MO-DLSCA: Deep Learning Based Non-profiled Side Channel Analysis Using Multi-output Neural Networks
暂无分享,去创建一个
[1] Thien Huynh-The,et al. MoDANet: Multi-Task Deep Network for Joint Automatic Modulation Classification and Direction of Arrival Estimation , 2022, IEEE Communications Letters.
[2] Takeshi Fujino,et al. Practical Aspects on Non-profiled Deep-learning Side-channel Attacks against AES Software Implementation with Two Types of Masking Countermeasures including RSM , 2021, ASHES@CCS.
[3] Shivam Bhasin,et al. On Use of Deep Learning for Side Channel Evaluation of Black Box Hardware AES Engine , 2021 .
[4] Sebastián Ventura,et al. Performing Multi-Target Regression via a Parameter Sharing-Based Deep Network , 2019, Int. J. Neural Syst..
[5] Olivier Markowitch,et al. Efficient Profiled Attacks on Masking Schemes , 2019, IEEE Transactions on Information Forensics and Security.
[6] Benjamin Timon,et al. Non-Profiled Deep Learning-Based Side-Channel Attacks , 2019, IACR Cryptol. ePrint Arch..
[7] Ivor W. Tsang,et al. Survey on Multi-Output Learning , 2019, IEEE Transactions on Neural Networks and Learning Systems.
[8] Annelie Heuser,et al. The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations , 2018, IACR Cryptol. ePrint Arch..
[9] Emmanuel Prouff,et al. Breaking Cryptographic Implementations Using Deep Learning Techniques , 2016, SPACE.
[10] Concha Bielza,et al. A survey on multi‐output regression , 2015, WIREs Data Mining Knowl. Discov..
[11] Jian Sun,et al. Delving Deep into Rectifiers: Surpassing Human-Level Performance on ImageNet Classification , 2015, 2015 IEEE International Conference on Computer Vision (ICCV).
[12] François-Xavier Standaert,et al. Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note , 2012, ASIACRYPT.
[13] Yoshua Bengio,et al. Understanding the difficulty of training deep feedforward neural networks , 2010, AISTATS.
[14] Jean-Sébastien Coron,et al. An Efficient Method for Random Delay Generation in Embedded Software , 2009, CHES.
[15] Houssem Maghrebi,et al. Deep Learning based Side Channel Attacks in Practice , 2019, IACR Cryptol. ePrint Arch..
[16] Cécile Canovas,et al. Study of Deep Learning Techniques for Side-Channel Analysis and Introduction to ASCAD Database , 2018, IACR Cryptol. ePrint Arch..