Sign Up to like & get
recommendations!
3
Published in 2022 at "Scientific Reports"
DOI: 10.1038/s41598-022-10279-9
Abstract: The majority of recently demonstrated Deep-Learning Side-Channel Analysis (DLSCA) use neural networks trained on a segment of traces containing operations only related to the target subkey. However, when the size of the training set is…
read more here.
Keywords:
cross subkey;
side channel;
channel analysis;
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3187201
Abstract: Recently, as deep learning has been applied to various fields, deep-learning-based side-channel analysis (SCA) has been widely investigated. Unlike traditional SCA, it can perform well independently of the attacker’s ability. In this paper, we propose…
read more here.
Keywords:
channel analysis;
profiled sca;
side channel;
deep learning ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Access"
DOI: 10.1109/access.2022.3232064
Abstract: The choice of activation functions can significantly impact the performance of neural networks. Due to an ever-increasing number of new activation functions being proposed in the literature, selecting the appropriate activation function becomes even more…
read more here.
Keywords:
activation functions;
channel analysis;
functions side;
side channel ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Transactions on Computers"
DOI: 10.1109/tc.2021.3135191
Abstract: Side Channel Analysis (SCA) is among the newly emerged threats to small scale devices performing a cryptographic operation. While such analysis is well studied against the block ciphers, we observe that the stream cipher counterpart…
read more here.
Keywords:
ciphers related;
stream ciphers;
channel analysis;
stream ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2021 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2021.3106169
Abstract: Deep Neural Network (DNN) models have been extensively developed by companies for a wide range of applications. The development of a customized DNN model with great performance requires costly investments, and its structure (layers and…
read more here.
Keywords:
neural network;
channel analysis;
side channel;
structure ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2022.3223232
Abstract: Memristive technologies offer fascinating opportunities for unconventional computing architectures and emerging applications. While memristive devices have received substantial attention as sources of entropy for security applications, security vulnerabilities of memristive technologies for implementing cryptographic circuits…
read more here.
Keywords:
memristive cryptographic;
cryptographic circuits;
channel analysis;
analysis ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Very Large Scale Integration (VLSI) Systems"
DOI: 10.1109/tvlsi.2022.3190236
Abstract: This article proposes a new, nondestructive method for detecting recycled integrated circuits (ICs) using the backscattering side-channel analysis (BSCA). In particular, this article explains the impact that aging has on the backscattering side-channel signal and…
read more here.
Keywords:
backscattering side;
channel analysis;
detection;
side channel ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "PLoS ONE"
DOI: 10.1371/journal.pone.0274616
Abstract: Various physical information can be leaked while the encryption algorithm is running in the device. Side-channel analysis exploits these leakages to recover keys. Due to the sensitivity of deep learning to the data features, the…
read more here.
Keywords:
network;
side channel;
channel analysis;
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2023 at "Entropy"
DOI: 10.3390/e25030505
Abstract: In recent years, side-channel analysis technology has been one of the greatest threats to information security. SCA decrypts the key information in the encryption device by establishing an appropriate leakage model. As one of many…
read more here.
Keywords:
regression;
channel analysis;
template analysis;
analysis ... See more keywords