Effective Deep Learning-based Side-Channel Analyses Against ASCAD
暂无分享,去创建一个
[1] Zongyue Wang,et al. Multi-label Deep Learning based Side Channel Attack , 2019, 2019 Asian Hardware Oriented Security and Trust Symposium (AsianHOST).
[2] S. Hou,et al. Convolutional Neural Networks for Profiled Side-channel Analysis , 2019, Radioengineering.
[3] Romain Poussier,et al. Template attacks versus machine learning revisited and the curse of dimensionality in side-channel analysis: extended version , 2018, Journal of Cryptographic Engineering.
[4] S. Hou,et al. Wavelet Support Vector Machine Algorithm in Power Analysis Attacks , 2017 .
[5] Emmanuel Prouff,et al. Breaking Cryptographic Implementations Using Deep Learning Techniques , 2016, SPACE.
[6] Elisabeth Oswald,et al. Robust Profiling for DPA-Style Attacks , 2015, CHES.
[7] Olivier Markowitch,et al. Power analysis attack: an approach based on machine learning , 2014, Int. J. Appl. Cryptogr..
[8] Zdenek Martinasek,et al. Innovative Method of the Power Analysis , 2013 .
[9] Kerstin Lemke-Rust,et al. Efficient Template Attacks Based on Probabilistic Multi-class Support Vector Machines , 2012, CARDIS.
[10] Joos Vandewalle,et al. Machine learning in side-channel analysis: a first study , 2011, Journal of Cryptographic Engineering.
[11] Yoshua Bengio,et al. Deep Sparse Rectifier Neural Networks , 2011, AISTATS.
[12] Olivier Markowitch,et al. Side channel attack: an approach based on machine learning , 2011 .
[13] Qiang Yang,et al. A Survey on Transfer Learning , 2010, IEEE Transactions on Knowledge and Data Engineering.
[14] Moti Yung,et al. A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version) , 2009, IACR Cryptol. ePrint Arch..
[15] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[16] Lilian Bossuet,et al. Methodology for Efficient CNN Architectures in Profiling Attacks , 2019, IACR Cryptol. ePrint Arch..
[17] Cécile Canovas,et al. Study of Deep Learning Techniques for Side-Channel Analysis and Introduction to ASCAD Database , 2018, IACR Cryptol. ePrint Arch..
[18] Emmanuel Prouff,et al. Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures - Profiling Attacks Without Pre-processing , 2017, CHES.