Fake it till you make it: data augmentation using generative adversarial networks for all the crypto you need on small devices
DOI10.1007/978-3-030-95312-6_13zbMATH Open1499.68052OpenAlexW4226069231MaRDI QIDQ2152167FDOQ2152167
Yinan Kong, Lejla Batina, Stjepan Picek, Naila Mukhtar
Publication date: 6 July 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-95312-6_13
Recommendations
data augmentationsignal processingelliptic curve cryptographyGANsASCADdeep learning-based side-channel attacks
Artificial neural networks and deep learning (68T07) Signal theory (characterization, reconstruction, filtering, etc.) (94A12) Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Computer security (68M25)
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Power analysis attack: an approach based on machine learning
- The Myth of Generic DPA…and the Magic of Learning
- Breaking cryptographic implementations using deep learning techniques
- Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures
- Online Template Attacks
- SiGAN: Siamese Generative Adversarial Network for Identity-Preserving Face Hallucination
- Localized Electromagnetic Analysis of Cryptographic Implementations
- Online Template Attack on ECDSA:
Uses Software
This page was built for publication: Fake it till you make it: data augmentation using generative adversarial networks for all the crypto you need on small devices
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2152167)