Improving attacks on round-reduced speck32/64 using deep learning A Gohr Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019 | 226 | 2019 |
On Hom-algebras with surjective twisting A Gohr Journal of Algebra 324 (7), 1483-1491, 2010 | 120 | 2010 |
Unital algebras of Hom-associative type and surjective or injective twistings Y Frégier, A Gohr, S Silvestrov Journal of Generalized Lie Theory and Applications 3 (4), 285-295, 2009 | 62 | 2009 |
On Hom-type algebras Y Frégier, G Aron Journal of Generalized Lie Theory and Applications 4, 1-16, 2010 | 51 | 2010 |
On unitality conditions for Hom-associative algebras Y Fregier, A Gohr arXiv preprint arXiv:0904.4874, 2009 | 40 | 2009 |
An assessment of differential-neural distinguishers A Gohr, G Leander, P Neumann Cryptology ePrint Archive, 2022 | 24 | 2022 |
CHES 2018 side channel contest CTF-solution of the AES challenges A Gohr, S Jacob, W Schindler Cryptology ePrint Archive, 2019 | 21 | 2019 |
Subsampling and knowledge distillation on adversarial examples: New techniques for deep learning based side channel evaluations A Gohr, S Jacob, W Schindler Selected Areas in Cryptography: 27th International Conference, Halifax, NS …, 2021 | 11 | 2021 |
Breaking masked implementations of the clyde-cipher by means of side-channel analysis: A report on the ches challenge side-channel contest 2020 A Gohr, F Laus, W Schindler IACR Transactions on Cryptographic Hardware and Embedded Systems, 397-437, 2022 | 9 | 2022 |
Efficient Solutions of the CHES 2018 AES Challenge Using Deep Residual Neural Networks and Knowledge Distillation on Adversarial Examples. A Gohr, S Jacob, W Schindler IACR Cryptol. ePrint Arch. 2020, 165, 2020 | 9 | 2020 |
Machine learning and side channel analysis in a CTF competition Y Hu, Y Zheng, P Feng, L Liu, C Zhang, A Gohr, S Jacob, W Schindler, ... Cryptology ePrint Archive, 2019 | 4 | 2019 |
Improving Attacks on Speck32/64 using Deep Learning. A Gohr IACR Cryptol. ePrint Arch. 2019, 37, 2019 | 3 | 2019 |
Brute Force Cryptanalysis A Gohr Cryptology ePrint Archive, 2022 | 2 | 2022 |
Verräterischer Stromverbrauch: Eine kurze Einführung in alte und neue Angriffstechniken in der Seitenkanalanalyse A Gohr, D Klein, W Schindler Datenschutz und Datensicherheit-DuD 44 (7), 431-435, 2020 | 1 | 2020 |
DL-SITM: Deep Learning-Based See-in-the-Middle Attack on AES T Gerlich, J Breier, P Sikora, Z Martinásek, A Gohr, A Baksi, X Hou Cryptology ePrint Archive, 2024 | | 2024 |
Efficient Solutions of the CHES 2018 AES Challenge Using Deep Residual Neural Networks and Knowledge Distillation on Adversarial Examples February 12, 2020 A Gohr, S Jacob, W Schindler challenge 2, 2, 2020 | | 2020 |
A study of practical-time distinguishing attacks against round-reduced Threefish-256 A Gohr | | 2012 |
On noncommutative deformations, cohomology of color-commutative algebras and formal smoothness AS Gohr Unilu-University of Luxembourg, Luxembourg, Luxembourg, 2009 | | 2009 |
Breaking Masked Implementations of the Clyde-Cipher by Means of Side-Channel Analysis A Gohr, F Laus, W Schindler | | |