Template attack versus Bayes classifier
暂无分享,去创建一个
[1] Axel Legay,et al. Climbing Down the Hierarchy: Hierarchical Classification for Machine Learning Side-Channel Attacks , 2017, AFRICACRYPT.
[2] Sylvain Guilley,et al. Side-channel analysis and machine learning: A practical perspective , 2017, 2017 International Joint Conference on Neural Networks (IJCNN).
[3] Emmanuel Prouff,et al. Breaking Cryptographic Implementations Using Deep Learning Techniques , 2016, SPACE.
[4] Sylvain Guilley,et al. Side-Channel Analysis of Lightweight Ciphers: Does Lightweight Equal Easy? , 2016, RFIDSec.
[5] Romain Poussier,et al. Template Attacks vs. Machine Learning Revisited (and the Curse of Dimensionality in Side-Channel Analysis) , 2015, COSADE.
[6] Olivier Markowitch,et al. Power analysis attack: an approach based on machine learning , 2014, Int. J. Appl. Cryptogr..
[7] Gianluca Bontempi,et al. A machine learning approach against a masked AES , 2013, Journal of Cryptographic Engineering.
[8] Markus G. Kuhn,et al. Efficient Template Attacks , 2013, CARDIS.
[9] Annelie Heuser,et al. Intelligent Machine Homicide - Breaking Cryptographic Devices Using Support Vector Machines , 2012, COSADE.
[10] Joos Vandewalle,et al. Machine learning in side-channel analysis: a first study , 2011, Journal of Cryptographic Engineering.
[11] Geoffrey I. Webb,et al. Learning by extrapolation from marginal to full-multivariate probability distributions: decreasingly naive Bayesian classification , 2011, Machine Learning.
[12] C. L. Philip Chen,et al. Adaptive least squares support vector machines filter for hand tremor canceling in microsurgery , 2011, Int. J. Mach. Learn. Cybern..
[13] Ian H. Witten,et al. The WEKA data mining software: an update , 2009, SKDD.
[14] Pankaj Rohatgi,et al. Template Attacks , 2002, CHES.
[15] Francis Olivier,et al. Electromagnetic Analysis: Concrete Results , 2001, CHES.
[16] Geoffrey I. Webb,et al. Lazy Learning of Bayesian Rules , 2000, Machine Learning.
[17] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[18] Nir Friedman,et al. Bayesian Network Classifiers , 1997, Machine Learning.
[19] David H. Wolpert,et al. The Lack of A Priori Distinctions Between Learning Algorithms , 1996, Neural Computation.
[20] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[21] D. Powers. Evaluation: From Precision, Recall and F-Factor to ROC, Informedness, Markedness & Correlation , 2008 .
[22] Geoffrey I. Webb,et al. Not So Naive Bayes: Aggregating One-Dependence Estimators , 2005, Machine Learning.
[23] Eamonn J. Keogh,et al. Learning augmented Bayesian classifiers: A comparison of distribution-based and classification-based approaches , 1999, AISTATS.
[24] Bojan Cestnik,et al. Estimating Probabilities: A Crucial Task in Machine Learning , 1990, ECAI.