Fake it till you make it: data augmentation using generative adversarial networks for all the crypto you need on small devices
From MaRDI portal
Publication:2152167
Recommendations
Cites work
- scientific article; zbMATH DE number 1979272 (Why is no real title available?)
- Breaking cryptographic implementations using deep learning techniques
- Convolutional neural networks with data augmentation against jitter-based countermeasures. Profiling attacks without pre-processing
- Deep learning
- Localized electromagnetic analysis of cryptographic implementations
- Online template attack on ECDSA: extracting keys via the other side
- Online template attacks
- Power analysis attack: an approach based on machine learning
- SiGAN: Siamese Generative Adversarial Network for Identity-Preserving Face Hallucination
- The Myth of Generic DPA…and the Magic of Learning
This page was built for publication: Fake it till you make it: data augmentation using generative adversarial networks for all the crypto you need on small devices
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2152167)