Combined VMD-GSO Based Points of Interest Selection Method for Profiled Side Channel Attacks
暂无分享,去创建一个
[1] Sylvain Guilley,et al. RSM: A small and fast countermeasure for AES, secure against 1st and 2nd-order zero-offset SCAs , 2012, 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[2] Yongbin Zhou,et al. How to Compare Selections of Points of Interest for Side-Channel Distinguishers in Practice? , 2014, ICICS.
[3] Bart Preneel,et al. Mutual Information Analysis , 2008, CHES.
[4] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.
[5] Tim Güneysu,et al. Applications of machine learning techniques in side-channel attacks: a survey , 2019, Journal of Cryptographic Engineering.
[6] Olivier Markowitch,et al. A machine learning approach against a masked AES , 2014, Journal of Cryptographic Engineering.
[7] Stefan Mangard,et al. Power analysis attacks - revealing the secrets of smart cards , 2007 .
[8] Kerstin Lemke-Rust,et al. Efficient Template Attacks Based on Probabilistic Multi-class Support Vector Machines , 2012, CARDIS.
[9] Axel Legay,et al. On the Relevance of Feature Selection for Profiled Side-channel Attacks , 2017 .
[10] Stephen P. Boyd,et al. Distributed Optimization and Statistical Learning via the Alternating Direction Method of Multipliers , 2011, Found. Trends Mach. Learn..
[11] Pankaj Rohatgi,et al. Template Attacks , 2002, CHES.
[12] Dominique Zosso,et al. Variational Mode Decomposition , 2014, IEEE Transactions on Signal Processing.
[13] Gérard Dreyfus,et al. Ranking a Random Feature for Variable and Feature Selection , 2003, J. Mach. Learn. Res..
[14] Elisabeth Oswald,et al. Practical Template Attacks , 2004, WISA.
[15] Christof Paar,et al. Templates vs. Stochastic Methods , 2006, CHES.
[16] N. Sivakumaran,et al. Grey wolf optimization based parameter selection for support vector machines , 2016 .
[17] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[18] Annelie Heuser,et al. Intelligent Machine Homicide - Breaking Cryptographic Devices Using Support Vector Machines , 2012, COSADE.
[19] Emmanuel Prouff,et al. Behind the Scene of Side Channel Attacks , 2013, ASIACRYPT.
[20] Moti Yung,et al. A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version) , 2009, IACR Cryptol. ePrint Arch..