Results 21 to 30 of about 2,364,158 (363)

SCAR: Power Side-Channel Analysis at RTL Level [PDF]

open access: greenIEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2023
Power side-channel (PSC) attacks exploit the dynamic power consumption of cryptographic operations to leak sensitive information about encryption hardware. Therefore, it is necessary to conduct a PSC analysis to assess the susceptibility of cryptographic
Amisha Srivastava   +6 more
openalex   +3 more sources

Ranking Loss: Maximizing the Success Rate in Deep Learning Side-Channel Analysis

open access: diamondIACR Cryptology ePrint Archive, 2020
The side-channel community recently investigated a new approach, based on deep learning, to significantly improve profiled attacks against embedded systems.
Gabriel Zaid   +4 more
openalex   +3 more sources

No (good) loss no gain: systematic evaluation of loss functions in deep learning-based side-channel analysis

open access: yesJournal of Cryptographic Engineering, 2023
Deep learning is a powerful direction for profiling side-channel analysis as it can break targets protected with countermeasures even with a relatively small number of attack traces. Still, it is necessary to conduct hyperparameter tuning to reach strong
Maikel Kerkhof   +3 more
semanticscholar   +1 more source

SoK: Deep Learning-based Physical Side-channel Analysis

open access: yesIACR Cryptology ePrint Archive, 2022
Side-channel attacks represent a realistic and serious threat to the security of embedded devices for already almost three decades. A variety of attacks and targets they can be applied to have been introduced, and while the area of side-channel attacks ...
S. Picek   +4 more
semanticscholar   +1 more source

SCALib: A Side-Channel Analysis Library

open access: yesJournal of Open Source Software, 2023
Side-channel attacks exploit unintended leakage from an electronic device in order to retrieve secret data. In particular, attacks exploiting physical side-channels such as power consumption or electromagnetic radiations to recover cryptographic keys are
Gaëtan Cassiers, Olivier Bronchain
semanticscholar   +1 more source

Label Correlation in Deep Learning-Based Side-Channel Analysis

open access: yesIEEE Transactions on Information Forensics and Security, 2023
The efficiency of the profiling side-channel analysis can be significantly improved with machine learning techniques. Although powerful, a fundamental machine learning limitation of being data-hungry received little attention in the side-channel ...
Lichao Wu   +6 more
semanticscholar   +1 more source

Information Theory-based Evolution of Neural Networks for Side-channel Analysis [PDF]

open access: yesIACR Trans. Cryptogr. Hardw. Embed. Syst., 2021
Profiled side-channel analysis (SCA) leverages leakage from cryptographic implementations to extract the secret key. When combined with advanced methods in neural networks (NNs), profiled SCA can successfully attack even those cryptocores assumed to be ...
R. Acharya, F. Ganji, Domenic Forte
semanticscholar   +1 more source

PROLEAD

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
Even today, Side-Channel Analysis attacks pose a serious threat to the security of cryptographic implementations fabricated with low-power and nanoscale feature technologies.
Nicolai Müller, Amir Moradi
doaj   +3 more sources

SCANN: Side Channel Analysis of Spiking Neural Networks

open access: yesCryptography, 2023
Spiking neural networks (SNNs) are quickly gaining traction as a viable alternative to deep neural networks (DNNs). Compared to DNNs, SNNs are computationally more powerful and energy efficient.
Karthikeyan Nagarajan   +4 more
doaj   +1 more source

Reinforcement Learning for Hyperparameter Tuning in Deep Learning-based Side-channel Analysis

open access: yesIACR Cryptology ePrint Archive, 2021
Deep learning represents a powerful set of techniques for profiling sidechannel analysis. The results in the last few years show that neural network architectures like multilayer perceptron and convolutional neural networks give strong attack performance
Jorai Rijsdijk   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy