Deep neural network attribution methods for leakage analysis and symmetric key recovery
From MaRDI portal
Publication:778967
DOI10.1007/978-3-030-38471-5_26zbMATH Open1457.94139OpenAlexW2953890756MaRDI QIDQ778967FDOQ778967
Authors: Benjamin Hettwer, Stefan Gehrer, Tim Güneysu
Publication date: 21 July 2020
Full work available at URL: https://doi.org/10.1007/978-3-030-38471-5_26
Recommendations
- Profiled power analysis attacks using convolutional neural networks with domain knowledge
- Subsampling and knowledge distillation on adversarial examples: new techniques for deep learning based side channel evaluations
- Against deep learning side-channel attacks
- Side-channel attacks based on dendrite network
- TransNet: shift invariant transformer network for side channel analysis
Artificial neural networks and deep learning (68T07) Cryptography (94A60) Channel models (including quantum) in information and communication theory (94A40)
Cited In (5)
- Kilroy was here: the first step towards explainability of neural networks in profiled side-channel analysis
- On the influence of optimizers in deep learning-based side-channel analysis
- Subsampling and knowledge distillation on adversarial examples: new techniques for deep learning based side channel evaluations
- Reinforcement learning-based design of side-channel countermeasures
- TransNet: shift invariant transformer network for side channel analysis
This page was built for publication: Deep neural network attribution methods for leakage analysis and symmetric key recovery
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q778967)