Subsampling and knowledge distillation on adversarial examples: new techniques for deep learning based side channel evaluations
From MaRDI portal
Publication:832386
DOI10.1007/978-3-030-81652-0_22zbMATH Open1493.94033OpenAlexW3184130264MaRDI QIDQ832386FDOQ832386
Authors: Aron Gohr, Sven Jacob, Werner Schindler
Publication date: 25 March 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-81652-0_22
Recommendations
- Deep neural network attribution methods for leakage analysis and symmetric key recovery
- Profiled power analysis attacks using convolutional neural networks with domain knowledge
- Against deep learning side-channel attacks
- Breaking cryptographic implementations using deep learning techniques
- TransNet: shift invariant transformer network for side channel analysis
Cites Work
- Title not available (Why is that?)
- Improving attacks on round-reduced Speck32/64 using deep learning
- Pattern recognition and machine learning.
- Title not available (Why is that?)
- Deep neural network attribution methods for leakage analysis and symmetric key recovery
- Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures
- On the performance of convolutional neural networks for side-channel analysis
Cited In (3)
Uses Software
This page was built for publication: Subsampling and knowledge distillation on adversarial examples: new techniques for deep learning based side channel evaluations
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q832386)