Cross-Subkey Deep-Learning Side-Channel Analysis
暂无分享,去创建一个
[1] Jia Wu,et al. Automatic Measurement of Fetal Cavum Septum Pellucidum From Ultrasound Images Using Deep Attention Network , 2020, 2020 IEEE International Conference on Image Processing (ICIP).
[2] Cécile Canovas,et al. A Comprehensive Study of Deep Learning for Side-Channel Analysis , 2019, IACR Cryptol. ePrint Arch..
[3] Elena Dubrova,et al. Tandem Deep Learning Side-Channel Attack Against FPGA Implementation of AES , 2020, 2020 IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS).
[4] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[5] Alan Hanjalic,et al. Make Some Noise: Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis , 2019, IACR Cryptol. ePrint Arch..
[6] Zhizhang Chen,et al. ChipWhisperer: An Open-Source Platform for Hardware Embedded Security Research , 2014, COSADE.
[7] Guigang Zhang,et al. Deep Learning , 2016, Int. J. Semantic Comput..
[8] Kota Yoshida,et al. Deep Learning Side-Channel Attack Against Hardware Implementations of AES , 2019, 2019 22nd Euromicro Conference on Digital System Design (DSD).
[9] Vincent Rijmen,et al. The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .
[10] Stefan Mangard,et al. Power analysis attacks - revealing the secrets of smart cards , 2007 .
[11] Elena Dubrova,et al. How Diversity Affects Deep-Learning Side-Channel Attacks , 2019, 2019 IEEE Nordic Circuits and Systems Conference (NORCAS): NORCHIP and International Symposium of System-on-Chip (SoC).
[12] Zongyue Wang,et al. Multilabel Deep Learning-Based Side-Channel Attack , 2021, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[13] Shreyas Sen,et al. X-DeepSCA: Cross-Device Deep Learning Side Channel Attack* , 2019, 2019 56th ACM/IEEE Design Automation Conference (DAC).
[14] Elena Dubrova,et al. Multi-Source Training Deep-Learning Side-Channel Attacks , 2020, 2020 IEEE 50th International Symposium on Multiple-Valued Logic (ISMVL).
[15] Taghi M. Khoshgoftaar,et al. A survey on Image Data Augmentation for Deep Learning , 2019, Journal of Big Data.
[16] Shreyas Sen,et al. Practical Approaches Toward Deep-Learning-Based Cross-Device Power Side-Channel Attack , 2019, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[17] François Durvaux,et al. From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces , 2016, EUROCRYPT.
[18] Guillermo Sapiro,et al. Image Enhancement and Restoration , 2014, Computer Vision, A Reference Guide.
[19] Leo Breiman,et al. Bagging Predictors , 1996, Machine Learning.
[20] Cécile Canovas,et al. Study of Deep Learning Techniques for Side-Channel Analysis and Introduction to ASCAD Database , 2018, IACR Cryptol. ePrint Arch..