Profiled power analysis attacks using convolutional neural networks with domain knowledge
From MaRDI portal
Recommendations
- Breaking cryptographic implementations using deep learning techniques
- Convolutional neural networks with data augmentation against jitter-based countermeasures. Profiling attacks without pre-processing
- Against deep learning side-channel attacks
- Back propagation neural network based leakage characterization for practical security analysis of cryptographic implementations
- Deep neural network attribution methods for leakage analysis and symmetric key recovery
Cites work
- scientific article; zbMATH DE number 6378127 (Why is no real title available?)
- scientific article; zbMATH DE number 1179314 (Why is no real title available?)
- scientific article; zbMATH DE number 1979272 (Why is no real title available?)
- scientific article; zbMATH DE number 1418307 (Why is no real title available?)
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- Analysis and improvements of the DPA contest v4 implementation
- Breaking cryptographic implementations using deep learning techniques
- Convolutional neural networks with data augmentation against jitter-based countermeasures. Profiling attacks without pre-processing
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Deep learning
- Knowledge-based artificial neural networks
- Power Analysis Attacks
- Power analysis attack: an approach based on machine learning
- Robust profiling for DPA-style attacks
- Scikit-learn: machine learning in Python
- Template Attacks on Masking—Resistance Is Futile
Cited in
(17)- Against deep learning side-channel attacks
- On the influence of optimizers in deep learning-based side-channel analysis
- Subsampling and knowledge distillation on adversarial examples: new techniques for deep learning based side channel evaluations
- On the performance of convolutional neural networks for side-channel analysis
- Security evaluation of cryptographic modules against profiling attacks
- Breaking cryptographic implementations using deep learning techniques
- Convolutional neural networks with data augmentation against jitter-based countermeasures. Profiling attacks without pre-processing
- Ridge-based profiled differential power analysis
- Back propagation neural network based leakage characterization for practical security analysis of cryptographic implementations
- Learning when to stop: a mutual information approach to prevent overfitting in profiled side-channel analysis
- Climbing down the hierarchy: hierarchical classification for machine learning side-channel attacks
- Towards private deep learning-based side-channel analysis using homomorphic encryption. Opportunities and limitations
- Deep neural network attribution methods for leakage analysis and symmetric key recovery
- On the evaluation of deep learning-based side-channel analysis
- Deep Learning Side-Channel Analysis on Large-Scale Traces
- Side-channel attacks based on dendrite network
- Convolutional neural network based side-channel attacks with customized filters
This page was built for publication: Profiled power analysis attacks using convolutional neural networks with domain knowledge
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1726696)