Results 11 to 20 of about 2,490,029 (269)

Deep Learning Method for Power Side-Channel Analysis on Chip Leakages

open access: yesElektronika ir Elektrotechnika, 2023
Power side channel analysis signal analysis is automated using deep learning. Signal processing and cryptanalytic techniques are necessary components of power side channel analysis.
Amjed Abbas Ahmed   +2 more
doaj   +2 more sources

Recent advances in deep learning‐based side‐channel analysis

open access: yesETRI Journal, 2020
As side‐channel analysis and machine learning algorithms share the same objective of classifying data, numerous studies have been proposed for adapting machine learning to side‐channel analysis.
Sunghyun Jin   +3 more
doaj   +2 more sources

SCAR: Power Side-Channel Analysis at RTL-Level [PDF]

open access: greenIEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2023
Power side-channel (PSC) attacks exploit the dynamic power consumption of cryptographic operations to leak sensitive information about encryption hardware. Therefore, it is necessary to conduct a PSC analysis to assess the susceptibility of cryptographic
Amisha Srivastava   +6 more
openalex   +3 more sources

Efficient Profiled Side-Channel Analysis of Masked Implementations, Extended

open access: greenIEEE Transactions on Information Forensics and Security, 2022
We extend the study of efficient profiled attacks on masking schemes initiated by Lerman and Markowitch (TIFS, 2019) in different directions. First, we study both the profiling complexity and the online attack complexity of different profiled ...
Olivier Bronchain   +3 more
openalex   +3 more sources

SCALib: A Side-Channel Analysis Library

open access: yesJournal of Open Source Software, 2023
Side-channel attacks exploit unintended leakage from an electronic device in order to retrieve secret data. In particular, attacks exploiting physical side-channels such as power consumption or electromagnetic radiations to recover cryptographic keys are
Gaëtan Cassiers, Olivier Bronchain
openaire   +2 more sources

Microwalk-CI: Practical Side-Channel Analysis for JavaScript Applications [PDF]

open access: yesConference on Computer and Communications Security, 2022
Secret-dependent timing behavior in cryptographic implementations has resulted in exploitable vulnerabilities, undermining their security. Over the years, numerous tools to automatically detect timing leakage or even to prove their absence have been ...
Jan Wichelmann   +3 more
semanticscholar   +1 more source

SoK: Deep Learning-based Physical Side-channel Analysis

open access: yesIACR Cryptology ePrint Archive, 2022
Side-channel attacks represent a realistic and serious threat to the security of embedded devices for already almost three decades. A variety of attacks and targets they can be applied to have been introduced, and while the area of side-channel attacks ...
S. Picek   +4 more
semanticscholar   +1 more source

EstraNet: An Efficient Shift-Invariant Transformer Network for Side-Channel Analysis

open access: yesIACR Trans. Cryptogr. Hardw. Embed. Syst., 2023
Deep Learning (DL) based Side-Channel Analysis (SCA) has been extremely popular recently. DL-based SCA can easily break implementations protected by masking countermeasures.
Suvadeep Hajra   +2 more
semanticscholar   +1 more source

Reinforcement Learning for Hyperparameter Tuning in Deep Learning-based Side-channel Analysis

open access: yesIACR Cryptology ePrint Archive, 2021
Deep learning represents a powerful set of techniques for profiling sidechannel analysis. The results in the last few years show that neural network architectures like multilayer perceptron and convolutional neural networks give strong attack performance
Jorai Rijsdijk   +3 more
semanticscholar   +1 more source

No (good) loss no gain: systematic evaluation of loss functions in deep learning-based side-channel analysis

open access: yesJournal of Cryptographic Engineering, 2023
Deep learning is a powerful direction for profiling side-channel analysis as it can break targets protected with countermeasures even with a relatively small number of attack traces. Still, it is necessary to conduct hyperparameter tuning to reach strong
Maikel Kerkhof   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy