Deep neural network attribution methods for leakage analysis and symmetric key recovery
From MaRDI portal
(Redirected from Publication:778967)
Recommendations
- Profiled power analysis attacks using convolutional neural networks with domain knowledge
- Subsampling and knowledge distillation on adversarial examples: new techniques for deep learning based side channel evaluations
- Against deep learning side-channel attacks
- Side-channel attacks based on dendrite network
- TransNet: shift invariant transformer network for side channel analysis
Cited in
(8)- Back propagation neural network based leakage characterization for practical security analysis of cryptographic implementations
- On the influence of optimizers in deep learning-based side-channel analysis
- Subsampling and knowledge distillation on adversarial examples: new techniques for deep learning based side channel evaluations
- Reinforcement learning-based design of side-channel countermeasures
- Profiled power analysis attacks using convolutional neural networks with domain knowledge
- TransNet: shift invariant transformer network for side channel analysis
- Kilroy was here: the first step towards explainability of neural networks in profiled side-channel analysis
- Side-channel attacks based on dendrite network
This page was built for publication: Deep neural network attribution methods for leakage analysis and symmetric key recovery
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q778967)