Side-Channel Information Characterisation Based on Cascade-Forward Back-Propagation Neural Network
暂无分享,去创建一个
[1] Manfred Pinkal,et al. Acoustic Side-Channel Attacks on Printers , 2010, USENIX Security Symposium.
[2] Martin A. Riedmiller,et al. A direct adaptive method for faster backpropagation learning: the RPROP algorithm , 1993, IEEE International Conference on Neural Networks.
[3] Martin Fodslette Møller,et al. A scaled conjugate gradient algorithm for fast supervised learning , 1993, Neural Networks.
[4] Stefan Mangard,et al. Power analysis attacks - revealing the secrets of smart cards , 2007 .
[5] Ingrid Verbauwhede,et al. Differential power and electromagnetic attacks on a FPGA implementation of elliptic curve cryptosystems , 2007, Comput. Electr. Eng..
[6] B. Preneel,et al. Electromagnetic Analysis Attack on an FPGA Implementation of an Elliptic Curve Cryptosystem , 2005, EUROCON 2005 - The International Conference on "Computer as a Tool".
[7] Srinivas Devadas,et al. Modeling attacks on physical unclonable functions , 2010, CCS '10.
[8] Ingrid Verbauwhede,et al. Machine learning attacks on 65nm Arbiter PUFs: Accurate modeling poses strict bounds on usability , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[9] Sven Bauer,et al. Attacking Exponent Blinding in RSA without CRT , 2012, COSADE.
[10] G. Lewicki,et al. Approximation by Superpositions of a Sigmoidal Function , 2003 .
[11] Tibor Juhas. The use of elliptic curves in cryptography , 2007 .
[12] Giorgio Di Natale,et al. A New Scan Attack on RSA in Presence of Industrial Countermeasures , 2012, COSADE.
[13] Peter M. Williams,et al. Bayesian Regularization and Pruning Using a Laplace Prior , 1995, Neural Computation.
[14] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[15] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[16] Martin Fodslette Meiller. A Scaled Conjugate Gradient Algorithm for Fast Supervised Learning , 1993 .
[17] Lindsay I. Smith,et al. A tutorial on Principal Components Analysis , 2002 .
[18] Stefan Tillich,et al. Attacking State-of-the-Art Software Countermeasures-A Case Study for AES , 2008, CHES.
[19] Johan A. K. Suykens,et al. Least Squares Support Vector Machines , 2002 .
[20] Markus Dürmuth,et al. A Provably Secure and Efficient Countermeasure against Timing Attacks , 2009, 2009 22nd IEEE Computer Security Foundations Symposium.
[21] D. Marquardt. An Algorithm for Least-Squares Estimation of Nonlinear Parameters , 1963 .
[22] Kerstin Lemke-Rust,et al. Efficient Template Attacks Based on Probabilistic Multi-class Support Vector Machines , 2012, CARDIS.
[23] Annelie Heuser,et al. Intelligent Machine Homicide - Breaking Cryptographic Devices Using Support Vector Machines , 2012, COSADE.
[24] Roberto Battiti,et al. First- and Second-Order Methods for Learning: Between Steepest Descent and Newton's Method , 1992, Neural Computation.
[25] Manuela M. Veloso,et al. Multiagent learning using a variable learning rate , 2002, Artif. Intell..
[26] Simon Haykin,et al. Neural Networks and Learning Machines , 2010 .
[27] Martin T. Hagan,et al. Neural network design , 1995 .
[28] Kouichi Itoh,et al. Address-Bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA , 2002, CHES.
[29] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[30] Mark Beale,et al. Neural Network Toolbox™ User's Guide , 2015 .
[31] Alfred Menezes,et al. Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.
[32] John E. Dennis,et al. Numerical methods for unconstrained optimization and nonlinear equations , 1983, Prentice Hall series in computational mathematics.
[33] Yinan Kong,et al. Side channel information analysis based on machine learning , 2014, 2014 8th International Conference on Signal Processing and Communication Systems (ICSPCS).
[34] Joos Vandewalle,et al. Machine learning in side-channel analysis: a first study , 2011, Journal of Cryptographic Engineering.
[35] Vitaly Schetinin. An Evolving Cascade Neural Network Technique for Cleaning Sleep Electroencephalograms , 2005, ArXiv.
[36] Benedikt Heinz,et al. Localized Electromagnetic Analysis of Cryptographic Implementations , 2012, CT-RSA.
[37] M. J. D. Powell,et al. Restart procedures for the conjugate gradient method , 1977, Math. Program..