Search Results - "Markowitch, Olivier"
-
1
A note on “new quantum key agreement protocols based on Bell states”
Published in Quantum information processing (01-02-2021)“…We remark that the quantum key agreement protocol (Yang et al. in Quantum Inf Process 18(10):322, 2019) is flawed. It is unnecessary for Bob to prepare his…”
Get full text
Journal Article -
2
Comment on "Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption With Verifiable Delegation in Cloud Computing"
Published in IEEE transactions on parallel and distributed systems (01-02-2021)“…The scheme [1] is flawed because: (1) its circuit access structure is confusingly described; (2) the cloud server cannot complete the related computations; (3)…”
Get full text
Journal Article -
3
Efficient Profiled Attacks on Masking Schemes
Published in IEEE transactions on information forensics and security (01-06-2019)“…Side-channel adversaries represent real-world threats against (certified and uncertified) cryptographic devices. Masking schemes represent prevailing…”
Get full text
Journal Article -
4
Reducing Data Complexity in Feature Extraction and Feature Selection for Big Data Security Analytics
Published in 2018 1st International Conference on Data Intelligence and Security (ICDIS) (01-04-2018)“…Feature extraction and feature selection are the first tasks in pre-processing of input logs in order to detect cybersecurity threats and attacks by utilizing…”
Get full text
Conference Proceeding -
5
Comment on "Efficient Secure Outsourcing of Large-Scale Sparse Linear Systems of Equations"
Published in IEEE transactions on big data (01-12-2021)“…The scheme [IEEE Trans. Big Data, 4 (1), 2018, 26-39] is flawed because the sparsity of coefficient matrix is neglected. In the discussed scenario, we find it…”
Get full text
Journal Article -
6
A machine learning approach against a masked AES: Reaching the limit of side-channel attacks with a learning model
Published in Journal of cryptographic engineering (01-06-2015)“…Side-channel attacks challenge the security of cryptographic devices. A widespread countermeasure against these attacks is the masking approach. Masking…”
Get full text
Journal Article -
7
Exploring the security landscape: NoC-based MPSoC to Cloud-of-Chips
Published in Microprocessors and microsystems (01-07-2021)“…In this paper, we present a detailed and systematic overview of communication security aspects of Multi-Processor Systems-on-Chip (MPSoC) and the emerging…”
Get full text
Journal Article -
8
Comment on "Highly Efficient Linear Regression Outsourcing to a Cloud"
Published in IEEE transactions on cloud computing (01-07-2019)“…We show that Chen et al.'s schemes [IEEE TCC, 2(4), 2014, 499-508] for outsourcing linear regression computation to the cloud are not unquestioned. In scheme…”
Get full text
Journal Article -
9
Template attacks versus machine learning revisited and the curse of dimensionality in side-channel analysis: extended version
Published in Journal of cryptographic engineering (01-11-2018)“…Template attacks and machine learning are two popular approaches to profiled side-channel analysis. In this paper, we aim to contribute to the understanding of…”
Get full text
Journal Article -
10
Start Simple and then Refine: Bias-Variance Decomposition as a Diagnosis Tool for Leakage Profiling
Published in IEEE transactions on computers (01-02-2018)“…Evaluating the resistance of cryptosystems to side-channel attacks is an important research challenge. Profiled attacks reveal the degree of resilience of a…”
Get full text
Journal Article -
11
The bias–variance decomposition in profiled attacks
Published in Journal of cryptographic engineering (01-11-2015)“…The profiled attacks challenge the security of cryptographic devices in the worst case scenario. We elucidate the reasons underlying the success of different…”
Get full text
Journal Article -
12
A Categorical Approach in Handling Event-Ordering in Distributed Systems
Published in 2016 IEEE 22nd International Conference on Parallel and Distributed Systems (ICPADS) (01-12-2016)“…The issue of event-ordering in distributed systems is crucial an connected to threat management. In this paper, we investigate the use of modifications for…”
Get full text
Conference Proceeding -
13
A novel Network-on-Chip security algorithm for tolerating Byzantine faults
Published in 2020 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT) (19-10-2020)“…Since the number of processors and cores on a single chip is increasing, the interconnection among them becomes significant. Network-on-Chip (NoC) has direct…”
Get full text
Conference Proceeding -
14
An intensive survey of fair non-repudiation protocols
Published in Computer communications (01-11-2002)“…With the phenomenal growth of the Internet and open networks in general, security services, such as non-repudiation, become crucial to many applications…”
Get full text
Journal Article -
15
SSPSoC: A Secure SDN-Based Protocol over MPSoC
Published in Security and communication networks (01-01-2019)“…In recent years, Multi-Processor System-on-Chips (MPSoCs) are widely deployed in safety-critical embedded systems. The Cloud-of-Chips (CoC) is a scalable MPSoC…”
Get full text
Journal Article -
16
SAT based analysis of LTE stream cipher ZUC
Published in Journal of information security and applications (01-06-2015)“…Mobile security is of paramount importance. The security of LTE (long term evolution of radio networks), which is currently widely deployed as a long-term…”
Get full text
Journal Article -
17
A twofold group key agreement protocol for NoC‐based MPSoCs
Published in Transactions on emerging telecommunications technologies (01-06-2019)“…A symmetric group key agreement protocol enables the group members to derive a shared session key for secure communication among them, whereas an asymmetric…”
Get full text
Journal Article -
18
Public-Key Encryption with Integrated Keyword Search
Published in Journal of hardware and systems security (01-03-2019)“…Since the last decade, the public-key encryption with keyword search (PEKS) has been studied as a popular technique for searching data over encrypted files…”
Get full text
Journal Article -
19
Two Optimum Secret Sharing Schemes Revisited
Published in 2008 International Seminar on Future Information Technology and Management Engineering (01-11-2008)“…In 2006, Obana et al proposed two optimum secret sharing schemes secure against cheating. They extend the secret s in the Shamir's scheme to an array of three…”
Get full text
Conference Proceeding -
20
Feature Extraction and Feature Selection: Reducing Data Complexity with Apache Spark
Published 11-12-2017“…International Journal of Network Security & Its Applications (IJNSA), Vol.9, No.6, November 2017 Feature extraction and feature selection are the first tasks…”
Get full text
Journal Article