default search action
Guilherme Perin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Lichao Wu, Sébastien Tiran, Guilherme Perin, Stjepan Picek:
Plaintext-based Side-channel Collision Attack. IACR Commun. Cryptol. 1(3): 20 (2024) - [j17]Lichao Wu, Azade Rezaeezade, Amir Alipour, Guilherme Perin, Stjepan Picek:
Leakage Model-flexible Deep Learning-based Side-channel Analysis. IACR Commun. Cryptol. 1(3): 41 (2024) - [j16]Marina Krcek, Guilherme Perin:
Autoencoder-enabled model portability for reducing hyperparameter tuning efforts in side-channel analysis. J. Cryptogr. Eng. 14(3): 475-497 (2024) - [j15]Huimin Li, Guilherme Perin:
A systematic study of data augmentation for protected AES implementations. J. Cryptogr. Eng. 14(4): 649-666 (2024) - [j14]Lichao Wu, Yoo-Seung Won, Dirmanto Jap, Guilherme Perin, Shivam Bhasin, Stjepan Picek:
Ablation Analysis for Multi-Device Deep Learning-Based Physical Side-Channel Analysis. IEEE Trans. Dependable Secur. Comput. 21(3): 1331-1341 (2024) - [j13]Lichao Wu, Guilherme Perin, Stjepan Picek:
I Choose You: Automated Hyperparameter Tuning for Deep Learning-Based Side-Channel Analysis. IEEE Trans. Emerg. Top. Comput. 12(2): 546-557 (2024) - [c25]Azade Rezaeezade, Abraham Basurto-Becerra, Léo Weissbart, Guilherme Perin:
One for All, All for Ascon: Ensemble-Based Deep Learning Side-Channel Analysis. ACNS Workshops (1) 2024: 139-157 - [c24]Ioana Savu, Marina Krcek, Guilherme Perin, Lichao Wu, Stjepan Picek:
The Need for MORE: Unsupervised Side-Channel Analysis with Single Network Training and Multi-output Regression. COSADE 2024: 113-132 - [i39]Sengim Karayalcin, Guilherme Perin, Stjepan Picek:
Diffuse Some Noise: Diffusion Models for Measurement Noise Removal in Side-channel Analysis. IACR Cryptol. ePrint Arch. 2024: 966 (2024) - 2023
- [j12]Guilherme Perin, Lichao Wu, Stjepan Picek:
The Need for Speed: A Fast Guessing Entropy Calculation for Deep Learning-Based SCA. Algorithms 16(3): 127 (2023) - [j11]Stjepan Picek, Guilherme Perin, Luca Mariot, Lichao Wu, Lejla Batina:
SoK: Deep Learning-based Physical Side-channel Analysis. ACM Comput. Surv. 55(11): 227:1-227:35 (2023) - [j10]Maikel Kerkhof, Lichao Wu, Guilherme Perin, Stjepan Picek:
No (good) loss no gain: systematic evaluation of loss functions in deep learning-based side-channel analysis. J. Cryptogr. Eng. 13(3): 311-324 (2023) - [j9]Lichao Wu, Léo Weissbart, Marina Krcek, Huimin Li, Guilherme Perin, Lejla Batina, Stjepan Picek:
Label Correlation in Deep Learning-Based Side-Channel Analysis. IEEE Trans. Inf. Forensics Secur. 18: 3849-3861 (2023) - [c23]Xiaoyun Xu, Guilherme Perin, Stjepan Picek:
IB-RAR: Information Bottleneck as Regularizer for Adversarial Robustness. DSN-W 2023: 129-135 - [c22]Lichao Wu, Guilherme Perin, Stjepan Picek:
Not so Difficult in the End: Breaking the Lookup Table-Based Affine Masking Scheme. SAC 2023: 82-96 - [i38]Xiaoyun Xu, Guilherme Perin, Stjepan Picek:
IB-RAR: Information Bottleneck as Regularizer for Adversarial Robustness. CoRR abs/2302.10896 (2023) - [i37]Marina Krcek, Guilherme Perin:
Autoencoder-enabled Model Portability for Reducing Hyperparameter Tuning Efforts in Side-channel Analysis. IACR Cryptol. ePrint Arch. 2023: 19 (2023) - [i36]Lichao Wu, Guilherme Perin, Stjepan Picek:
Hiding in Plain Sight: Non-profiling Deep Learning-based Side-channel Analysis with Plaintext/Ciphertext. IACR Cryptol. ePrint Arch. 2023: 209 (2023) - [i35]Lichao Wu, Guilherme Perin, Stjepan Picek:
Not so Difficult in the End: Breaking the ASCADv2 Dataset. IACR Cryptol. ePrint Arch. 2023: 724 (2023) - [i34]Marina Krcek, Lichao Wu, Guilherme Perin, Stjepan Picek:
Shift-invariance Robustness of Convolutional Neural Networks in Side-channel Analysis. IACR Cryptol. ePrint Arch. 2023: 1100 (2023) - [i33]Sengim Karayalcin, Marina Krcek, Lichao Wu, Stjepan Picek, Guilherme Perin:
It's a Kind of Magic: A Novel Conditional GAN Framework for Efficient Profiling Side-channel Analysis. IACR Cryptol. ePrint Arch. 2023: 1108 (2023) - [i32]Lichao Wu, Sébastien Tiran, Guilherme Perin, Stjepan Picek:
An End-to-end Plaintext-based Side-channel Collision Attack without Trace Segmentation. IACR Cryptol. ePrint Arch. 2023: 1109 (2023) - [i31]Lichao Wu, Amir Ali-pour, Azade Rezaeezade, Guilherme Perin, Stjepan Picek:
Breaking Free: Leakage Model-free Deep Learning-based Side-channel Analysis. IACR Cryptol. ePrint Arch. 2023: 1110 (2023) - [i30]Huimin Li, Guilherme Perin:
A Systematic Study of Data Augmentation for Protected AES Implementations. IACR Cryptol. ePrint Arch. 2023: 1179 (2023) - [i29]Ioana Savu, Marina Krcek, Guilherme Perin, Lichao Wu, Stjepan Picek:
The Need for MORE: Unsupervised Side-channel Analysis with Single Network Training and Multi-output Regression. IACR Cryptol. ePrint Arch. 2023: 1681 (2023) - [i28]Azade Rezaeezade, Abraham Basurto-Becerra, Léo Weissbart, Guilherme Perin:
One for All, All for Ascon: Ensemble-based Deep Learning Side-channel Analysis. IACR Cryptol. ePrint Arch. 2023: 1922 (2023) - 2022
- [j8]Lichao Wu, Guilherme Perin, Stjepan Picek:
The Best of Two Worlds: Deep Learning-assisted Template Attack. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(3): 413-437 (2022) - [j7]Guilherme Perin, Lichao Wu, Stjepan Picek:
Exploring Feature Selection Scenarios for Deep Learning-based Side-channel Analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(4): 828-861 (2022) - [c21]Sudharshan Swaminathan, Lukasz Chmielewski, Guilherme Perin, Stjepan Picek:
Deep Learning-Based Side-Channel Analysis Against AES Inner Rounds. ACNS Workshops 2022: 165-182 - [c20]Azade Rezaeezade, Guilherme Perin, Stjepan Picek:
To Overfit, or Not to Overfit: Improving the Performance of Deep Learning-Based SCA. AFRICACRYPT 2022: 397-421 - [c19]Maikel Kerkhof, Lichao Wu, Guilherme Perin, Stjepan Picek:
Focus is Key to Success: A Focal Loss Function for Deep Learning-Based Side-Channel Analysis. COSADE 2022: 29-48 - [c18]Lichao Wu, Guilherme Perin, Stjepan Picek:
On the Evaluation of Deep Learning-Based Side-Channel Analysis. COSADE 2022: 49-71 - [c17]Rodrigo Lellis, Rafael Soares, Guilherme Perin:
Pruning-based Neural Network Reduction for Faster Profiling Side-Channel Attacks. ICECS 2022 2022: 1-4 - [p1]Marina Krcek, Huimin Li, Servio Paguada, Unai Rioja, Lichao Wu, Guilherme Perin, Lukasz Chmielewski:
Deep Learning on Side-Channel Analysis. Security and Artificial Intelligence 2022: 48-71 - [i27]Azade Rezaeezade, Guilherme Perin, Stjepan Picek:
To Overfit, Or Not to Overfit: Improving the Performance of Deep Learning-based SCA. IACR Cryptol. ePrint Arch. 2022: 340 (2022) - [i26]Guilherme Perin, Lichao Wu, Stjepan Picek:
I Know What Your Layers Did: Layer-wise Explainability of Deep Learning Side-channel Analysis. IACR Cryptol. ePrint Arch. 2022: 1087 (2022) - [i25]Lichao Wu, Leo Weissbart, Marina Krcek, Huimin Li, Guilherme Perin, Lejla Batina, Stjepan Picek:
AGE Is Not Just a Number: Label Distribution in Deep Learning-based Side-channel Analysis. IACR Cryptol. ePrint Arch. 2022: 1507 (2022) - 2021
- [j6]Guilherme Perin, Lukasz Chmielewski, Lejla Batina, Stjepan Picek:
Keep it Unsupervised: Horizontal Attacks Meet Deep Learning. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(1): 343-372 (2021) - [j5]Jorai Rijsdijk, Lichao Wu, Guilherme Perin, Stjepan Picek:
Reinforcement Learning for Hyperparameter Tuning in Deep Learning-based Side-channel Analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(3): 677-707 (2021) - [c16]Lichao Wu, Guilherme Perin:
On the Importance of Pooling Layer Tuning for Profiling Side-Channel Analysis. ACNS Workshops 2021: 114-132 - [c15]Stjepan Picek, Annelie Heuser, Guilherme Perin, Sylvain Guilley:
Profiled Side-Channel Analysis in the Efficient Attacker Framework. CARDIS 2021: 44-63 - [c14]Vipul Arora, Ileana Buhan, Guilherme Perin, Stjepan Picek:
A Tale of Two Boards: On the Influence of Microarchitecture on Side-Channel Leakage. CARDIS 2021: 80-96 - [c13]Guilherme Perin, Ileana Buhan, Stjepan Picek:
Learning When to Stop: A Mutual Information Approach to Prevent Overfitting in Profiled Side-Channel Analysis. COSADE 2021: 53-81 - [c12]Jorai Rijsdijk, Lichao Wu, Guilherme Perin:
Reinforcement Learning-Based Design of Side-Channel Countermeasures. SPACE 2021: 168-187 - [i24]Jorai Rijsdijk, Lichao Wu, Guilherme Perin, Stjepan Picek:
Reinforcement Learning for Hyperparameter Tuning in Deep Learning-based Side-channel Analysis. IACR Cryptol. ePrint Arch. 2021: 71 (2021) - [i23]Guilherme Perin, Lichao Wu, Stjepan Picek:
Gambling for Success: The Lottery Ticket Hypothesis in Deep Learning-based SCA. IACR Cryptol. ePrint Arch. 2021: 197 (2021) - [i22]Guilherme Perin, Lichao Wu, Stjepan Picek:
AISY - Deep Learning-based Framework for Side-channel Analysis. IACR Cryptol. ePrint Arch. 2021: 357 (2021) - [i21]Lichao Wu, Guilherme Perin:
On the Importance of Pooling Layer Tuning for Profiling Side-channel Analysis. IACR Cryptol. ePrint Arch. 2021: 525 (2021) - [i20]Jorai Rijsdijk, Lichao Wu, Guilherme Perin, Stjepan Picek:
Reinforcement Learning-based Design of Side-channel Countermeasures. IACR Cryptol. ePrint Arch. 2021: 526 (2021) - [i19]Lichao Wu, Yoo-Seung Won, Dirmanto Jap, Guilherme Perin, Shivam Bhasin, Stjepan Picek:
Explain Some Noise: Ablation Analysis for Deep Learning-based Physical Side-channel Analysis. IACR Cryptol. ePrint Arch. 2021: 717 (2021) - [i18]Vipul Arora, Ileana Buhan, Guilherme Perin, Stjepan Picek:
A Tale of Two Boards: On the Influence of Microarchitecture on Side-Channel Leakage. IACR Cryptol. ePrint Arch. 2021: 905 (2021) - [i17]Lichao Wu, Guilherme Perin, Stjepan Picek:
On the Evaluation of Deep Learning-based Side-channel Analysis. IACR Cryptol. ePrint Arch. 2021: 952 (2021) - [i16]Lichao Wu, Guilherme Perin, Stjepan Picek:
The Best of Two Worlds: Deep Learning-assisted Template Attack. IACR Cryptol. ePrint Arch. 2021: 959 (2021) - [i15]Sudharshan Swaminathan, Lukasz Chmielewski, Guilherme Perin, Stjepan Picek:
Deep Learning-based Side-channel Analysis against AES Inner Rounds. IACR Cryptol. ePrint Arch. 2021: 981 (2021) - [i14]Maikel Kerkhof, Lichao Wu, Guilherme Perin, Stjepan Picek:
No (Good) Loss no Gain: Systematic Evaluation of Loss functions in Deep Learning-based Side-channel Analysis. IACR Cryptol. ePrint Arch. 2021: 1091 (2021) - [i13]Stjepan Picek, Guilherme Perin, Luca Mariot, Lichao Wu, Lejla Batina:
SoK: Deep Learning-based Physical Side-channel Analysis. IACR Cryptol. ePrint Arch. 2021: 1092 (2021) - [i12]Maikel Kerkhof, Lichao Wu, Guilherme Perin, Stjepan Picek:
Focus is Key to Success: A Focal Loss Function for Deep Learning-based Side-channel Analysis. IACR Cryptol. ePrint Arch. 2021: 1408 (2021) - [i11]Guilherme Perin, Lichao Wu, Stjepan Picek:
Exploring Feature Selection Scenarios for Deep Learning-based Side-Channel Analysis. IACR Cryptol. ePrint Arch. 2021: 1414 (2021) - [i10]Guilherme Perin, Lichao Wu, Stjepan Picek:
The Need for Speed: A Fast Guessing Entropy Calculation for Deep Learning-based SCA. IACR Cryptol. ePrint Arch. 2021: 1592 (2021) - 2020
- [j4]Guilherme Perin, Lukasz Chmielewski, Stjepan Picek:
Strength in Numbers: Improving Generalization with Ensembles in Machine Learning-based Profiled Side-channel Analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(4): 337-364 (2020) - [c11]Huimin Li, Marina Krcek, Guilherme Perin:
A Comparison of Weight Initializers in Deep Learning-Based Side-Channel Analysis. ACNS Workshops 2020: 126-143 - [c10]Guilherme Perin, Stjepan Picek:
On the Influence of Optimizers in Deep Learning-Based Side-Channel Analysis. SAC 2020: 615-636 - [i9]Guilherme Perin, Ileana Buhan, Stjepan Picek:
Learning when to stop: a mutual information approach to fight overfitting in profiled side-channel analysis. IACR Cryptol. ePrint Arch. 2020: 58 (2020) - [i8]Guilherme Perin, Lukasz Chmielewski, Lejla Batina, Stjepan Picek:
Keep it Unsupervised: Horizontal Attacks Meet Deep Learning. IACR Cryptol. ePrint Arch. 2020: 891 (2020) - [i7]Lichao Wu, Leo Weissbart, Marina Krcek, Huimin Li, Guilherme Perin, Lejla Batina, Stjepan Picek:
Everything is Connected: From Model Learnability to Guessing Entropy. IACR Cryptol. ePrint Arch. 2020: 899 (2020) - [i6]Huimin Li, Marina Krcek, Guilherme Perin:
A Comparison of Weight Initializers in Deep Learning-based Side-channel Analysis. IACR Cryptol. ePrint Arch. 2020: 904 (2020) - [i5]Guilherme Perin, Stjepan Picek:
On the Influence of Optimizers in Deep Learning-based Side-channel Analysis. IACR Cryptol. ePrint Arch. 2020: 977 (2020) - [i4]Lichao Wu, Guilherme Perin, Stjepan Picek:
I Choose You: Automated Hyperparameter Tuning for Deep Learning-based Side-channel Analysis. IACR Cryptol. ePrint Arch. 2020: 1293 (2020)
2010 – 2019
- 2019
- [c9]Christos Andrikos, Lejla Batina, Lukasz Chmielewski, Liran Lerman, Vasilios Mavroudis, Kostas Papagiannopoulos, Guilherme Perin, Giorgos Rassias, Alberto Sonnino:
Location, Location, Location: Revisiting Modeling and Exploitation for Location-Based Side Channel Leakages. ASIACRYPT (3) 2019: 285-314 - [i3]Christos Andrikos, Lejla Batina, Lukasz Chmielewski, Liran Lerman, Vasilios Mavroudis, Kostas Papagiannopoulos, Guilherme Perin, Giorgos Rassias, Alberto Sonnino:
Location, location, location: Revisiting modeling and exploitation for location-based side channel leakages. IACR Cryptol. ePrint Arch. 2019: 230 (2019) - [i2]Guilherme Perin, Baris Ege, Lukasz Chmielewski:
Neural Network Model Assessment for Side-Channel Analysis. IACR Cryptol. ePrint Arch. 2019: 722 (2019) - [i1]Guilherme Perin:
Deep Learning Model Generalization in Side-Channel Analysis. IACR Cryptol. ePrint Arch. 2019: 978 (2019) - 2015
- [j3]Guilherme Perin, Laurent Imbert, Philippe Maurine, Lionel Torres:
Vertical and horizontal correlation attacks on RNS-based exponentiations. J. Cryptogr. Eng. 5(3): 171-185 (2015) - [c8]Christophe Nègre, Guilherme Perin:
Trade-Off Approaches for Leak Resistant Modular Arithmetic in RNS. ACISP 2015: 107-124 - [c7]Guilherme Perin, Lukasz Chmielewski:
A Semi-Parametric Approach for Side-Channel Attacks on Protected RSA Implementations. CARDIS 2015: 34-53 - 2014
- [c6]Guilherme Perin, Laurent Imbert, Lionel Torres, Philippe Maurine:
Attacking Randomized Exponentiations Using Unsupervised Learning. COSADE 2014: 144-160 - 2013
- [j2]Guilherme Perin, Alice J. Kozakevicius:
Filtragem Wavelet de Sinais Cardíacos através de Algoritmos Adaptativos. RITA 20(3): 95-111 (2013) - [c5]Guilherme Perin, Laurent Imbert, Lionel Torres, Philippe Maurine:
Practical Analysis of RSA Countermeasures Against Side-Channel Electromagnetic Attacks. CARDIS 2013: 200-215 - [c4]Guilherme Perin, Laurent Imbert, Lionel Torres, Philippe Maurine:
Electromagnetic Analysis on RSA Algorithm Based on RNS. DSD 2013: 345-352 - 2012
- [c3]Guilherme Perin, Lionel Torres, Pascal Benoit, Philippe Maurine:
Amplitude demodulation-based EM analysis of different RSA implementations. DATE 2012: 1167-1172 - 2011
- [j1]Guilherme Perin, Daniel Gomes Mesquita, João Baptista dos Santos Martins:
Montgomery Modular Multiplication on Reconfigurable Hardware: Systolic versus Multiplexed Implementation. Int. J. Reconfigurable Comput. 2011: 127147:1-127147:10 (2011) - 2010
- [c2]Daniel Gomes Mesquita, Guilherme Perin, Fernando Luís Herrmann, João Baptista dos Santos Martins:
An efficient implementation of montgomery powering ladder in reconfigurable hardware. SBCCI 2010: 121-126
2000 – 2009
- 2009
- [c1]Fernando Luís Herrmann, Guilherme Perin, Josue Paulo Jose de Freitas, Rafael Bertagnolli, João Baptista dos Santos Martins:
A Gigabit UDP/IP network stack in FPGA. ICECS 2009: 836-839
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint