How to fool a black box machine learning based side-channel security evaluation
From MaRDI portal
Publication:2120993
DOI10.1007/s12095-021-00479-xzbMath1490.68192OpenAlexW3159706829MaRDI QIDQ2120993
Olivier Bronchain, Charles-Henry Bertrand Van Ouytsel, Gaëtan Cassiers, François-Xavier Standaert
Publication date: 1 April 2022
Published in: Cryptography and Communications (Search for Journal in Brave)
Full work available at URL: http://hdl.handle.net/2078.1/247935
Learning and adaptive systems in artificial intelligence (68T05) Cryptography (94A60) Computer security (68M25)
Related Items (1)
Uses Software
Cites Work
- Unnamed Item
- Breaking cryptographic implementations using deep learning techniques
- From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces
- Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests
- Making Masking Security Proofs Concrete
- A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices
- Consolidating Masking Schemes
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- Towards sound approaches to counteract power-analysis attacks
- Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures
- The Myth of Generic DPA…and the Magic of Learning
- How Fast Can Higher-Order Masking Be in Software?
- Topics in Cryptology – CT-RSA 2004
- On the performance of convolutional neural networks for side-channel analysis
This page was built for publication: How to fool a black box machine learning based side-channel security evaluation