Exploring Feature Selection Scenarios for Deep Learning-based Side-Channel Analysis
暂无分享,去创建一个
[1] François-Xavier Standaert,et al. Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages , 2008, CHES.
[2] Stjepan Picek,et al. I Choose You: Automated Hyperparameter Tuning for Deep Learning-based Side-channel Analysis , 2020, IACR Cryptol. ePrint Arch..
[3] Stefan Mangard,et al. Power analysis attacks - revealing the secrets of smart cards , 2007 .
[4] Cécile Canovas,et al. Gradient Visualization for General Characterization in Profiling Attacks , 2019, IACR Cryptol. ePrint Arch..
[5] Emmanuel Prouff,et al. Provably Secure Higher-Order Masking of AES , 2010, IACR Cryptol. ePrint Arch..
[6] Emmanuel Prouff,et al. Deep learning for side-channel analysis and introduction to ASCAD database , 2019, Journal of Cryptographic Engineering.
[7] Annelie Heuser,et al. The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations , 2018, IACR Cryptol. ePrint Arch..
[8] Pankaj Rohatgi,et al. Template Attacks , 2002, CHES.
[9] Dawu Gu,et al. Pay Attention to Raw Traces: A Deep Learning Architecture for End-to-End Profiling Attacks , 2021, IACR Trans. Cryptogr. Hardw. Embed. Syst..
[10] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.
[11] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[12] Stjepan Picek,et al. Strength in Numbers: Improving Generalization with Ensembles in Machine Learning-based Profiled Side-channel Analysis , 2020, IACR Trans. Cryptogr. Hardw. Embed. Syst..
[13] Alan Hanjalic,et al. Make Some Noise: Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis , 2019, IACR Cryptol. ePrint Arch..
[14] Benjamin Timon. Non-Profiled Deep Learning-based Side-Channel attacks with Sensitivity Analysis , 2019, IACR Transactions on Cryptographic Hardware and Embedded Systems.
[15] Bart Preneel,et al. Mutual Information Analysis , 2008, CHES.
[16] Emmanuel Prouff,et al. Breaking Cryptographic Implementations Using Deep Learning Techniques , 2016, SPACE.
[17] Bart Preneel,et al. Revisiting a Methodology for Efficient CNN Architectures in Profiling Attacks , 2020, IACR Trans. Cryptogr. Hardw. Embed. Syst..
[18] Stefan Mangard,et al. An AES Smart Card Implementation Resistant to Power Analysis Attacks , 2006, ACNS.
[19] Olivier Markowitch,et al. A machine learning approach against a masked AES , 2014, Journal of Cryptographic Engineering.
[20] Cécile Canovas,et al. Deep Learning Side-Channel Analysis on Large-Scale Traces - A Case Study on a Polymorphic AES , 2020, IACR Cryptol. ePrint Arch..
[21] Rémi Strullu,et al. Side Channel Analysis against the ANSSI's protected AES implementation on ARM , 2021, IACR Cryptol. ePrint Arch..
[22] Christof Paar,et al. A Stochastic Model for Differential Side Channel Cryptanalysis , 2005, CHES.
[23] Stjepan Picek,et al. Reinforcement Learning for Hyperparameter Tuning in Deep Learning-based Side-channel Analysis , 2021, IACR Cryptol. ePrint Arch..
[24] Lilian Bossuet,et al. Methodology for Efficient CNN Architectures in Profiling Attacks , 2019, IACR Cryptol. ePrint Arch..
[25] Pankaj Rohatgi,et al. Towards Sound Approaches to Counteract Power-Analysis Attacks , 1999, CRYPTO.
[26] Emmanuel Prouff,et al. Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures - Profiling Attacks Without Pre-processing , 2017, CHES.
[27] François-Xavier Standaert,et al. Give Me 5 Minutes: Attacking ASCAD with a Single Side-Channel Trace , 2021, IACR Cryptol. ePrint Arch..
[28] Dirmanto Jap,et al. Back to the Basics: Seamless Integration of Side-Channel Pre-Processing in Deep Neural Networks , 2021, IEEE Transactions on Information Forensics and Security.