Results 11 to 20 of about 2,326,402 (364)
Virtual Analysis and Reduction of Side-Channel Vulnerabilities of Smartcards [PDF]
This paper focuses on the usability of the PINPAS tool. The PINPAS tool is an instruction-level interpreter for smartcard assembler languages, augmented with facilities to study side-channel vulnerabilities. The tool can simulate side-channel leakage and has a suite of utilities to analyze this.
Jerry den Hartog, E.P. de Vink
core +14 more sources
NeuroSCA: Evolving Activation Functions for Side-Channel Analysis
The choice of activation functions can significantly impact the performance of neural networks. Due to an ever-increasing number of new activation functions being proposed in the literature, selecting the appropriate activation function becomes even more
Karlo Knezevic+4 more
doaj +6 more sources
Experimental Side Channel Analysis of BB84 QKD Source [PDF]
A typical implementation of BB84 protocol for quantum communication uses four laser diodes for transmitting weak coherent pulses, which may not have the same characteristics.
A. Biswas+4 more
semanticscholar +5 more sources
Ranking Loss: Maximizing the Success Rate in Deep Learning Side-Channel Analysis
The side-channel community recently investigated a new approach, based on deep learning, to significantly improve profiled attacks against embedded systems.
Gabriel Zaid+4 more
openalex +3 more sources
A Comprehensive Study of Deep Learning for Side-Channel Analysis
Recently, several studies have been published on the application of deep learning to enhance Side-Channel Attacks (SCA). These seminal works have practically validated the soundness of the approach, especially against implementations protected by masking
Loïc Masure, Cécile Canovas, E. Prouff
semanticscholar +6 more sources
Systematic Side-Channel Analysis of Curve25519 with Machine Learning [PDF]
Profiling attacks, especially those based on machine learning, proved to be very successful techniques in recent years when considering the side-channel analysis of symmetric-key crypto implementations.
Léo Weissbart+3 more
semanticscholar +5 more sources
A Modular and Optimized Toolbox for Side-Channel Analysis [PDF]
The aim of this paper is to describe the characteristics of a toolbox developed to carry out a side-channel analysis of cryptosystems implemented in physical devices.
Alberto Fuentes Rodriguez+3 more
doaj +3 more sources
CPSGD: A Novel Optimization Algorithm and Its Application in Side-Channel Analysis [PDF]
In recent years, side-channel analysis based on deep learning has garnered significant attention from researchers. A pivotal reason for this lies in the fact that deep learning-based side-channel analysis requires minimal preprocessing of side-channel ...
Yifan Zhang+3 more
doaj +2 more sources
SCAR: Power Side-Channel Analysis at RTL Level [PDF]
Power side-channel attacks exploit the dynamic power consumption of cryptographic operations to leak sensitive information of encryption hardware. Therefore, it is necessary to conduct power side-channel analysis for assessing the susceptibility of cryptographic systems and mitigating potential risks.
Amisha Srivastava+6 more
openalex +3 more sources
The Dark Side(-Channel) of Mobile Devices: A Survey on Network Traffic Analysis
In recent years, mobile devices (e.g., smartphones and tablets) have met an increasing commercial success and have become a fundamental element of the everyday life for billions of people all around the world.
Mauro Conti+3 more
openalex +4 more sources