Power analysis attack: an approach based on machine learning
From MaRDI portal
Recommendations
- Climbing down the hierarchy: hierarchical classification for machine learning side-channel attacks
- Breaking cryptographic implementations using deep learning techniques
- Public Key Cryptography - PKC 2005
- Side-channel analysis of embedded systems. An efficient algorithmic approach
- Foundations of Security Analysis and Design III
Cited in
(15)- How to fool a black box machine learning based side-channel security evaluation
- scientific article; zbMATH DE number 697831 (Why is no real title available?)
- Side-channel analysis of embedded systems. An efficient algorithmic approach
- Using principal component analysis for practical biasing of power traces to improve power analysis attacks
- Profiled power analysis attacks using convolutional neural networks with domain knowledge
- Comparative study on neural network structures in power analysis
- An Analysis of Goubin’s Refined Power Analysis Attack
- Fake it till you make it: data augmentation using generative adversarial networks for all the crypto you need on small devices
- On the performance of convolutional neural networks for side-channel analysis
- Convolutional neural network based side-channel attacks with customized filters
- Ridge-based profiled differential power analysis
- Climbing down the hierarchy: hierarchical classification for machine learning side-channel attacks
- Breaking cryptographic implementations using deep learning techniques
- Getting more from PCA: First results of using principal component analysis for extensive power analysis
- Support vector machines for improved IP detection with soft physical hash functions
This page was built for publication: Power analysis attack: an approach based on machine learning
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q486132)