Results 21 to 30 of about 2,490,029 (269)

Exploring Feature Selection Scenarios for Deep Learning-based Side-Channel Analysis

open access: yesIACR Cryptology ePrint Archive, 2022
One of the main promoted advantages of deep learning in profiling sidechannel analysis is the possibility of skipping the feature engineering process.
Guilherme Perin, Lichao Wu, S. Picek
semanticscholar   +1 more source

Label Correlation in Deep Learning-Based Side-Channel Analysis

open access: yesIEEE Transactions on Information Forensics and Security, 2023
The efficiency of the profiling side-channel analysis can be significantly improved with machine learning techniques. Although powerful, a fundamental machine learning limitation of being data-hungry received little attention in the side-channel ...
Lichao Wu   +6 more
semanticscholar   +1 more source

AVATAR: NN-Assisted Variation Aware Timing Analysis and Reporting for Hardware Trojan Detection

open access: yesIEEE Access, 2021
This paper presents AVATAR, a learning-assisted Trojan testing flow to detect hardware Trojans placed into fabricated ICs at an untrusted foundry, without needing a Golden IC.
Ashkan Vakil   +4 more
doaj   +1 more source

PROLEAD

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
Even today, Side-Channel Analysis attacks pose a serious threat to the security of cryptographic implementations fabricated with low-power and nanoscale feature technologies.
Nicolai Müller, Amir Moradi
doaj   +3 more sources

Side-channel Analysis of Lattice-based Post-quantum Cryptography: Exploiting Polynomial Multiplication

open access: yesIACR Cryptology ePrint Archive, 2022
Polynomial multiplication algorithms such as Toom-Cook and the Number Theoretic Transform are fundamental building blocks for lattice-based post-quantum cryptography.
Catinca Mujdei   +5 more
semanticscholar   +1 more source

Side-channel analysis in frequency domain with clustering

open access: yesDianzi Jishu Yingyong, 2021
The alignment of power traces is one of the key factors affecting the success of side-channel analysis. Frequency-domain side-channel analysis can effectively solve the alignment of power traces in the time domain.
Cai Juesong   +3 more
doaj   +1 more source

Information Theory-based Evolution of Neural Networks for Side-channel Analysis [PDF]

open access: yesIACR Trans. Cryptogr. Hardw. Embed. Syst., 2021
Profiled side-channel analysis (SCA) leverages leakage from cryptographic implementations to extract the secret key. When combined with advanced methods in neural networks (NNs), profiled SCA can successfully attack even those cryptocores assumed to be ...
R. Acharya, F. Ganji, Domenic Forte
semanticscholar   +1 more source

NeuroSCA: Evolving Activation Functions for Side-Channel Analysis

open access: yesIEEE Access, 2023
The choice of activation functions can significantly impact the performance of neural networks. Due to an ever-increasing number of new activation functions being proposed in the literature, selecting the appropriate activation function becomes even more
Karlo Knezevic   +4 more
doaj   +1 more source

Side-Channel Power Analysis Based on SA-SVM

open access: yesApplied Sciences, 2023
Support vector machines (SVMs) have been widely used in side-channel power analysis. The selection of the penalty factor and kernel parameter heavily influences how well support vector machines work.
Ying Zhang   +4 more
doaj   +1 more source

Experimental Side Channel Analysis of BB84 QKD Source [PDF]

open access: yesIEEE Journal of Quantum Electronics, 2021
A typical implementation of BB84 protocol for quantum communication uses four laser diodes for transmitting weak coherent pulses, which may not have the same characteristics.
A. Biswas   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy