupervised machine learning for side-channel based Trojan detection by Jap, Dirmanto, Bhasin, Shivam, He, Wei
Published 2017
Get full text
Conference Paper -
9
A Study on Analyzing Side-Channel Resistant Encoding Schemes with Respect to Fault Attacks by Breier, Jakub, Jap, Dirmanto, Bhasin, Shivam
Published 2018
Get full text
Journal Article -
10
An Electromagnetic Fault Injection Sensor using Hogge Phase-Detector by Breier, Jakub, Bhasin, Shivam, He, Wei
Published 2018
Get full text
Conference Paper -
11
Practical Evaluation of FSE 2016 Customized Encoding Countermeasure by Bhasin, Shivam, Jap, Dirmanto, Peyrin, Thomas
Published 2018
Get full text
Journal Article -
12
Online Detection and Reactive Countermeasure for leakage from BPU using TVLA by Bhattacharya, Sarani, Bhasin, Shivam, Mukhopadhyay, Debdeep
Published 2018
Get full text
Conference Paper -
13
An Industrial Outlook on Challenges of Hardware Security in Digital Economy—Extended Abstract— by Bhasin, Shivam, Lomné, Victor, Tobich, Karim
Published 2018
Get full text
Conference Paper -
14
-
15
On side channel vulnerabilities of bit permutations in cryptographic algorithms by Breier, Jakub, Jap, Dirmanto, Hou, Xiaolu, Bhasin, Shivam
Published 2020
Journal Article -
16
On configurable SCA countermeasures against single trace attacks for the NTT by Ravi, Prasanna, Poussier, Romain, Bhasin, Shivam, Chattopadhyay, Anupam
Published 2021
Conference Paper -
17
Branch prediction attack on blinded scalar multiplication by Bhattacharya, Sarani, Maurice, Clémentine, Bhasin, Shivam, Mukhopadhyay, Debdeep
Published 2021
Journal Article -
18
Lattice-based key-sharing schemes : a survey by Ravi, Prasanna, Howe, James, Chattopadhyay, Anupam, Bhasin, Shivam
Published 2021
Journal Article -
19
Poster : recovering the input of neural networks via single shot side-channel attacks by Batina, Lejla, Jap, Dirmanto, Bhasin, Shivam, Picek, Stjepan
Published 2021
Conference Paper -
20
SCA strikes back : reverse engineering neural network architectures using side channels by Batina, Lejla, Bhasin, Shivam, Jap, Dirmanto, Picek, Stjepan
Published 2021
Journal Article