Fake it till you make it: data augmentation using generative adversarial networks for all the crypto you need on small devices
DOI10.1007/978-3-030-95312-6_13zbMath1499.68052OpenAlexW4226069231MaRDI QIDQ2152167
Yinan Kong, Lejla Batina, Stjepan Picek, Naila Mukhtar
Publication date: 6 July 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-95312-6_13
signal processingelliptic curve cryptographydata augmentationGANsASCADdeep learning-based side-channel attacks
Artificial neural networks and deep learning (68T07) Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Signal theory (characterization, reconstruction, filtering, etc.) (94A12) Computer security (68M25)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Power analysis attack: an approach based on machine learning
- Breaking cryptographic implementations using deep learning techniques
- Localized Electromagnetic Analysis of Cryptographic Implementations
- Online Template Attacks
- Online Template Attack on ECDSA:
- Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures
- SiGAN: Siamese Generative Adversarial Network for Identity-Preserving Face Hallucination
- The Myth of Generic DPA…and the Magic of Learning
This page was built for publication: Fake it till you make it: data augmentation using generative adversarial networks for all the crypto you need on small devices