Results 21 to 30 of about 2,490,029 (269)
Exploring Feature Selection Scenarios for Deep Learning-based Side-Channel Analysis
One of the main promoted advantages of deep learning in profiling sidechannel analysis is the possibility of skipping the feature engineering process.
Guilherme Perin, Lichao Wu, S. Picek
semanticscholar +1 more source
Label Correlation in Deep Learning-Based Side-Channel Analysis
The efficiency of the profiling side-channel analysis can be significantly improved with machine learning techniques. Although powerful, a fundamental machine learning limitation of being data-hungry received little attention in the side-channel ...
Lichao Wu +6 more
semanticscholar +1 more source
AVATAR: NN-Assisted Variation Aware Timing Analysis and Reporting for Hardware Trojan Detection
This paper presents AVATAR, a learning-assisted Trojan testing flow to detect hardware Trojans placed into fabricated ICs at an untrusted foundry, without needing a Golden IC.
Ashkan Vakil +4 more
doaj +1 more source
Even today, Side-Channel Analysis attacks pose a serious threat to the security of cryptographic implementations fabricated with low-power and nanoscale feature technologies.
Nicolai Müller, Amir Moradi
doaj +3 more sources
Polynomial multiplication algorithms such as Toom-Cook and the Number Theoretic Transform are fundamental building blocks for lattice-based post-quantum cryptography.
Catinca Mujdei +5 more
semanticscholar +1 more source
Side-channel analysis in frequency domain with clustering
The alignment of power traces is one of the key factors affecting the success of side-channel analysis. Frequency-domain side-channel analysis can effectively solve the alignment of power traces in the time domain.
Cai Juesong +3 more
doaj +1 more source
Information Theory-based Evolution of Neural Networks for Side-channel Analysis [PDF]
Profiled side-channel analysis (SCA) leverages leakage from cryptographic implementations to extract the secret key. When combined with advanced methods in neural networks (NNs), profiled SCA can successfully attack even those cryptocores assumed to be ...
R. Acharya, F. Ganji, Domenic Forte
semanticscholar +1 more source
NeuroSCA: Evolving Activation Functions for Side-Channel Analysis
The choice of activation functions can significantly impact the performance of neural networks. Due to an ever-increasing number of new activation functions being proposed in the literature, selecting the appropriate activation function becomes even more
Karlo Knezevic +4 more
doaj +1 more source
Side-Channel Power Analysis Based on SA-SVM
Support vector machines (SVMs) have been widely used in side-channel power analysis. The selection of the penalty factor and kernel parameter heavily influences how well support vector machines work.
Ying Zhang +4 more
doaj +1 more source
Experimental Side Channel Analysis of BB84 QKD Source [PDF]
A typical implementation of BB84 protocol for quantum communication uses four laser diodes for transmitting weak coherent pulses, which may not have the same characteristics.
A. Biswas +4 more
semanticscholar +1 more source

