Articles with "channel analysis" as a keyword



Cross subkey side channel analysis based on small samples

Sign Up to like & get
recommendations!
Published in 2022 at "Scientific Reports"

DOI: 10.1038/s41598-022-10279-9

Abstract: The majority of recently demonstrated Deep-Learning Side-Channel Analysis (DLSCA) use neural networks trained on a segment of traces containing operations only related to the target subkey. However, when the size of the training set is… read more here.

Keywords: cross subkey; side channel; channel analysis;

Deep-Learning-Based Side-Channel Analysis of Block Cipher PIPO With Bitslice Implementation

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3187201

Abstract: Recently, as deep learning has been applied to various fields, deep-learning-based side-channel analysis (SCA) has been widely investigated. Unlike traditional SCA, it can perform well independently of the attacker’s ability. In this paper, we propose… read more here.

Keywords: channel analysis; profiled sca; side channel; deep learning ... See more keywords

NeuroSCA: Evolving Activation Functions for Side-Channel Analysis

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2022.3232064

Abstract: The choice of activation functions can significantly impact the performance of neural networks. Due to an ever-increasing number of new activation functions being proposed in the literature, selecting the appropriate activation function becomes even more… read more here.

Keywords: activation functions; channel analysis; functions side; side channel ... See more keywords

A New Approach for Side Channel Analysis on Stream Ciphers and Related Constructions

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Computers"

DOI: 10.1109/tc.2021.3135191

Abstract: Side Channel Analysis (SCA) is among the newly emerged threats to small scale devices performing a cryptographic operation. While such analysis is well studied against the block ciphers, we observe that the stream cipher counterpart… read more here.

Keywords: ciphers related; stream ciphers; channel analysis; stream ... See more keywords

Dual-Path Hybrid Residual Network for Profiled Side-Channel Analysis

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Transactions on Circuits and Systems II: Express Briefs"

DOI: 10.1109/tcsii.2024.3371110

Abstract: Side-channel analysis poses a significant security threat to cryptographic chips in embedded devices. The use of deep learning in side-channel analysis makes it easier to compromise the security of cryptographic chips. Although these chips equipped… read more here.

Keywords: residual network; analysis; side channel; channel analysis ... See more keywords
Photo from wikipedia

Stealing Neural Network Structure Through Remote FPGA Side-Channel Analysis

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2021.3106169

Abstract: Deep Neural Network (DNN) models have been extensively developed by companies for a wide range of applications. The development of a customized DNN model with great performance requires costly investments, and its structure (layers and… read more here.

Keywords: neural network; channel analysis; side channel; structure ... See more keywords
Photo from wikipedia

On Side-Channel Analysis of Memristive Cryptographic Circuits

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2022.3223232

Abstract: Memristive technologies offer fascinating opportunities for unconventional computing architectures and emerging applications. While memristive devices have received substantial attention as sources of entropy for security applications, security vulnerabilities of memristive technologies for implementing cryptographic circuits… read more here.

Keywords: memristive cryptographic; cryptographic circuits; channel analysis; analysis ... See more keywords

On the Instability of Softmax Attention-Based Deep Learning Models in Side-Channel Analysis

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2023.3326667

Abstract: In side-channel analysis (SCA), Points-of-Interest (PoIs), i.e., the informative sample points remain sparsely scattered across the whole side-channel trace. Several works in the SCA literature have demonstrated that the attack efficacy could be significantly improved… read more here.

Keywords: side channel; softmax attention; attention; attention based ... See more keywords

Detection of Recycled ICs Using Backscattering Side-Channel Analysis

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Very Large Scale Integration (VLSI) Systems"

DOI: 10.1109/tvlsi.2022.3190236

Abstract: This article proposes a new, nondestructive method for detecting recycled integrated circuits (ICs) using the backscattering side-channel analysis (BSCA). In particular, this article explains the impact that aging has on the backscattering side-channel signal and… read more here.

Keywords: backscattering side; channel analysis; detection; side channel ... See more keywords

Side channel analysis based on feature fusion network

Sign Up to like & get
recommendations!
Published in 2022 at "PLoS ONE"

DOI: 10.1371/journal.pone.0274616

Abstract: Various physical information can be leaked while the encryption algorithm is running in the device. Side-channel analysis exploits these leakages to recover keys. Due to the sensitivity of deep learning to the data features, the… read more here.

Keywords: network; side channel; channel analysis;
Photo from wikipedia

Second-Order Side-Channel Analysis Based on Orthogonal Transform Nonlinear Regression

Sign Up to like & get
recommendations!
Published in 2023 at "Entropy"

DOI: 10.3390/e25030505

Abstract: In recent years, side-channel analysis technology has been one of the greatest threats to information security. SCA decrypts the key information in the encryption device by establishing an appropriate leakage model. As one of many… read more here.

Keywords: regression; channel analysis; template analysis; analysis ... See more keywords