Results 1 to 10 of about 1,189,648 (238)
A Comprehensive Survey on the Non-Invasive Passive Side-Channel Analysis [PDF]
Side-channel analysis has become a widely recognized threat to the security of cryptographic implementations. Different side-channel attacks, as well as countermeasures, have been proposed in the literature.
Petr Socha+2 more
doaj +3 more sources
Side Channel Analysis of SPECK Based on Transfer Learning [PDF]
Although side-channel attacks based on deep learning are widely used in AES encryption algorithms, there is little research on lightweight algorithms. Lightweight algorithms have fewer nonlinear operations, so it is more difficult to attack successfully.
Qingqing Zhang+4 more
doaj +4 more sources
Side channel analysis based on feature fusion network. [PDF]
Various physical information can be leaked while the encryption algorithm is running in the device. Side-channel analysis exploits these leakages to recover keys.
Feng Ni+4 more
doaj +2 more sources
Multi-Leak Deep-Learning Side-Channel Analysis
Deep Learning Side-Channel Attacks (DLSCAs) have become a realistic threat to implementations of cryptographic algorithms, such as Advanced Encryption Standard (AES). By utilizing deep-learning models to analyze side-channel measurements, the attacker is
Fanliang Hu, Huanyu Wang, Junnian Wang
doaj +2 more sources
Cross subkey side channel analysis based on small samples [PDF]
The majority of recently demonstrated Deep-Learning Side-Channel Analysis (DLSCA) use neural networks trained on a segment of traces containing operations only related to the target subkey.
Fanliang Hu, Huanyu Wang, Junnian Wang
doaj +2 more sources
Hybrid Threshold Denoising Framework Using Singular Value Decomposition for Side-Channel Analysis Preprocessing [PDF]
The traces used in side-channel analysis are essential to breaking the key of encryption and the signal quality greatly affects the correct rate of key guessing.
Yuanzhen Wang+7 more
doaj +2 more sources
Weakly Profiling Side-channel Analysis [PDF]
Profiling side-channel analysis, recognized for its robust attack performance in worst-case scenarios, necessitates adversaries to have a cloned device for profiling measurements and secret information for data labeling.
Lichao Wu+2 more
doaj +2 more sources
Stealing Neural Network Structure Through Remote FPGA Side-Channel Analysis
Deep Neural Network (DNN) models have been extensively developed by companies for a wide range of applications. The development of a customized DNN model with great performance requires costly investments, and its structure (layers and hyper-parameters ...
Yicheng Zhang+4 more
openalex +2 more sources
Deep Learning Method for Power Side-Channel Analysis on Chip Leakages
Power side channel analysis signal analysis is automated using deep learning. Signal processing and cryptanalytic techniques are necessary components of power side channel analysis.
Amjed Abbas Ahmed+2 more
doaj +2 more sources
Recent advances in deep learning‐based side‐channel analysis
As side‐channel analysis and machine learning algorithms share the same objective of classifying data, numerous studies have been proposed for adapting machine learning to side‐channel analysis.
Sunghyun Jin+3 more
doaj +2 more sources