Power analysis attack: an approach based on machine learning
From MaRDI portal
Publication:486132
DOI10.1504/IJACT.2014.062722zbMATH Open1351.94055OpenAlexW1970267951MaRDI QIDQ486132FDOQ486132
Authors: Liran Lerman, Olivier Markowitch, Gianluca Bontempi
Publication date: 14 January 2015
Published in: International Journal of Applied Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1504/ijact.2014.062722
Recommendations
- Climbing down the hierarchy: hierarchical classification for machine learning side-channel attacks
- Breaking cryptographic implementations using deep learning techniques
- Public Key Cryptography - PKC 2005
- Side-channel analysis of embedded systems. An efficient algorithmic approach
- Foundations of Security Analysis and Design III
machine learningcryptographysecuritycryptanalysisside-channel attackshigh dimensional feature vectorspower analysis attackstemplate attacks
Cited In (15)
- Profiled power analysis attacks using convolutional neural networks with domain knowledge
- Getting more from PCA: First results of using principal component analysis for extensive power analysis
- On the performance of convolutional neural networks for side-channel analysis
- Comparative study on neural network structures in power analysis
- Support vector machines for improved IP detection with soft physical hash functions
- How to fool a black box machine learning based side-channel security evaluation
- Breaking cryptographic implementations using deep learning techniques
- Ridge-based profiled differential power analysis
- Fake it till you make it: data augmentation using generative adversarial networks for all the crypto you need on small devices
- Using principal component analysis for practical biasing of power traces to improve power analysis attacks
- Climbing down the hierarchy: hierarchical classification for machine learning side-channel attacks
- An Analysis of Goubin’s Refined Power Analysis Attack
- Title not available (Why is that?)
- Side-channel analysis of embedded systems. An efficient algorithmic approach
- Convolutional neural network based side-channel attacks with customized filters
This page was built for publication: Power analysis attack: an approach based on machine learning
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q486132)