Controlling the Deep Learning-Based Side-Channel Analysis: A Way to Leverage from Heuristics
- 14 October 2020
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC
Abstract
No abstract availableKeywords
This publication has 27 references indexed in Scilit:
- Back Propagation Neural Network Based Leakage Characterization for Practical Security Analysis of Cryptographic ImplementationsLecture Notes in Computer Science, 2012
- Intelligent Machine HomicideLecture Notes in Computer Science, 2012
- Machine learning in side-channel analysis: a first studyJournal of Cryptographic Engineering, 2011
- Mutual Information Analysis: a Comprehensive StudyJournal of Cryptology, 2010
- A Unified Framework for the Analysis of Side-Channel Key Recovery AttacksLecture Notes in Computer Science, 2009
- Mutual Information AnalysisLecture Notes in Computer Science, 2008
- A Stochastic Model for Differential Side Channel CryptanalysisLecture Notes in Computer Science, 2005
- Correlation Power Analysis with a Leakage ModelLecture Notes in Computer Science, 2004
- Template AttacksLecture Notes in Computer Science, 2003
- Differential Power AnalysisLecture Notes in Computer Science, 1999