Feed-Forward Back-Propagation Neural Networks in Side-Channel Information Characterization

The safety of cryptosystems, mainly based on algorithmic improvement, is still vulnerable to side-channel attacks (SCA) based on machine learning. Multi-class classification based on neural network...

[1]  Roberto Battiti,et al.  First- and Second-Order Methods for Learning: Between Steepest Descent and Newton's Method , 1992, Neural Computation.

[2]  P. Kalpana,et al.  Performance Analysis of Reversible Finite Field Arithmetic Architectures Over GF(p) and GF(2m) in Elliptic Curve Cryptography , 2015, J. Circuits Syst. Comput..

[3]  Martin Fodslette Møller,et al.  A scaled conjugate gradient algorithm for fast supervised learning , 1993, Neural Networks.

[4]  Ingrid Verbauwhede,et al.  Differential power and electromagnetic attacks on a FPGA implementation of elliptic curve cryptosystems , 2007, Comput. Electr. Eng..

[5]  Manuela M. Veloso,et al.  Multiagent learning using a variable learning rate , 2002, Artif. Intell..

[6]  Annelie Heuser,et al.  Intelligent Machine Homicide - Breaking Cryptographic Devices Using Support Vector Machines , 2012, COSADE.

[7]  Heng Tao Shen,et al.  Principal Component Analysis , 2009, Encyclopedia of Biometrics.

[8]  Emmanuel Prouff Constructive Side-Channel Analysis and Secure Design , 2014, Lecture Notes in Computer Science.

[9]  M. J. D. Powell,et al.  Restart procedures for the conjugate gradient method , 1977, Math. Program..

[10]  Shaahin Hessabi,et al.  A Fault Tolerant Parallelism Approach for Implementing High-Throughput Pipelined Advanced Encryption Standard , 2016, J. Circuits Syst. Comput..

[11]  Peter M. Williams,et al.  Bayesian Regularization and Pruning Using a Laplace Prior , 1995, Neural Computation.

[12]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[13]  George Cybenko,et al.  Approximation by superpositions of a sigmoidal function , 1992, Math. Control. Signals Syst..

[14]  Giorgio Di Natale,et al.  A New Scan Attack on RSA in Presence of Industrial Countermeasures , 2012, COSADE.

[15]  Seddik Bri,et al.  Hardware Implementation of AES Algorithm with Logic S-box , 2017, J. Circuits Syst. Comput..

[16]  D. Marquardt An Algorithm for Least-Squares Estimation of Nonlinear Parameters , 1963 .

[17]  Magdy A. Bayoumi,et al.  Redundant Bit Security in RFIDs: Architecture Design and Security Performance Evaluation , 2017, J. Circuits Syst. Comput..