Multi-label Deep Learning based Side Channel Attack
暂无分享,去创建一个
Zongyue Wang | Junfeng Fan | Xinpeng Xing | Libang Zhang | Suying Wang | Junfeng Fan | Libang Zhang | Xinpeng Xing | Zongyue Wang | Suying Wang
[1] Benjamin Timon,et al. Non-Profiled Deep Learning-Based Side-Channel Attacks , 2019, IACR Cryptol. ePrint Arch..
[2] Cécile Canovas,et al. Study of Deep Learning Techniques for Side-Channel Analysis and Introduction to ASCAD Database , 2018, IACR Cryptol. ePrint Arch..
[3] Wim Lamotte,et al. Improving CEMA using Correlation Optimization , 2018, IACR Trans. Cryptogr. Hardw. Embed. Syst..
[4] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[5] Axel Legay,et al. On the Performance of Deep Learning for Side-channel Analysis , 2018, IACR Cryptol. ePrint Arch..
[6] J. Jaffe,et al. Side Channel Cryptanalysis Using Machine Learning Using an SVM to recover DES keys from a smart card . , 2012 .
[7] Leo Breiman,et al. Bagging Predictors , 1996, Machine Learning.
[8] Emmanuel Prouff,et al. Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures - Profiling Attacks Without Pre-processing , 2017, CHES.
[9] Guang Yang,et al. Convolutional Neural Network Based Side-Channel Attacks in Time-Frequency Representations , 2018, CARDIS.
[10] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[11] Francis Olivier,et al. Electromagnetic Analysis: Concrete Results , 2001, CHES.
[12] Zdenek Martinasek,et al. Innovative Method of the Power Analysis , 2013 .
[13] Tim Güneysu,et al. Deep Neural Network Attribution Methods for Leakage Analysis and Symmetric Key Recovery , 2019, IACR Cryptol. ePrint Arch..
[14] Yoav Freund,et al. A decision-theoretic generalization of on-line learning and an application to boosting , 1995, EuroCOLT.
[15] Moti Yung,et al. A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (extended version) , 2009, IACR Cryptol. ePrint Arch..
[16] Annelie Heuser,et al. The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations , 2018, IACR Cryptol. ePrint Arch..
[17] Emmanuel Prouff,et al. Breaking Cryptographic Implementations Using Deep Learning Techniques , 2016, SPACE.
[18] Jean-Jacques Quisquater,et al. ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards , 2001, E-smart.
[19] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.
[20] Adi Shamir,et al. Acoustic Cryptanalysis , 2017, Journal of Cryptology.
[21] Min-Ling Zhang,et al. A Review on Multi-Label Learning Algorithms , 2014, IEEE Transactions on Knowledge and Data Engineering.
[22] Rob Fergus,et al. Visualizing and Understanding Convolutional Networks , 2013, ECCV.
[23] Jean-Pierre Seifert,et al. Simple photonic emission analysis of AES , 2013, Journal of Cryptographic Engineering.
[24] Jean-Pierre Seifert,et al. Simple Photonic Emission Analysis of AES - Photonic Side Channel Analysis for the Rest of Us , 2012, CHES.
[25] Olivier Markowitch,et al. Side channel attack: an approach based on machine learning , 2011 .
[26] Alexander Binder,et al. On Pixel-Wise Explanations for Non-Linear Classifier Decisions by Layer-Wise Relevance Propagation , 2015, PloS one.
[27] Andrew Zisserman,et al. Deep Inside Convolutional Networks: Visualising Image Classification Models and Saliency Maps , 2013, ICLR.