Fake it till you make it: data augmentation using generative adversarial networks for all the crypto you need on small devices (Q2152167): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: Breaking cryptographic implementations using deep learning techniques / rank
 
Normal rank
Property / cites work
 
Property / cites work: Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures / rank
 
Normal rank
Property / cites work
 
Property / cites work: SiGAN: Siamese Generative Adversarial Network for Identity-Preserving Face Hallucination / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4425684 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Myth of Generic DPA…and the Magic of Learning / rank
 
Normal rank
Property / cites work
 
Property / cites work: Power analysis attack: an approach based on machine learning / rank
 
Normal rank
Property / cites work
 
Property / cites work: Localized Electromagnetic Analysis of Cryptographic Implementations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Online Template Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Online Template Attack on ECDSA: / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5270493 / rank
 
Normal rank

Latest revision as of 13:19, 29 July 2024

scientific article
Language Label Description Also known as
English
Fake it till you make it: data augmentation using generative adversarial networks for all the crypto you need on small devices
scientific article

    Statements

    Fake it till you make it: data augmentation using generative adversarial networks for all the crypto you need on small devices (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    6 July 2022
    0 references
    deep learning-based side-channel attacks
    0 references
    ASCAD
    0 references
    elliptic curve cryptography
    0 references
    GANs
    0 references
    data augmentation
    0 references
    signal processing
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references