Combined VMD-GSO Based Points of Interest Selection Method for Profiled Side Channel Attacks

[1]  Sylvain Guilley,et al.  RSM: A small and fast countermeasure for AES, secure against 1st and 2nd-order zero-offset SCAs , 2012, 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[2]  Yongbin Zhou,et al.  How to Compare Selections of Points of Interest for Side-Channel Distinguishers in Practice? , 2014, ICICS.

[3]  Bart Preneel,et al.  Mutual Information Analysis , 2008, CHES.

[4]  Christophe Clavier,et al.  Correlation Power Analysis with a Leakage Model , 2004, CHES.

[5]  Tim Güneysu,et al.  Applications of machine learning techniques in side-channel attacks: a survey , 2019, Journal of Cryptographic Engineering.

[6]  Olivier Markowitch,et al.  A machine learning approach against a masked AES , 2014, Journal of Cryptographic Engineering.

[7]  Stefan Mangard,et al.  Power analysis attacks - revealing the secrets of smart cards , 2007 .

[8]  Kerstin Lemke-Rust,et al.  Efficient Template Attacks Based on Probabilistic Multi-class Support Vector Machines , 2012, CARDIS.

[9]  Axel Legay,et al.  On the Relevance of Feature Selection for Profiled Side-channel Attacks , 2017 .

[10]  Stephen P. Boyd,et al.  Distributed Optimization and Statistical Learning via the Alternating Direction Method of Multipliers , 2011, Found. Trends Mach. Learn..

[11]  Pankaj Rohatgi,et al.  Template Attacks , 2002, CHES.

[12]  Dominique Zosso,et al.  Variational Mode Decomposition , 2014, IEEE Transactions on Signal Processing.

[13]  Gérard Dreyfus,et al.  Ranking a Random Feature for Variable and Feature Selection , 2003, J. Mach. Learn. Res..

[14]  Elisabeth Oswald,et al.  Practical Template Attacks , 2004, WISA.

[15]  Christof Paar,et al.  Templates vs. Stochastic Methods , 2006, CHES.

[16]  N. Sivakumaran,et al.  Grey wolf optimization based parameter selection for support vector machines , 2016 .

[17]  Paul C. Kocher,et al.  Differential Power Analysis , 1999, CRYPTO.

[18]  Annelie Heuser,et al.  Intelligent Machine Homicide - Breaking Cryptographic Devices Using Support Vector Machines , 2012, COSADE.

[19]  Emmanuel Prouff,et al.  Behind the Scene of Side Channel Attacks , 2013, ASIACRYPT.

[20]  Moti Yung,et al.  A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version) , 2009, IACR Cryptol. ePrint Arch..