Feed-Forward Back-Propagation Neural Networks in Side-Channel Information Characterization
暂无分享,去创建一个
[1] Roberto Battiti,et al. First- and Second-Order Methods for Learning: Between Steepest Descent and Newton's Method , 1992, Neural Computation.
[2] P. Kalpana,et al. Performance Analysis of Reversible Finite Field Arithmetic Architectures Over GF(p) and GF(2m) in Elliptic Curve Cryptography , 2015, J. Circuits Syst. Comput..
[3] Martin Fodslette Møller,et al. A scaled conjugate gradient algorithm for fast supervised learning , 1993, Neural Networks.
[4] Ingrid Verbauwhede,et al. Differential power and electromagnetic attacks on a FPGA implementation of elliptic curve cryptosystems , 2007, Comput. Electr. Eng..
[5] Manuela M. Veloso,et al. Multiagent learning using a variable learning rate , 2002, Artif. Intell..
[6] Annelie Heuser,et al. Intelligent Machine Homicide - Breaking Cryptographic Devices Using Support Vector Machines , 2012, COSADE.
[7] Heng Tao Shen,et al. Principal Component Analysis , 2009, Encyclopedia of Biometrics.
[8] Emmanuel Prouff. Constructive Side-Channel Analysis and Secure Design , 2014, Lecture Notes in Computer Science.
[9] M. J. D. Powell,et al. Restart procedures for the conjugate gradient method , 1977, Math. Program..
[10] Shaahin Hessabi,et al. A Fault Tolerant Parallelism Approach for Implementing High-Throughput Pipelined Advanced Encryption Standard , 2016, J. Circuits Syst. Comput..
[11] Peter M. Williams,et al. Bayesian Regularization and Pruning Using a Laplace Prior , 1995, Neural Computation.
[12] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[13] George Cybenko,et al. Approximation by superpositions of a sigmoidal function , 1992, Math. Control. Signals Syst..
[14] Giorgio Di Natale,et al. A New Scan Attack on RSA in Presence of Industrial Countermeasures , 2012, COSADE.
[15] Seddik Bri,et al. Hardware Implementation of AES Algorithm with Logic S-box , 2017, J. Circuits Syst. Comput..
[16] D. Marquardt. An Algorithm for Least-Squares Estimation of Nonlinear Parameters , 1963 .
[17] Magdy A. Bayoumi,et al. Redundant Bit Security in RFIDs: Architecture Design and Security Performance Evaluation , 2017, J. Circuits Syst. Comput..