Search Results - "Markowitch, Olivier"

Refine Results
  1. 1

    A note on “new quantum key agreement protocols based on Bell states” by Cao, Zhengjun, Markowitch, Olivier

    Published in Quantum information processing (01-02-2021)
    “…We remark that the quantum key agreement protocol (Yang et al. in Quantum Inf Process 18(10):322, 2019) is flawed. It is unnecessary for Bob to prepare his…”
    Get full text
    Journal Article
  2. 2

    Comment on "Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption With Verifiable Delegation in Cloud Computing" by Cao, Zhengjun, Markowitch, Olivier

    “…The scheme [1] is flawed because: (1) its circuit access structure is confusingly described; (2) the cloud server cannot complete the related computations; (3)…”
    Get full text
    Journal Article
  3. 3

    Efficient Profiled Attacks on Masking Schemes by Lerman, Liran, Markowitch, Olivier

    “…Side-channel adversaries represent real-world threats against (certified and uncertified) cryptographic devices. Masking schemes represent prevailing…”
    Get full text
    Journal Article
  4. 4

    Reducing Data Complexity in Feature Extraction and Feature Selection for Big Data Security Analytics by Sisiaridis, Dimitrios, Markowitch, Olivier

    “…Feature extraction and feature selection are the first tasks in pre-processing of input logs in order to detect cybersecurity threats and attacks by utilizing…”
    Get full text
    Conference Proceeding
  5. 5

    Comment on "Efficient Secure Outsourcing of Large-Scale Sparse Linear Systems of Equations" by Cao, Zhengjun, Markowitch, Olivier

    Published in IEEE transactions on big data (01-12-2021)
    “…The scheme [IEEE Trans. Big Data, 4 (1), 2018, 26-39] is flawed because the sparsity of coefficient matrix is neglected. In the discussed scenario, we find it…”
    Get full text
    Journal Article
  6. 6

    A machine learning approach against a masked AES: Reaching the limit of side-channel attacks with a learning model by Lerman, Liran, Bontempi, Gianluca, Markowitch, Olivier

    Published in Journal of cryptographic engineering (01-06-2015)
    “…Side-channel attacks challenge the security of cryptographic devices. A widespread countermeasure against these attacks is the masking approach. Masking…”
    Get full text
    Journal Article
  7. 7

    Exploring the security landscape: NoC-based MPSoC to Cloud-of-Chips by Sharma, Gaurav, Bousdras, Georgios, Ellinidou, Soultana, Markowitch, Olivier, Dricot, Jean-Michel, Milojevic, Dragomir

    Published in Microprocessors and microsystems (01-07-2021)
    “…In this paper, we present a detailed and systematic overview of communication security aspects of Multi-Processor Systems-on-Chip (MPSoC) and the emerging…”
    Get full text
    Journal Article
  8. 8

    Comment on "Highly Efficient Linear Regression Outsourcing to a Cloud" by Cao, Zhengjun, Liu, Lihua, Markowitch, Olivier

    Published in IEEE transactions on cloud computing (01-07-2019)
    “…We show that Chen et al.'s schemes [IEEE TCC, 2(4), 2014, 499-508] for outsourcing linear regression computation to the cloud are not unquestioned. In scheme…”
    Get full text
    Journal Article
  9. 9

    Template attacks versus machine learning revisited and the curse of dimensionality in side-channel analysis: extended version by Lerman, Liran, Poussier, Romain, Markowitch, Olivier, Standaert, François-Xavier

    Published in Journal of cryptographic engineering (01-11-2018)
    “…Template attacks and machine learning are two popular approaches to profiled side-channel analysis. In this paper, we aim to contribute to the understanding of…”
    Get full text
    Journal Article
  10. 10

    Start Simple and then Refine: Bias-Variance Decomposition as a Diagnosis Tool for Leakage Profiling by Lerman, Liran, Veshchikov, Nikita, Markowitch, Olivier, Standaert, Francois-Xavier

    Published in IEEE transactions on computers (01-02-2018)
    “…Evaluating the resistance of cryptosystems to side-channel attacks is an important research challenge. Profiled attacks reveal the degree of resilience of a…”
    Get full text
    Journal Article
  11. 11

    The bias–variance decomposition in profiled attacks by Lerman, Liran, Bontempi, Gianluca, Markowitch, Olivier

    Published in Journal of cryptographic engineering (01-11-2015)
    “…The profiled attacks challenge the security of cryptographic devices in the worst case scenario. We elucidate the reasons underlying the success of different…”
    Get full text
    Journal Article
  12. 12

    A Categorical Approach in Handling Event-Ordering in Distributed Systems by Sisiaridis, Dimitrios, Kuchta, Veronika, Markowitch, Olivier

    “…The issue of event-ordering in distributed systems is crucial an connected to threat management. In this paper, we investigate the use of modifications for…”
    Get full text
    Conference Proceeding
  13. 13

    A novel Network-on-Chip security algorithm for tolerating Byzantine faults by Ellinidou, Soultana, Sharma, Gaurav, Markowitch, Olivier, Gogniat, Guy, Dricot, Jean-Michel

    “…Since the number of processors and cores on a single chip is increasing, the interconnection among them becomes significant. Network-on-Chip (NoC) has direct…”
    Get full text
    Conference Proceeding
  14. 14

    An intensive survey of fair non-repudiation protocols by Kremer, Steve, Markowitch, Olivier, Zhou, Jianying

    Published in Computer communications (01-11-2002)
    “…With the phenomenal growth of the Internet and open networks in general, security services, such as non-repudiation, become crucial to many applications…”
    Get full text
    Journal Article
  15. 15

    SSPSoC: A Secure SDN-Based Protocol over MPSoC by Markowitch, Olivier, Vanspouwen, Tristan, Rigas, Théo, Sharma, Gaurav, Ellinidou, Soultana, Dricot, Jean-Michel

    Published in Security and communication networks (01-01-2019)
    “…In recent years, Multi-Processor System-on-Chips (MPSoCs) are widely deployed in safety-critical embedded systems. The Cloud-of-Chips (CoC) is a scalable MPSoC…”
    Get full text
    Journal Article
  16. 16

    SAT based analysis of LTE stream cipher ZUC by Lafitte, Frédéric, Markowitch, Olivier, Van Heule, Dirk

    “…Mobile security is of paramount importance. The security of LTE (long term evolution of radio networks), which is currently widely deployed as a long-term…”
    Get full text
    Journal Article
  17. 17

    A twofold group key agreement protocol for NoC‐based MPSoCs by Sharma, Gaurav, Kuchta, Veronika, Anand Sahu, Rajeev, Ellinidou, Soultana, Bala, Suman, Markowitch, Olivier, Dricot, Jean‐Michel

    “…A symmetric group key agreement protocol enables the group members to derive a shared session key for secure communication among them, whereas an asymmetric…”
    Get full text
    Journal Article
  18. 18

    Public-Key Encryption with Integrated Keyword Search by Saraswat, Vishal, Sahu, Rajeev Anand, Sharma, Gaurav, Kuchta, Veronika, Markowitch, Olivier

    Published in Journal of hardware and systems security (01-03-2019)
    “…Since the last decade, the public-key encryption with keyword search (PEKS) has been studied as a popular technique for searching data over encrypted files…”
    Get full text
    Journal Article
  19. 19

    Two Optimum Secret Sharing Schemes Revisited by Zhengjun Cao, Markowitch, O.

    “…In 2006, Obana et al proposed two optimum secret sharing schemes secure against cheating. They extend the secret s in the Shamir's scheme to an array of three…”
    Get full text
    Conference Proceeding
  20. 20

    Feature Extraction and Feature Selection: Reducing Data Complexity with Apache Spark by Sisiaridis, Dimitrios, Markowitch, Olivier

    Published 11-12-2017
    “…International Journal of Network Security & Its Applications (IJNSA), Vol.9, No.6, November 2017 Feature extraction and feature selection are the first tasks…”
    Get full text
    Journal Article