Results 1 to 10 of about 1,189,648 (238)

A Comprehensive Survey on the Non-Invasive Passive Side-Channel Analysis [PDF]

open access: yesSensors, 2022
Side-channel analysis has become a widely recognized threat to the security of cryptographic implementations. Different side-channel attacks, as well as countermeasures, have been proposed in the literature.
Petr Socha   +2 more
doaj   +3 more sources

Side Channel Analysis of SPECK Based on Transfer Learning [PDF]

open access: yesSensors, 2022
Although side-channel attacks based on deep learning are widely used in AES encryption algorithms, there is little research on lightweight algorithms. Lightweight algorithms have fewer nonlinear operations, so it is more difficult to attack successfully.
Qingqing Zhang   +4 more
doaj   +4 more sources

Side channel analysis based on feature fusion network. [PDF]

open access: yesPLoS ONE, 2022
Various physical information can be leaked while the encryption algorithm is running in the device. Side-channel analysis exploits these leakages to recover keys.
Feng Ni   +4 more
doaj   +2 more sources

Multi-Leak Deep-Learning Side-Channel Analysis

open access: yesIEEE Access, 2022
Deep Learning Side-Channel Attacks (DLSCAs) have become a realistic threat to implementations of cryptographic algorithms, such as Advanced Encryption Standard (AES). By utilizing deep-learning models to analyze side-channel measurements, the attacker is
Fanliang Hu, Huanyu Wang, Junnian Wang
doaj   +2 more sources

Cross subkey side channel analysis based on small samples [PDF]

open access: yesScientific Reports, 2022
The majority of recently demonstrated Deep-Learning Side-Channel Analysis (DLSCA) use neural networks trained on a segment of traces containing operations only related to the target subkey.
Fanliang Hu, Huanyu Wang, Junnian Wang
doaj   +2 more sources

Hybrid Threshold Denoising Framework Using Singular Value Decomposition for Side-Channel Analysis Preprocessing [PDF]

open access: yesEntropy, 2023
The traces used in side-channel analysis are essential to breaking the key of encryption and the signal quality greatly affects the correct rate of key guessing.
Yuanzhen Wang   +7 more
doaj   +2 more sources

Weakly Profiling Side-channel Analysis [PDF]

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Profiling side-channel analysis, recognized for its robust attack performance in worst-case scenarios, necessitates adversaries to have a cloned device for profiling measurements and secret information for data labeling.
Lichao Wu   +2 more
doaj   +2 more sources

Stealing Neural Network Structure Through Remote FPGA Side-Channel Analysis

open access: bronzeIEEE Transactions on Information Forensics and Security, 2021
Deep Neural Network (DNN) models have been extensively developed by companies for a wide range of applications. The development of a customized DNN model with great performance requires costly investments, and its structure (layers and hyper-parameters ...
Yicheng Zhang   +4 more
openalex   +2 more sources

Deep Learning Method for Power Side-Channel Analysis on Chip Leakages

open access: yesElektronika ir Elektrotechnika, 2023
Power side channel analysis signal analysis is automated using deep learning. Signal processing and cryptanalytic techniques are necessary components of power side channel analysis.
Amjed Abbas Ahmed   +2 more
doaj   +2 more sources

Recent advances in deep learning‐based side‐channel analysis

open access: yesETRI Journal, 2020
As side‐channel analysis and machine learning algorithms share the same objective of classifying data, numerous studies have been proposed for adapting machine learning to side‐channel analysis.
Sunghyun Jin   +3 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy