Give Me 5 Minutes: Attacking ASCAD with a Single Side-Channel Trace
暂无分享,去创建一个
François-Xavier Standaert | Gaëtan Cassiers | Olivier Bronchain | François-Xavier Standaert | Gaëtan Cassiers | Olivier Bronchain
[1] A. Adam Ding,et al. A Fast and Accurate Guessing Entropy Estimation Algorithm for Full-key Recovery , 2020, IACR Trans. Cryptogr. Hardw. Embed. Syst..
[2] Éliane Jaulmes,et al. A Systematic Appraisal of Side Channel Evaluation Strategies , 2020, SSR.
[3] Dawu Gu,et al. Pay Attention to Raw Traces: A Deep Learning Architecture for End-to-End Profiling Attacks , 2021, IACR Trans. Cryptogr. Hardw. Embed. Syst..
[4] François-Xavier Standaert,et al. Side-Channel Countermeasures' Dissection and the Limits of Closed Source Security Evaluations , 2019, IACR Cryptol. ePrint Arch..
[5] François-Xavier Standaert,et al. Breaking Masked Implementations with Many Shares on 32-bit Software Platforms or When the Security Order Does Not Matter , 2021, IACR Trans. Cryptogr. Hardw. Embed. Syst..
[6] Nenghai Yu,et al. A Novel Evaluation Metric for Deep Learning-Based Side Channel Analysis and Its Extended Application to Imbalanced Data , 2020, IACR Trans. Cryptogr. Hardw. Embed. Syst..
[7] Stjepan Picek,et al. Strength in Numbers: Improving Generalization with Ensembles in Machine Learning-based Profiled Side-channel Analysis , 2020, IACR Trans. Cryptogr. Hardw. Embed. Syst..
[8] Stefan Mangard,et al. Hardware Countermeasures against DPA ? A Statistical Analysis of Their Effectiveness , 2004, CT-RSA.
[9] Emmanuel Prouff,et al. Deep learning for side-channel analysis and introduction to ASCAD database , 2019, Journal of Cryptographic Engineering.
[10] Máire O'Neill,et al. Plaintext: A Missing Feature for Enhancing the Power of Deep Learning in Side-Channel Analysis? Breaking multiple layers of side-channel countermeasures , 2020, IACR Trans. Cryptogr. Hardw. Embed. Syst..
[11] Stjepan Picek,et al. Remove Some Noise: On Pre-processing of Side-channel Measurements with Autoencoders , 2020, IACR Cryptol. ePrint Arch..
[12] Lilian Bossuet,et al. Methodology for Efficient CNN Architectures in Profiling Attacks , 2019, IACR Cryptol. ePrint Arch..
[13] Cécile Canovas,et al. A Comprehensive Study of Deep Learning for Side-Channel Analysis , 2019, IACR Cryptol. ePrint Arch..
[14] Bart Preneel,et al. Revisiting a Methodology for Efficient CNN Architectures in Profiling Attacks , 2020, IACR Trans. Cryptogr. Hardw. Embed. Syst..
[15] Nenghai Yu,et al. A Novel Evaluation Metric for Deep Learning-Based Side Channel Analysis and Its Extended Application to Imbalanced Data , 2020 .
[16] Romain Poussier,et al. Simple Key Enumeration (and Rank Estimation) Using Histograms: An Integrated Approach , 2016, CHES.
[17] François-Xavier Standaert,et al. Soft Analytical Side-Channel Attacks , 2014, ASIACRYPT.
[18] François-Xavier Standaert,et al. Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages , 2008, CHES.